Search Results

Search found 18450 results on 738 pages for 'mobile programming'.

Page 486/738 | < Previous Page | 482 483 484 485 486 487 488 489 490 491 492 493  | Next Page >

  • Parallel port recording to file on Win XP

    - by Nikola Kotur
    Hi there. I need to write a simple program that records all the input from parallel port into a file. Data flows from industrial machine, setup is fairly simple, but I can't find any good open source examples on parallel port reading for Windows. Do you know a software that does this (and lets me learn how to do it myself), or is there any guideline for parallel port programming on XP? Thanks.

    Read the article

  • How to use prettify with blogger/blogspot?

    - by billpg
    Hi everyone. I'm using blogger.com to host some texts on programming, and I'd like to use prettify (same as stackoverflow) to nicely colour the code samples. How do I install the prettify scripts into the blog domain? Would it be better (if indeed its possible) to link to a shared copy somewhere? I have webspace on a different domain. Would that help? Many thanks.

    Read the article

  • Trouble with inheritance

    - by Matt
    I'm relatively new to programming so excuse me if I get some terms wrong (I've learned the concepts, I just haven't actually used most of them). Trouble: I currently have a class I'll call Bob its parent class is Cody, Cody has method call Foo(). I want Bob to have the Foo() method as well, except with a few extra lines of code. I've attempted to do Foo() : base(), however that doesn't seem to work like. Is there some simple solution to this?

    Read the article

  • Fluent API Style Usage

    - by Chris Dwyer
    When programming against a fluent API, I've seen the style mostly like this: var obj = objectFactory.CreateObject() .SetObjectParameter(paramName, value) .SetObjectParameter(paramName, value) .DoSomeTransformation(); What is the reasoning behind putting the dot at the beginning of the line instead of the end of the line like this: var obj = objectFactory.CreateObject(). SetObjectParameter(paramName, value). SetObjectParameter(paramName, value). DoSomeTransformation(); Or, is it merely a style thing that a team makes a consensus on?

    Read the article

  • Differnce between linux write and sendfile syscall

    - by JosiP
    Hi Im programming webserver (C), which should send big files. My question is: What are the main differneces in two syscalls: write and sendfile. Does sendfile depends on size of socket system buffer ? I noticed that write often writes less then i requested. For example, if got many requests for one file: should i open it, copy into memory and use 'write', or maybe i can do 'sendfile' for each client ? thx in advance for all answers

    Read the article

  • cool project to use a genetic algorithm for?

    - by Ryan
    I'm looking for a practical application to use a genetic algorithm for. Some things that have thought of are: Website interface optimization Vehicle optimization with a physics simulator Genetic programming Automatic test case generation But none have really popped out at me. So if you had some free time (a few months) to spend on a genetic algorithms project, what would you choose to tackle?

    Read the article

  • Video Game Bots?

    - by cam
    Something I've always wondered, especially since it inspired me to start programming when I was a kid, was how video game bots work? I'm sure there are a lot of different methods, but what about automation for MMORPGs? Or even FPS-type bots?

    Read the article

  • Handling User Authentication in C#.NET?

    - by Daniel
    Hi! I am new to .NET, and don't have much experience in programming. What is the standard way of handling user authentication in .NET in the following situation? In Process A, User inputs ID/Password Process A sends the ID/Password to Process B over a nonsecure public channel. Process B authenticates the user with the recieved ID/Password what are some of the standard cryptographic algorithms I can use in above model? thank you for your time!

    Read the article

  • Flash in Python

    - by iamgopal
    I was exploring possibilities of Rich Internet applications using Python. The most awesome possibility I found was of programming in IronPython and running it as a Silverlight. Is there something similar available for Adobe AIR? I.e. programing in Python and run in Adobe AIR (Flash, that is).

    Read the article

  • Column variables in Excel?

    - by Ryan
    Let's say I have column A and Column B. Cells in Column A contain either "Y" or "N". How can I set the value of the cell in the corresponding row in Column B with a formula that detects if the cell's value = "N"? Not new to programming logic but to Excel formulas, thanks for your help. -Ryan

    Read the article

  • Design Patters in Rails

    - by Winston
    I remember, I have a GoF book back in college about design patterns which helped me a lot with my C and C++ programming, since my jump ship to Rails I was trying to use those design patterns I learned previously, Rails is a relatively new paradigm to me, plurals, verbs, REST, DRY.. Can you give me a recommended book for Rails that I can easily understand what I previously learned back in College. P.S. I suspect Matz knew about the GoF book, and applied it on Ruby... :-)

    Read the article

  • QR Codes for Files on Google Code

    - by Synetech inc.
    Hi, When you download files from Google Code now (example), in addition to the text version of the SHA1 hash, it includes a QR code of it. The device that the file was downloaded to is the one that has to hash the file. But, if it can download the file (ie, has access to the webpage), it also has access to the text version of the hash, so the QR code seems completely useless—and more work to decode when the raw text is available. How would reading the hash into a mobile phone allow you to verify the file you download to the computer? Or if you download the file to the phone, how would you use the phone to take a picture of the QR code displayed on the webpage on its own screen? Does anyone know what the point to the QR code is or how you would use it to verify the downloaded file (I don’t mean QR codes in general, but specifically in this context).

    Read the article

  • Does oneway declaration in Android .aidl guarantee that method will be called in a separate thread?

    - by Dan Menes
    I am designing a framework for a client/server application for Android phones. I am fairly new to both Java and Android (but not new to programming in general, or threaded programming in particular). Sometimes my server and client will be in the same process, and sometimes they will be in different processes, depending on the exact use case. The client and server interfaces look something like the following: IServer.aidl: package com.my.application; interface IServer { /** * Register client callback object */ void registerCallback( in IClient callbackObject ); /** * Do something and report back */ void doSomething( in String what ); . . . } IClient.aidl: package com.my.application; oneway interface IClient { /** * Receive an answer */ void reportBack( in String answer ); . . . } Now here is where it gets interesting. I can foresee use cases where the client calls IServer.doSomething(), which in turn calls IClient.reportBack(), and on the basis of what is reported back, IClient.reportBack() needs to issue another call to IClient.doSomething(). The issue here is that IServer.doSomething() will not, in general, be reentrant. That's OK, as long as IClient.reportBack() is always invoked in a new thread. In that case, I can make sure that the implementation of IServer.doSomething() is always synchronized appropriately so that the call from the new thread blocks until the first call returns. If everything works the way I think it does, then by declaring the IClient interface as oneway, I guarantee this to be the case. At least, I can't think of any way that the call from IServer.doSomething() to IClient.reportBack() can return immediately (what oneway is supposed to ensure), yet IClient.reportBack still be able to reinvoke IServer.doSomething recursively in the same thread. Either a new thread in IServer must be started, or else the old IServer thread can be re-used for the inner call to IServer.doSomething(), but only after the outer call to IServer.doSomething() has returned. So my question is, does everything work the way I think it does? The Android documentation hardly mentions oneway interfaces.

    Read the article

  • X locks up with konqueror on comics.com

    - by retracile
    If I browse to comics.com using konqueror under KDE on Fedora 11, X will, after a delay, lock up. The mouse will move, but no keyboard input is recognized, and the screen does not react to the mouse passing over objects on screen. I am able to ssh into the machine and issue shutdown -r now and have that work. The machine is a Dell XPS M1330 with Intel Corporation Mobile GM965/GL960 Integrated Graphics Controller (rev 0c), and Fedora 11 is fully updated. Visiting the same site in Firefox does not cause a lockup. I am booting with nomodeset since it won't boot into X otherwise. I tried the other two accel options: EXA (still locks up) and XAA (X won't start). Any suggestions on how I can debug this? bugzilla

    Read the article

  • Is there any SMS/MMS server for LAN environment

    - by Chau Chee Yang
    I am looking for a solution to send SMS/MMS message to mobile device from desktop or browser in LAN environment. As such, it is most probably using TCP/IP protocol to transmit request/response. The server may attach to a GSM device with SIM card attached. An server application would then start accept the request from any LAN client and convey the SMS/MMS to one or more recipients. The server may log all requests for further traffic analysis in later stage. Is there any solution that able to perform what I describe here. Please advice.

    Read the article

  • When to use Python special methods?

    - by bodacydo
    I know that classes can implement various special methods, such as __iter__, __setitem__, __len__, __setattr__, and many others. But when should I use them? Can anyone describe typical scenarios when I would want to implement them and they would simplify programming in Python? Thanks, Boda Cydo.

    Read the article

  • Howto start writing iPad applications?

    - by Lothar
    I know Objective-C from Desktop Apple Programming. But i want to jump on the iPad bandwagon and start developing some small edutainment applets. Is the iPad API the same as iPhone just with more power? Do i need to join the iPhone developer program and does it still start with $100. Is there any iPad emulator yet?

    Read the article

  • Can't connect to exchange thru my smart phone

    - by Hoorayo
    We just moved Exchange server from our company to Local data center. Everything is working except mobile access. There is no problem with receiving and sending email from outlook of my laptop, but I can’t connect to exchange server from my smart phone to receive email. While I am setting up exchange account for my phone(Google) , it recognizes when I put wrong password. But it says “Unable to open connection to server” with right password and ID. Is there any option for IP address for this service when I move my server to different location? Please, help me out for any clue.

    Read the article

  • What parts of this book are outdated? "Design of the UNIX Operating System" by Maurice Bach, 1986

    - by blee
    I learned programming on the job via high-level languages. I'm trying to gain a better understanding of the lower-level workings of computing and picked up "Design of the UNIX Operating System" by Maurice Bach. What do I need to know in terms of which topics in this book may not be relevant to understanding Linux nuts and bolts? Is there a newer book or Linux-specific book that I should read instead? I really like the clarity of this particular book, though.

    Read the article

  • How to send a popup message to unknow computer connected to my WLAN?

    - by Leandro
    Is there any way to send a popup message from a Linux systen to a "random" laptop/tablet/mobile linked to my Wireless network ? For example, if I let my WLAN open and I see a not recognized computer connected to it, is there anyway to send to that device a message ? On the other hand, if I am connected to someone else open network and they may or may not be aware that their network is open, can I send them a message warning that I am accessing their network? Probably for a completely "random" device the answer should be no. But if we restrict to laptops with Win7 or Linux SO is there any service running by default on such systems that allows one to send such popup messages ? PS: I have no practical motivation for this question. This is only a curiosity.

    Read the article

< Previous Page | 482 483 484 485 486 487 488 489 490 491 492 493  | Next Page >