Search Results

Search found 20007 results on 801 pages for 'banking software'.

Page 268/801 | < Previous Page | 264 265 266 267 268 269 270 271 272 273 274 275  | Next Page >

  • SQL CHECK constraint to prevent date overlap

    - by Michael
    I have a table that describes which software versions were installed on a machine at various times: machine_id::integer, version::text, datefrom::timestamp, dateto::timestamp I'd like to do a constraint to ensure that no date ranges overlap, i.e. it is not possible to have multiple software versions installed on a machine at the same time. How can this be achieved in SQL? I am using PostgreSQL v8.4.

    Read the article

  • SQL Server: How can I SELECT FROM TABLE TO Other Format

    - by RedsDevils
    I have Table A. How can I select from Table A to get Table B Format. Table A Employee Name Effective Date FieldType FieldValue Maung Mya 1/1/2005 Title Project Engineer Maung Mya 1/1/2005 Department IT Department Maung Mya 1/1/2007 Title Assist Project Manager Kyaw Kyaw 1/1/2006 Title Software Engineer Kyaw Kyaw 1/1/2006 Department IT Department Table B Effective Date Employee Name Title Department 1/1/2007 Maung Mya Assist Project Manager IT Department 1/1/2006 Kyaw Kyaw Software Engineer IT Department Anyone please suggest me. Thanks in advance.

    Read the article

  • Brute force a website

    - by bigbrute
    Hi, there's a website i visit that always has these code giveaways where you get a prize for cracking the code. The code is in a format like this: QBYQC-Y??T3-W7G4R-QP4HG-2WQPT and they'll give you a hint such as two letters or a number and a letter. The solution to this is easy, brute-forcing it. However, I need the software that will make my browser repeatedly enter a new combination. What software can I use on Mac (and if not, Windows)?

    Read the article

  • Year dropdown range - when do we stop?

    - by Andrew Heath
    I attended a payroll software demo yesterday wherein the year dropdowns throughout the software ran from 2000 to 2200. Now, we've all been down this road before with 2 digit shortsight, but honestly - a 200 year service life for a Java & Oracle payroll system? Our Board of Directors would be thrilled if the company was even solvent for 1/4th that long. When forced to use a dropdown year select, where do you draw the line?

    Read the article

  • Commercial use of Google API

    - by Mac
    This question maybe a better fit on The Business of Software forum but despite my post on there, I'm still unable to determine the following: Can I use the Google API to build commercial software? If not how can the people behind Byline charge for their app? Update: I'm specifically interested in Google's Picasa & Reader APIs

    Read the article

  • How to implement Scrum?

    - by Kaan
    We're trying to switch to Scrum as our development process but we're not sure how to implement it in the best way possible. We also don't want to pay for expensive software tools until we get scrum working and get positive results. How can we implement scrum using a whiteboard without asking people to write down their time on the board and then also input into our own time tracking software? What kind of methodologies do you use?

    Read the article

  • What kind of intern experience should I get?

    - by Narcolapser
    So right now I have a good job as a software development intern for a company called Country Maid. I know that having 4 years of experience when I graduate from college (I'm currently a freshman) will look good on a resume. But I started to wonder, would 4 with one company be best, or 4 years split up between multiple companies be best? So my question is, when hiring a software developer straight out of college, what kind and how much experience to companies look for? ~N

    Read the article

  • Getting file updates in folders with no permission.

    - by Wesley
    I've been working on a program to monitor a network folder to find out which spreadsheets our company uses are the most popular. I'm using the FileSystemWatcher class in C# to do the monitoring. I've noticed I'm getting updates to files that are in folders that my user does not have permission to browse. I understand that my software is subscribing to a list of updates done by other system software and not actually browsing those files itself, but is this functionality intentional or is it a bug?

    Read the article

  • C# Create Values in Registry Local Machine

    - by Shahmir Javaid
    This is not working for me: public bool createRegistry() { if (!registryExists()) { Microsoft.Win32.Registry.LocalMachine.CreateSubKey("Software\\xelo\\"); Microsoft.Win32.Registry.LocalMachine.OpenSubKey("Software\\xelo").SetValue("hostname", (string)hostname, Microsoft.Win32.RegistryValueKind.String); return true; } else { return updateRegistry(); } } The exception error is to do with Not Authorized to do this. Any Help would be apreaciated Exeption: System.UnauthorizedAccessException | "Cannot write to the registry key"

    Read the article

  • How to remove music/videos DRM protection and convert to Mobile Devices such as iPod, iPhone, PSP, Z

    - by tonywesley
    The music/video files you purchased from online music stores like iTunes, Yahoo Music or Wal-Mart are under DRM protection. So you can't convert them to the formats supported by your own mobile devices such as Nokia phone, Creative Zen palyer, iPod, PSP, Walkman, Zune… You also can't share your purchased music/videos with your friends. The following step by step tutorial is dedicated to instructing music lovers to how to convert your DRM protected music/videos to mobile devices. Method 1: If you only want to remove DRM protection from your protected music, this method will not spend your money. Step 1: Burn your protected music files to CD-R/RW disc to make an audio CD Step 2: Find a free CD Ripper software to convert the audio CD track back to MP3, WAV, WMA, M4A, AAC, RA… Method 2: This guide will show you how to crack drm from protected wmv, wma, m4p, m4v, m4a, aac files and convert to unprotected WMV, MP4, MP3, WMA or any video and audio formats you like, such as AVI, MP4, Flv, MPEG, MOV, 3GP, m4a, aac, wmv, ogg, wav... I have been using Media Converter software, it is the quickest and easiest solution to remove drm from WMV, M4V, M4P, WMA, M4A, AAC, M4B, AA files by quick recording. It gets audio and video stream at the bottom of operating system, so the output quality is lossless and the conversion speed is fast . The process is as follows. Step 1: Download and install the software Step 2: Run the software and click "Add…" button to load WMA or M4A, M4B, AAC, WMV, M4P, M4V, ASF files Step 3: Choose output formats. If you want to convert protected audio files, please select "Convert audio to" list; If you want to convert protected video files, please select "Convert video to" list. Step 4: You can click "Settings" button to custom preference for output files. Click "Settings" button bellow "Convert audio to" list for protected audio files Click "Settings" button bellow "Convert video to" list for protected video files Step 5: Start remove DRM and convert your DRM protected music and videos by click on "Start" button. What is DRM? DRM, which is most commonly found in movies and music files, doesn't mean just basic copy-protection of video, audio and ebooks, but it basically means full protection for digital content, ranging from delivery to end user's ways to use the content. We can remove the Drm from video and audio files legally by quick recording.

    Read the article

  • Wallet Underflow? [closed]

    - by David T. McKee
    I am a software engineer who would love to "disconnect" from the "company store" so-to-speak. This concept of Stack-Overflow is great...so, because I know that software engineers need coffee and food, how do you monetize this? Just wondering.

    Read the article

  • view handler design pattern

    - by Mark Roberts
    I'm trying to figure out the origin of the view handler design pattern in software engineering. Many of the design patterns in software engineering were inspired by things which pre-date computers, and I was wondering if anybody had any insights on the origin of this particular pattern.

    Read the article

  • open corel draw file into photoshop

    - by air
    i have one coral draw file and i don't have coral draw software with me. is this possible to open that file in PSD or convert into PSD or image format. i search on internet but didn't find any free software or plug in. Thanks

    Read the article

  • C# Document Scanning

    - by ErocM
    I have a document storage application that I need to integrate with a scanner software or create one on my own. I have very limited funding so buying an expensive alternative isn't really an option. I thought about just linking to the customer's scanning software's executable and opening it when they want to scan but that just seems like a bad way of doing it. Anyone have any suggestions on how I do this? Thanks as usual, Eroc

    Read the article

  • how to develop a program to minimize errors in human transcription of hand written surveys

    - by Alex. S.
    I need to develop custom software to do surveys. Questions may be of multiple choice, or free text in a very few cases. I was asked to design a subsystem to check if there is any error in the manual data entry for the multiple choices part. We're trying to speed up the user data entry process and to minimize human input differences between digital forms and the original questionnaires. The surveys are filled with handwritten marks and text by human interviewers, so it's possible to find hard to read marks, or also the user could accidentally select a different value in some question, and we would like to avoid that. The software must include some automatic control to detect possible typing differences. Each answer of the multiple choice questions has the same probability of being selected. This question has two parts: The GUI. The most simple thing I have in mind is to implement the most usable design of the questions display: use of large and readable fonts and space generously the choices. Is there something else? For faster input, I would like to use drop down lists (favoring keyboard over mouse). Given the questions are grouped in sections, I would like to show the answers selected for the questions of that section, but this could slow down the process. Any other ideas? The error checking subsystem. What else can I do to minimize or to check human typos in the multiple choice questions? Is this a solvable problem? is there some statistical methodology to check values that were entered by the users are the same from the hand filled forms? For example, let's suppose the survey has 5 questions, and each has 4 options. Let's say I have n survey forms filled in paper by interviewers, and they're ready to be entered in the software, then how to minimize the accidental differences that can have the manual transcription of the n surveys, without having to double check everything in the 5 questions of the n surveys? My first suggestion is that at the end of the processing of all the hand filled forms, the software could choose some forms randomly to make a double check of the responses in a few instances, but on what criteria can I make this selection? This validation would be enough to cover everything in a significant way? The actual survey is nation level and it has 56 pages with over 200 questions in total, so it will be a lot of hand written pages by many people, and the intention is to reduce the likelihood of errors and to optimize speed in the data entry process. The surveys must filled in paper first, given the complications of taking laptops or handhelds with the interviewers.

    Read the article

  • Distributions and hashes

    - by Don Mackenzie
    Has anyone ever had an incidence of downloading software from a genuine site, where an MD5 or SHA series hash for the download is also supplied and then discovered that the hash calculated from the downloaded artifact doesn't match the published hash? I understand the theory but am curious how prevalent the problem is. Many software publishers seem to discount the threat.

    Read the article

  • How many developers are there in the world?

    - by Nick Hodges
    What is the total number of software developers in the world? And to respond to the inevitable "How do you define a software developer?" -- I'll answer two ways: Define it as "Anyone who writes code to make a computer do something he wants done". Define it however you like and then answer the question References to studies or more authoritative sources of information would be greatly appreciated.

    Read the article

  • errors when trying to delete a key in the registry

    - by NightsEVil
    i'm trying to delete a registry from the Local_Machine\Software in the registry i made a key titles "DeleteMe" as a test to try it out but i cant get it to work iv tried multiple options and they all say that the "subkey" "subkeytree" and "value" do not exist BUT IT DOES! and i hope i'm using the right terminology here to its HKEY_LOCAL_MACHINE\SOFTWARE\DeleteMe i want it and all the sub keys/values deleted.. (i hope key is the right terminology they look just like folders but when right clicked on they have the option "copy key name")

    Read the article

  • AutoRestart Custom Shell App

    - by MattH
    We have a .Net application that runs as a shell for certain users. We'd like the application to automatically restart when it crashes. The application is set as the shell here: HKEY_USERS*User*\Software\Microsoft\Windows NT\WinLogon\Shell I've tried adding an "AutoRestartShell" key with a value of "1", like what exists in: HKLM\Software\Microsoft\Windows NT\WinLogon. When I kill the application's process for the user (via RDP) the application exits, but never restarts. Ideas?

    Read the article

< Previous Page | 264 265 266 267 268 269 270 271 272 273 274 275  | Next Page >