Search Results

Search found 34513 results on 1381 pages for 'end task'.

Page 664/1381 | < Previous Page | 660 661 662 663 664 665 666 667 668 669 670 671  | Next Page >

  • How do you take into account usability and user requirements for your application?

    - by voroninp
    Our team supports BackOffice application: a mix of WinForm and WPF windows. (about 80 including dialogs). Really a kind of a Swiss Army Knife. It is used by developers, tech writers, security developers, testers. The requirements for new features come quite often and sometimes we play Wizard of Oz to decide which GUI our users like the most. And it usually happens (I admit it can be just my subjective interpretation of the reality) that one tiny detail giving the flavor of good usability to our app requires a lot of time. This time is being spent on 'fighting' with GUI framework making it act like we need. And it very difficult to make estimations for this type of tasks (at least for me and most members of our team). Scrum poker is not a help either. Management often considers this usability perfectionism to be a waste of time. On the other hand an accumulated affect of features where each has some little usability flaw frustrates users. But the same users want frequent releases and instant bug fixes. Hence, no way to get the positive feedback: there is always somebody who is snuffy. I constantly feel myself as competing with ourselves: more features - more bugs/tasks/architecture. We are trying to outrun the cart we are pushing. New technologies arrive and some of them can potentially help to improve the design or decrease task implementation time but these technologies require learning, prototyping and so on. Well, that was a story. And now is the question: How do you balance between time pressure, product quality, users and management satisfaction? When and how do you decide to leave the problem with not a perfect but to some extent acceptable solution, how often do you make these decisions? How do you do with your own satisfaction? What are your priorities? P.S. Please keep in mind, we are a BackOffice team, we have neither dedicated technical writer nor GUI designer. The tester have joined us recently. We've much work to do and much freedom concerning 'how'. I like it because it fosters creativity but I don't want to become too nerdy perfectionist.

    Read the article

  • Tab autocomplete in terminal is not behaving properly

    - by CaptSaltyJack
    There's something odd about my autocomplete in the gnome terminal. I used to be able to type cp Downtab to get cp Downloads/, and then type Jettab to end up with cp Downloads/Jet\ Pack\ Instructions.pdf But now, when I have cp Down typed and hit tab, I get cp Downloads with a space afterwards. And if I backspace that and make it say cp Downloads/Jet and hit tab, I get cp Downloads/Jet Pack Instructions.pdf without the backslashes. It wasn't like this before. How do I fix this? EDIT: There's a problem with my /etc/bash_completion file, it seems. Just not sure what.

    Read the article

  • How to quantify product work in Resume?

    - by mob1lejunkie
    One of things I do in my Resume is try to quantify the impact my work has had in the particular company I was with at the time. The reason is it shows the value my work had added to the business. Is this what you guys do as well or am I the only one? In my previous job this was easy as I worked on short/medium internal applications and it was fairly easy to measure end result. For example, external consulting company quoted $50,000 for an application Business Services department wanted I completed it in 3 days so I say I saved the company $48,000. I have been in my current job for 3 years but all of it has been on 1 single well established product. About 30% work is maintenance and 70% work is on new modules. I have worked on various modules like API (WCF), Security (2 factor authentication), etc. How should I quantify work on modules? Many thanks.

    Read the article

  • Ubuntu stops letting wired or wireless mice click through after a short while

    - by Jonathan Chan
    Hi! I have a very confusing problem that renders Ubuntu near unusable. Whenever I try to use any wired or wireless mouse with my Ubuntu 10.10 install, clicks stop going through - often times, this blockage of clicks happens in less than a minute. Sometimes no clicks are accepted, other times, clicks are accepted in certain windows and denied in others. The end result is the same, and I am forced to resort to using the keyboard to navigate. If anyone could help me resolve this problem, I would be very appreciative, as it would finally allow me to try Ubuntu. Thanks!

    Read the article

  • EAV - is it really bad in all scenarios?

    - by Giedrius
    I'm thinking to use EAV for some of the stuff in one of the projects, but all questions about it in stackoverflow end up to answers calling EAV an anti pattern. But I'm wondering, if is it that wrong in all cases? Let's say shop product entity, it has common features, like name, description, image, price, etc., that take part in logic many places and has (semi)unique features, like watch and beach ball would be described by completely different aspects. So I think EAV would fit for storing those (semi)unique features? All this is assuming, that for showing product list, it is enough info in product table (that means no EAV is involved) and just when showing one product/comparing up to 5 products/etc. data saved using EAV is used. I've seen such approach in Magento commerce and it is quite popular, so may be there are cases, when EAV is reasonable?

    Read the article

  • What are some potential issues in blocking all incoming requests from the Amazon cloud?

    - by ElHaix
    Recently I, along with the rest of the world, have seen a significant increase in what appears to be scraping from Amazon AWS-related sources. So simply put, I blocked all incoming requests from the Amazon cloud for our hosted application. I know that some good services/bots are now hosted on the cloud, and I'm wondering if certain IP addresses should be allowed, as they may gather data that would in the end benefit our site's SEO rankings? -- UPDATE -- I added a feature to block requests from the following hosts: Amazon Softlayer ServerDeals GigAvenue Since then, I have seen my network traffic decrease (monitored by network out bytes). Average operation is around 10,000,000 bytes. You can see where last week I was not blocking, then started blocking. I've since removed the blocks and will see what the outcome is.

    Read the article

  • How much do they study in the best universities, relative to the other universities?

    - by Velizar Hristov
    In my university, our total required weekly attendance (for lectures and tutorials/similar) is about 12 hours. It was like that in the first year, and then everything required extremely little effort - I believe that if I invested as much efforts as someone who is studying for medicine or law, I could have learnt everything for 1-2 months - if not less! Now I'm second year and it doesn't look like it's going to be too different. This concerns me about the people who study in Oxford, Cambridge or Imperial College. It would be weird if they study that little, and it would be very concerning if they do study very hard, because this would mean that by the end of the year, their first year students will be better than our average third year student. Which is bad news for me, given that I share the market with them. I know the question can't have an absolutely accurate answer, but it can still be answered quite definitely, and it's relevant to many people.

    Read the article

  • As a Qt GUI programmer, how to improve (career & skill)?

    - by linjunhalida
    hello, I'm a python & Qt programmer, and my daily job is create small PC GUI programs ship with hardware devices. the problem is, My job is simple, read/write data to device by using serial port(pyserial), display and edit data(PyQt + PyQwt), that's all. although I'm a linux user, my program is running under windows XP, but thanks to PyQt, I can still develop under linux. And I'm always afraid of being replaced by the people cheaper and younger than me in the future. (I'm 26 now.. not too much time for playing..) So I need improve myself, and make me more competitive in the global market, and I like programming, and want coding till the end of my life. any roadmap suggestion?

    Read the article

  • Silverlight Introduction

    This article will be very helpful for beginners who want to know and start development on Silverlight projects. In this article I begin with the definition of Silverlight, then move on to define its purpose. You will also see the development tools required to work with Silverlight. At the end of this article you will have been given a complete introduction.Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Agile books for sales people? [on hold]

    - by Sander Marechal
    Are there any good books or other resources on how to sell agile to your clients? Our development shop would really like to do more agile projects but we have a problem getting clients on board. Many clients want a budget and a deadline. It's hard to sell a client on an agile project when our competitors do come up with waterfall-based fixed deadlines and fixed prices. We know their fixed numbers are bad, but the client doesn't know that. So, we end up looking bad to the client because we can't fix the price or a deadline but our competitors can. So, are there any sales-oriented agile resources that cover this? All the books I read focus on project management and developers.

    Read the article

  • Learning PostgreSql: Embracing Change With Copying Types and VARCHAR(NO_SIZE_NEEDED)

    - by Alexander Kuznetsov
    PostgreSql 9.3 allows us to declare parameter types to match column types, aka Copying Types. Also it allows us to omit the length of VARCHAR fields, without any performance penalty. These two features make PostgreSql a great back end for agile development, because they make PL/PgSql more resilient to changes. Both features are not in SQL Server 2008 R2. I am not sure about later releases of SQL Server. Let us discuss them in more detail and see why they are so useful. Using Copying Types Suppose...(read more)

    Read the article

  • Would you hire a computer scientist which refuses to use computers? [closed]

    - by blueberryfields
    Imagine that you're interviewing a brilliant CS grad. He's just finished school, has very high grades, and has been performing very well on the interview so far. You reach a point near the end, where you're starting to speak about terms of employment, salary, etc.., and you're trying to show off the environment he'll be working in. When you mention that programmers at your company have systems with two monitors, the interviewee stops you and informs you that he won't need a computer. He only ever writes code by hand, in a note-book, and relies on his phone for sending/receiving email. This is not something he's willing to budge on. Would you still hire him? How good would he have to be for you to hire him? What would you hire him to do, if you do hire him? (the student is modelling himself on E.W. Djikstra)

    Read the article

  • 3D RTS pathfinding

    - by xcrypt
    I understand the A* algorithm, but I have some trouble doing it in 3D to suit the needs of my RTS Basically, in the game I'm making, there will be agents with different sizes of OBB collision boxes. I can use steering behaviours for avoiding other agents, so I don't need complete dynamic pathfinding. However, there is a problem because different agents have different collision geometry, and structures can be placed in almost any place. This means that there might be a gap between two structures where some agents can go through and some can't. A solution I have found to this problem is to do a sweep of the collision geometry of the agent from start node of the edge the pf algorithm is currently testing, to the end node of that edge. But this is probably a bit overkill since every edge the algorithm tests would also have to create and test with a collision geometry sweep. What are some reasonable approaches to this problem? I should mention that I'd prefer not to use navmeshes, I prefer waypoints because my entire system is based on it atm.

    Read the article

  • How to purge old links in google from an old domain.

    - by jbcurtin
    Hey all, Recently, I uploaded a new site to an existing domain and I'd like to figure out how I can forward all links to said domain to a new domain. I'm looking for a wordpress solution if possible, but in the end I I seem myself writing a small header script that I will paste into ever directory's index file saying header('Location:http://xxx.yyy.zzz') Is there a cleaner way to do this without having to resort to managing the whole file structure? No, I do not have access to the apache runtime. Unfortunately it is a shared-host server. Thanks in advance.

    Read the article

  • Is Java "dead in the water" as a consequence of Oracle buying Sun and subsequently suing Google

    - by NimChimpsky
    Google has led many useful Java features (guava, gson); now that Oracle has purchased Sun will it effect its future enhancements and utilization as a development language. What exactly, or even approximately, are the legal ramifications? I thought Java was open source and would therefore remain unaffected ... ? Should Google just buy Oracle to get rid of the whole mess, that would be cool wouldn't it ? Do you think this is the beginning of the end for Java as a widely used language ? Its continued success as an open source/free technology is now doubtful?

    Read the article

  • Trouble Setting up Open SSH with Putty

    - by warpstack
    I for the life of me can't seem to get openSSH to work on Ubuntu Server 10.10 with keys I generated in PuttyGen on my Windows machine. After hours of trial and error and web searches I can't get my ssh service to accept my private key! Here is my sshd_config. I generated my public and private keys using Putty in Windows then used a ssh connection to paste my key from putty directly into my authorized_keys2 file located in */etc/ssh/publickeys/authorized_keys2* The authorized_keys2 file looks something like: ssh-rsa AAAAB3NzaC1yc2EAAAA... with no email or anything at the end of it. I just pasted it straight from PuttyGen without using a key comment. I feel like it's not working because of some nuance I am not understanding or some unusual setting or incompatibility. I've restarted the ssh service (and the machine) to no avail. What are some common pitfalls I might have gotten myself into? Is there a simpler way to generate ssh keys that putty can use in windows?

    Read the article

  • it started with a broken package

    - by Inteloidl.com
    all started when i tried to updated to the latest lts, but the problen is that the update interumpted and some broken packages apeared, i used synaptics to repair, but it wont repair, iv tried some console from some forum topic ... and in the end when i try to open synaptic or update managre this is what apears any ideas : E: Dynamic MMap ran out of room. Please increase the size of APT::Cache-Limit. Current value: 25165824. (man 5 apt.conf) E: Error occurred while processing mantis (NewVersion1) E: Problem with MergeList /var/lib/apt/lists/c.archive.ubuntu.com_ubuntu_dists_lucid_universe_binary-i386_Packages E: The package lists or status file could not be parsed or opened. E: _cache-open() failed, please report. W: Unable to munmap

    Read the article

  • How do I install D-Link DWA-140 on Ubuntu 12.04?

    - by Jerrod Griffiths
    When I try to run the .exe file, this error notice comes up. Archive: /media/DWA-140/DWA140.exe [/media/DWA-140/DWA140.exe] End-of-central-directory signature not found. Either this file is not a zipfile, or it constitutes one disk of a multi-part archive. In the latter case the central directory and zipfile comment will be found on the last disk(s) of this archive. zipinfo: cannot find zipfile directory in one of /media/DWA-140/DWA140.exe or /media/DWA-140/DWA140.exe.zip, and cannot find /media/DWA-140/DWA140.exe.ZIP, period. Is there any steps I can take to get this to run? Thanks!

    Read the article

  • Gradient and window re sizing with css [migrated]

    - by guisasso
    The situation: A table with width set to 100%, that has a cell inside with 1000px width. The table is centered, and so is the cell. I would like to have a gradient from left to right, and right to left that would end at the beginning of the centered cell, with the same color as the cell. The problem is, to occupy the whole page, no matter what size the browser is, the table is set to 100%, the cell is set to 1000px so it'll never change its size, How can i achieve, if possible, what i want, making sure that in smaller resolutions/monitors or with window re sizing, the gradient will stop at the beginning of that cell, since gradients are set with percentage?

    Read the article

  • Xubuntu LightDM shows blank screen half the time

    - by Sman789
    System info: (will be amended if any more info is asked for) My laptop runs Xubuntu 12.10. As it has a Solid State Drive, /tmp, /var/tmp, /var/log and /var/log/apt are set to tmpfs in the /etc/fstab file - in case this makes any difference. Problem My problem is quite simple. Approximately 50% of boot attempts end in the mouse cursor on a black screen (presumably LightDM failing to load), forcing me to restart and try again. I can access the CTRL+ALT+F1 terminal to reboot the machine, but it's very annoying having to boot and reboot two or three times before one works. Oh, and this problem is the same whether I use the Xubuntu or Unity greeter. Thanks for any help you can give.

    Read the article

  • How To Deliberately Hide Bugs In Code (for use in a Novel I'm writing) [closed]

    - by Dennis Murphy
    I'm writing a novel in which an evil programmer wants to include subtle errors in his code that are likely to go unnoticed by his supervisor during a code review and unlikely to be caught by a compiler, yet cause damage at possibly random times when the program is executed by an end-user. I only need a couple of examples, which may be exotic but which have to be easily explainable to non-technical readers. Procedural or object-oriented examples would be equally helpful. (It's been a VERY long time since I've written any code.) Thanks for your help.

    Read the article

  • How to access / query Team Foundation Server 2012 with Odata?

    - by cseder
    I've tried to find a solution for this for hours now, and I'm getting the same results in the end, asking me to install a lot of Azure and other stuff, plus running some example project .sln that I can't open with my 2012 version of Visual Studio. So, I'm pretty much stuck, and have some pretty straight forward questions regarding this: Does TFS 2012 include the Odata service in any way, so that I don't have to install it? If not, how can I install a NATIVE 2012 version of the Odata service for TFS 2012? Is it possible that I'm aiming for the wrong target here? I'm looking for a solution to the following: I have a TFS 2012 Server that I need to be able to create Work Items on programatically, based on data from our Help Desk system. Then I need to query these Work Items for changed status since its creation, and update the Help Desk Database. Am I better off using the "regular" TFS API? I was kinda thinking that the Odata way was more "future proof", but I'm not sure...

    Read the article

  • how to map a network drive [duplicate]

    - by acquacheta
    This question already has an answer here: Correct way of mounting a Windows share 1 answer I hope someone can help me.. I'm trying to connect with my university remote filestore, but I can't make it work.. Here is explained what to do on Windows or Mac, and here I found a guide about how to do it with ubuntu, but it's not working to me (at the end of all the steps, I can't access to the mounted folder). I can access to the storage through Konqueror (I'm using KDE), but I would like to access to it also without it. Any suggestion?

    Read the article

  • How to redirect keeping the referral without server-side redirects?

    - by sergilazaro
    I have an HTML page hosted in Dropbox that some external websites link to. I want to redirect to a different page using only HTML or Javascript, since I can't use any server-side redirects. My goal is to be able to keep the original referral information for analytics. I've tried different ways but they all end up showing up with no referral. So if a blog that I have no control over (B) links to my public static page on Dropbox (D), and I want a redirect to the new page hosted elsewhere (N), I would like for the analytics for N to be shown as B, not D. Is that even possible?

    Read the article

  • How to login after modifying ~/.profile wrongly

    - by Jasper Loy
    I did something very silly a few weeks ago. I wanted to add a path so that the OS could find some manually installed executable. Instead of typing 'PATH=xxx:$PATH;export PATH' at the end of the ~/.profile file where xxx is the directory in which the executable lies, I accidentally typed 'PATH=xxx;export PATH'. After I logged out I was unable to login anymore as I probably messed up the whole PATH variable and reinstalled the whole thing. My question is: is there a way of rectifying the situation if I happen to add the path wrongly (hopefully not!) in future?

    Read the article

< Previous Page | 660 661 662 663 664 665 666 667 668 669 670 671  | Next Page >