Search Results

Search found 19904 results on 797 pages for 'software enthusiastic'.

Page 491/797 | < Previous Page | 487 488 489 490 491 492 493 494 495 496 497 498  | Next Page >

  • Who will prosecute if GPL code is misused

    - by udpsunil
    I have seen using of GPL code in proprietary software which is sold to customers. It seems so wrong that they are not releasing under GPL and not contributing to the Community Is there any authority to check the misuse of GPL? How misuse of GPL can be reported?

    Read the article

  • What library should I use for financial product pricing?

    - by watkins
    I work in software division of a large bank and we are considering writing our own financial library. However, before we embark in such a project, I want to check that there is no such library on the market. We would need to have the following feature: Pricing of derivative products (options, futures, swaps, etc) Different financial models Hedging / risk management Open source would be great if it's stable. Otherwise, we would purchase the source code. We are looking for C#/.NET.

    Read the article

  • Is there any small linux distribution which comes with a complete C development environment

    - by hits_lucky
    Hi, I have installed "Damn Small Linux" on my home computer for doing C development in unix. But the distribution doesn't by default come with the C development environment and I am facing some issues when trying to install the gcc. Is there any other small Linux distribution which by default has the required packages for the C development. And also I don't want additional software which takes up lot of space but still would like to have the graphical environment. Thanks

    Read the article

  • Are there any good version control programs for a Windows box that do not have to be installed?

    - by CaffeineZombie
    On my work machine, I do not have the permissions to install anything, and astoundingly, there are not any version control software packages set up. I am using VS2008, and was hoping to work around depending on SourceSafe. I've talked to the network admin, and all I could get was "We don't have any version control set up." Are there any good ways of going about this, or do I have to just bite the bullet?

    Read the article

  • Looking for work with startups in exchange for Equity [closed]

    - by SteveG
    Hi guys, I'm looking for a startup to get involved with for an equity stake. I'm a software enginner/architect with 25 years experience. I've got extensive experience with Java, C# and LAMP and have worked with serveral startups over the last couple of years. If you're interested but would like to know more about me I can send you my resume. Steve

    Read the article

  • What are the techniques to implement evaluation period and ensure it is not tempered?

    - by understack
    I've a simple product installer for windows OS, which could be evaluated for a month. What are the techniques I can use so that this piece of software is not used after a month? I've seen that several s/w use system date to check it but it's very primitive and easily forge-able. I think a key based system based on registry or online verification could be an option but I don't know much about these. Please help.

    Read the article

  • PHP coding - A class for each view or one class to rule them all?

    - by Kyle
    I am starting my first "programming" project in PHP making some sort of web application that give the linux program, Motion, a decent web interface. Anyways, I was curious as to how when real applications are programmed, do y'all go for a class for each view or one single class for the application altogether? I know this is more of a preference thing, I was just curious as to how it happens in real software.

    Read the article

  • Session attacks, what are the new breeds of attacks ?

    - by user352321
    Hello, I am collecting as information as possible about http(s) session attacks. There is a plenty of information about existing attacks, but, i would like to know if some new breeds of attacks are now made possible either by security flaws in popular software or technologies or by new smarter security engineering. Do you have some recommendations about new techniques or tools ? Thanks,

    Read the article

  • c# front-end GUI calling linux C++ functions

    - by queandans
    I am working on a project that the software is written in .NET C# and now new features require that we call third party's APIs that are built in C++ on Linux. We are given the .so files. What is the best way to achieve this? Is developing a JBoss application server and with JNI the best way? Thanks.

    Read the article

  • Good resource for studying Database High Availability techniques

    - by Invincible
    Hello Can anybody suggest some good resource/book on Database high availability techniques? Moreover, High-availability of system software like Intrusion Prevention system or Web servers. I am considering high-availability is global term which covers clustring, cloud computing, replication, replica management, distributed synchronization for cluster. Thanks in advance!

    Read the article

  • Confusing If Statement?

    - by NetSide
    I always use If statement (In C#) as (1. Alternative); if (IsSuccessed == true) { // } I know that there is no need to write "== true" as (2. Alternative)); if (IsSuccessed) { // } But, I use it because it is more readable and cause no performance issue. Of course, this is my choice and I know many software developers prefer first alternative. What is the best usage, and Why?

    Read the article

  • remote desktop using c#

    - by seddik
    hello , am developing a remote desktop software using c#.net , i have client and server , the server sends screenshots to client & the client sends events , i have done this , but the problem is when i send the click message , i dunno how to execute it in the server ??!! , plz any ideas ???

    Read the article

  • Best Java obfuscator ?

    - by Xinus
    I am developing a security software and want to obfuscate my java code so it will become impossible to reverse engineer. What is the most reliable java obfuscator ?

    Read the article

  • C++ Programming in Linux Platform

    - by viswanathan
    I am a software engineer and i work in VC++, C++ in WIndows OS. Are there any major differences when it comes to coding in C++ in Linux environment. Or is it just some adjustments that we have to make when we need to code in C++ in Linux.

    Read the article

  • Which CMS to use?

    - by Hastings
    I need to create a web (or non-web) system where a user can create a template layout with tags and placeholders for elements. They could then add new pages to this template. My system would need to pick up any elements that have changed and create an XML of the tagged content. I was just wondering what would be the best CMS or any other software I could use to implement this?

    Read the article

  • find out the origin of function calls

    - by user560343
    Hi all, I wonder if there is a software that can help us determine all possible origins of a function call. For example: /* in file f1.c */ int f1() { x_func(); } /* in file f2.c */ int f2() { x_func(); } If we want to trace the origin of all function calls to x_func(), the output will be: f1.c:f1() f2.c:f2() This is very useful when reading the source code. All answers are appreciated. Thank in advance :D

    Read the article

< Previous Page | 487 488 489 490 491 492 493 494 495 496 497 498  | Next Page >