Search Results

Search found 19664 results on 787 pages for 'python for ever'.

Page 535/787 | < Previous Page | 531 532 533 534 535 536 537 538 539 540 541 542  | Next Page >

  • IIS Redirection - command line

    - by clklachu
    I have a website say www.mywebsite.com/demo . When ever if anyone requests this site, i want to navigate to another website www.myanotherwebsite.com . I know that this can be done in IIS by using the HTTP Redirect feature. But since i want to do this for different websites, I would like to write a bat file which would run the command to set the redirect url for a website. Can anyone please help me how to set the redirection URL through command line?

    Read the article

  • Why can operator-> be overloaded manually?

    - by FredOverflow
    Wouldn't it make sense if p->m was just syntactic sugar for (*p).m? Essentially, every operator-> that I have ever written could have been implemented as follows: Foo::Foo* operator->() { return &**this; } Is there any case where I would want p->m to mean something else than (*p).m?

    Read the article

  • Flushing JDBC connection pools

    - by Matt
    Does anyone know the best (or any) way to flush a JDBC connection pool? I can't find anything obvious in the documentation. It appears connection pools aren't meant to ever be deleted. My current thought is to delete all DataSources from the hash we store them in, which will trigger our code to make new ones. However, my first attempt throws a ConcurrentModificationException.

    Read the article

  • Double reversals on technology decisions

    - by Kev
    Have you ever gone through a painful switch from one technology to another, only to switch back later in a project's lifetime? Was it because the technologies evolved differently than you expected, or because of something you didn't understand about them in the first place, or because they didn't fly when it came to beta testing or production? Did you regret the switch back too?

    Read the article

  • Antique Software [closed]

    - by Antique
    Will software ever be considered "antique"? In other words, is a stack of punch cards worth anything? (Perhaps if they were made by someone special, or the program on them was some type of programming milestone?) What about modern software?

    Read the article

  • How do I set a resource file to non-embedded

    - by themaninthesuitcase
    In Visual studio 2008 is it possible to have a resource file that is included as a separate file after compilation rather than as an embedded resource. This is to enable small changes to be rolled out more easily. I have tried build options of Resource, None, Compile and also copy local on and off for most of these. However when ever I try access the resource at run time I get a cannot find resource exception. Is this actually possible or am I wasting my time?

    Read the article

  • jquery.hover on iphone

    - by Sam
    I use jquery.hover to toggle a class when someone mouses over a link. On the iphone when someone taps the link, it toggles the class on, but it doesn't ever toggle the class off until they tap somewhere else.

    Read the article

  • Can't retrieve an id through swfupload

    - by RichieH
    I'm having trouble retrieving an echoed ajax response through SWFupload. Upon uploading a file, my account.php?action=uploadphotographs echos the number 37, the text field hidFileId should then be updated with this data. I'm not sure if the file is ever properly being submitted. Is there something wrong with my code? Heres a link to my SWFUpload code: http://pastie.org/962656 Thanks a lot!

    Read the article

  • As a programmer, what are some telltale signs that you're about to get fired or laid off?

    - by plaureano
    If you have ever been fired from a job, did you notice anything different about the behavior of your peers or upper management just before your termination? What are some common signs to look for among your coworkers and project manager(s) that would indicate your position is severely at risk? EDIT: My instincts were right, and I opted to resign rather than face termination. I guess when you have that "gut feeling" that something is about to happen, it's a strong sign that you should be heading for the exit...

    Read the article

  • Strange phantom header margin bug html/css

    - by MickyJimbo
    So I'm creating this website and there is a strange untraceable bug that causes the header to move down 10 or so pixels. On a refresh the header could be correct or it could be broken. I've been testing it on Adobe Browserlab and the results are different every time.There is no discernible pattern making it incredible hard to track down. http://www.freeimagehosting.net/uploads/c866bf594d.jpg Has anyone ever had this problem and been able to fix it?

    Read the article

  • What's wrong with foreign keys?

    - by kronoz
    I remember hearing Joel mention in the podcast that he'd barely ever used a foreign key (if I remember correctly). However, to me they seem pretty vital to avoid duplication and subsequent data integrity problems throughout your database. Do people have some solid reasons as to why (to avoid a discussion in lines with SO principals)? Edit: "I've yet to have a reason to create a foreign key, so this might be my first reason to actually set up one."

    Read the article

  • MODx changing my image path

    - by Austin
    In the MODx WYSIWYG whenever I click the Image icon to insert an image, followed by browse image it generates the wrong path: /data/12/1/111/99/1111262/user/1169144/htdocs/images/image.jpg instead of assets/images/image.jpg I have checked my Resource URL and Resource Path and they both look correct. Has anyone ever experienced MODx rewriting your paths to the server vs what it should be? Thanks in advance.

    Read the article

  • Eclipse Memory usuage in Windows Vs Linux..

    - by Nareshreddy Kola
    Can someone please give me the details about the Eclipse memory usage in Windows XP and Linux? I heard Eclipse consumes less memory in Linux compared to Windows? Is it true? What ever the OS is, IDE will look for some amount memory so how will it vary with OS? Related Question: Eclipse memory use

    Read the article

  • Flash AS3 - Access external swf on the same domain

    - by christinelalala
    Hi, I ran into this problem and could not solve it, so I have a swf file that loads assets from another swf file, everything's fine, until I put them on the server, they are under the same domain, relative path doesnt work nor does absolute path. This is not even a cross domain problem, since both files are on the same server. Did anyone ever have the same problem? Thanks.

    Read the article

  • Table in DB for generating primary keys?

    - by Sapphire
    Do you ever use a separate table for "generating" artificial primary keys for DB (and why)? What I mean is to have a table with two columns, table name and current ID - with which you could get new "ID" for some table by simply locking the row with that table name, getting the current value of the key, increment it by one, and unlock the row. Why would you prefer this over standard integer identity column? P.S. The "idea" is from Fowlers Patterns of Enterprise Application Architecture, btw...

    Read the article

  • Automatically download files in Ruby

    - by Obinna
    I'm trying to write a ruby script which automatically downloads some files from some server ever 30-45 minutes (to prevent overload) as long as my computer is turned on. It's possible that my computer might be turned off at some point, but the download should resume (probably re-download the current file). I already have the file list but I can't figure out how to make such a script to run autonomously. What are some ways I can do this?

    Read the article

  • How to get if the object is already retrieved in inject

    - by zerkms
    Is it possible to know that particular dependency already has been satisfied by ninject kernel? To be clear: Let's suppose we have this module: Bind<IA>().To<A>(); Bind<IB>().To<B>(); And some "client"-code: var a = kernel.Get<IA>(); // how to get here "true" for assumption: "IA was requested (once)" // and "false" for: "IB was not requested ever"

    Read the article

  • pass commands to an running R-Runtime

    - by tiny81
    Hi, is there a way to pass commands (from a shell) to an all ready running R-runtime/R-Gui, without copy&past. So far I only know how to call R via shell with the -f or -e option, but in both cases a new R-Runtime will process the R-Script or R-Command I passed to it. I rather would like to have an open R-Runtime waiting for commands passed to it (via what ever connection is possible). regrads, Tiny

    Read the article

  • Converting MS Word 2002 Templates from PC to Mac

    - by Spacehamster
    I've been asked to convert several hundred MS Word 2002 Templates (on the PC) to work on the Macintosh. I have to evaluate whether the Word Templates can be run in iWork Pages and Microsoft Word for the Mac. The biggest issues that I've found thus far are that I'm unable to convert the following - Macros WordBasic code Visual Basic Has anyone here ever done this before and can provide any suggestions?

    Read the article

  • Will this only allow certain extensions?

    - by Dr Hydralisk
    I found this snippet that says will only allow certain file types. Will it work and could someone bypass it to upload what ever file type they want? And could someone explain the substr part, i don't get how it works.. <?php function CheckExt($filename, $ext) { $name = strtolower($filename); if(substr($name, strlen($name) -3, 3) == $ext) return true; else return false; } ?>

    Read the article

  • RegCreateKeyEx - does it update the returned handle on failure?

    - by Permaquid
    MSDN documentation seems silent on whether RegCreateKeyEx ever updates the value of the handle referred to by its second-last parameter when it fails. My tests have only shown it not to update this - i.e., I set h = 0 before the call, pass &h to a call to RegCreateKeyEx to open a non-existent key, and see h = 0 after the call. Does anyone know of any situation in which the handle would be changed?

    Read the article

  • Am I supposed to store hashes for passwords?

    - by Doug
    User System and Passwords: I was looking through MD5 stuff, and I am wondering what is the normal/good practice for passwords. Right now, I think people super encrypt the passwords and store the hashes. If so, how does password checking work? I just have the input password go through the encryption process again and then check the hash with the stored one, correct? This question may contradict the above, but should my salt ever be a randomly generated value?

    Read the article

< Previous Page | 531 532 533 534 535 536 537 538 539 540 541 542  | Next Page >