Search Results

Search found 21659 results on 867 pages for 'welcome always'.

Page 258/867 | < Previous Page | 254 255 256 257 258 259 260 261 262 263 264 265  | Next Page >

  • At what point does a good programmer know he is skilled programmer? [closed]

    - by Eritrea
    Possible Duplicate: How Can I Know Whether I Am a Good Programmer? I am just guessing, there is no end to programming, there is always someone who know what you do not know, once you learn it all something evolves out of somewhere, and you have to learn that one. It is a perpetually process eventually. But, at what point can you consider yourself, you are worth much in the programming world? By the amount of your reputation on Stackechange or if you create your own software...? When can you even know?

    Read the article

  • Chrome window freezes in Ubuntu

    - by Dragon5689
    Sometimes, especially when I open pages that have some kind of multimedia contents, Chrome freezes. It always happens directly after opening a new tab. In contrast to the way Chrome usually has only tabs crashing, the entire windows freezes. If I have multiple separate Chrome windows open, the others keep working. I run Ubuntu 12.04 and Chrome in version 20.0.1132.47 but this has been going on since I last set up my machine around half a year ago. Anyone having the same problems or an idea what could be wrong here?

    Read the article

  • Run Tests in Folder

    - by Tomas Mysik
    Hi all, today we would like to show you another minor improvement we have prepared for NetBeans 7.2. Today, let's talk a little bit about testing. This minor improvement will be useful especially for users who have a lot of unit tests (it means all of us, right? ;) - just right click on any folder underneath Test Files node and you will notice: The result is as expected - all the tests from the given folder are run: That's all for today, as always, please test it and report all the issues or enhancements you find in NetBeans BugZilla (component php, subcomponent PHPUnit).

    Read the article

  • How far can you get in iOS without learning PhotoShop or another graphic design program? [on hold]

    - by Aerovistae
    I'm in the process of learning iOS, and I'm coming from a web dev background where CSS controls 70-90% of the UI, and Python/C++ desktop dev where there are highly customizable UI toolkits for most things. I'm trying to figure out how people make good-looking apps without graphic design skills. You always hear about some 8 year old or 14 year old who made a successful app. So I assume that even if the required code was relatively basic, the app must have looked good if it was a success. But I find it really unlikely that these kids have advanced PhotoShop skills as well as having learned iOS programming at such a young age. Frankly, the same goes for most independent app developers....as they say, unicorns don't exist. So what's the deal? Can you make a good-looking, market quality app without those skills? What are the limitations?

    Read the article

  • How to have similar sound quality in Banshee and Rhythmbox (or Totem) ?

    - by Alkalyzer
    Hello, I am running Ubuntu 10.10 on an Acer Aspire 6390G. With its 5.1 embedded sound system, this laptop is good at playing music using in-built speakers. The soundcard is an HDA-Intel ALC888. When I use Rhythmbox (version 0.13.1) (or Totem) (and the in-built speakers), the sound is deep, warm, great. But with Banshee (version 1.8.0.), it is always crispy and basically of poor quality when the Banshee equalizer is disabled. I know that it is possible to fine tune Banshee sound using the equalizer, but after some time spent trying to properly adjust it without success, I decided to ask this question on askubuntu.com. Is there a way to get the same sound quality in Banshee as in Rhythmbox (or Totem) or keeping on adjusting Banshee equalizer is the only alternative to try to solve this problem ? (If the answer is the latter, is there anyone who would be kind enough to provide me his equalizer settings ?) Thanks all for your answers.

    Read the article

  • What to do if I hate C++ header files?

    - by BlaXpirit
    I was always confused about header files. They are so strange: you include .h file which doesn't include .cpp but .cpp are somehow compiled too. NOTE: I UNDERSTAND EVERYTHING ABOUT THE HEADERS, PLEASE DON'T TELL ME I'M STUPID OR SHOULD USE OTHER LANGUAGE Recently I joined a team project, and of course, both .h and .cpp are used. I understand that this is very important, but I can't live with copy-pasting every function declaration in each of multiple classes we have. How do I handle the 2-file convention efficiently? Are there any tools to help with that, or automatically change one file that looks like example below to .h and .cpp? (specifically for MS VC++ 2010) class A { ... Type f(Type a,Type b) { //implementation here, not in another file! } ... }; Type f(Type a) { //implementation here } ...

    Read the article

  • Help on PHP CURL script [closed]

    - by Sumeet Jain
    This script uses a cookie.txt in the same folder chmoded to 777... The problem i am facing is i hav many accounts to login... Say if i hav 5 accounts...i created cookie1.txt,cookie2.txt an so on.. then the script worked..with the post data But i want this to be always logged in and post data.. Can anyone tell me how to do this????? Code which works for login and post data is http://pastebin.com/zn3gfdF2 Code which i require should be something like this ( i tried with using the same cookie.txt but i guess it expires :( ) http://pastebin.com/45bRENLN Please help me with dealing with cookies... Or suggest how to modify the code without using cookie files...

    Read the article

  • How can I programmatically block user input for a given time?

    - by black_puppydog
    As a person working in computer science working offline to avoid facebook and thelike is not always (meaning hardly ever) possible for me since I mostly have to be online to work. I have tried leechblock and similar things but the problem becomes that at some point I start making systems for myself to hack, which is kind of pointless if oyu have root. I would very much like to try out the method described here. (Short version: reboot your PC every time finish a task or get bored with it) Unlike for the author of this blog my work is mainly done not in screen sessions but in IDEs ans other not-so-fast-to-start-up stuff, meaning a full reboot including loading all my programs will take its time. So, the question is: How can I block all user input and preferrably blank the screen for a given amount of time? The idea would then be to have a keyboard shortcut to activate the script/program (which would probably also have to have root i guess?)

    Read the article

  • How difficult it is to develope Apps for Android and iOS? [on hold]

    - by netsetter
    I'm an experienced web developer in PHP, HTML, Javascript, MySQL, CSS and I'm running communities where people can register to be able to login and do some stuff. Now more and more people are requestion an App, I told them that I have no time and experience to develope Apps with many functions for such complex communities I am running, but then the users told me what would be enough for them and this sounds already simpler to me: An app to install on Android / iOS just to be able to login (+ autologin), so they appear always online in the community when they have internet connection. Then only 1 function like a counter of new activities regarding their user account (new messages, new replies, etc..), and if they click on the app then a browser window will open to read the info at the main website. So, what you think, it will be a big thing to develope such an app for the members? Is there a big diffrence between developing for Android and iOS? How to test the App if you don't have an Android or iOS phone in example?

    Read the article

  • Windows 7 and 11.10 side by side from scratch what am I doing wrong?

    - by Bill.Caffery
    I have tried everything I can think of at this point and I'm at a total loss. I have a 2TB drive I want to install Windows 7 and 11.10 (both are 64 bit) side by side, but once I install Windows it must need gpt to work or something because no matter how many times I've removed it, it always returns. If I use gdisk and set the disk as mbr, Windows won't load. Now this last time I ran gdisk and tried to boot into Windows before I installed Ubuntu all the way and ended up at a grub rescue prompt. Any help please? Also let me say I have been searching and reading for days and have tried everything I can find to make this work so this isn't a one time event, it's continual.

    Read the article

  • Building an instance system.

    - by Kyle C
    I am looking into how to design an instance system for the game I am working on. I have always wondered how these are created in games like World of Warcraft, where instances == dungeons/raids/etc). Areas that are separated from players other than those in your group, but have specific logic to them. Specifically how can you reuse your existing code base and not have a bunch of checks everywhere ? if (isInstance) do x; else do y; I don't know if this will make too much of a difference on any answers, but we're using a pretty classic "Object as pure aggregation" component system for our entities.

    Read the article

  • laptop suspend broken after latest kernel update

    - by Iestyn ap Mwg
    I ran a software update (Ubuntu 14.04) on my laptop over the weekend, which included an update from kernel 3.13.0-24 to 3.13.0-27, among other things. Today i had to take my laptop to work, so closed the lid and put it in my bag. However, it never went into suspend mode! I tried several times, even rebooting. Finally I tried the previous kernel from the grub menu (reverting back to the -24 one) and suspend works the same as it always had before. Did something suspend related change between the -24 and -27 kernels used in Ubuntu 14.04? I think by only reverting to a previous kernel to temporarily fix it, i've ruled out any other software changes made during the weekend's upgrade.

    Read the article

  • Logout or shutdown shows terminal

    - by N.N.
    When I logout or shutdown the terminal (the one I reach with Ctrl Alt + F7) is sometimes shown before the login screen appears or before the computer is shut off. Is there a way to stop this behavior? More explicitly. If I logout the terminal is sometimes shown for a second before the login screen appears. Also, sometimes when I shutdown (from within Unity or Gnome) the terminal is shown, sometimes for the whole shutdown process or just for a second or two. I've had this problem throughout 10.04, 10.10 and 11.04 and I've always used the standard Ubuntu variant. I've also noticed this happening on a fresh install of Natty on a friends netbook, so it's not local to my computers.

    Read the article

  • Tile transitions - external vs internal

    - by omgnoseat
    I've been looking at a couple of games and noticed that the transitions between tiles are handled somewhat different. I was wondering which methods are to be used in different situations and why. I'm currently using internal edges in a top-down game, and it's working out so far. But I don't want to run into problems later on, and have to redo the whole tileset. I noticed that platforming games mostly use the internal edges, and top-down games mostly use external and hybrid transitions. I can see how these tiles are used to create "depth" in top-down games, where the player apears to be standing in front of a wall for example. But it seems unlikely that such a small feature decides the entire method for tile transitions. You could always alter the bounding box to create the same effect.

    Read the article

  • What's the best web entrepeneur's conference to go on

    - by user4845
    Our dream as business partners was always to go to a conference overseas. Now that we can finally afford to, we have no clue of which one to go to. Which conference would you guys suggest from a web entrepeneur's point of view, if there were just one to go to? Perhaps something that included a bit of marketing, new thinking, innovation, inspiration. We were very keen on Google IO previously, but were concerned that it would be very Google product focused. Huge thanks!

    Read the article

  • What resources about business should an internal IT department programmer be familiar with

    - by Badger
    I am developer / analyst in an internal IT department at a medium sized business. I have to deal with business people all the time and many of the things I create can have profound impacts on the business. I am starting to regret not taking any business classes in college because I don't understand the first thing about running a business so I don't always understand what people are wanting, the best I can do is "think through it". Does anyone have suggested methods of learning this stuff, maybe some resources. And please don't just say to ask people who work here. I have tried that before and I get no where.

    Read the article

  • Parsing glGetShaderInfoLog() to get error info. Is this reliable, or is there a better way?

    - by m4ttbush
    I want to get a list of errors and their line numbers so I can display the error information different to how it's formatted in the error string, and also show the line in error. It looks easy enough to just parse the result of glGetShaderInfoLog(), look for "ERROR:" then read the next number up to : and then the next, and then the error description up to the next newline. But the OpenGL docs say "Application developers should not expect different OpenGL implementations to produce identical information logs." Which makes me worry that my code may behave incorrectly on different systems. I don't need them to be identical, I just need them to follow the same format. So is there a better way to get a list of errors with line number separate, is it safe to assume that they'll always follow the "ERROR: 0:123:" format, or is there simply no reliable way to do this? Thanks!

    Read the article

  • How to display lyrics that are stored in MP3-Tag?

    - by Der_Techniker
    How can I achieve that goal? I tried many players - banshee, rhythmbox, amarok, exaile... none of them displays lyrics that are already stored in the mp3. They always try to fetch lyrics from the internet. Interestingly, banshee supports STORING lyrics into the mp3 but not READING - I find that annoying... One player though does it properly - gmusicbrowser. But this piece of software has a so confusing user interface - I don't wanna use it. Any ideas?

    Read the article

  • XNA: draw a sprite in 3d, is that possible?

    - by Heisenbug
    since now I always used sprited to draw in 2D: spriteBatch.Draw(myTexture, rectangle, color); (I suppose the texture is binded internally to 2 triangles and then scaled.) Now, I'm porting my game in 3D and I have to draw several planes (walls, floor, roof,..). Do I need to manually binding a texture to a geometry (for example using VertexPositionColorTexture with VertexBuffer and IndexBuffer), or is there any simpler way to do that? I'm looking for something like spriteBatch.Draw with the rectangle clip specified in 3d space: spriteBatch.Draw(myTexture, rectangleIn3D, color);

    Read the article

  • Where to get PNG icons/graphics for game development for kids? [closed]

    - by at.
    Possible Duplicate: Where can I find free sprites and images? I'm teaching kids to program using Ruby and the gaming framework Gosu/Chingu. Kids love it, including the part where they have to look for the icons/graphics for their game objects. I direct them to iconarchive.com, but the selection is sometimes very limited, the graphics aren't always with transparent backgrounds and sometimes the art requires payment. I don't mind paying for an educational license of some sort, but I want the kids to easily select graphics they can use in their games. Is there another resource better suited for this purpose? I don't have a good solution for this, but would also love a site they can get cool background images for their games.

    Read the article

  • Expression Engine vs Drupal for Theming

    - by user793011
    Ive been using Drupal for years and now with work need to learn Expression Engine. Im interested in the comparison of Drupal and Expression Engine, but purely from a theming point of view (Ive no doubt Drupal is more powerful for development). Does anyone have any insights? It seems EE does give you more control over the exact html outputted, but is this necessary? I design my graphics first and Ive always been able to make exactly what I wanted in Drupal (some theme overrides could be easier, but ive got there in the end). Thanks

    Read the article

  • Can't connect to wireless without typing sudo modprobe b43 in terminal

    - by user90889
    I just upgraded to 12.04 on an old ACER Travelmate 5320 using Broadcom 4311. I wasn't able to connect to the internet through the wireless for a few days. It didn't even display wireless networks. I was finally able to make it work by following the instructions found here: http://linuxwireless.org/en/users/Drivers/b43#supported However, each time I log on to the computer I have to go to the terminal and type sudo modprobe b43 to make the wireless work. Is there somehow I can avoid this? I have used Ubuntu for many years but always relied on other people to help me with the technical stuff. The terminal is alien to me so I literally follow online forum instructions without knowing what I'm doing. Also, I tried many many things before I managed to make it work. So I'm worried I may have installed something that now conflicts with whatever the sudo modprobe b43 does. Thank you

    Read the article

  • Do you use i-->0 for backward loops?

    - by maaartinus
    Some people write for (int i=N; i-->0; ) doSomething(i); instead of for (int i=N-1; i>=0; --i) doSomething(i); for backward loops. The --> "operator"1 looks very confusing at the first glance, but it's trivial: i-->0 simply parses as (i--)>0, and once you get it, you see it immediately. The main disadvantage is the strange look. The advantage is that you'll get it always right (unlike the more verbose version offering the possibility to forget something, which really happened to me a couple of times). What do you think about using the --> "operator"? 1First time I saw the funny term in a comment to this question today.

    Read the article

  • Top Down bounds of vision

    - by Rorrik
    Obviously in a first person view point the player sees only what's in front of them (with the exception of radars and rearview mirrors, etc). My game has a top down perspective, but I still want to limit what the character sees based on their facing. I've already worked out having objects obstruct vision, but there are two other factors that I worry would be disorienting and want to do right. I want the player to have reduced peripheral vision and very little view behind them. The assumption is he can turn his head and so see fairly well out to the sides, but hardly at all behind without turning the whole body. How do I make it clear you are not seeing behind you? I want the map to turn so the player is always facing up. Part of the game is to experience kind of a maze and the player should be able to lose track of North. How can I turn the map rather than the player avatar without causing confusion?

    Read the article

  • Data Source Security Part 2

    - by Steve Felts
    In Part 1, I introduced the default security behavior and listed the various options available to change that behavior.  One of the key topics to understand is the difference between directly using database user and password values versus mapping from WLS user and password to the associated database values.   The direct use of database credentials is relatively new to WLS, based on customer feedback.  Some of the trade-offs are covered in this article. Credential Mapping vs. Database Credentials Each WLS data source has a credential map that is a mechanism used to map a key, in this case a WLS user, to security credentials (user and password).  By default, when a user and password are specified when getting a connection, they are treated as credentials for a WLS user, validated, and are converted to a database user and password using a credential map associated with the data source.  If a matching entry is not found in the credential map for the data source, then the user and password associated with the data source definition are used.  Because of this defaulting mechanism, you should be careful what permissions are granted to the default user.  Alternatively, you can define an invalid default user to ensure that no one can accidentally get through (in this case, you would need to set the initial capacity for the pool to zero so that the pool is populated only by valid users). To create an entry in the credential map: 1) First create a WLS user.  In the administration console, go to Security realms, select your realm (e.g., myrealm), select Users, and select New.  2) Second, create the mapping.  In the administration console, go to Services, select Data sources, select your data source name, select Security, select Credentials, and select New.  See http://docs.oracle.com/cd/E24329_01/apirefs.1211/e24401/taskhelp/jdbc/jdbc_datasources/ConfigureCredentialMappingForADataSource.html for more information. The advantages of using the credential mapping are that: 1) You don’t hard-code the database user/password into a program or need to prompt for it in addition to the WLS user/password and 2) It provides a layer of abstraction between WLS security and database settings such that many WLS identities can be mapped to a smaller set of DB identities, thereby only requiring middle-tier configuration updates when WLS users are added/removed. You can cut down the number of users that have access to a data source to reduce the user maintenance overhead.  For example, suppose that a servlet has the one pre-defined, special WLS user/password for data source access, hard-wired in its code in a getConnection(user, password) call.  Every WebLogic user can reap the specific DBMS access coded into the servlet, but none has to have general access to the data source.  For instance, there may be a ‘Sales’ DBMS which needs to be protected from unauthorized eyes, but it contains some day-to-day data that everyone needs. The Sales data source is configured with restricted access and a servlet is built that hard-wires the specific data source access credentials in its connection request.  It uses that connection to deliver only the generally needed day-to-day information to any caller. The servlet cannot reveal any other data, and no WebLogic user can get any other access to the data source.  This is the approach that many large applications take and is the reasoning behind the default mapping behavior in WLS. The disadvantages of using the credential map are that: 1) It is difficult to manage (create, update, delete) with a large number of users; it is possible to use WLST scripts or a custom JMX client utility to manage credential map entries. 2) You can’t share a credential map between data sources so they must be duplicated. Some applications prefer not to use the credential map.  Instead, the credentials passed to getConnection(user, password) should be treated as database credentials and used to authenticate with the database for the connection, avoiding going through the credential map.  This is enabled by setting the “use-database-credentials” to true.  See http://docs.oracle.com/cd/E24329_01/apirefs.1211/e24401/taskhelp/jdbc/jdbc_datasources/ConfigureOracleParameters.html "Configure Oracle parameters" in Oracle WebLogic Server Administration Console Help. Use Database Credentials is not currently supported for Multi Data Source configurations.  When enabled, it turns off credential mapping on Generic and Active GridLink data sources for the following attributes: 1. identity-based-connection-pooling-enabled (this interaction is available by patch in 10.3.6.0). 2. oracle-proxy-session (this interaction is first available in 10.3.6.0). 3. set client identifier (this interaction is available by patch in 10.3.6.0).  Note that in the data source schema, the set client identifier feature is poorly named “credential-mapping-enabled”.  The documentation and the console refer to it as Set Client Identifier. To review the behavior of credential mapping and using database credentials: - If using the credential map, there needs to be a mapping for each WLS user to database user for those users that will have access to the database; otherwise the default user for the data source will be used.  If you always specify a user/password when getting a connection, you only need credential map entries for those specific users. - If using database credentials without specifying a user/password, the default user and password in the data source descriptor are always used.  If you specify a user/password when getting a connection, that user will be used for the credentials.  WLS users are not involved at all in the data source connection process.

    Read the article

< Previous Page | 254 255 256 257 258 259 260 261 262 263 264 265  | Next Page >