If I develop a unique software using an open source software, do I have all rights to protect my Intellectual Property?
I dont know, if this is the right place to ask this question. But kindly answer
I want to publish some software for different Linux distributions, using the regular Linux packaging formats (rpm, deb, yast, etc). My package will require a click-thru license agreement. Which Linux tools and package formats support a license in the package which is shown to the user before installing the software?
My program is trying to create an key on the
HKLM\Software\Microsoft\Shared Tools\MSCONFIG\startupreg\test\
but instead the key is created on the
HKLM\Wow6432node\Software\Microsoft\Shared Tools\MSCONFIG\startupreg\test\
and don't work properly... Why? How can I solve it?
I've been developing some software which uses the libusb-win32 library to interact with some USB hardware I've been developing. Now I'm trying to run the same software on windows 64 but the drivers don't seem to work (understandably).
Are there any alternatives for 64 bit Windows I've overlooked?
I need software that will rip a site via HTTP. It needs to download the images, HTML, CSS, and JavaScript as well as organize it in a file system.
Does anyone know of software that does this? Or would I be better off just writing it myself?
I am working on a huge web-application with hundreds of dependencies (jar files). I want to organise the jars in sensible way as each piece of software comes with its bunch of jar files and when I want to remove or upgrade version of that software it will be easier to do if kept in sub directories.
Problem is that when using a web-server (I'm using tomcat), all libs need to be under WEB-INF/lib folder, you cannot create subdirectories otherwise it doesn't load the jars in subdirectories.
Thanks.
I have Table A. How can I select from Table A to get Table B Format.
Table A
Employee Name Effective Date FieldType FieldValue
Maung Mya 1/1/2005 Title Project Engineer
Maung Mya 1/1/2005 Department IT Department
Maung Mya 1/1/2007 Title Assist Project Manager
Kyaw Kyaw 1/1/2006 Title Software Engineer
Kyaw Kyaw 1/1/2006 Department IT Department
Table B
Effective Date Employee Name Title Department
1/1/2007 Maung Mya Assist Project Manager IT Department
1/1/2006 Kyaw Kyaw Software Engineer IT Department
Anyone please suggest me.
Thanks in advance.
I have a table that describes which software versions were installed on a machine at various times:
machine_id::integer, version::text, datefrom::timestamp, dateto::timestamp
I'd like to do a constraint to ensure that no date ranges overlap, i.e. it is not possible to have multiple software versions installed on a machine at the same time.
How can this be achieved in SQL? I am using PostgreSQL v8.4.
I need a very simple SMTP server running on my computer for notification software that I developed. I tried "Free SMTP SERVER" and "QK SMTP SERVER 3", but for some reason they don't work, they always give me a time out error.
Do you know some good SMTP server software? Thanks.
I really want to know if I'm missing anything obvious in the software I'm developing.
What User Interface features that you consider important are often missing in most software?
This question maybe a better fit on The Business of Software forum but despite my post on there, I'm still unable to determine the following: Can I use the Google API to build commercial software? If not how can the people behind Byline charge for their app?
Update: I'm specifically interested in Google's Picasa & Reader APIs
Hi, there's a website i visit that always has these code giveaways where you get a prize for cracking the code. The code is in a format like this:
QBYQC-Y??T3-W7G4R-QP4HG-2WQPT
and they'll give you a hint such as two letters or a number and a letter. The solution to this is easy, brute-forcing it. However, I need the software that will make my browser repeatedly enter a new combination. What software can I use on Mac (and if not, Windows)?
I want to create a Java Desktop Application and want to employ some mechanism to protect my software from illegal copy. What is the general best approach to implement the serial number and activation protection for Java Application? If the user can activate the software correctly, where to store the activation info?
Thanks.
We're trying to switch to Scrum as our development process but we're not sure how to implement it in the best way possible.
We also don't want to pay for expensive software tools until we get scrum working and get positive results.
How can we implement scrum using a whiteboard without asking people to write down their time on the board and then also input into our own time tracking software?
What kind of methodologies do you use?
I attended a payroll software demo yesterday wherein the year dropdowns throughout the software ran from 2000 to 2200. Now, we've all been down this road before with 2 digit shortsight, but honestly - a 200 year service life for a Java & Oracle payroll system? Our Board of Directors would be thrilled if the company was even solvent for 1/4th that long.
When forced to use a dropdown year select, where do you draw the line?
So right now I have a good job as a software development intern for a company called Country Maid. I know that having 4 years of experience when I graduate from college (I'm currently a freshman) will look good on a resume. But I started to wonder, would 4 with one company be best, or 4 years split up between multiple companies be best?
So my question is, when hiring a software developer straight out of college, what kind and how much experience to companies look for?
~N
I've been working on a program to monitor a network folder to find out which spreadsheets our company uses are the most popular. I'm using the FileSystemWatcher class in C# to do the monitoring. I've noticed I'm getting updates to files that are in folders that my user does not have permission to browse. I understand that my software is subscribing to a list of updates done by other system software and not actually browsing those files itself, but is this functionality intentional or is it a bug?
I have a document storage application that I need to integrate with a scanner software or create one on my own. I have very limited funding so buying an expensive alternative isn't really an option.
I thought about just linking to the customer's scanning software's executable and opening it when they want to scan but that just seems like a bad way of doing it.
Anyone have any suggestions on how I do this?
Thanks as usual,
Eroc
i have one coral draw file and i don't have coral draw software with me.
is this possible to open that file in PSD or convert into PSD or image format.
i search on internet but didn't find any free software or plug in.
Thanks
This is not working for me:
public bool createRegistry()
{
if (!registryExists())
{
Microsoft.Win32.Registry.LocalMachine.CreateSubKey("Software\\xelo\\");
Microsoft.Win32.Registry.LocalMachine.OpenSubKey("Software\\xelo").SetValue("hostname", (string)hostname, Microsoft.Win32.RegistryValueKind.String);
return true;
}
else
{
return updateRegistry();
}
}
The exception error is to do with Not Authorized to do this. Any Help would be apreaciated
Exeption: System.UnauthorizedAccessException | "Cannot write to the registry key"
I'm trying to figure out the origin of the view handler design pattern in software engineering. Many of the design patterns in software engineering were inspired by things which pre-date computers, and I was wondering if anybody had any insights on the origin of this particular pattern.
Hi,
Are there any open source implementations of the Ribbon interface available? I need to use them in a GPL licensed software, so the library should be compatible with GPL. The software is in VC++ 2005.
What is the total number of software developers in the world?
And to respond to the inevitable "How do you define a software developer?" -- I'll answer two ways:
Define it as "Anyone who writes code to make a computer do something he wants done".
Define it however you like and then answer the question
References to studies or more authoritative sources of information would be greatly appreciated.
Possible Duplicate:
Protect .NET code from reverse engineering?
we just develop a application with C# winforms, is there any good encryption method to help us prevent from piracy ?
I saw some software may need hardware support to protect their software, how to implement that ?
Thanks in advance !
Without purchasing someone elses software, how can I as a software engineer, delete index.dat? What OS Voodoo hoops do I have to jump through to accomplish the simple deletion of a single file on my own computer? I have windows Vista.