Search Results

Search found 19606 results on 785 pages for 'the thing'.

Page 156/785 | < Previous Page | 152 153 154 155 156 157 158 159 160 161 162 163  | Next Page >

  • How do you verify that your prototype/application meets the requirements?

    - by Roflcoptr
    Recently I wrote an small prototype that uses some relatively new technology. Now I wanted to verify if this prototype is usefull and could be used in real world example. But now I have a problem, how can I do that? Normally, it would be a good thing to compare the prototype with already existing similar applications and compare if you perform better, provide better usability, etc. Since I'm not aware of something similar, this is quite difficult Normally, I would see if the requirements of the customers are met. But there aren't any real requirements and no real customers. It as just an idea. So the problem is, how can I get feedback on my prototype to see how it is accepted by potential users and what should be improved in a real implementation?

    Read the article

  • place to host a simple php socket server

    - by bonusbox
    i am running a small project that occasionally requires me to run a php socket script through ssh. it uses a few bytes of bandwidth (just some text) which activates my art installation project. i tried a simple web hosting plan but that didn't support sockets, so know i am using a 32$ vps plan on namecheap.com just to run a simple php script. i don't really need to host anything else on it. i find it kind of excessive for such a simple thing. is there a place i can run my script for a lower cost? any servers that support php sockets and ssh?

    Read the article

  • How do I make Ubuntu go past the splash screen?

    - by John Baber
    I recently upgraded my desktop mac to Precise and now can't get past the Ubuntu 12.04 splash page. The splash freezes with ubntu and the dots turning from white to orange forever. This is when I choose 3.2.0-generic from the grub menu. If I choose to load up older kernels, I still get the same thing. How can I make my computer finish booting again? I'm able to ssh into the machine and poke around, but the actual screen freezes at the splash. dmesg cat kern.log

    Read the article

  • Possible / How to render to multiple back buffers, using one as a shader resource when rendering to the other, and vice versa?

    - by Raptormeat
    I'm making a game in Direct3D10. For several of my rendering passes, I need to change the behavior of the pass depending on what is already rendered on the back buffer. (For example, I'd like to do some custom blending- when the destination color is dark, do one thing; when it is light, do another). It looks like I'll need to create multiple render targets and render back and forth between them. What's the best way to do this? Create my own render textures, use them, and then copy the final result into the back buffer. Create multiple back buffers, render between them, and then present the last one that was rendered to. Create one render texture, and one back buffer, render between them, and just ensure that the back buffer is the final target rendered to I'm not sure which of these is possible, and if there are any performance issues that aren't obvious. Clearly my preference would be to have 2 rather than 3 default render targets, if possible.

    Read the article

  • Organizations that encourage kids to program

    - by mwgriffith
    Since my son started going to school, I've been noticing a very serious lack of organizations to encourage kids to program or at least letting them know how to get involved in programming. Are there any groups that you know of to help kids out this area?? And I'm not referring to tools to help kids learn, I'm referring to groups that will help in getting kids interested in programming. Here are a few that I know of: Dreamspark Lego First Robotics Imagine Cup Are there anymore out there? And are there any that work at the elementary - high school levels?? Also are there any other parents that have noticed the same thing, or is this local to my area??

    Read the article

  • libstdc++-6.dll not found. [migrated]

    - by Molmasepic
    I have been working on a project(a game to be specific) and I feel that I should start over with different libraries. So when doing this I reinstalled Code::Blocks and setup my new libraries and includes. But as of now Im having a problem starting u[ my new project to test if all of the includes work. This problem is: libstdc++-6.dll was not found. At first i wondered if I could just find this file online, but its nowhere to be found(or at least the many places I have searched...) Soon after, I tried loading up my old project, and the same problem happened again(wierd... ._.) I was thinking its maybe my compiler, so I used my older compiler and it did the same thing! At this moment I held the problem off for tomorrow(which is today) So my question is: If anyone else had this problem, how would you solve it? Im using Code::Blocks with MinGW as the compiler on Windows Vista 32 bit.

    Read the article

  • Load old kernel module while keeping current

    - by legion
    So I was wondering if there is anyway that I would be able to load an old iwlwifi from a 2.6 kernel while still using the 3.2 kernel and if there was a guide to doing so? I need to be able to do so because my wireless card is.... well the new kernels have broken all support for my card, which is a Intel Ultimate-N 6300. I'm extremely upset with how badly they broke support for this card to the point where I can't connect to any router that isn't wifi N enabled and even then only a select few routers work, it amazes me as to how awful it is and whats more amazing is how well it worked in 2.6 kernels. I've tried all the work arounds that have been discussed to try and fix this, and the only thing I have found that works is running a 2.6 kernel. However I would like to be able to keep my 3.2 kernel and just load up an old version of iwlwifi that actually supports it, is there anyway to do this?

    Read the article

  • How can I estimate the entropy of a password?

    - by Wug
    Having read various resources about password strength I'm trying to create an algorithm that will provide a rough estimation of how much entropy a password has. I'm trying to create an algorithm that's as comprehensive as possible. At this point I only have pseudocode, but the algorithm covers the following: password length repeated characters patterns (logical) different character spaces (LC, UC, Numeric, Special, Extended) dictionary attacks It does NOT cover the following, and SHOULD cover it WELL (though not perfectly): ordering (passwords can be strictly ordered by output of this algorithm) patterns (spatial) Can anyone provide some insight on what this algorithm might be weak to? Specifically, can anyone think of situations where feeding a password to the algorithm would OVERESTIMATE its strength? Underestimations are less of an issue. The algorithm: // the password to test password = ? length = length(password) // unique character counts from password (duplicates discarded) uqlca = number of unique lowercase alphabetic characters in password uquca = number of uppercase alphabetic characters uqd = number of unique digits uqsp = number of unique special characters (anything with a key on the keyboard) uqxc = number of unique special special characters (alt codes, extended-ascii stuff) // algorithm parameters, total sizes of alphabet spaces Nlca = total possible number of lowercase letters (26) Nuca = total uppercase letters (26) Nd = total digits (10) Nsp = total special characters (32 or something) Nxc = total extended ascii characters that dont fit into other categorys (idk, 50?) // algorithm parameters, pw strength growth rates as percentages (per character) flca = entropy growth factor for lowercase letters (.25 is probably a good value) fuca = EGF for uppercase letters (.4 is probably good) fd = EGF for digits (.4 is probably good) fsp = EGF for special chars (.5 is probably good) fxc = EGF for extended ascii chars (.75 is probably good) // repetition factors. few unique letters == low factor, many unique == high rflca = (1 - (1 - flca) ^ uqlca) rfuca = (1 - (1 - fuca) ^ uquca) rfd = (1 - (1 - fd ) ^ uqd ) rfsp = (1 - (1 - fsp ) ^ uqsp ) rfxc = (1 - (1 - fxc ) ^ uqxc ) // digit strengths strength = ( rflca * Nlca + rfuca * Nuca + rfd * Nd + rfsp * Nsp + rfxc * Nxc ) ^ length entropybits = log_base_2(strength) A few inputs and their desired and actual entropy_bits outputs: INPUT DESIRED ACTUAL aaa very pathetic 8.1 aaaaaaaaa pathetic 24.7 abcdefghi weak 31.2 H0ley$Mol3y_ strong 72.2 s^fU¬5ü;y34G< wtf 88.9 [a^36]* pathetic 97.2 [a^20]A[a^15]* strong 146.8 xkcd1** medium 79.3 xkcd2** wtf 160.5 * these 2 passwords use shortened notation, where [a^N] expands to N a's. ** xkcd1 = "Tr0ub4dor&3", xkcd2 = "correct horse battery staple" The algorithm does realize (correctly) that increasing the alphabet size (even by one digit) vastly strengthens long passwords, as shown by the difference in entropy_bits for the 6th and 7th passwords, which both consist of 36 a's, but the second's 21st a is capitalized. However, they do not account for the fact that having a password of 36 a's is not a good idea, it's easily broken with a weak password cracker (and anyone who watches you type it will see it) and the algorithm doesn't reflect that. It does, however, reflect the fact that xkcd1 is a weak password compared to xkcd2, despite having greater complexity density (is this even a thing?). How can I improve this algorithm? Addendum 1 Dictionary attacks and pattern based attacks seem to be the big thing, so I'll take a stab at addressing those. I could perform a comprehensive search through the password for words from a word list and replace words with tokens unique to the words they represent. Word-tokens would then be treated as characters and have their own weight system, and would add their own weights to the password. I'd need a few new algorithm parameters (I'll call them lw, Nw ~= 2^11, fw ~= .5, and rfw) and I'd factor the weight into the password as I would any of the other weights. This word search could be specially modified to match both lowercase and uppercase letters as well as common character substitutions, like that of E with 3. If I didn't add extra weight to such matched words, the algorithm would underestimate their strength by a bit or two per word, which is OK. Otherwise, a general rule would be, for each non-perfect character match, give the word a bonus bit. I could then perform simple pattern checks, such as searches for runs of repeated characters and derivative tests (take the difference between each character), which would identify patterns such as 'aaaaa' and '12345', and replace each detected pattern with a pattern token, unique to the pattern and length. The algorithmic parameters (specifically, entropy per pattern) could be generated on the fly based on the pattern. At this point, I'd take the length of the password. Each word token and pattern token would count as one character; each token would replace the characters they symbolically represented. I made up some sort of pattern notation, but it includes the pattern length l, the pattern order o, and the base element b. This information could be used to compute some arbitrary weight for each pattern. I'd do something better in actual code. Modified Example: Password: 1234kitty$$$$$herpderp Tokenized: 1 2 3 4 k i t t y $ $ $ $ $ h e r p d e r p Words Filtered: 1 2 3 4 @W5783 $ $ $ $ $ @W9001 @W9002 Patterns Filtered: @P[l=4,o=1,b='1'] @W5783 @P[l=5,o=0,b='$'] @W9001 @W9002 Breakdown: 3 small, unique words and 2 patterns Entropy: about 45 bits, as per modified algorithm Password: correcthorsebatterystaple Tokenized: c o r r e c t h o r s e b a t t e r y s t a p l e Words Filtered: @W6783 @W7923 @W1535 @W2285 Breakdown: 4 small, unique words and no patterns Entropy: 43 bits, as per modified algorithm The exact semantics of how entropy is calculated from patterns is up for discussion. I was thinking something like: entropy(b) * l * (o + 1) // o will be either zero or one The modified algorithm would find flaws with and reduce the strength of each password in the original table, with the exception of s^fU¬5ü;y34G<, which contains no words or patterns.

    Read the article

  • Introduction to Google Apps Script Triggers

    Introduction to Google Apps Script Triggers Love Apps Script, but wish that it would just automatically work in the background? We've got just the thing for you - Triggers! This show will be an introductory level show about how to set up Apps Script so your scripts are run on a schedule, or in response to certain events like a spreadsheet being edited or a form submission. We'll talk about what triggers are, how to manually schedule triggers, how to programmatically create them, and some of the cool things you can do with them. From: GoogleDevelopers Views: 87 13 ratings Time: 50:17 More in Science & Technology

    Read the article

  • How to xkill an application by its id?

    - by Hanynowsky
    I need to simulate the behavior of the keyboard shortcut (ALT+F4) using Terminal for a given application. If I open for example gedit and click ALT + F4 , then GEDIT will be xkilled. If I want to achieve same thing using Terminal, how should I proceed? The command export PIDTOKILL=pidof gedit | grep [^*]; xkill -id $PIDTOKILL does not work and gives the following error: xkill: killing creator of resource 0x3f38 X Error of failed request: BadValue (integer parameter out of range for operation) Major opcode of failed request: 113 (X_KillClient) Value in failed request: 0x3f38 Serial number of failed request: 8 Current serial number in output stream: 9 I think I am confusing application id and process id here

    Read the article

  • ASUS X53S Intel Graphics and Unity 3D

    - by Nordlöw
    I just bought a ASUS X53S. Everything works flawlessly except that I can't run Unity 3D on it because NVIDIA Linux drivers currently doesn't support Optimus. So I'm stuck with the other integrated Intel Graphics Adapter. I'm already installed BumbleBee but it doesn't help with Unity 3D thing. Will the Xorg driver ever support OpenGL and especially GLX_texture_from_pixmap so that Unity 3D will work with it? The Intel driver is really snappy with Unity 2D and seems to support most other X acceleration features such as smooth scrolling.

    Read the article

  • How to make a launcher that will first navigate to a folder and then execute a command that resides in normal /usr/bin/

    - by Nirmik
    Okay this Question is basically directed for using GRIVE the linux client for Google Drive Details on how to do it are Here. The thing is that,evrytime i want the folder to sync,I have to navigate to the google drive folder and then execute the grive commnd. I want to make it simple..I want to make a launcher(I know how to make a *.desktop file). But in a .desktop file you always give path to executable file(generally .sh). Here,there is no script in the Grive folder.The app is as usual in /usr/bin/grive Now how do I make the launcher to first navigate to the grive folder and then execut the grive command.. Thanx :)

    Read the article

  • Ubuntu 12.04 keeps rebooting after changing video settings

    - by ScottJShea
    In a pinch I had to install Ubuntu 12.04 on an HP Pavilion g6. I was not fond of the 1024 x 7678 resolution so after investigating and finding I had the intel chipset I set the below in the grub file: GRUB_GFXMODE=1366x768x32 GRUB_GFXPAYLOAD_LINUX=1366x768x32 This did not work. The system just keeps rebooting as nauseum. I powered down, inserted my Ubuntu Install USB, powered up, edited the Grub file on the disk (made sure it was the disk and not the Grub for the USB stick). Powered off and tried booting up again. Same thing. So: As a noob am I missing something in the boot to allow me into a recovery mode? (I cannot seem to get to the Grub menu) If not is there a way I can recover from this? UPDATE: Holding down the shift key after BIOS gets "GRUB Loading..." and then a reboot

    Read the article

  • Using an external hard drive as a server and be able to connect via wifi [on hold]

    - by user289228
    OK, so i have an old external HDD(seagate 1tb) and a windows computer just in case but im trying to set it up as a server for my home at the moment but if everything goes right i want to transfer it to being a database hub for the business i work for that way i can have more then one register at a time on the same basic database. The thing is im new to the whole server part along with im not well versed with ubuntu either so what im getting at is if i can get it setup, can i connect it on ubuntu and run a linux based Point of sales program but have multiple linked to the single server? i may be able to do it via the router, i think its a belkin n600 with usb port but at this moment i dont know what it is since im not home. i just need information if this is possible and if so, a guide would be appreciated.

    Read the article

  • How can I customize an icon on the dash/launcher?

    - by user26272
    all. I have a question that has been bugging me recently.. Say I install Blender.. I am using the Bumblebee project thing, so in order to properly use it, I have to go to the terminal and type "optirun blender". If I just click on the icon on the dash, it will run without the proper parameter being passed. Is there a way I could customize the Blender launcher on the dash so it would always launch it with the optirun parameter? Thanks.

    Read the article

  • And if I ask the job interviewer for reasons to join the company?

    - by Oscar
    In job interviews I am frequently asked if I know the company, explain why do I think I would be the best choice for this company, etc and I have never liked this kinds of questions. Using your experiences in job interviewing, what do you think it would happen if I ask the interviewer to explain me why he think the company is the best company for me and why I should accept their answer? Do you think it would be a good think or bad thing to do? Edit: the idea of the question would not be to "challenge" the interviewer. The idea of the question would be to see what he thinks about the company, what values he thinks are given importance inside the company and what are the strong points of the company.

    Read the article

  • Where can I get fresh new Wine DLLs?

    - by SuperScript
    I was acting careless today and I accidentally deleted one of the .dlls in my Ubuntu Wine installation, ~/.wine/drive_c/windows/system32/ole32.dll to be exact, and need a new fresh copy of only this one .dll. I know that reinstalling will fix it, but I have installed quite a few programs and do not want to have to do such a drastic thing just to fix this one problem. So, I'm wondering if there is somewhere that I can download this original .dll as it came with my original Wine installation. I have found the SourceForge repository, but it only has .h and .c files and I do not know how to build them into a .dll. Can anyone give me a link to download, or instructions to build my missing .dlls?

    Read the article

  • KC Java Users Group Presentation

    - by rodelljr
    Originally posted on: http://geekswithblogs.net/rodelljr/archive/2014/08/22/kc-java-users-group-presentation.aspxI would like to thank the KC Java Users Group for allowing me to do my presentation; Supporting Multiple Devices Part 2. In this talk, I discussed a Master/Detail application that runs on Android 2.2 devices and forward. I used the Actionbar compat Android library to allow the older devices to have an actionbar. I also used a SQLite database for my data. And just to add one last thing, I also incorporated the use of custom fonts. If you are interesting in looking at this sample application, I have uploaded it to my GitHub account here. I also have a Power Point presentation which you can get here.

    Read the article

  • Figuring out what object is closer to a certain point?

    - by user1157885
    I'm trying to create fog of war, I have the visual effect created but I'm not sure how to deal with the hiding of other players if they're within the fog of war. So right now the thing I'm trying to do is if another player is hiding behind a wall then not to render that player. I was thinking of doing it by sending a ray in the direction of all the players, and then creating a list of all the obstacles that ray collides with and then trying to figure out if an obstacle was closer than the player in order to predict the distance. But then I realized I'm not really sure how to figure out if the obstacle is infact closer or not because I have to account for all the dimensions, so I'm kind of stuck. First of all is this approach the correct way to go about it and secondly how would I calculate if the obstacle was infact closer taking into account the X Y and Z. Thanks

    Read the article

  • What is the difference between all-static-methods and applying a singleton pattern?

    - by shahensha
    I am making a database to store information about the users of my website (I am using stuts2 and hence Java EE technology). For the database I'll be making a DBManager. Should I apply singleton pattern here or rather make all it's methods static? I will be using this DBManager for basic things like adding, deleting and updating User profiles. Along with it, I'll use for all other querying purposes, for instance to find out whether a username already exists and to get all users for administrative purposes and stuff like that. My questions What is the benefit of singleton pattern? Which thing is most apt here? All static methods or a singleton pattern? Please compare both of them. P.S. The database is bigger than this. Here I am talking only about the tables which I'll be using for storing User Information.

    Read the article

  • Blank desktop after login

    - by Alex
    Today my 14.04 updated itself not requiring a reboot. After a while I rebooted because of other reasons and then I was pleasantly surprised by a blank screen. I have tried everything I could think about including Reinstalled compiz, unity, ubuntu-desktop, xorg Reinstalled and then removed the nvidia driver So far nothing has worked. Except for one little thing: my cairo-dock is showing. And that's all. I tried with Unity doesn't load, no Launcher, no Dash appears, but none of the answers there helped me. I also tried removing my ~/.Xauthority file and it still doesn't work. Does anybody know what else I could try? UPDATE: sudo dpkg-reconfigure xserver-xorg sudo service lightdm stop sudo service lightdm start When I run that code and then login again the icons on the desktop are displayed but the menu and the launcher are still not there. Also, when I try to run an application from CTRL + ALT + F1 such as dconf reset -f /org/compiz/ it says Cannot autolaunch D-Bus without X11 $DISPLAY I can only run applications with export DISPLAY=:0

    Read the article

  • screen blacks out after pressing a key on keyboard, specially enter key

    - by ahmad598
    I have natty, and i have installed kubuntu-desktop package. before installing it, everything was fine but after that, this thing happens: when I'm typing, after stroking a key, screen blacks out, fan speeds up, and i have to turn off machine by pressing power button. it just happens in many different apps (chromium, hotot, kde proxy settings, ...) and in every environment: unity, kde, gnome 2. i don't know what details i must provide with this question, and i don't like to remove my kde desktop, or re-install my ubuntu. any ideas are appreciated ;-)

    Read the article

  • Did you know you can shrink a transaction log even when log shipping?

    - by simonsabin
    David's posted a great post on shrinking the transaction log and log shipping. Log shipping and shrinking transaction logs Unlike shrinking the data file shrinking the transaction log isn't a bad thing, IF you don't need the log to be that size. I've seen many systems that shrink the log because it has grown only for it to grow the next day to the same size becuase of an overnight operation. To reduce the growth of the transaction log you need to do one or more of the following, 1.Back it up more frequently2.Change to simple recovery model3.Use minimally logged operations4.Keep transactions short and small5.Break large transactions into smaller transactions6.If using replication ensure that your backup of the replication topology is frequent enough

    Read the article

  • Any recommendations for a domain buying negotiating service? [closed]

    - by Saunt Valerian
    The best domain for my niche and related is owned by a guy in San Fransisco, and I want to buy the domain from him but I don't want to deal with him directly (even though he has contacted me in the past). I need to find an intermediary company that can handle the negotiation for me. I don't expect to have to pay much since the guy has been squatting on it for more than 15 years and according to the Internet Wayback Machine it has never actually been used for anything at all - he has never added any value to it. It kind of irritates me that such a good domain has been sitting in this guy's closet gather dust for 15 years. I know that GoDaddy has a domain buying negotiating service (and the domain is registered through them, which may make it easier), but I really, really do not want to do business with GoDaddy if I don't have too. Do any of you know of other firms that deal with this sort of thing?

    Read the article

  • Cost of Web Server that hosted and delivered text only

    - by slandau
    We are developing an application that needs a web server to interact with the two (or more) entities involved. They will not ever see anything on the web, but the server is required for the transfer of data between them. It's sort of a holding point. Now, the only thing the server is going to be holding is textual data. The two entities are going to be doing the work with the data. I was wondering what the cost of this type of server would be. Since it would be JUST a database with no front end, would it make sense to employ a service through Amazon or Google that just holds data for me to access instead of buying a server and making my own database? The amount of data can grow very large however it's only text, and all data over a day old will be deleted for the most part every day. Thanks!

    Read the article

< Previous Page | 152 153 154 155 156 157 158 159 160 161 162 163  | Next Page >