Search Results

Search found 28163 results on 1127 pages for 'project vba'.

Page 656/1127 | < Previous Page | 652 653 654 655 656 657 658 659 660 661 662 663  | Next Page >

  • Drupal development workflow for teams

    - by Raul Singahn
    In my last Drupal project we were 5 people doing coding and installing new modules, at the same type our client was putting up content. Since we chose to have only one server for simplicity there were times were many people needed to write to the same files like style.css or page.tpl.php or when someones broken code would prevent others from working Are there any best practises for a team that works with Drupal? How can leverage code repositories or sandboxes?

    Read the article

  • How to restrict code from developers

    - by Kelvin
    My company is planning in hiring outsourcers to work for us, but concerned to give whole existing code to outside world. What is the proper way to deal with security of sharing code in such cases? Is it possible to restrict part of code for developers? So each of them could work on their project without having access to whole repository. P.S. The code we have is very integrated, and its hard to extract "one module", each module can use files from different locations. Thanks in advance

    Read the article

  • stun and p2p communication

    - by sr-dusad
    hi I m new in network programming.I want to traverse NAT using Stun .I use the stun client application defined in code project Stun Client .It returned me a mapped ip and port.But i don't know how to use this ip and port for p2p communication in c#.net. Pls Help me . Any help will be appriciated

    Read the article

  • Ajax-enabled composite component

    - by Jonathan Frank
    I am using composite components in my JSF 2.0 project, and I want to combine my composite components with like this: <ex:mycompositecomponent> <f:ajax event="change" render="anotherComponent" /> </ex:mycompositecomponent> Is there any way to do that? Yours sincerely Jonathan Frank

    Read the article

  • ASP.NET membership assign roles in Windows Authintication

    - by Abdulrhman
    Hi Guys I'm working on intranet project and for some purpose i have to use windows authintication. my Question is how can i assign the users from my organization active directory to the rules that I've created in Asp.Net Web Site Administration Tool or if there is another way to create and mange rules please tell me about it. thanx alot.

    Read the article

  • How do you specify a direct build name directory using TFS build of an ASP.net web application?

    - by Mark Kadlec
    I have a TFS build set up to deploy an ASP.net project to a test server. The build works great, and deploys to the test server fine, but instead of putting it into the \Website directory that my IIS webserver is configured for, it puts the build into \Website_20100511.6 Why is the date suffixed to the directory name? Is there a way to turn that off so I can publish directly to the \Website?

    Read the article

  • asp.net mvc linq sql problem

    - by user339449
    Hi all, Now I am working on project using asp.net mvc 2 and linq to sql, the problem is occurs when trying to insert data in a table where the table has an identity column type of tinyint. When trying to insert the error following error occurs, The primary key column of type 'TinyInt' cannot be generated by the server. What is the problem, does linq to sql support tinyint datatype? Please help me

    Read the article

  • Subversion: Write protection for tagged directories

    - by Alexander
    Hi, i am using subversion as RCS. Always when a new version of my project is finised i create a tag of it (copy of the trunk). Does anybody know how i can protect this tagged directory from being accidentally modified? At the moment as a workaround i lock all files. But this sill means that the user with the lock can edit the files. Is there any better solution?

    Read the article

  • How to setup MGTwitterEngine

    - by wgpubs
    Just downloaded from github ... tried to build the xcode project and got over a hundred errors. TouchJSON, OAuthConsumer and yajl folders don't even exist (which looks like the problem). Did I pooch something? What do I need to do to recover? Thanks

    Read the article

  • NoSQL vs. MySQL when scalability is irrelevant

    - by Bryan Ward
    Recently I have read a lot about different NoSQL databases and how they are being effectively deployed by some major websites out there. I'm starting a project in which I think the schema-free nature of a database such as MongoDB would be tremendously useful. Everything I have read though seems to indicate that the main advantage of a NoSQL database is scalability. Is choosing a NoSQL database for the schema-free design just as legitimate a design decision as that of scalability?

    Read the article

  • Why do I have a memory leak in UIApplication

    - by saintmac
    I have an iphone app project. I analysed it using instruments memory leak tool. According to instruments I have 2 leaks the Trace is as follows: start main UIAplicationMain _run CFRunLoopInMode CFRunLoopRunSpecific PurpleEventCallback _UIAplicationHandleEvent sendEvent: handleEvent:withNewEvent: After this trace there are two separate traces. What causes this and how can I fix it?

    Read the article

  • Best source control development tool for windows / .NET

    - by Jeff
    what are your recommendations to use as a source control, project repository for a windows - .NET development environment (2 coders, possible one using the system) thanks addition: also the team includes 3 developers. 1 vb6 moving to .net, myself in .net, and one web developer (php, javascript, etc.) the system i am looking for would be something that easily integrates into the ide of visual studio

    Read the article

  • iPhone app identifier?

    - by Horace Ho
    What is the unique identifier for an iPhone app? In the info.plist file, there are keys: Bundle display name Executable file Bundle identifier Bundle name If I have already submitted an app on the AppStore before. Then I change some of the keys in the project. Which of the above can be changed freely and AppStore still considers my app is same as the existing one? Thanks!

    Read the article

  • Resources (resx) maintenance in big projects

    - by exalted
    In a big project where you have lots of resources (resx) what would be the right approaches and/or tools of translation in order to save time, at the same time keep everything in order and leave nothing behind. More precisely, how to find (as far as translations are concerned) what has been modified (adds and removes are easy) of an entire .NET application from a previous version to another? Would resx technology help you there? How?

    Read the article

  • How could i use a specific font for my web site.

    - by Mayur
    Hi All, I am Working on new Project. In this web site client used a font (Volta Regular). please tell how can i used it. This font is missing in my Computer, How could i used it. This problem would come with all machine. How could i adjust it through css ? Thanks Mayur

    Read the article

  • Django - urls.py - Filenames with a hash/pound (#) sign?

    - by miya
    I'm using django and realized that when the filename that the user wants to access (let's say a photo) has the pound sign, the entry in the url.py does not match. Any ideas? url(r'^static/(?P<path>.*)$', 'django.views.static.serve', {'document_root': MEDIA_ROOT}, it just says: "/home/user/project/static/upload/images/hello" does not exist when actually the name of the file is: hello#world.jpg Thanks, Nico

    Read the article

  • code to identify the number

    - by [email protected]
    Hi All, I got one problem while doing one TAPI application based project in C#. I'm using ITAPI3.dll My problem is.. i'm not getting incoming call information. To get the incoming call information, i'm using the getcallinfo function, but it is showing empty message.

    Read the article

  • How do you avoid an invalid search space in a genetic algorithm?

    - by Dave
    I am developing a GA for a school project and I've noticed that upon evaluating my functions for fitness, an individual is equivalent to its inverse. For example, the set (1, 1, -1, 1) is equivalent to (-1, -1, 1, -1). To shrink my search space and reach a solution more efficiently, how can I avoid my crossovers from searching in this second half of the search space?

    Read the article

  • Using a Cyc Image in Windows

    - by nrhine1
    Hi, I am trying to use a Microtheory for a research project I am working on, and am having trouble getting my saved Image of constants I create to work correctly. I save the image after creating the constants using (write-image "world\MyImage") and then going to the \server\run\ directory and using run-cyc-32bit.bat -w "world\MyImage" It loads the server correctly, but not with my constants. I found the above command at the reference page here. Thank you for any help

    Read the article

< Previous Page | 652 653 654 655 656 657 658 659 660 661 662 663  | Next Page >