Search Results

Search found 30270 results on 1211 pages for 'bart read'.

Page 487/1211 | < Previous Page | 483 484 485 486 487 488 489 490 491 492 493 494  | Next Page >

  • Developing AI for warhammer board game [closed]

    - by josemanuel
    right now I'm going to develop a simple AI for some units for the board game warhammer fantasy. With some simple rules, I've read some things such as http://gamedev.stackexchange.com/questions/21519/complex-game-ai-for-turn-based-strategy-games . I have the robots to move the pieces, the map is just simple(no hills,buildings..) and I need to start to give an AI for the robot to move the pieces. Problem is I have been searching for a long time and can't really find someone that has done something similar with warhammer, and I don't really know where to begin with or which tools I need to use. I would be glad if someone can give me some headsup on how to begin with, or if any programming language is better, not to mention if there is something similar where I could ask for help.

    Read the article

  • Microsoft Secret Event: New Tablet Unveiling?

    If you read the headline, you know what everyone thinks it will be: a new tablet computer, that Microsoft will manufacture from beginning to end. Apparently, the company believes it will be better able to compete against Apple if it controls both the hardware and the software. But why choose this location for the announcement? Wired thinks it makes sense if the tablet features Xbox live streaming. That would turn the humble device into something of a media machine. Speaking of the device itself, what kind of specs will this hypothetical tablet have? It's hard to say. Microsoft boasts software...

    Read the article

  • Is there a pattern to restrict which classes can update another class?

    - by Mike
    Say I have a class ImportantInfo with a public writable property Data. Many classes will read this property but only a few will ever set it. Basically, if you want to update Data you should really know what you're doing. Is there a pattern I could use to make this explicit other than by documenting it? For example, some way to enforce that only classes that implement IUpdateImportantData can do it (this is just an example)? I'm not talking about security here, but more of a "hey, are you sure you want to do that?" kind of thing.

    Read the article

  • Cancelling WPF Application.Shutdown

    - by MarkPearl
    Today I spent the better part of an hour trying to figure out what I had had done wrong. I had an application that when the user click’s “exit”, it should prompt if they want to save the last unsaved file, or cancel the exit. If the select cancel it should not exit the application. Everything seemed fine in my code, all I was doing was calling Application.Current.Shutdown(); And then capturing the Closing event and setting cancel to true.. (see SO question here) Long story short, If should not have been calling Application.Current.Shutdown() but rather Application.Current.MainWindow.Close(). grrrr… <I must read documentation properly>

    Read the article

  • UEFI hardware and dual booting with windows

    - by user39803
    I've been struggling for 3 days trying to dual boot Ubuntu 11.10 and Windows 7. I want to use an SSD for my Ubuntu installation and an hdd for Windows. I realized that I have to install windows first and then ubuntu, and so I did that. When I first install windows it boots fine from my hdd, but when I add ubuntu on my ssd and restart, I get a black screen with a blinking cursor. I've read many forums where this is asked but haven't found a single solution that works. I've tried boot repair. It told me to make a fat ESP partition and I did that as well but it still doesn't work. I'm a noob and any suggestions would be really appreciated.

    Read the article

  • URL Rewrite Multiple domains under one site. Part II

    I believe I have it Ive been meaning to put together the ultimate outgoing rule for hosting multiple domains under one site.  I finally sat down this week and setup a few test cases, and created one rule to rule them all.  In Part I of this two part series, I covered the incoming rule necessary to host a site in a subfolder of a website, while making it appear as if its in the root of the site.  Part II wont work without applying Part I first, so if you havent read it, I encourage...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • URL Rewrite Multiple domains under one site. Part II

    I believe I have it Ive been meaning to put together the ultimate outgoing rule for hosting multiple domains under one site.  I finally sat down this week and setup a few test cases, and created one rule to rule them all.  In Part I of this two part series, I covered the incoming rule necessary to host a site in a subfolder of a website, while making it appear as if its in the root of the site.  Part II wont work without applying Part I first, so if you havent read it, I encourage...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Who created that user?

    - by AaronBertrand
    Twitter has provided some great fodder for blog content lately. And twice this week, I've found an excuse to take advantage of the default trace. Tonight @meltondba asked: I'm trying to find who created a user act in a DB It is true, SQL Server doesn't really keep track of who created objects, such as user accounts in a database. You can get some of this information from the default trace, though, since it tracks EventClass 109 (Audit Add DB User). If you run this code: USE [master] ; GO CREATE LOGIN...(read more)

    Read the article

  • Rebuilding system databases in 2008 R2

    - by TiborKaraszi
    All my attempts so far to rebuild the system databases in 2008 R2 has failed. I first tried to run setup from below path: C:\Program Files\Microsoft SQL Server\100\Setup Bootstrap\Release But above turns out to be the 2008 setup program, not 2008R2 setup; even though I have no 2008 instanced installed (I have only R2 instances installed). Apparently, the 2008 setup program does a version check of the instance to be rebuilt and since it is > 10.50.0, the rebuild fails. Books Online for R2 the section...(read more)

    Read the article

  • What job is most similar to being a DBA?

    - by fatherjack
    As long as I have worked with computers, and that's a length of time that may be easier on the eye when converted to dog-years, computers have been compared with cars. I guess the car was the most complicated thing in our lives until the PC arrived. We had plenty of time to get used to the car and how it worked, or not, and how it gradually became more complex. We can compare backups to spare tyres, CPU cores to pistons ("the more you blow, the faster you go"), and so on. I am not aware...(read more)

    Read the article

  • Is backing up a MySQL database in GIT a good idea?

    - by wobbily_col
    I am trying to improve the backup situation for my application. I have a Django application and MySQL database. I read an article suggesting backing up the database in Git. On the one hand I like it, as it will keep a copy of the data and the code in synch. But GIT is a designed for code, not for data. As such it will be doing a lot of extra work diffing the mysql dump every commit, which is not really necessary. If I compress the file before storing it, will git diff the files? (The dump file is currently 100MB uncompressed, 5.7Mb when bzipped). Edit: the code and database schema definitions are already in GIT, it is really the data I am concerned about backing up now.

    Read the article

  • Writing files to an Airport Extreme using afp

    - by Bill Oldroyd
    Using Nautilus I can connect from Ubuntu 12.04 (64-bit) to my Apple Airport Extreme using user & password without a problem. I can read, browse folders and delete files. However I cannot write files, the file is created, but the contents of the file are not transferred. The transfer fails with the error message "kFPMiscErr" which I think means that "authentication has already been established" ?. I have tried the command line tools for access using AFP but these do not work either. Is there a solution to this problem ?

    Read the article

  • (Phaser) Preload Future States in Create?

    - by Brian
    I'm a first time user of Phaser, been trying to make a simple point and click type game. I'm trying to keep things very modular, so I'm defining a list of levels (states) in a JSON, and then every level has its own JSON containing the objects within that level. However, I'm encountering an issue in that, when changing states, I get a black flash while the assets for the next state load (this happens whether I iterate through the JSON list or define everything manually). From what I've read, all sprites should be loaded in the preload stage, however, by doing this I'm causing that tiny but noticeable black pause. I know one way would be to simply load every asset at the start of the game, but that seems incredibly inefficient (wouldn't that fill up the memory immensely?). I would rather load a state's assets from the "parent" state. However, in my quick test (which maybe I did wrong) it seems that game.load doesn't work properly if done within the create stage? What is the best approach to doing this?

    Read the article

  • Where has Cloud Computing gone?

    - by Srikar
    I have been hearing about this term for close to 5 years now. I have read about services from Microsoft (Azure), but I have never saw it adopted in the mainstream usage. The thing I am trying to understand is this: What happened to cloud computing? Is the infrastructure at present insufficient to implement this? Is it still in its infancy? Is it being used in other forms, like all the services Google seems to provide (plus Plus Google OS, etc)? If it has failed, then why?

    Read the article

  • What is a byte stream actually?

    - by user2720323
    Can anyone explain me what byte stream actually contains? Does it contain bytes (hex data) or binary data or english letters only? I am also confused about the term Raw Data. If someone asked me to "reverse the 4 byte data", then what should I assume the data is hex code or binary code? Can anyone please clarify this for me. I have read so many articles and in java and c. They used to talk these words frequently but never understood them clearly.

    Read the article

  • Video of my session from SQLBits 8 (Brighton)

    - by NeilHambly
    If you missed my session @ SQLBits 8 (Brighton) on "Queues & Waits" and are feeling somewhat brave, you can now view it in your own home/office and @ your leisure, so pull up a chair and settle in for a hour of "Waiting" .. hmmm that doesn't sound quite right but if you insist Follow this link and enjoy me if Full HDD if that is your preference (is that the right word ?), well hopefully you will not cringe quite as much as I did watching it {But I do think that is universal...(read more)

    Read the article

  • What exactly is a chroot? Is it similar to a simultaneous dual boot?

    - by mathematician1975
    It has been suggested to me that the use of a chroot might solve my problem of building an application that must run on an embedded device. I have inferred from this description that it is somehow similar to creating the embedded environment locally on my machine which I can then use to develop on from my desktop development machine. Is this the right way to look at the functionality or have I totally misunderstood? In order to get some idea of how it works I read this https://wiki.ubuntu.com/DebootstrapChroot which I will attempt to make a chroot for an old Ubuntu version on my machine. However, as I am a total linux novice, I am a bit concerned that as I do not entirely know what I am doing is there anyway that I could end up with an unusable system?? Is this something that a novice should even attempt???

    Read the article

  • What's the recommend way to enable / disable services?

    - by NES
    I read about how to enable and disable services in Ubuntu and it seems that there are different possibilities manage theme? The first method i found is update-rc.d to add new services to startup, which aims on the /etc/init.d folder and it's contents. The other one i found is the way to edit .conf the files in /etc/init folder. What's the recommended way to enable / disable / add services and why? Could you please give a short bulletproof step by step example how to add a service xyz in Ubuntu and enable and disable it?

    Read the article

  • River City Give Camp 4-6 Feb 2011 in Richmond!

    - by andyleonard
    I'm often approached by community members who seek new or better employment. One problem? Experience. You need experience to get a new or better job; you can't get experience without the new gig. </ Catch22 > River City Give Camp is a way to gain some experience, but it's much more than that - it's also a great way to network with others currently working in the field. Sign up ! Show them what you've got! :{>...(read more)

    Read the article

  • How to get some experience in a new programming language? [closed]

    - by BeCool
    I have commercial experience in one programming language but I want to make a switch to another programming language (C#/.NET). I am in full-time employment so whenever I get free time I read relevant books or use online resources available. My questions are - How do I develop experience in the new language of interest (without leaving current job)? The best way I find to learn is to develop a project - How do you / Where can you find new test projects which you can refer to in the interview (these don't have to be real projects but perhaps I can take the code with me in a usb stick as proof). Do you have any tips/advice for me regarding best way to switch career? My lanugauge of choice is C# - so c# related answers will be appreciated.

    Read the article

  • Content Weighting and Sociology

    - by Chris Massey
    I’ve had loads of fantastic feedback on the concept and early curation wireframes I posted on the labs, and it’s led to some further thoughts on the topic of voting. More specifically, thoughts about the kinds of behaviour and values a platform encourages in it’s users via the set of available actions. StackOverflow is a very good example of this kind of sociology in action, not only via the set of available actions, but through the reputation system it uses to both reward and control it’s users. In our case (specifically, in the case of the curation model I’ve been talking about thus far), the main considerations are how the quality of content is judged, and how to make sure each piece of curated content gets a fair hearing. Based on the feedback and conversations I’ve had with many of you over the last few days, a few considerations came to light about how we might need to weight and display our curations, and I’ve written about that more extensively over on the labs themselves – have a read and let me know what you think.

    Read the article

  • New Seagate SSD and Hard Disks

    - by jchang
    Seagate today announced a near complete overhaul of their enterprise product line. This include second generation SSD now with either SAS and SATA interfaces. The first generation Pulsar SSD only supported SATA interface. The new 2.5in 15K and 10K hard drive models have higher capacity. The 2.5in 7.2K hard drive was upgraded to 1TB last month? The 7.2K 3.5in is now available upto 3TB. All models support 6Gbps. The new second generation Seagate Pulsar SSD comprises two product lines. The Pulsar XT.2...(read more)

    Read the article

  • What is the primary use of Vertex Buffer Objects?

    - by sensae
    From what I've read, it seems VBOs are purely for performance. I'm working on a very rudimentary learning project in lwjgl and I'm just trying to figure out what more advanced features of the library I should be delving into, and what their use is. My understanding is that VBOs allow a person to keep vertexes in VRAM while they aren't currently being drawn in a scene. In my case, I'm just drawing quads and performance probably isn't a concern at all, but I'm trying to piece together what's happening under the hood. If I'm drawing quads directly, I'm drawing from the CPU memory, correct? Also, if I'm not doing any checks for visibility, does that mean I'm rendering absolutely everything in the "scene", regardless of whether its in view? Are VBOs a way to store objects and only render what's needed?

    Read the article

  • knetworkmanager not starting at all

    - by yoshi
    It seems that my knetworkmanager is not starting anymore. Read: In KDE4's sys tray I don't have a icon to manage my networks. Also when starting it from terminal or kick off menu literally "nothing" happens. I don't know what's wrong with it. Sadly after reading this answer on superuser.com it seems I can not connect to wifi via iwconfig 'cause my network is WPA2 encrypted. (Basically I can not set they passphrase - invalid argumenterror.) So it seems I've to get knetworkmanger running again as I also can't download other tools. I've tried stuff like sudo service network-manager restart but it didn't seem to help. I'm kinda puzzled so any help for this would be appreciated. PS: If it hasn't become clear: The whole drama of is simply I can't connect to wifi and internet :o)

    Read the article

< Previous Page | 483 484 485 486 487 488 489 490 491 492 493 494  | Next Page >