Search Results

Search found 11141 results on 446 pages for 'base conversion'.

Page 206/446 | < Previous Page | 202 203 204 205 206 207 208 209 210 211 212 213  | Next Page >

  • And at what point of modification to the original does source code with no license become owned by me?

    - by nathansizemore
    I've recently come across a publicly viewable project on Github that has no license associated with it. In this repo, there is a file with the logic and most of the code needed to work as a piece of a project I am working on. Not verbatim, but about 60% of it I'd like to use with various modifications. Once my code base is a little bit more stable, I plan to release what I've done under the WTFPL License. I've emailed the repo owner, and so far have not gotten a reply. I know I have the rights to fork the repo, but if I release a stripped down and modified version of the other project's file with mine, under the WTFPL, am I infringing on copyrights? Per Github's Terms of Service, by submitted a project on Github and making it viewable to the public, you are allowing other users to see and fork your project. Doesn't say anything about modifying, distributing, or using the fork. And at what point of modification to the original does it become owned by me?

    Read the article

  • Multiple vulnerabilities in ImageMagick

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2004-0981 Buffer overflow vulnerability 10.0 ImageMagick Solaris 10 SPARC: 136882-03 X86: 136883-03 CVE-2005-0397 Format string vulnerability 7.5 CVE-2005-0759 Denial of service (DoS) vulnerability 5.0 CVE-2005-0760 Denial of service (DoS) vulnerability 5.0 CVE-2005-0761 Denial of service (DoS) vulnerability 5.0 CVE-2005-0762 Buffer overflow vulnerability 7.5 CVE-2005-1739 Denial of service (DoS) vulnerability 5.0 CVE-2007-4985 Denial of service (DoS) vulnerability 4.3 CVE-2007-4986 Numeric Errors vulnerability 6.8 CVE-2007-4987 Numeric Errors vulnerability 9.3 CVE-2007-4988 Numeric Errors vulnerability 6.8 This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Adode confirme une attaque de son site Connectusers.com, ayant entraîné une fuite de 150 000 fichiers sur les utilisateurs

    Adode confirme une attaque de son site Connectusers.com ayant entrainé une fuite de 150 000 fichiers sur les utilisateurs Adode a confirmé que la base de données de son forum Connectusers.com a été compromise, exposant les mots de passe des utilisateurs. Cette réaction fait suite à la publication par un hacker du pseudo de « Virus HimA » sur le site Pastebin des informations sur les utilisateurs du forum. Ce hacker a déclaré qu'il avait à sa disposition près de 150 000 fichiers contenant des informations personnelles sur les clients, le personnel et les partenaires de l'éditeur. Pour appuyer ses propos, celui-ci a publié les fichiers contenant les adresses mails, identifiants et autres do...

    Read the article

  • Configuration of LDAP client on 12.04

    - by user106515
    We have here a way to log in the computers base on Ldap(openldap). You can use any seat with the login/pass you have. Well my problem is that everything worked fine till I had to upgrade Ubuntu to the last version (12.04). Now, it is far from impossible to log in because you only can choose administrator account! That would be my issue; I want to Lightdm allow me to choose the user e.g : pagonzalez or rmlago or whatever the login-name you have. I´ve been searching for 2 days now, and nothing comes up! Hope somebody here has any idea about it!

    Read the article

  • Simplicity-effecincy tradeoff

    - by sarepta
    The CTO called to inform me of a new project and in the process told me that my code is weird. He explained that my colleagues find it difficult to understand due to the overly complex, often new concepts and technologies used, which they are not familiar with. He asked me to maintain a simple code base and to think of the others that will inherit my changes. I've put considerable time into mastering LINQ and thread-safe coding. However, others don't seem to care nor are impressed by anything other than their paycheck. Do I have to keep it simple (stupid), just because others are not familiar with best practices and efficient coding? Or should I continue to do what I find best and write code my way?

    Read the article

  • Oracle sort ADF Essentials, une version gratuite de son Framework MVC de développement Java

    Oracle sort ADF Essentials une version gratuite de son Framework MVC de développement Java Oracle a publié une version gratuite de son Framework de développement Java ADF (Application Development Framework). Oracle ADF est une plateforme de développement reposant sur le standard JEE (Java Enterprise Edition) et les technologies open source, permettant de simplifier et accélérer la mise au point d'applications orientées services. ADF est basé sur l'architecture MVC (Model View Controller) et implémente par défaut des routines couramment utilisées comme l'authentification utilisateur, des couches de sécurité, etc. Le Framework est utilisé en interne par Oracle pour plusieurs de se...

    Read the article

  • Nouvelle galerie d'extensions pour le "Facebook pour développeurs" d'Atlassian et pour sa solution de collaboration

    Atlassian ouvre une nouvelle galerie d'extensions Pour sa solutions de collaborations et son « Facebook pour développeurs » Les « Marketplace » sont à la mode. Windows Store, Mac OS, Sap Store, Mozilla Marketplace, Google Play, AppUp Center d'Intel, AppWave d'Embarcadero. On ne compte plus les galeries applicatives. Il n'y avait donc pas de raison qu'Atlassian, start-up australienne basé à Sydney qui a reçu le titre de « Technology Pioneer » du World Economic Forum en 2011 - reçu par le passé par Google, Mozilla, Twitter ou Dropbox - ne s'y mette pas. Au cas où ce nom ne vous dirait rien, Atlassian est l'é...

    Read the article

  • Russian Hydrodynamic Modeling, Prediction, and Visualization in Java

    - by Geertjan
    JSC "SamaraNIPIoil", located in Samara, Russia, provides the following applications for internal use. SimTools. Used to create & manage reservoir history schedule files for hydrodynamic models. The main features are that it lets you create/manage schedule files for models and create/manage well trajectory files to use with schedule files. DpSolver. Used to estimate permeability cubes using pore cube and results of well testing. Additionally, the user visualizes maps of vapor deposition polymerization or permeability, which can be visualized layer by layer. The base opportunities of the application are that it enables calculation of reservoir vertical heterogeneity and vertical sweep efficiency; automatic history matching of sweep efficiency; and calculations using Quantile-Quantile transformation and vizualization of permeability cube and other reservoir data. Clearly, the two applications above are NetBeans Platform applications.

    Read the article

  • An access violation occurs, and the corresponding application pool is recycled when an ASP.NET 1.1 W

    976400 ... An access violation occurs, and the corresponding application pool is recycled when an ASP.NET 1.1 Web site is under a heavy loadThis RSS feed provided by kbAlerz.com.Visit kbAlertz.com to subscribe. It's 100% free and you'll be able to recieve e-mail or RSS updates for the technologies you pick from the Microsoft Knowledge Base....Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Grouping IP Addresses based on ranges [on hold]

    - by mustard
    Say I have 5 different categories based on IP Address ranges for monitoring user base. What is the best way to categorize a list of input IP addresses into one of the 5 categories depending on which range it falls into? Would sorting using a segment tree structure be efficient? Specifically - I'm looking to see if there are more efficient ways to sort IP addresses into groups or ranges than using a segment sort. Example: I have a list of IP address ranges per country from http://dev.maxmind.com/geoip/legacy/geolite/ I am trying to group incoming user requests on a website per country for demographic analysis. My current approach is to use a segment tree structure for the IP address ranges and use lookups based on the structure to identify which range a given ip address belongs to. I would like to know if there is a better way of accomplishing this.

    Read the article

  • Ubuntu 12.04 LTS : la beta 2 de "Precise Pangolin" améliore HUD, Ubuntu One et intègre de nouvelles versions d'applications

    Ubuntu 12.04 LTS : la beta 2 de "Precise Pangolin" améliore HUD Ubuntu One et intègre de nouvelles versions d'applications Mise à jour du 09/04/2012 À quelques semaines de la publication de la version finale de Precise Pangolin, la prochaine version du système d'exploitation fondé sur Linux, Canonical publie la dernière beta de l'OS. La beta 2 d'Ubuntu 12.04 LTS apporte des corrections de bugs et quelques nouvelles fonctionnalités, dont l'ajout du noyau Linux 3.2.0-20.33 qui est basé sur la version stable 3.2.12 du Kernel. HUD, le nouveau menu intelligent pour les applications Unity dont un premier aperç...

    Read the article

  • Unable to remove network proxy

    - by Rushil
    I'm on 11.10 I'd set up a network proxy a couple of days back from system settings .And afterwards I'd set my proxy method back to none. However, my proxy has not been removed. I know this because: a: 127.0.0.1 routes me to the index.html file in the base directory of the proxy server. b: I'm able to access my university internet after hours. I checked my /etc/environment and etc/apt/apt.conf file and both of them have no proxy details. I also tried resetting the proxy and then getting rid of it but that didn't work either.

    Read the article

  • A great option for those of us who live by virtual environments, SQL Server 2008 R2 sysprep

    - by Enrique Lima
    For a long time when creating images for my development environment, I had to install the OS and then sysprep.  Only after that would I then create a differencing drive/image that would have SQL Server. So, the thought of having a base/core image for SQL Server as a template was not easily done.  Well, how do things change?  SQL Server 2008 R2 gives us the option now. Check this HOW TO provided on the library docs at TechNet.  http://technet.microsoft.com/en-us/library/ee210664(SQL.105).aspx

    Read the article

  • Removing unnecessary joomla CMS components

    - by Gaz_Edge
    Background I have been developing a web application. I have been using Joomla platform and CMS as the base from my application. My application relies heavily on the joomla platform, but uses very few features of the CMS (I have to login users etc so I use the _users component of the CMS). Question What is the best way to start removing some of the excess CMS that I don't need? For example when I being building my production site, I will want to avoid creating a load of joomla component database tables etc. I have read that an application can be build from the ground up using just the joomla platform, but i still want to include the _users component and would also like to avoid having to start coding all the session handling aspects. Any advice?

    Read the article

  • Code Space : le projet de Microsoft qui introduit une nouvelle façon de collaborer en utilisant Kinect, terminaux tactiles et PC

    Code Space : le projet de Microsoft qui introduit une nouvelle façon de collaborer En utilisant Kinect, terminaux tactiles et PC Microsoft research vient de mettre sur pied un projet qui présente un nouveau concept de partage de l'information lors des réunions ou séance de travail en petit groupe. Le projet baptisé « Code Space », démocratise l'accès, le contrôle et le partage d'informations à travers de multiples dispositifs personnels et de présentation publique. [IMG]http://rdonfack.developpez.com/images/CodeSpace.jpg[/IMG] Le système comme son nom l'indique, a été conçu à la base pour les développeurs. Avec cette technologie, ceux-ci peuvent facilement...

    Read the article

  • Vers des serveurs embarquant des puces ARM basses consommations ? Crédible, souhaitable ou irréalist

    Vers des serveurs embarquant des puces ARM basses consommations ? Crédible, souhaitable ou irréaliste ? ARM est connu pour ses puces basses consommations qui équipent bons nombres de terminaux mobiles allant des téléphones portables aux netbooks. Mais le consortium, basé à Cambridge, aurait d'autres projets dans ses cartons. C'est en tout cas ce que laisse entendre son directeur Marketing, Ian Drew, qui vient de révéler qu'un site test (le Linux Internet Platform) utilisait un serveur embarquant une puce ARM depuis environ un an. Ce test ferait suite à plusieurs demandes de la part de clients particulièrement intéressés par des les économies d'énergie que pou...

    Read the article

  • Storing E-mail addresses more efficiently in SQL Server

    A lot of people are storing large quantities of e-mail addresses in their systems. Since a large percentage of any system's user base is going to be supplying e-mail addresses from a few of the vastly popular providers (such as GMail and Hotmail), we are storing the "@gmail.com" and "@hotmail.com" parts of those addresses on disk over and over and over again. Get smart with SQL Backup ProPowerful centralised management, encryption and more.SQL Backup Pro was the smartest kid at school. Discover why.

    Read the article

  • Une nouvelle API gère le NFC dans App Inventor, le kit de création d'applications Android pour les non-développeurs du MIT

    Une nouvelle API gère le NFC dans App Inventor le kit de création d'applications Android pour les non-développeurs du MIT Une démonstration d'une nouveauté issue d'App Inventor pour la prise en charge du NFC sera effectuée ces jours. App Inventor est un kit académique de développement d'application Android pour les non-développeurs. Le projet avait été développé à la base par le MIT, puis cédé par la suite à Google. Le projet avait ensuite fait les frais de la politique de Google ayant entrainé l'abandon de plusieurs autres projets et était retourné entre les mains du MIT en début 2012. Le...

    Read the article

  • returning null vs returning zero, which would be better?

    - by Dark Star1
    I inherited a project that I am managing and having to maintain pending the redevelopment of the code base. At the moment I am being tasked with adding little feature all over the place and have gotten into the habit of returning null instead of zero in parts of the code where I am working on. The problem is we have a client that is using this code and parts of code that require data from my implemented features recieve a null and dump the stack trace in UI. I would like to avoid this entirely from my input but without the nullPointer exceptions there's the potential that errors would be introduced into the client's data which may go un-noticed. Usually I would have come up with my own error notification system but I have never inherited a project before. so I am unsure whether to continue down this path. I still believe that the stack dump is preferable to un-noticed data corruption/inaccuracies.

    Read the article

  • Duplicating content from another site and adding value (summaries, statistics) - ranking and courtesy

    - by Krastanov
    I am working on a site that takes a governmental data base, provides a number of statistical and other summaries and also post the original data. However this data (mostly long pieces of text) is also published on the official governmental site (without the added value of summaries). Should I worry about google ranking due to this duplication? What is the preferred way to point to the official source of the information? There is no advertisement on my site. My site is ".com". The governmental site is ".bg".

    Read the article

  • Am I violating LSP if the condition can be checked?

    - by William
    This base class for some shapes I have in my game looks like this. Some of the shapes can be resized, some of them can not. private Shape shape; public virtual void SetSizeOfShape(int x, int y) { if (CanResize()){ shape.Width = x; shape.Height = y; } else { throw new Exception("You cannot resize this shape"); } } public virtual bool CanResize() { return true; } In a sub class of a shape that I don't ever want to resize I am overriding the CanResize() method so a piece of client code can check before calling the SetSizeOfShape() method. public override bool CanResize() { return false; } Here's how it might look in my client code: public void DoSomething(Shape s) { if(s.CanResize()){ s.SetSizeOfShape(50, 70); } } Is this violating LSP?

    Read the article

  • Drive By Download Issue

    - by mprototype
    I'm getting a drive by download issue reported on www.cottonsandwichquiltshop.com/catalog/index.php?manufacturers_id=19&sort=2a&filterid=61 reported from safeweb.norton.com when I scan the root url. I have dug through the entire site architecture, and code base and removed a few files that were malicious, i upgraded the site's framework and fixed the security holes (mostly sql injection concerns)..... However this one threat still exists and I can't locate it for the life of me, or find any valid research or information on removing this type of threat at the server level, mostly just a bunch of anti-virus software wanting to sell you on their ability to manage it on the client end. PLEASE HELP Thanks.

    Read the article

  • HappyEdit : un bon remake de l'éditeur Vim, développé en HTML5

    HappyEdit : un bon remake de l'éditeur Vim Développé en HTML5 Les remakes ne sont pas tous bons, mais celui-ci vaut le coup d'oeil ! Per Thulin, fervent utilisateur de Vim, nous propose un remake de l'éditeur qu'on ne présente plus, développé en HTML5. Jaloux des fonctionnalités des nouveaux éditeurs de ses collègues comme SublimeText ou encore TextMake, Per Thulin a décidé de se lancer dans un projet de taille : développer une version "améliorée" de Vim pour intégrer toutes les nouvelles fonctionnalités qu'offre l'HTML5. C'est ainsi qu'est née une première version de HappyEdit, éditeur open source et basé sur le projet Ace. Foncti...

    Read the article

  • SQL Server 2012 disponible en RC0, avec des améliorations pour AlwaysOn et Power View, le SGBD se rapproche de la version finale

    SQL Server 2012 disponible en Release Candidate avec des améliorations pour AlwaysOn et Power View, le SGBD se rapproche de la version finale Mise à jour du 18/11/11 SQL Server 2012 passe en release candidate et se rapproche de la version finale. Microsoft vient de publier la RCO (Release Candidate 0) du gestionnaire de base de données, qui marque l'entrée dans la dernière ligne droite du développement de Denali. Cette mouture apporte quelques corrections et améliorations de fonctionnalités de la CTP 3 du SGBD. Parmi celles-ci, on va noter des modifications pour une meilleure prise en charge des applicati...

    Read the article

  • Local LINQtoSQL Database For Your Windows Phone 7 Application

    - by Tim Murphy
    There aren’t many applications that are of value without having some for of data store.  In Windows Phone development we have a few options.  You can store text directly to isolated storage.  You can also use a number of third party libraries to create or mimic databases in isolated storage.  With Mango we gained the ability to have a native .NET database approach which uses LINQ to SQL.  In this article I will try to bring together the components needed to implement this last type of data store and fill in some of the blanks that I think other articles have left out. Defining A Database The first things you are going to need to do is define classes that represent your tables and a data context class that is used as the overall database definition.  The table class consists of column definitions as you would expect.  They can have relationships and constraints as with any relational DBMS.  Below is an example of a table definition. First you will need to add some assembly references to the code file. using System.ComponentModel;using System.Data.Linq;using System.Data.Linq.Mapping; You can then add the table class and its associated columns.  It needs to implement INotifyPropertyChanged and INotifyPropertyChanging.  Each level of the class needs to be decorated with the attribute appropriate for that part of the definition.  Where the class represents the table the properties represent the columns.  In this example you will see that the column is marked as a primary key and not nullable with a an auto generated value. You will also notice that the in the column property’s set method It uses the NotifyPropertyChanging and NotifyPropertyChanged methods in order to make sure that the proper events are fired. [Table]public class MyTable: INotifyPropertyChanged, INotifyPropertyChanging{ public event PropertyChangedEventHandler PropertyChanged; private void NotifyPropertyChanged(string propertyName) { if(PropertyChanged != null) { PropertyChanged(this, new PropertyChangedEventArgs(propertyName)); } } public event PropertyChangingEventHandler PropertyChanging; private void NotifyPropertyChanging(string propertyName) { if(PropertyChanging != null) { PropertyChanging(this, new PropertyChangingEventArgs(propertyName)); } } private int _TableKey; [Column(IsPrimaryKey = true, IsDbGenerated = true, DbType = "INT NOT NULL Identity", CanBeNull = false, AutoSync = AutoSync.OnInsert)] public int TableKey { get { return _TableKey; } set { NotifyPropertyChanging("TableKey"); _TableKey = value; NotifyPropertyChanged("TableKey"); } } The last part of the database definition that needs to be created is the data context.  This is a simple class that takes an isolated storage location connection string its constructor and then instantiates tables as public properties. public class MyDataContext: DataContext{ public MyDataContext(string connectionString): base(connectionString) { MyRecords = this.GetTable<MyTable>(); } public Table<MyTable> MyRecords;} Creating A New Database Instance Now that we have a database definition it is time to create an instance of the data context within our Windows Phone app.  When your app fires up it should check if the database already exists and create an instance if it does not.  I would suggest that this be part of the constructor of your ViewModel. db = new MyDataContext(connectionString);if(!db.DatabaseExists()){ db.CreateDatabase();} The next thing you have to know is how the connection string for isolated storage should be constructed.  The main sticking point I have found is that the database cannot be created unless the file mode is read/write.  You may have different connection strings but the initial one needs to be similar to the following. string connString = "Data Source = 'isostore:/MyApp.sdf'; File Mode = read write"; Using you database Now that you have done all the up front work it is time to put the database to use.  To make your life a little easier and keep proper separation between your view and your viewmodel you should add a couple of methods to the viewmodel.  These will do the CRUD work of your application.  What you will notice is that the SubmitChanges method is the secret sauce in all of the methods that change data. private myDataContext myDb;private ObservableCollection<MyTable> _viewRecords;public ObservableCollection<MyTable> ViewRecords{ get { return _viewRecords; } set { _viewRecords = value; NotifyPropertyChanged("ViewRecords"); }}public void LoadMedstarDbData(){ var tempItems = from MyTable myRecord in myDb.LocalScans select myRecord; ViewRecords = new ObservableCollection<MyTable>(tempItems);}public void SaveChangesToDb(){ myDb.SubmitChanges();}public void AddMyTableItem(MyTable newScan){ myDb.LocalScans.InsertOnSubmit(newScan); myDb.SubmitChanges();}public void DeleteMyTableItem(MyTable newScan){ myDb.LocalScans.DeleteOnSubmit(newScan); myDb.SubmitChanges();} Updating existing database What happens when you need to change the structure of your database?  Unfortunately you have to add code to your application that checks the version of the database which over time will create some pollution in your codes base.  On the other hand it does give you control of the update.  In this example you will see the DatabaseSchemaUpdater in action.  Assuming we added a “Notes” field to the MyTable structure, the following code will check if the database is the latest version and add the field if it isn’t. if(!myDb.DatabaseExists()){ myDb.CreateDatabase();}else{ DatabaseSchemaUpdater dbUdater = myDb.CreateDatabaseSchemaUpdater(); if(dbUdater.DatabaseSchemaVersion < 2) { dbUdater.AddColumn<MyTable>("Notes"); dbUdater.DatabaseSchemaVersion = 2; dbUdater.Execute(); }} Summary This approach does take a fairly large amount of work, but I think the end product is robust and very native for .NET developers.  It turns out to be worth the investment. del.icio.us Tags: Windows Phone,Windows Phone 7,LINQ to SQL,LINQ,Database,Isolated Storage

    Read the article

< Previous Page | 202 203 204 205 206 207 208 209 210 211 212 213  | Next Page >