Search Results

Search found 31646 results on 1266 pages for 'third normal form'.

Page 455/1266 | < Previous Page | 451 452 453 454 455 456 457 458 459 460 461 462  | Next Page >

  • MySQL high IO usage quries

    - by jack
    MySQL has a built-in slow query logger. Is there any options or third-party tools which are able to detect the queries causing high IO usage just in the way like what slow query logger does?

    Read the article

  • Localization of Settings.bundle defaultvalues

    - by notnoop
    How can I have a localized default values in the Settings bundle? I encounter this problem for regionally sensitive defaults. Consider an option in the settings bundle to indicate whether to show distances in miles or kilometers. The default settings for en_US and en_GB is 'miles, and km for everywhere else. Does the SDK provide a settings for that? Or should I just add a third option: 'Infer metric system, miles, kms'

    Read the article

  • Batch file that returns folder size

    - by Paul Wall
    Hi, I'm having space issues on my Vista machine and need to figure out what's taking up so much space. I would like to write a simple batch file that returns all folders under C: and the size of each folder. The dir command doesn't appear to return folder size. Unfortunately we don't have admin rights and can't install a third party application and we have other users in our group that also need this information. Thanks...

    Read the article

  • ASP.Net RSS feed

    - by Joel Coehoorn
    How do I create an rss feed in ASP.Net? Is there anything built in to support it? If not, what third-party tools are available? I'm thinking webforms, not MVC, though I suppose since this isn't a traditional page the difference may be minimal.

    Read the article

  • How does Google Wave & iGoogle prevent XSS by a widget?

    - by Axel
    Hello, If you've used Google Wave or iGoogle you have probably seen that you can insert widgets that are made by third parties without approval. My question is: How does prevent the widge from performing XSS or steak cookies? Are the widgets loaded in an <iframe>? If yes, then what prevents them from redirecting you to another page? Thanks

    Read the article

  • How can I monitor the SQL commands send over my ADO connection?

    - by RRUZ
    i need intercept all the SQL commands that pass between an ADO connection component and a database server. something like the TSQLmonitor of dbExpress, but for ADO . Anybody know any third-party component that implements this functionality? UPDATE I want to do is to monitor the SQL statements programmatically (by code) from my application without using an external tool. for any database engine.

    Read the article

  • PHP mkdir issue!

    - by Richard González Alberto
    Hi, I trying to create some dirs like this: @mkdir("photos/$cat/$sku", 0777, true) it creates the first directory with 0777 permissions, but when it creates the second is uses 000 as it's perms, so it fails to create the third. A workaround this please? Thanks, Richard.

    Read the article

  • stunnel on window for IBM MQ connection

    - by user171523
    Does anyone have an experience or just thoughts about securing MQ TCP communication channels using stunnel? I am integration with third party S.W which has MQ support built in but it can not support SSL. So to have some kind of security over the TCP we would like to use stunnel. Does any one have any thoughts how to implement and any best practices

    Read the article

  • Useful Java Annotations

    - by Jon
    I'm interested in finding out exactly which Java annotations people think are most useful during development. This doesn't necessarily have to limited to the core Java API, you may include annotations you found in third party libraries or annotations you've developed yourself (make sure you include a link to the source). I'm really interested in common development tasks rather than knowing why the @ManyToOne(optional=false) in JPA is awesome... Include the annotation and a description of why it's useful for general development.

    Read the article

  • Multiple Active Calls in Blackberry

    - by Umar Siddique
    i need help in finding any software for blackberry device which can do multiple active calls like if i hold my first call and make my second call then also put this call on hold without disconnecting the first call and recieve or make third call is there any solution for this ?

    Read the article

  • Infinite service

    - by rayman
    Hello, I have some proccess that i would like to run in the background the whole time. so i made it "service". my question is: is there anyway to prevent from the user to kill this service? (even if he uses third party app) thanks, ray.

    Read the article

  • Strong Signing, and Updating A Referencing Assembly

    - by Alan
    Hi, I have two, third party assemblies: Foo.dll and ReferencesFoo.dll As noted, ReferencesFoo.dll is an assembly that has a reference to Foo.dll For my application, I need to resign these assemblies. I use ildasm/ilasm in combination along with a signing key to resign them, however, ReferencesFoo.dll still contains (in it's manifest?) the reference to the Foo.dll old public key and public key token. So, how do I sign both dll's with my key, and update the references in ReferencesFoo.dll without getting the source code and recompiling?

    Read the article

  • installer for distribution visual studio 2008 express

    - by Matt Facer
    Hi guys... I've been doing some research in to installers for visual studio express 2008. I don't much like the standard publish option. I'd rather have a proper windows installer. Am I right in thinking that the only way to do this is to upgrade to the standard edition? Are there any third party tools which can be used? I've tried googling a lot, but don't seem to be getting anywhere!

    Read the article

  • Help choosing authentication method

    - by Dima
    I need to choose an authentication method for an application installed and integrated in customers environment. There are two types of environments - windows and linux/unix. Application is user based, no web stuff, pure Java. The requirement is to authenticate users which will use my application against customer provided user base. Meaning, customer installs my app, but uses his own users to grant or deny access to my app. Typical, right? I have three options to consider and I need to pick up the one which would be a) the most flexible to cover most common modern environments and b) would take least effort while stay robust and standard. Option (1) - Authenticate locally managing user credentials in some local storage, e.g. file. Customer would then add his users to my application and it will then check the passwords. Simple, clumsy but would work. Customers would have to punch every user they want to grant access to my app using some UI we will have to provide. Lots of work for me, headache to the customer. Option (2) - Use LDAP authentication. Customers would tell my app where to look for users and I will walk their directory resolving names into user names and trying to bind with found password. This is better approach IMO, but more fragile because I will have to walk an unknown directory structure and who knows if this will be permitted everywhere. Would be harder to test since there are many LDAP implementation out there, last thing I want is drowning in this voodoo. Option(3) - Use plain Kerberos authentication. Customers would tell my app what realm (domain) and which KDC (key distribution center) to use. In ideal world these two parameters would be all I need to set while customers could use their own administration tools to configure domain and kdc. My application would simply delegate user credentials to this third party (using JAAS or Spring security) and consider success when third party is happy with them. I personally prefer #3, but not sure what surprises I might face. Would this cover windows and *nix systems entirely? Is there another option to consider?

    Read the article

  • Testing Rails Metal With Cucumber/rSpec

    - by nkabbara
    Hi, I'm trying to stub a third party service that my metal talks to. It seems rspec mocks/stubs don't extend all the way to the Metal. When I call stubbed methods on objects, it calls the original one and not the stubbed one. Any idea of how I can have rSpec doubles extend all the way to the metal? Thanks. -Nash

    Read the article

  • Minimum set of Delphi 2010 files to move to a SVN repository for compiling

    - by bcrooker
    We are using Subversion for SCC. We have a great deal of our build environment in our repository so that we can check a given version out and rebuild it fairly close to what was in use at that time. We have the following in there now: InnoSetup binaries Third Party Components VCL (including Indy) Our Source (of course) Finalbuilder project files The only thing missing is the binaries for Delphi itself - I am wondering if there is a minimum set of files that can be copied to the repository and run. Thanks

    Read the article

  • Ways to clean up java applications.

    - by Begui
    How do java people handle clean up of their apps when the program receives a kill signal? For instance, there is an application i connect to which wants any third party app ( my app) to send a "finish" command. What is the best say to send that "finish" command if one does a kill -9 on me.

    Read the article

  • Web request timeout in c#

    - by victor_foster
    I am trying to make a web service request call to a third part web site who's server is a little unreliable. Is there a way I can set a timeout on a request to this site? Something like this pseudo code: try for 1 minute { // Make web request here using (WebClient client new WebClient())...etc. } catch { }

    Read the article

< Previous Page | 451 452 453 454 455 456 457 458 459 460 461 462  | Next Page >