Search Results

Search found 7502 results on 301 pages for '4 guys from rolla'.

Page 48/301 | < Previous Page | 44 45 46 47 48 49 50 51 52 53 54 55  | Next Page >

  • Tomcat - How to limit the maximum memory Tomcat will use

    - by gav
    Hi Guys, I am running Tomcat on a small VPS (256MB/512MB) and I want to explicitly limit the amount of memory Tomcat uses. I understand that I can configure this somehow by passing in the java maximum heap and initial heap size arguments; -Xmx256m -Xms128m But I can't find where to put this in the configuration of Tomcat 6 on Ubuntu. Thanks in advance, Gav

    Read the article

  • ScaleOut vs Ncache?

    - by Atanas
    Hi guys, I'm evaluating both of this third-part vendors for distributed cache, does anyone already compared them and has some opinion which one is better? Regards, Atanas

    Read the article

  • Java Test by IKM

    - by Suresh S
    guys let me know whether the IKM test is harder compared to sun certifications.Anybody taken the test for java/j2ee let me know your experiences?what types of questions they ask.

    Read the article

  • jQuery selectors with meta-characters

    - by steamboy
    Hello Guys, I'm having problem selecting an element with an id like this <li ="0f:Bactidol_Recorder.mp4">. I tried using the function that escapes meta-characters with two backslashes below from this jquery link but still can't select the element Function: function jq(myid) { return '#' + myid.replace(/(:|\.)/g,'\\$1'); } Example: $(jq('0fb:Bactidol_Recorder.mp4')).empty() Output: $(#0fb\\:Bactidol_Recorder\\.mp4).empty();

    Read the article

  • NSDate Convert milliseconds to NSDate.

    - by user208041
    Hi Guys I have this 1273636800000 Wed Mar 03 2010 00:00:00 GMT-0500 (EST) I nee dto convert this milliseonds to NSdate format. I tried this NSDate *tr = [NSDate dateWithTimeIntervalSince1970:1273636800000]; and NSDate *tr = [NSDate dateWithTimeIntervalSinceNow:1273636800000]; But I cat get it to work... anyone had thsi problem and found solution V

    Read the article

  • Disadvantages of the Force.com platform

    - by lomaxx
    We're currently looking at using the Force.com platform as our development platform and the sales guys and the force.com website are full of reasons why it's the best platform in the world. What I'm looking for tho, is some real disadvantages to using such a platform.

    Read the article

  • Converting sql query to EF query - nested query in from

    - by vdh_ant
    Hey guys Just wondering how the following sql query would look in linq for Entity Framework... SELECT KPI.* FROM KeyPerformanceIndicator KPI INNER JOIN ( SELECT SPP.SportProgramPlanId FROM SportProgramPlan PSPP INNER JOIN SportProgramPlan ASPP ON (PSPP.SportProgramPlanId = @SportProgramPlanId AND PSPP.StartDate >= ASPP.StartDate AND PSPP.EndDate <= ASPP.EndDate ) AS SPP ON KPI.SportProgramPlanId = SPP.SportProgramPlanId Cheers Anthony

    Read the article

  • MPMoviePlayerController problems on iPad

    - by Infinity
    Hello guys! I'm trying to use the MPMoviePlayerController class on the iPad. here's my code: multimediaPlayer = [[MPMoviePlayerController alloc] initWithContentURL:[NSURL fileURLWithPath:path]]; multimediaPlayer.movieControlMode = MPMovieControlModeDefault; [multimediaPlayer play]; and this works very well on the iPhone but it don't want to run on the iPad. I hear the sound of the video, but the movie doesn't playing. Why it can be this problem?

    Read the article

  • iPhone Tableview Use Cells in Horizontal Scrolling not Vertical

    - by norskben
    Hi Guys This is not an uiview orientation question, I want to Have the iphone in Portrait or Landscape, and I want a standard tableview(controller?) that will display cells in a vertical strip down the iphone and the tableview scrolls horizontally. -I.e. a 100% normal tableview, that is rotated 90deg without rotating the phone orientation Is this possible?

    Read the article

  • How to avoid open-redirect vulnerability and safely redirect on successful login (HINT: ASP.NET MVC

    - by Brad B.
    Normally, when a site requires that you are logged in before you can access a certain page, you are taken to the login screen and after successfully authenticating yourself, you are redirected back to the originally requested page. This is great for usability - but without careful scrutiny, this feature can easily become an open redirect vulnerability. Sadly, for an example of this vulnerability, look no further than the default LogOn action provided by ASP.NET MVC 2: [HttpPost] public ActionResult LogOn(LogOnModel model, string returnUrl) { if (ModelState.IsValid) { if (MembershipService.ValidateUser(model.UserName, model.Password)) { FormsService.SignIn(model.UserName, model.RememberMe); if (!String.IsNullOrEmpty(returnUrl)) { return Redirect(returnUrl); // open redirect vulnerability HERE } else { return RedirectToAction("Index", "Home"); } } else { ModelState.AddModelError("", "User name or password incorrect..."); } } return View(model); } If a user is successfully authenticated, they are redirected to "returnUrl" (if it was provided via the login form submission). Here is a simple example attack (one of many, actually) that exploits this vulnerability: Attacker, pretending to be victim's bank, sends an email to victim containing a link, like this: http://www.mybank.com/logon?returnUrl=http://www.badsite.com Having been taught to verify the ENTIRE domain name (e.g., google.com = GOOD, google.com.as31x.example.com = BAD), the victim knows the link is OK - there isn't any tricky sub-domain phishing going on. The victim clicks the link, sees their actual familiar banking website and is asked to logon Victim logs on and is subsequently redirected to http://www.badsite.com which is made to look exactly like victim's bank's website, so victim doesn't know he is now on a different site. http://www.badsite.com says something like "We need to update our records - please type in some extremely personal information below: [ssn], [address], [phone number], etc." Victim, still thinking he is on his banking website, falls for the ploy and provides attacker with the information Any ideas on how to maintain this redirect-on-successful-login functionality yet avoid the open-redirect vulnerability? I'm leaning toward the option of splitting the "returnUrl" parameter into controller/action parts and use "RedirectToRouteResult" instead of simply "Redirect". Does this approach open any new vulnerabilities? Side note: I know this open-redirect may not seem to be a big deal compared to the likes of XSS and CSRF, but us developers are the only thing protecting our customers from the bad guys - anything we can do to make the bad guys' job harder is a win in my book. Thanks, Brad

    Read the article

  • Help with regex to detect urls in a string

    - by Ali Taha Ali Mahboub
    Hi guys i found this regex to detect urls in a string and wraps them inside the tag public static String detectUrls(String text) { String newText = text .replaceAll("(?<!http://)www\\.[\\w/%.\\-?&=]+", "http://$0") .replaceAll("(?:https?|ftps?|http?)://[\\w/%.\\-?&=]+", "<a href='$0'>$0</a>"); return newText; } but this regex doesn't work with the following pattern: https://www.myserver.com so please advise.

    Read the article

  • Any ccTalk libraries available?

    - by fretje
    I want to integrate a coin acceptor into one of our applications. This specific coin acceptor uses the ccTalk protocol (specs here). I've been looking for a ccTalk library which I can use from C#, but until this point I've only found this open source project which seems not quite ready, and abandoned. Any of you guys know of any ccTalk libraries out there? I can't believe this hasn't been done before. It doesn't necessarily has to be free.

    Read the article

  • .Net/C# - Pros and cons using the GAC

    - by Adi barad
    Hi Guys, I would like to hear your opinion regarding the benefits of disadvantages of using the GAC in .Net applications. To me, it looks more professional to sign & register the application dlls in the GAC. It's more secure, helps with backward compatibility, side by side installations and easy to reference for end-users. But I want to hear the other side as well. Thank you very much, Adi Barda

    Read the article

  • Can we run MVC 2.0 on .Net 2.0

    - by Vinni
    Hello guys, I have an asp.net website which is already developed in .net 3.5, Now I asked to develop few pages in MVC 2.0 and few pages in DynamicData. Now Can I Run the MVC 2.0 and Dynamic Data in 3.5. When I run this i am getting lot of errors in web.config..

    Read the article

  • Regex: Comma delimited integers

    - by Metju
    Hi Guys, I'm trying to create a regex that accept: An empty string, a single integer or multiple integers separated by a comma but can have no starting and ending comma. I managed to find this, but I cannot undertsand how to remove the digit limit ^\d{1,10}([,]\d{10})*$

    Read the article

  • VB.net Unique Hardware ID ideas

    - by xzerox
    I was wondering if there would be anything else I could use in my Hardware ID protection that would make it much more unique. I am currently using Processor ID Volume ID Mac Address Graphics Card Name If you guys can provide source codes to anything else that would make it even more unique please tell me.

    Read the article

  • Best Practise/Subjective: Implement a finite state automaton in OOP

    - by poeschlorn
    Hi guys, I am thinking about implementing a programm with finite state automaton in an OOP language like Java or C++. What would you think is the best way to implement this with a manageable amount of available states, regarding to good software design? Is it good to implement for each state an own class? If yes, how to do the bridge between two states? Thanks for any comment!

    Read the article

  • Advantages of Migrating Flex3 App to Flex4

    - by Srirangan
    Hi guys, What are the advantages of migrating a Flex 3 app (Java backend, BlazeDS, Spring, Hibernate) to Flex 4? One of the biggest advantages of Flex 4 is design. Assuming that design / UI isn't a big driver for the business right now as compared to performance, what are the other factors we can highlight? We have implemented Cairngorm and Swiz on the App (with a gradual "roll out" of Cairngorm planned for the future). Any opinions? Thanks, Sri

    Read the article

  • UML Class Diagram for User Login

    - by 01010011
    Hi, The diagram below is my very first attempt at creating a UML class diagram describing a user login into a website. I'm sure its a poor design and full of flaws, but I'm hoping to learn from you guys how you would design a simple login like this. I'm particularly interested in your use of design patterns and which patterns you would use, how you would implement it in the design, and why. Any advise, criticisms, comments and suggestions will be really appreciated. Thanks in advance.

    Read the article

  • ArcGis and GeoCortex

    - by Frank
    Hi, we are tying to set-up GeoCortex with our ArcGis server but can't seem to get it right. We do see some of the requests that have been made to the application, but we don't have a lot of details about it, only the number of image requested, I was wondering if you guys had any problem with this (if you ever tried it) and if I could get a checklist of things to look for. Thanks p.s.: I know that this is a very precise subject, any help will be appreciated.

    Read the article

  • Java Graphics2D DrawString....

    - by user69514
    Hey guys I have a little issue here. I have a panel where I am drawing a string. This is a game so I keep redrawing the score in order to update it. However when I draw it again it is drawn on top of the previous score so it looked all garbled up. Any ideas how to fix this? comp2d.drawString(GetScore(Score),ScoreX,ScoreY);

    Read the article

  • iphone Rendering 3-D Object rendering

    - by Yoon Lee
    Hello, I'm a beginner 3-D Quartz thing but knows how to create application. I was looking over sample of GLGravity Source code given by apple today, I was wondering teapot.h file contains all contents of array file such as indices, vertices. Do you guys think this code has been provided by human or, program? if it so, any auto generate program exist written in c based? (cause teapot.h seemed to me obvious native c code) thanks.

    Read the article

< Previous Page | 44 45 46 47 48 49 50 51 52 53 54 55  | Next Page >