Search Results

Search found 5566 results on 223 pages for 'behind'.

Page 56/223 | < Previous Page | 52 53 54 55 56 57 58 59 60 61 62 63  | Next Page >

  • 2D isometric: screen to tile coordinates

    - by Dr_Asik
    I'm writing an isometric 2D game and I'm having difficulty figuring precisely on which tile the cursor is. Here's a drawing: where xs and ys are screen coordinates (pixels), xt and yt are tile coordinates, W and H are tile width and tile height in pixels, respectively. My notation for coordinates is (y, x) which may be confusing, sorry about that. The best I could figure out so far is this: int xtemp = xs / (W / 2); int ytemp = ys / (H / 2); int xt = (xs - ys) / 2; int yt = ytemp + xt; This seems almost correct but is giving me a very imprecise result, making it hard to select certain tiles, or sometimes it selects a tile next to the one I'm trying to click on. I don't understand why and I'd like if someone could help me understand the logic behind this. Thanks!

    Read the article

  • Networking Client Server Packet logic (How they communicate)

    - by Trixmix
    I want to know what is the logic behind server client communication through packets for a real time game. for example the server sends x packets then the client receives x packets and processes them.. Basically what is the process to keep the client and server in sync and able to receive and send packets. more in depth example of what I want to know: client step 1 wait for a packet step 2 read x packets step 3 process x packets step 4 send x packets and so on... I need to know the very basic outline of the communication. Big questions are: 1) do I send and read packets all at one time? i.e for loop though the incoming packets array list and read them all or one every server loop or what... 2) what order should I do things i.e first receive then read then process then send etc.. 3) what I asked above a step by step of what the server / client should do.. Thanks!

    Read the article

  • OOW Session: Trends in Identity Management

    - by B Shashikumar
    In his Identity Management address today, Amit Jasuja - VP of Oracle Identity Management and Security Products, will discuss several key identity management trends and showcase how innovation is the key driver behind Oracle’s latest Identity Management 11gR2 release. This session will focus on how the latest 11gR2 release of Oracle Identity Management addresses emerging identity management requirements for mobile, social, and cloud computing. It also explores how existing Oracle Identity Management customers are simplifying implementations and reducing total cost of ownership. When: Monday, October 1, at 10:45 a.m., Where: Moscone West L3, room 3003, (session ID# CON9405) For a complete listing of all identity management sessions, hands-on labs, and more, check out the Focus on Identity Management now. 

    Read the article

  • What You Said: Your Favorite Windows Customization Tricks

    - by Jason Fitzpatrick
    Earlier this week we asked you to share your favorite Windows customization tricks and now we’re back to highlight some of the tips, tricks, and tweaks you shared. Your customization tips ranged from cosmetic to behind the scenes tweaks and offered a wide variety of ways to customize the Windows experience. Ted Lilley’s favorite must-have tweak involves Windows Explorer: The most fundamental change I make to Windows 7 is to immediately add tabs to Explorer via the QTTabbar add-on. I also add the good old cut/copy/paste/delete/new folder buttons alongside the tabs by installing Classic Shell (I skip Classic Start). Robin sets up virtual desktops: How to Use an Xbox 360 Controller On Your Windows PC Download the Official How-To Geek Trivia App for Windows 8 How to Banish Duplicate Photos with VisiPic

    Read the article

  • "Search Friendly" domain names

    - by Ben
    We bought a few search friendly domain names for the CPA site that I manage. Each of the domains we bought has the name of a nearby city and the word cpa in front of, or behind the city name. The plan is to create a landing page for each of these domains with useful information about business filings, ect. specific to that city, as well as directions to our office from that city. The question is how to best utilize these new domains: Should each domain be set to a 301 redirect to mainsite.com/city ? Should each domain be it's own single page mini-site that links to mainsite.com ? What other options are there and what are the pros/cons? Remember the goal is to be more relevant in searches that use a nearby city name in their search for CPA/accounting services.

    Read the article

  • Java - learning / migrating fast

    - by Yippie-Kai-Yay
    Hello! This is not one of those questions like "How do I learn Java extremely fast, I know nothing about programming, but I heard Java is cool, yo". I have an interview for a Java Software Developer in a couple of weeks and the thing is that I think that I know C++ really good and I am somewhat good at C# (like, here I can probably answer on a lot of questions related to these languages), but I have almost zero experience with Java. I have a lot of projects written in both languages, I participiated in several open-source projects (mostly C++, though). Now, what should I do (in your opinion) to prepare myself for this Java interview. I guess migrating from C# to Java should be kind of fast, especially when you know a lot about programming in global, patterns, modern techniques and have a lot of practical experience behind you. But still two weeks is obviously not enough to get Java in-depth - so what should I focus on to have the best chances to pass the interview? Thank you.

    Read the article

  • SilverlightShow for 06-12 Dec 2010

    - by Dave Campbell
    In an effort to get some synergy in the Silverlight community, the SilverlightShow folks and I have decided to share some information. As always, I'm running a bit behind, so I get to post first with the material they provided to me :) Check out the five most popular news at SilverlightShow for last week (06 - 12 Dec 2010). The news that hit the top is the announcement for the upcoming SilverlightShow webinar with Gill Cleeren [which I posted about a couple weeks ago] (check other webinars Gill delivered for SilverlightShow) and the free Telerik license given away to attendees. Michael Crump's digest of Silverlight 5 news announced at Firestarter was the next most attention-grabbing news. Here is SilverlightShow's weekly top 5: Join our next webinar and win a license for Telerik RadControls for Silverlight Silverlight 5 - What's New (Including Screenshots & Code Snippets) Glossy TextBlock Custom Control For Windows Phone WP7 development vs iOS, Android and mobile Web Silverlight Simple Drag And Drop / Or Browse View Model / MVVM File Upload Control Visit and bookmark SilverlightShow... they've got a lot of good things happening over there. Stay in the 'Light

    Read the article

  • Disabling Navigation Flicks in WPF

    - by Brian Genisio's House Of Bilz
    I am currently working on a multi-touch application using WPF.  One thing that has been irritating me with this development is an automatic navigation forward/back command that is bound to forward and backwards flicks.  Many of my touch-based interactions were being thwarted by gestures picked up by WPF as navigation.  I just wanted to disable this behavior. My programmatic back/forward calls are not affected by this change, which is nice.  Here is how I did it:  In my main window, I added the following command bindings:<NavigationWindow.CommandBindings> <CommandBinding Command="NavigationCommands.BrowseBack" Executed="DoNothing" /> <CommandBinding Command="NavigationCommands.BrowseForward" Executed="DoNothing" /> </NavigationWindow.CommandBindings> Then, the DoNothing method in the code-behind does nothing:private void DoNothing(object sender, ExecutedRoutedEventArgs e) { } There may be a better way to do this, but I haven’t found one.

    Read the article

  • Shotwell issues in 11.10

    - by John Speed
    I had used Shotwell happily previously then updated to Natty last week. Despite Shotwell showing on the tool bar on screen, when clicked, nothing happened, and it ignored my SD card when loaded. I read all sorts of remedies and tried everything to no avail. When I next turned on the laptop, Ocelot was available so with nothing to loose, I upgraded again. Still no Shotwell. Tried all the new fixes and now atleast I have the icon pictures but nothing behind it. When I ran the command to load the log file, Shotwell loaded and all my photos are present. Exited programme, and now nothing. Can anyone tell me where I have gone wrong please.

    Read the article

  • Vintage Fan Home Movie Captures the Filming of Return of the Jedi

    - by Jason Fitzpatrick
    Back in 1982, Jeff Broz and a group of his friends heard the next Star Wars film was being shot out in the California desert so they did what any fan would do; they trekked out into the desert and crashed the set. In this 7 minute home video we’re treated to views of the set, actors at work, and other behind-the-scenes footage of the production of Return of the Jedi. It’s hard to imagine, given modern security practices and secrecy surrounding movies, that a bunch of kids could just walk onto a set and start filming these days. [via Neatorama] HTG Explains: What Is Windows RT and What Does It Mean To Me? HTG Explains: How Windows 8′s Secure Boot Feature Works & What It Means for Linux Hack Your Kindle for Easy Font Customization

    Read the article

  • Naming the Weapons and Designing Weapons Based in Real-life During Game Development [duplicate]

    - by David Dimalanta
    This question already has an answer here: Do you need a license for weapon models? 6 answers Is it legit or copyright safe if I name the actual name of the gun model such as AK-47, M16, Remington 870, and so on? I'm on the works for making a simple 2D 3rd-person shooter game. One of the examples is the Counter Strike and the game listed the name of weapons based on the real life models and so developers decided to created this named it for the weapon designs. If not, should I make either falsify the name of weapons (e.g. 9mm instead of Glock 17 from a Syphon Filter game) or make fictional weapons like the ones developed behind Halo games?

    Read the article

  • Swap and hibernation

    - by maaartinus
    I saw a lot of recommendations claiming that for hibernation the swap partition/file must be at least as large as the main memory. This makes no sense to me. Lets assume I have 8 GB of main memory and 8 GB swap area and want to hibernate: case 1: I'm using 4 GB of virtual memory - 8 GB of swap is unnecessarily large. case 2: I'm using 8 GB of virtual memory - 8 GB of swap is just right. case 3: I'm using 12 GB of virtual memory - 8 GB of swap is too small. The outcome is: A swap area of size equal to the memory size is sufficient for hibernate IFF it doesn't get used for swapping at all. So what is the reason behind the claim that you need at least as much swap area as main memory for hibernate to work? I know that virtual memory gets used for caching too, and that the cache may be simply discarded, but what happens to hibernation if a program allocates 12 GB of virtual memory (given the above memory and swap sizes)?

    Read the article

  • Shotwell not available in 11.10

    - by John Speed
    I had used Shotwell happily previously then updated to Natty last week. Despite Shotwell showing on the tool bar on screen, when clicked, nothing happened, and it ignored my SD card when loaded. I read all sorts of remedies and tried everything to no avail. When I next turned on the laptop, Ocelot was available so with nothing to loose, I upgraded again. Still no Shotwell. Tried all the new fixes and now atleast I have the icon pictures but nothing behind it. When I ran the command to load the log file, Shotwell loaded and all my photos are present. Exited programme, and now nothing. Can anyone tell me where I have gone wrong please.

    Read the article

  • Resources on how to relate structured and semi- / un-structured information

    - by Fritz Meissner
    I don't have a great background in information organisation / retrieval, but I know of a few ways of dealing with the problem. For structured information, it's possible to go OOish - everything "has-a" or "has-many" something else, and you navigate the graph to find relationships between things. For unstructured information, you have techniques like text search and tagging. What resources - articles or books - are there that summarise the CS theory behind these techniques or could introduce me to others? I'm developing a system that needs to handle capture and retrieval of information that ranges from necessarily unstructured (advice about X) to structured (list of Xs that relate to Ys) to a combination (Ys that relate to the advice about X) and I'd like to get some insight into how to do it properly.

    Read the article

  • Print Your Favorite Video Game Character in 3D

    - by Jason Fitzpatrick
    Beloved video game characters of yesterday are perfect candidates for 3D printing with their simple and block-based sprite shapes. Read on to learn more about the process and mathematics of turning 2D sprites into 3D models. Courtesy of Mikola Lysenko, a computer scientist and mechanical engineer, we’re treated to not just a tutorial on how to create a 3D shape from a 2D seed image, but the mathematics behind figuring out exactly what that 2D sprite should look like if stretched out into three dimensions. Hit up the link below for his tour of techniques including multiview stereo reconstruction and space carving (and why he went with one technique over the other)–the explanation of his process is just as interesting as the cool results it yields. Turning 8-Bit Sprites into Printable 3D Models [via Hack A Day] How To Create a Customized Windows 7 Installation Disc With Integrated Updates How to Get Pro Features in Windows Home Versions with Third Party Tools HTG Explains: Is ReadyBoost Worth Using?

    Read the article

  • Why Are Dial-up Modems so Noisy?

    - by Jason Fitzpatrick
    Throughout the 1990s the majority of internet users began their session with the noisy handshake of a dial-up modem, but what exactly was all that electronic chatter about? Read on as we investigate one of the more iconic sounds of the burgeoning Internet age. Today’s Question & Answer session comes to us courtesy of SuperUser—a subdivision of Stack Exchange, a community-drive grouping of Q&A web sites. While dial-up modem use might be down from the nearly 100% market saturation in the 1990s to only 10% of current US internet users, the sound of a dial-up modem connecting lives on in the memories of geeks everywhere. This week we’re taking a look at the technology behind the noisy process and what exactly was going on when you dialed in for your internet session. Why Enabling “Do Not Track” Doesn’t Stop You From Being Tracked HTG Explains: What is the Windows Page File and Should You Disable It? How To Get a Better Wireless Signal and Reduce Wireless Network Interference

    Read the article

  • Adding a ppa repo and get key signed - no valid OpenPGP data - proxy issue?

    - by groovehunter
    I want to get a ppa key signed I tried apt-key adv --keyserver keyserver.ubuntu.com --recv-keys A258828C Executing: gpg --ignore-time-conflict --no-options --no-default-keyring --secret-keyring /etc/apt/secring.gpg --trustdb-name /etc/apt/trustdb.gpg --keyring /etc/apt/trusted.gpg --primary-keyring /etc/apt/trusted.gpg --keyserver keyserver.ubuntu.com --recv-keys A258828C gpg: requesting key A258828C from hkp server keyserver.ubuntu.com gpgkeys: HTTP fetch error 7: couldn't connect to host gpg: no valid OpenPGP data found. gpg: Total number processed: 0 and wget -q http://ppa.launchpad.net/panda3d/ppa/ubuntu/dists/lucid/Release.gpg -O- | apt-key add - gpg: no valid OpenPGP data found I am behind a proxy , in apt.conf it is configured correctly Acquire::http::Proxy "http://proxy.mycompany.de:3128"; I also tried setting proxy export http_proxy="proxy.mycompany.de:3128" export https_proxy="proxy.mycompany.de:3128"

    Read the article

  • Why do large IT projects tend to fail or have big cost/schedule overruns?

    - by Pratik
    I always read about large scale transformation or integration project that are total or almost total disaster. Even if they somehow manage to succeed the cost and schedule blow out is enormous. What is the real reason behind large projects being more prone to failure. Can agile be used in these sort of projects or traditional approach is still the best. One example from Australia is the Queensland Payroll project where they changed test success criteria to deliver the project. See some more failed projects in this SO question Have you got any personal experience to share?

    Read the article

  • Strange GTK3 issue with Audacious and Evince (Document Viewer)

    - by Sman789
    I find that, in some GTK3 apps such as Audacious and Evince (Document Viewer), parts of the UI are pure black, which looks ugly and out-of-place. It is not intentional, as the screenshots on both websites show the app looking different. I only have this issue with the Adwaita GTK theme, but since it comes with Gnome 3 and is the main theme these apps are designed for, I'm guessing the problem is not simply the theme having some bug (though the Ubuntu package might). I have had this issue on two laptops now, running both Ubuntu 12.04 and Xubunu 12.10 with Gnome Shell and Adwaita. The screenshots below show the problem: Audcious's is visible in the search area around the text box, and behind the playlist tabs, and Evince's is visible in more or less the same position and around the document itself. Compare this from the Audacious homepage: With this image from my system: And Evince too:

    Read the article

  • Why not expose a primary key

    - by Angelo Neuschitzer
    In my education I have been told that it is a flawed idea to expose actual primary keys (not only DB keys, but all primary accessors) to the user. I always thought it to be a security problem (because an attacker could attempt to read stuff not their own). Now I have to check if the user is allowed to access anyway, so is there a different reason behind it? Also, as my users have to access the data anyway I will need to have a public key for the outside world somewhere in between. Now that public key has the same problems as the primary key, doesn't it?

    Read the article

  • Junior software developer - How to understand web aplications in depth?

    - by nat_gr
    I am currently a junior developer in web applications and specifically in asp.net mvc technology. My problem is that the c# senior developer in the company has no experience with this technology and I try to learn without any guidance. I went through all tutorials (e.g music store), codeplex projects and also read pro asp.net mvc 4. However, most of the examples are about crud and e-commerce applications. What I don't understand is how dependency injection fits in web applications (I have realized that is not only used for facilitating unit testing) or when i should use a custom model binder or how to model the business logic when there is already a database schema in place. I read the forum quite often and it would very helpful if some experienced developers could give me an insight about how to proceed. Do I need to read some books to understand the overall idea behind web applications? And what kind of application should I start building myself - I don't think it would be useful to create similar examples with the tutorials.

    Read the article

  • Is SharpDX mature enough to adopt yet or should I just start using SlimDX right now?

    - by Gavin Williams
    I'm about to stop my game-project in XNA because from what I can gather it's development is coming to an end (and it's already behind current technology). Therefore, I need to adopt a new framework or API. I have just spent 2 days looking at C++ and decided it's really not for me - however I do find the raw access to DirectX appealing. SharpDX sounds like a good place to start, but it has no documentation and no code comments. I feel like it's not quite ready for use. I'm interested in the opinions of people that have used either or both of these frameworks, to help me decide for sure which one I should learn? Thanks for any advice.

    Read the article

  • ArchBeat Link-o-Rama Top 10 for June 23 - July 1 2012

    - by Bob Rhubart
    The top 10 most popular items as shared via my social networks for the week of June 23 - July 1 2012. Software Architecture for High Availability in the Cloud | Brian Jimerson How to Setup JDeveloper workspace for ADF Fusion Applications to run Business Component Tester? | Jack Desai Podcast: Public, Private, and Hybrid Clouds | OTN ArchBeat Podcast Read the latest news on the global user group community - June 2012 | IOUC Embrace 'big data' now or fall behind the competition, analyst warns | TechTarget ArchBeat Link-o-Rama Top 20 for June 17-23, 2012 Calculating the Size (in Bytes and MB) of a Oracle Coherence Cache | Ricardo Ferreira A Universal JMX Client for Weblogic –Part 1: Monitoring BPEL Thread Pools in SOA 11g | Stefan Koser Progress 4GL and DB to Oracle and cloud | Tom Laszewski BPM – Disable DBMS job to refresh B2B Materialized View | Mark Nelson Thought for the Day "On Monday, when the sun is hot I wonder to myself a lot: 'Now is it true, or is it not, That what is which and which is what?'" — A. A. Hodge (July 18, 1823 – November 12, 1886) Source: ThinkExist.com

    Read the article

  • What light attenuation function does UDK use?

    - by ananamas
    I'm a big fan of the light attenuation in UDK. Traditionally I've always used the constant-linear-quadratic falloff function to control how "soft" the falloff is, which gives three values to play with. In UDK you can get similar results, but you only need to tweak one value: FalloffExponent. I'm interested in what the actual mathematical function here is. The UDK lighting reference describes it as follows: FalloffExponent: This allows you to modify the falloff of a light. The default falloff is 2. The smaller the number, the sharper the falloff and the more the brightness is maintained until the radius is reached. Does anyone know what it's doing behind the scenes?

    Read the article

  • Visual Studio 2010 Parody

    Last week my acting career got off the ground (and likely burned and crashed just as quickly). You can check out my Visual Studio meets The Pink Panther-like a totally tongue in cheek video right here. be gentle :-) Tim Heuer even has some behind the scenes photos he may share. ...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

< Previous Page | 52 53 54 55 56 57 58 59 60 61 62 63  | Next Page >