Search Results

Search found 39440 results on 1578 pages for 'possible homework'.

Page 601/1578 | < Previous Page | 597 598 599 600 601 602 603 604 605 606 607 608  | Next Page >

  • does android 1.5 saves fpu regs on context switch

    - by fazo
    i'm asking 1.5 and up or is it dependant on what's in ".config" when compiled for my phone? (and yes, i know that android has to support processors with soft-float, but several libm on different phones do have hard-float libm) (please provide -if possible- any link to/file name of context switching function for msm 7200A/7201A)

    Read the article

  • Facing Memory Leaks in AES Encryption Method.

    - by Mubashar Ahmad
    Can anyone please identify is there any possible memory leaks in following code. I have tried with .Net Memory Profiler and it says "CreateEncryptor" and some other functions are leaving unmanaged memory leaks as I have confirmed this using Performance Monitors. but there are already dispose, clear, close calls are placed wherever possible please advise me accordingly. its a been urgent. public static string Encrypt(string plainText, string key) { //Set up the encryption objects byte[] encryptedBytes = null; using (AesCryptoServiceProvider acsp = GetProvider(Encoding.UTF8.GetBytes(key))) { byte[] sourceBytes = Encoding.UTF8.GetBytes(plainText); using (ICryptoTransform ictE = acsp.CreateEncryptor()) { //Set up stream to contain the encryption using (MemoryStream msS = new MemoryStream()) { //Perform the encrpytion, storing output into the stream using (CryptoStream csS = new CryptoStream(msS, ictE, CryptoStreamMode.Write)) { csS.Write(sourceBytes, 0, sourceBytes.Length); csS.FlushFinalBlock(); //sourceBytes are now encrypted as an array of secure bytes encryptedBytes = msS.ToArray(); //.ToArray() is important, don't mess with the buffer csS.Close(); } msS.Close(); } } acsp.Clear(); } //return the encrypted bytes as a BASE64 encoded string return Convert.ToBase64String(encryptedBytes); } private static AesCryptoServiceProvider GetProvider(byte[] key) { AesCryptoServiceProvider result = new AesCryptoServiceProvider(); result.BlockSize = 128; result.KeySize = 256; result.Mode = CipherMode.CBC; result.Padding = PaddingMode.PKCS7; result.GenerateIV(); result.IV = new byte[] { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 }; byte[] RealKey = GetKey(key, result); result.Key = RealKey; // result.IV = RealKey; return result; } private static byte[] GetKey(byte[] suggestedKey, SymmetricAlgorithm p) { byte[] kRaw = suggestedKey; List<byte> kList = new List<byte>(); for (int i = 0; i < p.LegalKeySizes[0].MaxSize; i += 8) { kList.Add(kRaw[(i / 8) % kRaw.Length]); } byte[] k = kList.ToArray(); return k; }

    Read the article

  • no sms deleted folder?

    - by Nicholas
    Hi, I'm new to Android and trying to convert a Windows Mobile app to java/android. In WM there are the followning standard folders: Inbox,Sent, dratfs, outbox, deleted. I'm able to access all folders except deleted with Uri.parse("content://sms/XXXXXX") 1) Is deleted folder missing? 2) Is it possible to create user folders, like "content://sms/My Folder" Thanks, Nicholas

    Read the article

  • AS3 and hashing

    - by gok
    Is it possible to hash flv videos so it is unplayable by itself and the format is unrecognizable by softwares, but i could actually de-hash them and play in my as3 script? This is going to be realized on a CD so I can't use server scripts.

    Read the article

  • inner class within Interface

    - by harigm
    is that possible to create a inner class within an interface? If yes, why do we create like that? Anyways we are not going to create any interface objects? Do they help in any Development process?

    Read the article

  • PHP and jquery restrict direct access

    - by Sergio
    Is it possible to restrict direct access to PHP file if I use jquery .load function like this one: $(document).ready(function(){ $("#second").load("testip.php"); }); In this case I want to restrict direct access to file testip.php that will instert data in database. Can I do it using some PHP function that will compare visitors IP address and server IP at "testip.php" file or there is some better way to do it?

    Read the article

  • iPhone integration with Google Buzz

    - by radesix
    Many iPhone apps have the capability to integrate with Twitter, Facebook, and other social networking apps. It is possible yet to integrate with Google Buzz? I've checked the Google API docs for Objective C here http://code.google.com/p/gdata-objectivec-client/ But I don't see any mention of Google Buzz.

    Read the article

  • Broadcasting

    - by Avik
    Could anyone please provide me with the code or link to send and receive broadcast messages if possible using UDP? I have been stuck in a problem and hope if u guys could help me resolve it. Thanks

    Read the article

  • Java Swt Text (SWT.MULTI) append text without scroll

    - by mchr
    I have a Java SWT GUI with a multiline Text control. I want to append lines of text to the Text control without affecting the position of the cursor within the text box. In particular, the user should be able to scroll and select text at the top of the Text control while new text lines are appended to the bottom. Is this possible?

    Read the article

  • Text to speech on iPhone

    - by lostInTransit
    Hi Is there any way we can convert text to speech in an iPhone app? Is it possible using the SDK? Thanks Are there any third-party TTS engines available for the iPhone? (AFAIK Acapela is not yet released)

    Read the article

  • List - Strings - Textfiles

    - by b3y4z1d
    I've got a few questions concerning text files,list and strings. I wonder if it is possible to put in a code which reads the text in a textfile,and then using "string line;" or something else to define each new row of the text and turn all of them into one list. So I can sort the rows, remove a row or two or even all of them or search through the text for a specific row.

    Read the article

  • Most Astonishing Violation of the Principle of Least Astonishment

    - by Adam Liss
    The Principle of Least Astonishment suggests that a system should operate as a user would expect it to, as much as possible. In other words, it should never "astonish" the user with unexpected behavior. In your experience as the "astonishee," what types of systems are the worst offenders, and if you were the project manager, how would you correct the problem? Bonus if your answer describes how you'd retrain the developers!

    Read the article

  • remotestart (0.4.0) requires plug-in org.eclipse.rse.files.ui

    - by user310291
    I want to install http://emonic.sourceforge.net/html/downloadinfos.html#Download+via+update+site on eclipse sdk 3.2.2 but I get this message. I'd like not to upgrade eclipse due to other plugin. Is it possible to fix this ? It is supposed to work http://emonic.sourceforge.net/html/requirements.html o use this plug-in you will need: Eclipse 3.2 or newer (Tested on Eclipse 3.2.2, 3.3, and 3.4 development line)

    Read the article

  • How to calculate the length of a Path2D in Java?

    - by Sanoj
    I have some paths represented by Path2D. The Path consist of multiple CubicCurve2D or Line2D segments that are connected to each other. I would like to calculate or get the length from the start to the end of a Path. How can I calculate it or get it? Is it possible? I have checked the API documentation, but couldn't find any useful methods.

    Read the article

  • How to select all row in vaadin table?

    - by Kumar
    HI, I am having one check box and one table and table has 10 rows .If user selects the check box then all the 10 rows in the vaadin table should need to select but i don't know how to achieve this functionality.Can anyone tell me how to achieve this? If possible provide me some code snippet.

    Read the article

  • Is instanceof considered bad practice? If so, under what circumstances is instanceof still preferabl

    - by aioobe
    Over the years, I've tried to avoid instanceof whenever possible. Using polymorphism or the visitor pattern where applicable. I suppose it simply eases maintenance in some situations... Are there any other drawbacks that one should be aware of? I do however see it here and there in the Java libraries so I suppose it has its place? Under what circumstances is it preferable? Is it ever unavoidable?

    Read the article

< Previous Page | 597 598 599 600 601 602 603 604 605 606 607 608  | Next Page >