text
stringlengths
0
30.5k
title
stringclasses
1 value
embeddings
listlengths
768
768
var lambda = Expression.Lambda(body,parameters.ToArray()); return Delegate.CreateDelegate(handlerType, lambda.Compile(), "Invoke", false); } //void delegate with one parameter static public Delegate Create<T>(EventInfo evt, Action<T> d) { var handlerType = evt.EventHandlerType; var eventParams = handlerType.GetMethod("Invoke").GetParameters(); //lambda: (object x0, ExampleEventArgs x1) => d(x1.IntArg) var parameters
[ 0.24639052152633667, -0.44168078899383545, 0.1487419307231903, 0.05949614569544792, 0.0322871208190918, 0.4277806878089905, 0.2917606234550476, -0.7422100901603699, -0.25432008504867554, -0.29841282963752747, -0.1494854837656021, 0.5881454348564148, -0.49169570207595825, 0.0543527975678443...
= eventParams.Select(p=>Expression.Parameter(p.ParameterType,"x")).ToArray(); var arg = getArgExpression(parameters[1], typeof(T)); var body = Expression.Call(Expression.Constant(d),d.GetType().GetMethod("Invoke"), arg); var lambda = Expression.Lambda(body,parameters); return Delegate.CreateDelegate(handlerType, lambda.Compile(), "Invoke", false); } //returns an expression that represents an argument to be passed to the delegate static Expression getArgExpression(ParameterExpression eventArgs, Type handlerArgType) {
[ 0.08748740702867508, -0.3941626250743866, 0.17618843913078308, -0.05397249013185501, -0.058297354727983475, 0.3413129448890686, 0.30630728602409363, -0.602099597454071, -0.19884148240089417, -0.2328978329896927, -0.3172907531261444, 0.5081554055213928, -0.5693572163581848, 0.22305659949779...
if (eventArgs.Type==typeof(ExampleEventArgs) && handlerArgType==typeof(int)) { //"x1.IntArg" var memberInfo = eventArgs.Type.GetMember("IntArg")[0]; return Expression.MakeMemberAccess(eventArgs,memberInfo); } throw new NotSupportedException(eventArgs+"->"+handlerArgType); } } static class Test { public static void Main() {
[ 0.24526813626289368, -0.3826225996017456, -0.09718625992536545, -0.17254507541656494, 0.3227148652076721, -0.025204157456755638, 0.6465319395065308, -0.3814745247364044, 0.15661220252513885, -0.3779880702495575, -0.35563233494758606, 0.47739505767822266, -0.32482782006263733, 0.33381405472...
var raiser = new EventRaiser(); var handler = new Handler(); //void delegate with no parameters string eventName = "SomethingHappened"; var eventinfo = raiser.GetType().GetEvent(eventName); eventinfo.AddEventHandler(raiser,EventProxy.Create(eventinfo,handler.HandleEvent)); //void delegate with one parameter string eventName2 = "SomethingHappenedWithArg"; var eventInfo2 = raiser.GetType().GetEvent(eventName2);
[ 0.02041446976363659, -0.3937157690525055, 0.1207919493317604, -0.3125273287296295, -0.118100106716156, 0.293092280626297, 0.3185693025588989, -0.5196916460990906, -0.2986921966075897, -0.2810719907283783, -0.25557729601860046, 0.6930843591690063, -0.19657284021377563, 0.07657215744256973, ...
eventInfo2.AddEventHandler(raiser,EventProxy.Create<int>(eventInfo2,handler.HandleEventWithArg)); //or even just: eventinfo.AddEventHandler(raiser,EventProxy.Create(eventinfo,()=>Console.WriteLine("!"))); eventInfo2.AddEventHandler(raiser,EventProxy.Create<int>(eventInfo2,i=>Console.WriteLine(i+"!"))); raiser.RaiseEvents(); } } ```
[ -0.3925836384296417, -0.23910686373710632, 0.3282109797000885, -0.4136942923069, 0.2862676978111267, 0.1692063808441162, 0.0773719847202301, -0.28367963433265686, -0.12371139228343964, -0.6060019135475159, -0.37401658296585083, 0.7165266871452332, -0.33382898569107056, -0.05824713036417961...
My team is currently trying to automate the deployment of our .Net and PHP web applications. We want to streamline deployments, and to avoid the hassle and many of the headaches caused by doing it manually. We require a solution that will enable us to: ``` - Compile the application - Version the application with the SVN version number - Backup the existing site - Deploy to a web farm ``` All our apps are source controlled using SVN and our .Net apps use CruiseControl. We have been trying to use MSBuild and NAnt deployment scripts with limited success. We have
[ 0.28499433398246765, 0.04947855323553085, 0.7206935286521912, -0.019060427322983742, 0.3316296935081482, -0.10380399227142334, 0.3058374524116516, 0.030612235888838768, -0.2020207643508911, -0.5211026668548584, -0.057674843817949295, 0.7360685467720032, -0.09697293490171432, -0.08798713982...
also used Capistrano in the past, but wish to avoid using Ruby if possible. Are there any other deployment tools out there that would help us? Thank you all for your kind suggestions. We checked them all out, but after careful consideration we decided to roll our own with a combination of CruiseControl, NAnt, MSBuild and MSDeploy. This article has some great information: [Integrating MSBuild with CruiseControl.NET](http://dougrohm.com/blog/post/2006/01/29/Integrating-MSBuild-with-CruiseControlNET.aspx) Here's roughly how our solution works: * Developers build the 'debug' version of the app and run unit tests, then check in to SVN. * CruiseControl sees the updates and calls our build script... + Runs any new migrations on
[ -0.05467989668250084, -0.11851932853460312, 0.9360963702201843, 0.1442686915397644, 0.22964102029800415, -0.0683869943022728, 0.1850772351026535, -0.17716611921787262, -0.4106994867324829, -0.42816054821014404, 0.05190711468458176, 0.8339478373527527, -0.31173402070999146, -0.1132608801126...
the build database + Replaces the config files with the build server config + Builds the 'debug' configuration of the app + Runs all unit and integration tests + Builds the 'deploy' configuration of the app - Versions the DLLs with the current major/minor version and SVN revision, e.g. 1.2.0.423 - Moves this new build to a 'release' folder on our build server - Removes unneeded files + Updates IIS on the build server if required Then when we have verified everything is ready to go up to live/staging we run another script to: * Run migrations on live/staging server * MSDeploy: archive current live/staging site * MSDeploy: sync site from build
[ 0.357674777507782, 0.04498600587248802, 0.707308828830719, -0.21700918674468994, 0.08666636049747467, 0.03200677037239075, 0.30351296067237854, -0.6723340153694153, -0.005269226618111134, -0.7103574872016907, -0.3588986098766327, 0.5332356691360474, -0.24909384548664093, -0.228769555687904...
to live/staging It wasn't pretty getting to this stage, but it's mostly working like a charm now :D I'm going to try and keep this answer updated as we make changes to our process, as there seem to be several similar questions on SA now.
[ 0.8545659780502319, -0.3569363057613373, 0.20629023015499115, -0.13310717046260834, -0.07527302950620651, 0.09965632855892181, 0.5637304782867432, -0.17491565644741058, -0.20959657430648804, -0.6440300941467285, 0.4339389503002167, 0.24021069705486298, 0.12542538344860077, -0.2421227246522...
Our ASP.NET 3.5 website running on IIS 6 has two teams that are adding content: * Development team adding code. * Business team adding simple web pages. For sanity and organization, we would like for the business team to add their web pages to a sub-folder in the project: > Root: for pages of development team > > > Content: for pages of business team **But** We would like for users to be able to navigate to the business team content without having to append "Content" in their URLs, as described below: > **Root**: Default.aspx (*Available at: www.oursite.com/default.aspx*) > > > **Content**: Popcorn.aspx (*Available at:
[ 0.571174681186676, -0.056843582540750504, 0.45101967453956604, 0.13691331446170807, -0.14945824444293976, 0.029677724465727806, 0.16105559468269348, -0.09611483663320541, -0.32071539759635925, -0.9082466959953308, -0.20002864301204681, 0.23875518143177032, 0.030285656452178955, -0.01959861...
www.oursite.com/popcorn.aspx*) Is there a way we can accomplish for making a config entry in an ISAPI rewrite tool for every one of these pages? I don't have any way to test this right now, but I think you can use the -f flag on RewriteCond to check if a file exists, in either directory. ``` RewriteCond %{REQUEST_FILENAME} -!f RewriteCond Content/%{REQUEST_FILENAME} -f RewriteRule (.*) Content/(.*) ``` Something like that might do what you're after, too.
[ 0.8007265329360962, 0.06916960328817368, 0.7375475764274597, 0.24775855243206024, 0.23451931774616241, -0.2780310809612274, 0.05682117119431496, 0.16765347123146057, -0.17811211943626404, -0.829738974571228, 0.058942846953868866, 0.3686895966529846, -0.06425507366657257, 0.2012536227703094...
How do you automatically set the focus to a textbox when a web page loads? Is there an HTML tag to do it or does it have to be done via Javascript? If you're using jquery: ``` $(function() { $("#Box1").focus(); }); ``` or prototype: ``` Event.observe(window, 'load', function() { $("Box1").focus(); }); ``` or plain javascript: ``` window.onload = function() { document.getElementById("Box1").focus(); }; ``` though keep in mind that this will replace other on load handlers, so look up addLoadEvent() in google for a safe way to append onload handlers rather than replacing.
[ 0.3940275013446808, -0.3436278700828552, 0.24521085619926453, -0.15023241937160492, -0.05914562568068504, -0.14935250580310822, 0.10880789905786514, -0.26822900772094727, -0.2772456109523773, -0.737816572189331, -0.3704533874988556, 0.5486162900924683, -0.5451551079750061, -0.3136977553367...
What, if any, considerations (HTML, CSS, JavaScript) should you take when designing for Google Chrome? Chrome uses Webkit, the same engine as is used by Safari, OmniWeb, iCab and more. Just code everything based on the standards and verify in each browser.
[ 0.5288730263710022, 0.2551770806312561, 0.1783830225467682, 0.24917258322238922, -0.3738013505935669, -0.20204751193523407, 0.12991364300251007, -0.008376166224479675, 0.014545297250151634, -0.8400071859359741, 0.23975540697574615, 0.8342568874359131, -0.3295418620109558, -0.40554368495941...
In TFS when you merge branch A to branch B and checkin, you get a single changeset on B (typically with a comment like "merged A->B"). This means B doesn't have any of the checkin history from A. So if someone created a new file on branch A, you can't tell who created it from branch B. And if someone updated a file on A, you can't tell who did the update from branch B. Is there any way to see this kind of detailed changeset history across branches? Some kind of power toy, or third party tool, or anything? Update: The
[ 0.40562763810157776, -0.46885815262794495, 0.289158433675766, 0.12994809448719025, 0.07042916119098663, -0.16111880540847778, 0.024725575000047684, -0.06234774366021156, -0.5779712200164795, -0.8755906820297241, -0.10405109822750092, 0.23408164083957672, -0.4607829451560974, 0.436700314283...
TFS Power Toy tfpt history /followbranches tool does not "expand merges," it only "expands branches" and therefore doesn't solve this problem. TFS 2010 will include support for this. Brian Harry talks about it in [this presentation](http://channel9.msdn.com/pdc2008/TL52/). You will now be able to see where a change originated and who made it after the change has been merged to a different branch.
[ 0.07887215912342072, -0.4948047399520874, 0.33467569947242737, -0.07796663790941238, -0.019302507862448692, -0.19488349556922913, -0.15602485835552216, -0.3594810664653778, -0.3048839569091797, -0.36985838413238525, -0.28393810987472534, 0.30252233147621155, -0.4607614278793335, 0.07559756...
In an application that I'm writing I have some code like this: ``` NSWorkspace* ws = [NSWorkspace sharedWorkspace]; NSString* myurl = @"http://www.somewebsite.com/method?a=%d"; NSURL* url = [NSURL URLWithString:myurl]; [ws openURL:url]; ``` The main difference being that *myurl* comes from somewhere outside my control. Note the %d in the URL which isn't entirely correct and means that URLWithString fails, returning *nil*. What is the "correct" way of handling this? Do I need to parse the string and properly encode the arguments? Or is there some clever method in Cocoa that does all the hard work for me? I'm not sure if this is exactly what you're looking for, but there is
[ 0.178890660405159, 0.5682753324508667, 0.2107137143611908, -0.26105308532714844, -0.11145149916410446, -0.060561783611774445, 0.414293497800827, 0.09862568229436874, -0.1583707332611084, -0.68784499168396, 0.007188370916992426, 0.33789873123168945, -0.2768212556838989, 0.2545725703239441, ...
a method in NSString that will sanitize a URL: [stringByAddingPercentEscapesUsingEncoding:](https://developer.apple.com/documentation/foundation/nsstring/1415058-stringbyaddingpercentescapesusin)
[ -0.4233444929122925, -0.2886277735233307, 0.0324535109102726, -0.04111180454492569, -0.04976106062531471, -0.20223763585090637, 0.4561708867549896, -0.002208310179412365, -0.2777765989303589, -0.502807080745697, -0.3759680688381195, 0.17967118322849274, -0.30941346287727356, 0.269517421722...
We are trying to implement a REST API for an application we have now. We want to expose read/write capabilities for various resources using the REST API. How do we implement the "form" part of this? I get how to expose "read" of our data by creating RESTful URLs that essentially function as method calls and return the data: ``` GET /restapi/myobject?param=object-id-maybe ``` ...and an XML document representing some data structure is returned. Fine. But, normally, in a web application, an "edit" would involve two requests: one to load the current version of the resources and populate the form with that data, and one to
[ 0.412337988615036, 0.06368956714868546, 0.3150831460952759, 0.20642338693141937, 0.08749791234731674, -0.15226027369499207, 0.23281987011432648, -0.23769159615039825, -0.14664147794246674, -0.530778169631958, -0.29522112011909485, 0.5802702903747559, -0.1221701055765152, 0.0438148155808448...
post the modified data back. But I don't get how you would do the same thing with HTTP methods that REST is sort of mapped to. It's a PUT, right? Can someone explain this? (Additional consideration: The UI would be primarily done with AJAX) -- Update: That definitely helps. But, I am still a bit confused about the server side? Obviously, I am not simply dealing with files here. On the server, the code that answers the requests should be filtering the request method to determine what to do with it? Is that the "switch" between reads and writes? If you're submitting the data
[ 0.4721246659755707, -0.2154906839132309, 0.18096497654914856, 0.45236554741859436, -0.2660382091999054, -0.26580095291137695, 0.18162532150745392, 0.19419948756694794, -0.18607595562934875, -0.8842566609382629, 0.1227642223238945, 0.3959124982357025, -0.1155935749411583, 0.1791078895330429...
via plain HTML, you're restricted to doing a POST based form. The URI that the POST request is sent to **should not** be the URI for the resource being modified. You should either POST to a collection resource that ADDs a newly created resource each time (with the URI for the new resource in the *Location* header and a **202** status code) or POST to an updater resource that updates a resource with a supplied URI in the request's content (or custom header). If you're using an XmlHttpRequest object, you can set the method to PUT and submit the data to
[ 0.48481640219688416, -0.07856873422861099, 0.38936084508895874, 0.04491593688726425, -0.3951399028301239, -0.09445267170667648, 0.056392788887023926, 0.2600158751010895, -0.22495731711387634, -0.7984866499900818, -0.43946394324302673, 0.07775460183620453, -0.47081324458122253, 0.3199050426...
the resource's URI. This can also work with empty forms if the server supplies a valid URI for the yet-nonexistent resource. The first PUT would create the resource (returning **202**). Subsequent PUTs will either do nothing if it's the same data or modify the existing resource (in either case a **200** is returned unless an error occurs).
[ 0.39620882272720337, -0.11541508883237839, 0.29595914483070374, -0.0019290221389383078, 0.013649527914822102, 0.16488197445869446, -0.019282206892967224, 0.011894287541508675, 0.07188680022954941, -0.6835114359855652, -0.33184412121772766, 0.08326665312051773, -0.21146227419376373, 0.48896...
So, I did search google and SO prior to asking this question. Basically I have a DLL that has a form compiled into it. The form will be used to display information to the screen. Eventually it will be asynchronous and expose a lot of customization in the dll. For now I just want it to display properly. The problem that I am having is that I use the dll by loading it in a Powershell session. So when I try to display the form and get it to come to the top and have focus, It has no problem
[ 0.7832890748977661, 0.058540720492601395, 0.5375836491584778, 0.1522982269525528, -0.020791932940483093, -0.21865427494049072, 0.09398065507411957, 0.046247921884059906, 0.024455271661281586, -0.7219244837760925, 0.2437441200017929, 0.49023565649986267, -0.03288358822464943, 0.260112434625...
with displaying over all the other apps, but I can't for the life of me get it to display over the Powershell window. Here is the code that I am currently using to try and get it to display. I am sure that the majority of it won't be required once I figure it out, this just represents all the things that I found via google. ``` CLass Blah { [DllImport("user32.dll", EntryPoint = "SystemParametersInfo")] public static extern bool SystemParametersInfo(uint uiAction, uint uiParam, uint pvParam, uint fWinIni);
[ 0.11098311841487885, -0.16387638449668884, 0.8929920792579651, -0.05838392302393913, -0.01853683963418007, 0.09702351689338684, 0.18199831247329712, -0.24158698320388794, -0.19517569243907928, -1.0459816455841064, -0.04534891992807388, 0.7250977158546448, -0.3840290307998657, 0.17077055573...
[DllImport("user32.dll", EntryPoint = "SetForegroundWindow")] public static extern bool SetForegroundWindow(IntPtr hWnd); [DllImport("User32.dll", EntryPoint = "ShowWindowAsync")] private static extern bool ShowWindowAsync(IntPtr hWnd, int cmdShow); private const int WS_SHOWNORMAL = 1; public void ShowMessage(string msg) { MessageForm msgFrm = new MessageForm(); msgFrm.lblMessage.Text =
[ 0.059820231050252914, -0.3590787351131439, 0.9036867618560791, -0.47194141149520874, -0.11361312121152878, 0.18025358021259308, 0.26265063881874084, -0.38035309314727783, -0.1663520485162735, -0.546897292137146, -0.47163447737693787, 0.44272932410240173, -0.4801371395587921, 0.496999859809...
"FOO"; msgFrm.ShowDialog(); msgFrm.BringToFront(); msgFrm.TopMost = true; msgFrm.Activate(); SystemParametersInfo((uint)0x2001, 0, 0, 0x0002 | 0x0001); ShowWindowAsync(msgFrm.Handle, WS_SHOWNORMAL); SetForegroundWindow(msgFrm.Handle);
[ -0.1792503148317337, -0.23382288217544556, 0.987000048160553, -0.3869132697582245, 0.0411207377910614, 0.10310965776443481, 0.5615079402923584, -0.3347744345664978, -0.18422931432724, -0.27903661131858826, -0.22342221438884735, 0.4251433312892914, -0.5277523398399353, 0.11436977237462997, ...
SystemParametersInfo((uint)0x2001, 200000, 200000, 0x0002 | 0x0001); } } ``` As I say I'm sure that most of that is either not needed or even flat out wrong, I just wanted to show the things that I had tried. Also, as I mentioned, I plan to have this be asynchronously displayed at some point which I suspect will wind up requiring a separate thread. Would splitting the form out into it's own thread make it easier to cause it to get focus over the Powershell session? --- @Joel, thanks for the info. Here is what I tried based
[ -0.03443701192736626, -0.38208165764808655, 0.5236455202102661, 0.24199819564819336, -0.03857918456196785, 0.06167124956846237, 0.2918696105480194, 0.09711962938308716, -0.202867791056633, -0.9549614191055298, 0.39352619647979736, 0.5039347410202026, -0.2727547287940979, 0.0048505491577088...
on your suggestion: ``` msgFrm.ShowDialog(); msgFrm.BringToFront(); msgFrm.Focus(); Application.DoEvents(); ``` The form still comes up *under* the Powershell session. I'll proceed with working out the threading. I've spawned threads before but never where the parent thread needed to talk to the child thread, so we'll see how it goes. Thnks for all the ideas so far folks. --- Ok, threading it took care of the problem. @Quarrelsome, I did try both of those. Neither (nor both together) worked. I am curious as to what is evil about using threading? I am not using Application.Run and I have yet to have a problem. I am using a mediator class that both the
[ 0.45579999685287476, 0.044049426913261414, 0.5496556162834167, 0.1020209863781929, -0.06708859652280807, 0.0496034137904644, 0.17838101089000702, -0.017550984397530556, -0.22240380942821503, -0.5878512263298035, 0.4030012786388397, 0.6015843749046326, -0.27621445059776306, 0.43946871161460...
parent thread and the child thread have access to. In that object I am using a ReaderWriterLock to lock one property that represents the message that I want displayed on the form that the child thread creates. The parent locks the property then writes what should be displayed. The child thread locks the property and reads what it should change the label on the form to. The child has to do this on a polling interval (I default it to 500ms) which I'm not real happy about, but I could not find an event driven way to let the child
[ 0.13205349445343018, 0.004741604905575514, 0.5650588870048523, 0.25699248909950256, 0.13858987390995026, 0.11917279660701752, 0.04521265998482704, -0.048122286796569824, 0.1631743609905243, -0.8772523403167725, 0.08013926446437836, 0.30339962244033813, -0.038338616490364075, 0.587456047534...
thread know that the proerty had changed, so I'm stuck with polling. I also had trouble activating and bringing a window to the foreground. Here is the code that eventually worked for me. I'm not sure if it will solve your problem. Basically, call ShowWindow() then SetForegroundWindow(). ``` using System.Diagnostics; using System.Runtime.InteropServices; // Sets the window to be foreground [DllImport("User32")] private static extern int SetForegroundWindow(IntPtr hwnd); // Activate or minimize a window [DllImportAttribute("User32.DLL")] private static extern bool ShowWindow(IntPtr hWnd, int nCmdShow); private const int SW_SHOW = 5; private const int SW_MINIMIZE = 6; private const int SW_RESTORE = 9; private void ActivateApplication(string briefAppName) { Process[] procList = Process.GetProcessesByName(briefAppName); if (procList.Length
[ 0.10330197215080261, -0.3405313193798065, 0.8421852588653564, -0.46300503611564636, 0.13421905040740967, 0.18404074013233185, 0.3428220748901367, -0.3007594048976898, -0.067830890417099, -0.6156724095344543, 0.01636716164648533, 0.534541130065918, -0.4509664475917816, 0.2814088761806488, ...
> 0) { ShowWindow(procList[0].MainWindowHandle, SW_RESTORE); SetForegroundWindow(procList[0].MainWindowHandle); } } ```
[ 0.14996100962162018, 0.13040567934513092, 0.88724684715271, -0.4926482141017914, 0.2682051956653595, -0.2742367386817932, 0.5084345936775208, -0.2655438482761383, 0.09884773939847946, -0.43690913915634155, -0.4666801989078522, 0.46999314427375793, -0.37314334511756897, 0.3841111660003662, ...
I'm using TortoiseSVN against the SourceForge SVN repository. I'd like to move a file from one folder to another in order to maintain its revision history. Is this possible? If so, how do you do it? (My current strategy has been to copy the file into the new folder and check it in and then delete the file from the current folder.) Subversion has native support for moving files. ``` svn move SOURCE DESTINATION ``` See the online help (svn help move) for more information.
[ 0.04881500080227852, -0.15565815567970276, 0.29205521941185, -0.13113003969192505, -0.0739067867398262, -0.15038886666297913, 0.23105107247829437, 0.23119941353797913, -0.4393720030784607, -0.4987254738807678, -0.040856629610061646, 0.6329144239425659, -0.030876215547323227, 0.379232317209...
Is it possible to remote-debug a Visual C++ 6.0 application running on a Windows NT machine from a developer workstation running Windows XP? If so, is there a procedure written up somewhere? Take a look at [this article.](http://www.codeproject.com/KB/debug/remotedebug.aspx) Also [this](http://msdn.microsoft.com/en-us/library/bt727f1t.aspx) may be helpful although you don't mention which version of the IDE you're using.
[ 0.35179033875465393, -0.18360987305641174, -0.02552201971411705, 0.15122032165527344, 0.21316416561603546, -0.36756351590156555, 0.34737834334373474, 0.04262261837720871, -0.32209375500679016, -0.15992754697799683, -0.33436891436576843, 0.5086807012557983, -0.32690221071243286, 0.093426875...
I'm trying to find the correct names for these 2 "types" of coding expressions in LINQ so that I can refer to them correctly. I want to say that the first is called "Fluent Style"? ``` var selectVar = arrayVar.Select( (a,i) => new { Line = a }); var selectVar = from s in arrayVar select new { Line = s }; ``` * First - calling an extension method. This style of coding is called "[fluent interface](http://www.martinfowler.com/bliki/FluentInterface.html)" as you mentioned. * Second method is called [language integrated query](http://en.wikipedia.org/wiki/Language_Integrated_Query)
[ 0.4247623383998871, -0.08086016029119492, 0.47696396708488464, -0.35307228565216064, -0.08825325965881348, 0.20343463122844696, 0.41502436995506287, -0.376069039106369, -0.12304199486970901, -0.4514334201812744, -0.1228593960404396, 0.8001927137374878, -0.47809529304504395, -0.066723980009...
We have a deployment system at my office where we can automatically deploy a given build of our code to a specified dev environment (dev01, dev02, etc.). These dev environments are generalized virtual machines, so our system has to configure them automatically. We have a new system requirement with our next version; we need to give certain user accounts read/write access to certain folders (specifically, giving the ASPNET user read/write to a logging folder). I'm pretty sure we could do this with WMI or scripts (we use Sysinternals PSTools in a few places for deployment), but I'm not sure what
[ 0.609882116317749, -0.10513954609632492, 0.12957479059696198, 0.28895503282546997, 0.11595466732978821, -0.26389601826667786, 0.3443816006183624, -0.09786064177751541, -0.21616169810295105, -0.8654145002365112, -0.17911244928836823, 0.41055113077163696, -0.10127244889736176, -0.26194983720...
is the best way to do it. The deployment system is written in C# 2.0, the dev environment is a VM with Windows XP. The VM is on the same domain as the deployment system and I have administrator access. Edit: There's not really a right answer for this, so I'm hesitant to mark an answer as accepted. Another option would be to investigate using a Powershell script There are a lot powershell community snap ins to support VMs and active directory. [Active Directory Script Rescources](http://www.computerperformance.co.uk/powershell/powershell_active_directory.htm#ADUC_(Active_Directory_Users_and_Computers)_) [Powershell Script Library](http://www.myitforum.com/myITWiki/Default.aspx?Page=WPScripts&AspxAutoDetectCookieSupport=1) [Microsoft Script Resources](http://www.microsoft.com/technet/scriptcenter/scripts/msh/ad/default.mspx?mfr=true) [VMWARE VI Toolkit (for Windows)](http://blogs.vmware.com/vipowershell/)
[ 0.25379207730293274, 0.06427132338285446, 0.7136045098304749, 0.11231986433267593, 0.06396651268005371, -0.2761469781398773, 0.10526887327432632, -0.23928257822990417, -0.07782337069511414, -0.670950174331665, -0.38924163579940796, 0.9004027247428894, -0.17221112549304962, 0.01767216250300...
I'm writing my first iPhone app, so I haven't gotten around to figuring out much in the way of debugging. Essentially my app displays an image and when touched plays a short sound. When compiling and building the project in XCode, everything builds successfully, but when the app is run in the iPhone simulator, it crashes. I get the following error: ``` Application Specific Information: iPhone Simulator 1.0 (70), iPhone OS 2.0 (5A331) *** Terminating app due to uncaught exception 'NSUnknownKeyException', reason: '[<UIView 0x34efd0> setValue:forUndefinedKey:]: this class is not key value coding-compliant for the key kramerImage.' ``` kramerImage here is the image I'm using for the background. I'm not sure
[ 0.20232883095741272, 0.32838842272758484, 0.3526206612586975, -0.08057358860969543, 0.31796392798423767, 0.07323943078517914, 0.39296913146972656, -0.10905676335096359, 0.0006492477259598672, -0.4682157337665558, -0.19542458653450012, 0.6222662329673767, -0.3339267671108246, -0.00283778249...
what NSUnknownKeyException means or why the class is not key value coding-compliant for the key. (This isn't really iPhone specific - the same thing will happen in regular Cocoa). NSUnknownKeyException is a common error when using [Key-Value Coding](https://developer.apple.com/library/mac/#documentation/Cocoa/Conceptual/KeyValueCoding/Articles/KeyValueCoding.html) to access a key that the object doesn't have. The properties of most Cocoa objects can be accessing directly: ``` [@"hello world" length] // Objective-C 1.0 @"hello world".length // Objective-C 2.0 ``` Or via Key-Value Coding: ``` [@"hello world" valueForKey:@"length"] ``` I would get an NSUnknownKeyException if I used the following line: ``` [@"hello world" valueForKey:@"purpleMonkeyDishwasher"] ``` because NSString does not have a property (key) called 'purpleMonkeyDishwasher'. Something in your code
[ -0.23858380317687988, 0.18674513697624207, -0.08640559762716293, -0.01502236071974039, -0.027053561061620712, -0.065401092171669, 0.5777824521064758, 0.08889644593000412, -0.2378445714712143, -0.7088339924812317, -0.017901843413710594, 0.40012139081954956, -0.2440945953130722, 0.2193228453...
is trying to set a value for the key 'kramerImage' on an UIView, which (apparently) doesn't support that key. If you're using Interface Builder, it might be something in your nib. Find where 'kramerImage' is being used, and try to track it down from there.
[ 0.08073609322309494, -0.02742503397166729, 0.08455859124660492, 0.2418666034936905, -0.015459423884749413, -0.20314274728298187, 0.4006088972091675, 0.23938676714897156, -0.18007437884807587, -0.5532251596450806, -0.09922000765800476, 0.49931445717811584, -0.253445565700531, 0.081009447574...
I'm working on an application where users have to make a call and type a verification number with the keypad of their phone. I would like to be able to detect if the number they type is correct or not. The phone system does not have access to a list of valid numbers, but instead, it will validate the number against an algorithm (like a credit card number). Here are some of the requirements : * It must be difficult to type a valid random code * It must be difficult to have a valid code if I make a typo (transposition of digits,
[ 0.5582984089851379, 0.3893144726753235, 0.13507139682769775, 0.24858924746513367, 0.37346458435058594, -0.14491212368011475, 0.03878575563430786, -0.12407790124416351, -0.18352025747299194, -0.4416736662387848, 0.16129934787750244, 0.38582751154899597, -0.06933780014514923, -0.001244149869...
wrong digit) * I must have a reasonable number of possible combinations (let's say 1M) * The code must be as short as possible, to avoid errors from the user Given these requirements, how would you generate such a number? EDIT : @Haaked: The code has to be numerical because the user types it with its phone. @matt b: On the first step, the code is displayed on a Web page, the second step is to call and type in the code. I don't know the user's phone number. Followup : I've found several algorithms to *check* the validity of numbers (See this interesting Google Code project
[ 0.33447450399398804, 0.24557805061340332, 0.33697575330734253, 0.19854211807250977, 0.022375725209712982, 0.11687593907117844, 0.6752603650093079, -0.2596023678779602, 0.11697393655776978, -0.2884367108345032, 0.09912911057472229, 0.23103784024715424, -0.2760258913040161, -0.27838259935379...
: [checkDigits](http://code.google.com/p/checkdigits/wiki/CheckDigitSystems)). After some research, I think I'll go with the **ISO 7064 Mod 97,10** formula. It seems pretty solid as it is used to validate IBAN (International Bank Account Number). The formula is very simple: 1. Take a number : `123456` 2. Apply the following formula to obtain the 2 digits checksum : `mod(98 - mod(number * 100, 97), 97)` => 76 3. Concat number and checksum to obtain the code => 12345676 4. To validate a code, verify that `mod(code, 97) == 1` Test : * `mod(12345676, 97) = 1` => GOOD * `mod(21345676, 97) = 50` => BAD ! * `mod(12345678, 97) = 10` => BAD ! Apparently,
[ 0.017108166590332985, 0.3748866617679596, 0.2950740158557892, -0.037250179797410965, 0.11690786480903625, -0.14415861666202545, 0.35257425904273987, -0.12345826625823975, -0.11812188476324081, -0.08921560645103455, 0.11993195116519928, 0.2867862284183502, -0.32929784059524536, 0.1728627979...
this algorithm catches most of the errors. Another interesting option was the [Verhoeff algorithm](http://en.wikipedia.org/wiki/Verhoeff_algorithm). It has only one verification digit and is more difficult to implement (compared to the simple formula above).
[ -0.2771303057670593, -0.020588384941220284, 0.02537272498011589, 0.2666877508163452, -0.06798484921455383, 0.13827797770500183, 0.48228365182876587, -0.29802075028419495, -0.2030743658542633, -0.3700478672981262, 0.14159968495368958, 0.34480395913124084, -0.2381010502576828, -0.20366661250...
I am a web-developer working in PHP. I have some limited experience with using Test Driven Development in C# desktop applications. In that case we used nUnit for the unit testing framework. I would like to start using TDD in new projects but I'm really not sure where to begin. What recommendations do you have for a PHP-based unit testing framework and what are some good resources for someone who is pretty new to the TDD concept? I've used both PHPUnit & **[SimpleTest](http://simpletest.org/)** and I found **SimpleTest** to be easier to use. As far as TDD goes, I haven't had much luck with
[ 0.8707790374755859, 0.020906003192067146, -0.3918820321559906, -0.05466917157173157, -0.5010360479354858, 0.050452955067157745, 0.13660375773906708, -0.025616677477955818, 0.12534476816654205, -0.6208826899528503, 0.5271861553192139, 0.7156050205230713, 0.08197996020317078, 0.1308728903532...
it in the purest sense. I think that's mainly a time/discipline issue on my part though. Adding tests after the fact has been somewhat useful but my favorite things to do is use write SimpleTest tests that test for specific bugs that I have to fix. That makes it very easy to verify that things are actually fixed and stay fixed.
[ 0.6702205538749695, 0.18413333594799042, -0.14447316527366638, 0.2955538034439087, 0.11129117757081985, 0.19180770218372345, 0.2582293152809143, 0.3969706892967224, -0.2772660255432129, -0.24396643042564392, 0.20627999305725098, 0.5035491585731506, -0.18937867879867554, 0.06959627568721771...
We have an encryption service that we've exposed over net. tcp. Most of the time, the service is used to encrypt/decrypt strings. However, every now and then, we the need to encrypt large documents (pdf, JPG, bmp, etc.). What are the best endpoint settings for a scenario like this? Should I accept/return a stream? I've read a lot about this, but no one gives guidance on what to do when the large file doesn't occur frequently. MSDN describes [how to enable streaming over WCF](http://msdn.microsoft.com/en-us/library/ms789010.aspx) rather well. Note, if the link between client and server needs to be encrypted, then you'll need to
[ 0.18198822438716888, -0.011632089503109455, 0.2508166432380676, 0.28803175687789917, 0.08988918364048004, -0.48047932982444763, 0.08830801397562027, 0.10011421889066696, -0.25117889046669006, -0.7162595987319946, -0.33588436245918274, 0.48945632576942444, -0.029873574152588844, 0.197956055...
"roll your own" encryption mechanism. The default `net.tcp` encryption requires X.509 certificates, which won't work with streams as this kind of encryption needs to work on an entire message in one go rather than a stream of bytes. This, in turn, means that you won't be able to authenticate the client using the default WCF security mechanisms as authentication requires encryption. The only work-around for this that I know of is to implement your own custom behaviour extensions on client and server to handle authentication. A really good reference on how to add custom behaviour extensions is [here](http://www.winterdom.com/weblog/2006/10/02/CustomWCFBehaviorsThroughAppConfig.aspx): this documents
[ 0.666885256767273, -0.08377986401319504, 0.599118709564209, 0.024380367249250412, -0.19527283310890198, -0.2633529305458069, 0.2039298117160797, -0.17916876077651978, -0.6863046884536743, -0.3095259964466095, -0.025542153045535088, 0.3099394738674164, -0.09440199285745621, 0.11897103488445...
how to provide custom configuration, too (something that I don't think is discussed anywhere in the MSDN documents at this time).
[ 0.3342605233192444, -0.23217669129371643, -0.056133855134248734, 0.3665145933628082, 0.3284628093242645, -0.1911085546016693, -0.1857881397008896, 0.03063870221376419, -0.2601682245731354, -0.5580935478210449, -0.01875292882323265, 0.6422080993652344, -0.15008729696273804, -0.3239164054393...
I am writing a webapp using CodeIgniter that requires authentication. I created a model which handles all my authentication. However, I can't find a way to access this authentication model from inside another model. Is there a way to access a model from inside another mode, or a better way to handle authentication inside CodeIgniter? In general, you don't want to create objects inside an object. That's a bad habit, instead, write a clear API and inject a model into your model. ``` <?php // in your controller $model1 = new Model1(); $model2 = new Model2(); $model2->setWhatever($model1); ?> ```
[ 0.1666751205921173, -0.030804920941591263, 0.5571883916854858, 0.029664942994713783, 0.06693132221698761, -0.1597691774368286, 0.3701595664024353, -0.24130882322788239, -0.16822902858257294, -0.685599148273468, 0.2788424491882324, 0.378355473279953, -0.4770069420337677, 0.2637023627758026,...
Is there a clean way to redirect all attempts to going to an HTTP:// version of a site to its HTTPS:// equivalent? I think the cleanest way is as described [here on IIS-aid.com](http://www.iis-aid.com/articles/how_to_guides/redirect_http_to_https_iis_7). It's web.config only and so if you change server you don't have to remember all the steps you went through with the 403.4 custom error page or other special permissions, it just works. ``` <configuration> <system.webServer> <rewrite> <rules> <rule name="HTTP to HTTPS redirect" stopProcessing="true"> <match
[ 0.16651488840579987, -0.14448195695877075, 0.6134924292564392, 0.020572936162352562, 0.16880366206169128, -0.5789733529090881, 0.7519426941871643, -0.16561032831668854, -0.30919381976127625, -0.866815447807312, -0.27598217129707336, 0.4044572710990906, -0.28652510046958923, -0.031653121113...
url="(.*)" /> <conditions> <add input="{HTTPS}" pattern="off" ignoreCase="true" /> </conditions> <action type="Redirect" redirectType="Permanent" url="https://{HTTP_HOST}/{R:1}" /> </rule> </rules> </rewrite> </system.webServer> </configuration> ```
[ -0.07320685684680939, -0.22019320726394653, 0.7237045764923096, -0.11058653146028519, -0.07651833444833755, -0.2145908921957016, 0.1464274376630783, -0.17878593504428864, -0.42557603120803833, -0.5770803093910217, -0.6149223446846008, 0.04116306081414223, -0.46386629343032837, 0.5075711607...
What is the syntax for placing constraints on multiple types? The basic example: ``` class Animal<SpeciesType> where SpeciesType : Species ``` I would like to place constraints on both types in the following definition such that `SpeciesType` must inherit from `Species` and `OrderType` must inherit from `Order`: ``` class Animal<SpeciesType, OrderType> ``` ``` public class Animal<SpeciesType,OrderType> where SpeciesType : Species where OrderType : Order { } ```
[ 0.030472539365291595, -0.20562976598739624, -0.2934128940105438, 0.1291903257369995, 0.18501605093479156, 0.15382608771324158, -0.299124538898468, 0.050750140100717545, -0.11298994719982147, -0.6338011026382446, 0.0009523915941826999, 0.708775520324707, -0.72979336977005, 0.181601285934448...
If you've used Oracle, you've probably gotten the helpful message "ORA-00942: Table or view does not exist". Is there a legitimate technical reason the message doesn't include the name of the missing object? Arguments about this being due to security sound like they were crafted by the TSA. If I'm an attacker, I'd know what table I just attempted to exploit, and be able to interpret this unhelpful message easily. If I'm a developer working with a complex join through several layers of application code, it's often very difficult to tell. My guess is that when this error was originally implemented,
[ 0.40274420380592346, 0.3720473051071167, -0.20012062788009644, 0.1692691296339035, 0.16127344965934753, -0.04357416555285454, 0.2700252830982208, 0.3036046326160431, -0.455963134765625, -0.3593448996543884, 0.06841573864221573, 0.5230525732040405, 0.020645136013627052, 0.15969055891036987,...
someone neglected to add the object name, and now, people are afraid it will break compatibility to fix it. (Code doing silly things like parsing the error message will be confused if it changes.) Is there a developer-friendly (as opposed to recruiting your DBA) way to determine the name of the missing table? --- Although I've accepted an answer which is relevant to the topic, it doesn't really answer my question: *Why isn't the name part of the error message?* If anyone can come up with the real answer, I'll be happy to change my vote. You can set an EVENT in your parameter
[ 0.32914021611213684, 0.04861930385231972, 0.09491035342216492, 0.391263484954834, -0.24523593485355377, -0.09983941912651062, 0.32128795981407166, 0.09420251846313477, -0.4474124312400818, -0.3750668168067932, 0.11708274483680725, 0.30708158016204834, -0.15504266321659088, 0.26669475436210...
file (plain text or spfile) to force Oracle to dump a detailed trace file in the user\_dump\_dest, the object name might be in there, if not the SQL should be. EVENT="942 trace name errorstack level 12" If you are using a plain text file you need to keep all your EVENT settings on consecutive lines. Not sure how that applied to spfile.
[ 0.07006175816059113, -0.09859093278646469, -0.04599599167704582, 0.1410963088274002, -0.056173454970121384, -0.3407682478427887, 0.4890452027320862, -0.13028784096240997, -0.22402377426624298, -0.503287136554718, 0.03381669521331787, 0.3886928856372833, -0.41650471091270447, -0.36616328358...
What's the best way to delete all rows from a table in sql but to keep n number of rows on the top? ``` DELETE FROM Table WHERE ID NOT IN (SELECT TOP 10 ID FROM Table) ``` **Edit:** Chris brings up a good performance hit since the TOP 10 query would be run for each row. If this is a one time thing, then it may not be as big of a deal, but if it is a common thing, then I did look closer at it.
[ 0.22819992899894714, 0.25209131836891174, 0.11917193233966827, 0.17624498903751373, 0.044546958059072495, -0.20311306416988373, 0.04328799620270729, -0.1769358515739441, -0.20945322513580322, -0.5045111775398254, 0.16014747321605682, 0.5705428719520569, 0.05850822106003761, -0.020936490967...
I am using a perl script to POST to Google Appengine application. I post a text file containing some XML using the -F option. <http://www.cpan.org/authors/id/E/EL/ELIJAH/bget-1.1> There is a version 1.2, already tested and get the same issue. The post looks something like this. ``` Host: foo.appspot.com User-Agent: lwp-request/1.38 Content-Type: text/plain Content-Length: 202 <XML> <BLAH>Hello World</BLAH> </XML> ``` I have modified the example so the 202 isn't right, don't worry about that. On to the problem. The Content-Length matches the number of bytes on the file, however unless I manually increase the Content-Length it does not send all of the file, a few bytes get truncated. The number of bytes
[ 0.44396597146987915, 0.3676983714103699, 0.6915479302406311, -0.10058742761611938, 0.00025286019081249833, -0.031061293557286263, 0.18974733352661133, -0.04033279791474342, -0.19245679676532745, -0.6932836771011353, -0.1858988255262375, 0.3458668887615204, -0.5019153356552124, -0.047883033...
truncated is not the same for files of different sizes. I used the -r option on the script and I can see what it is sending and it is sending all of the file, but Google Appengine self.request.body shows that not everything is received. I think the solution is to get the right number for Content-Length and apparently it isn't as simple as number of bytes on the file or the perl script is mangling it somehow. Update: Thanks to Erickson for the right answer. I used printf to append characters to the end of the file and it always truncated exactly
[ 0.02852274477481842, -0.0669393464922905, -0.04824801906943321, 0.19479860365390778, -0.5373103022575378, 0.3449054956436157, 0.3360363841056824, 0.1723703294992447, -0.45732980966567993, -0.3814133405685425, -0.04371994361281395, -0.0021598604507744312, -0.2992985248565674, 0.107735209167...
the number of lines in the file. I suppose I could figure out what is being added by iterating through every character on the server side but not worth it. This wasn't even answered over on the google groups set up for app engine! Is the number of extra bytes you need equal to the number of lines in the file? I ask because perhaps its possible that somehow carriage-returns are being introduced but not counted.
[ 0.4200122356414795, -0.07768320292234421, 0.49834969639778137, 0.2165338099002838, -0.0965636819601059, 0.45905157923698425, 0.07060090452432632, 0.10092978924512863, -0.7418659925460815, -0.458976149559021, 0.24167926609516144, 0.37624964118003845, -0.22251760959625244, 0.2631953060626983...
I have a function that gets x(a value) and xs(a list) and removes all values that are bigger than x from the list. Well it doesn't work, can you tell me why? ``` (defun biggerElems(x xs) (let ((xst)) (dolist (elem xs) (if (> x elem) (setf xst (remove elem xs)))) xst)) ``` I think it's this line that's not right: ``` (setf xst (remove elem xs)))) ``` The first argument to `setf` is the place, followed by the value. It looks like you have it backwards
[ 0.010131072252988815, 0.11359203606843948, 0.5795770883560181, -0.22493761777877808, -0.08911493420600891, -0.11006012558937073, 0.14698830246925354, -0.34790557622909546, -0.02998335473239422, -0.41339394450187683, -0.22962678968906403, 0.49159303307533264, -0.5854396224021912, 0.34048157...
(and `xst` is either `nil` or uninitialized). You might find it easier to do this: ``` (defun biggerElems (x xs) (remove-if (lambda (item) (> item x)) xs)) ```
[ 0.02228052355349064, -0.1697939783334732, 0.20586994290351868, -0.07569576799869537, -0.07637638598680496, -0.10675765573978424, 0.11756346374750137, -0.16496700048446655, -0.3018273711204529, -0.3298893868923187, -0.6020534038543701, 0.5515124201774597, -0.2883670926094055, 0.098344631493...
Is there an easy way to read an entire Access file (.mdb) into a DataSet in .NET (specifically C# or VB)? Or at least to get a list of tables from an access file so that I can loop through it and add them one at a time into a DataSet? Thanks for the suggestions. I was able to use those samples to put together this code, which seems to achieve what I'm looking for. ``` Using cn = New OleDbConnection(connectionstring) cn.Open() Dim ds As DataSet = new DataSet() Dim Schema As DataTable = cn.GetOleDbSchemaTable(OleDbSchemaGuid.Tables,
[ 0.3130355477333069, -0.08367536216974258, 0.42478862404823303, 0.21348702907562256, 0.12224132567644119, -0.22774045169353485, -0.1239740252494812, -0.11219639331102371, -0.5876386165618896, -0.5940386652946472, 0.008687852881848812, 0.4125596284866333, -0.3292129337787628, 0.2601404488086...
New Object() {Nothing, Nothing, Nothing, "TABLE"}) For i As Integer = 0 To Schema.Rows.Count - 1 Dim dt As DataTable = New DataTable(Schema.Rows(i)!TABLE_NAME.ToString()) Using adapter = New OleDbDataAdapter("SELECT * FROM " + Schema.Rows(i)!TABLE_NAME.ToString(), cn) adapter.Fill(dt) End Using ds.Tables.Add(dt) Next i End Using ```
[ -0.16386204957962036, -0.29586371779441833, 0.8488691449165344, -0.3257867693901062, 0.0848304033279419, 0.14276431500911713, 0.19373968243598938, -0.4877247214317322, -0.4702403247356415, -0.6571028828620911, -0.28868603706359863, 0.4368305802345276, -0.3831523060798645, 0.639963924884796...
What are the differences between `htmlspecialchars()` and `htmlentities()`. When should I use one or the other? From the PHP documentation for [htmlentities](http://us2.php.net/htmlentities): > This function is identical to `htmlspecialchars()` in all ways, except with `htmlentities()`, all characters which have HTML character entity equivalents are translated into these entities. From the PHP documentation for [htmlspecialchars](http://us.php.net/htmlspecialchars): > Certain characters have special significance in HTML, and should be represented by HTML entities if they are to preserve their meanings. This function returns a string with some of these conversions made; the translations made are those most useful for everyday web programming. If you require all HTML character
[ 0.04777270182967186, 0.16722583770751953, 0.6097691059112549, -0.08505047857761383, -0.15766769647598267, 0.25100409984588623, 0.14294923841953278, 0.04460038244724274, -0.06866241991519928, -0.8068907260894775, -0.172331303358078, 0.370199054479599, 0.020021313801407814, -0.17721122503280...
entities to be translated, use `htmlentities()` instead. The difference is what gets encoded. The choices are everything (entities) or "special" characters, like ampersand, double and single quotes, less than, and greater than (specialchars). I prefer to use `htmlspecialchars` whenever possible. For example: ```php echo htmlentities('<Il était une fois un être>.'); // Output: &lt;Il &eacute;tait une fois un &ecirc;tre&gt;. // ^^^^^^^^ ^^^^^^^
[ 0.03426855802536011, 0.0690116360783577, 0.48564842343330383, 0.3789372742176056, -0.13531309366226196, 0.0603654645383358, 0.21660758554935455, 0.18916310369968414, -0.11447577178478241, -0.6274284720420837, -0.5442478656768799, 0.3747459948062897, -0.2512034773826599, -0.3212403059005737...
echo htmlspecialchars('<Il était une fois un être>.'); // Output: &lt;Il était une fois un être&gt;. // ^ ^ ```
[ 0.013085633516311646, 0.1271151751279831, 0.3251979947090149, -0.07965962588787079, -0.4112420976161957, 0.1549239605665207, 0.5781562328338623, -0.02323010563850403, -0.2247990220785141, -0.41999348998069763, -0.6358810663223267, 0.3937591016292572, -0.45451006293296814, -0.26355358958244...
Is there a way to use `JQuery` to cloak or encrypt email addresses on an `HTML` page without changing the syntax in the `href`? Using JQuery may not be the route you want to take since this would be on the client side... Is there a reason you're not encrypting on server side?
[ 0.4301625192165375, -0.0321970097720623, 0.21218754351139069, 0.28146877884864807, -0.03756468743085861, -0.429295152425766, 0.4340440332889557, 0.04797999933362007, -0.20552845299243927, -0.4426589608192444, 0.047267816960811615, 0.2560734450817108, -0.1280321627855301, -0.121670842170715...
Today I had a coworker suggest I refactor my code to use a label statement to control flow through 2 nested for loops I had created. I've never used them before because personally I think they decrease the readability of a program. I am willing to change my mind about using them if the argument is solid enough however. What are people's opinions on label statements? Many algorithms are expressed more easily if you can jump across two loops (or a loop containing a switch statement). Don't feel bad about it. On the other hand, it may indicate an overly complex
[ 0.4271903932094574, 0.05716203898191452, -0.08277768641710281, 0.17613360285758972, -0.19286192953586578, 0.05182430520653725, 0.5283260345458984, -0.3488980531692505, -0.28437376022338867, -0.6156542301177979, 0.24350155889987946, 0.32630273699760437, -0.3138996362686157, 0.17404888570308...
solution. So stand back and look at the problem. Some people prefer a "single entry, single exit" approach to all loops. That is to say avoiding break (and continue) and early return for loops altogether. This may result in some duplicate code. What I would strongly avoid doing is introducing auxilary variables. Hiding control-flow within state adds to confusion. Splitting labeled loops into two methods may well be difficult. Exceptions are probably too heavyweight. Try a single entry, single exit approach.
[ 0.16666235029697418, -0.0948835238814354, -0.32059022784233093, 0.31280162930488586, -0.14629606902599335, -0.19216598570346832, 0.6286483407020569, -0.22255101799964905, -0.2476033866405487, -0.5391756892204285, -0.17495618760585785, 0.25913888216018677, -0.6695439219474792, 0.24302247166...
In the build log I'd like to the start and end time of each project's compilation. Is there any way to get VS to do this? For VC++ builds you can enable build timing. Go to Tools->Options->Projects and Solutions->VC++ Project settings and choose the option for 'Build Timing'
[ 0.8694587349891663, -0.20662477612495422, -0.16000506281852722, 0.22851260006427765, -0.048256732523441315, 0.16235122084617615, 0.3015233278274536, -0.23721644282341003, -0.2089506834745407, -0.6482641100883484, 0.22007112205028534, 0.8072267770767212, 0.06947728246450424, -0.258109748363...
How do I do backups in MySQL? I'm hoping there'll be something better than just running mysqldump every "x" hours. Is there anything like SQL Server has, where you can take a full backup each day, and then incrementals every hour, so if your DB dies you can restore up to the latest backup? Something like the DB log, where as long as the log doesn't die, you can restore up to the exact point where the DB died? Also, how do these things affect locking? I'd expect the online transactions to be locked for a while if I do a mysqldump. You might want
[ 0.34092316031455994, 0.05003388226032257, 0.29908132553100586, 0.36593109369277954, 0.1432783156633377, -0.21952681243419647, 0.3735312521457672, 0.1099650040268898, -0.47291624546051025, -0.39797431230545044, 0.2239220142364502, 0.7840694189071655, -0.10336516052484512, 0.0171488430351018...
to look at [incremental backups](http://dev.mysql.com/doc/refman/5.5/en/point-in-time-recovery.html).
[ -0.10695492476224899, -0.20124058425426483, 0.2518366873264313, 0.2178308069705963, 0.23727378249168396, -0.16564315557479858, 0.2982393205165863, -0.15970519185066223, -0.22980591654777527, -0.2869703769683838, -0.32629111409187317, 0.5796698927879333, 0.1598019301891327, -0.1499535888433...
From what I can gather, there are three categories: 1. Never use `GET` and use `POST` 2. Never use `POST` and use `GET` 3. It doesn't matter which one you use. Am I correct in assuming those three cases? If so, what are some examples from each case? Use `POST` for destructive actions such as creation (I'm aware of the irony), editing, and deletion, because you can't hit a `POST` action in the address bar of your browser. Use `GET` when it's safe to allow a person to call an action. So a URL like: ``` http://myblog.org/admin/posts/delete/357 ``` Should bring you to a confirmation page, rather than simply deleting
[ 0.4627416431903839, 0.09841526299715042, 0.2281373143196106, 0.12924475967884064, -0.16709959506988525, -0.03138379752635956, 0.4683566689491272, -0.15935315191745758, -0.20300915837287903, -0.3834145963191986, -0.1614345759153366, 0.24275484681129456, -0.2896248400211334, 0.00820736214518...
the item. It's far easier to avoid accidents this way. `POST` is also more secure than `GET`, because you aren't sticking information into a URL. And so using `GET` as the `method` for an HTML form that collects a password or other sensitive information is not the best idea. One final note: `POST` can transmit a larger amount of information than `GET`. 'POST' has no size restrictions for transmitted data, whilst 'GET' is limited to 2048 characters.
[ -0.055289044976234436, -0.2004864513874054, 0.4948400557041168, 0.44956737756729126, -0.2912102937698364, 0.015226910822093487, 0.3159390985965729, -0.12373548001050949, -0.16979162395000458, -0.20128768682479858, -0.4402269124984741, -0.07533664256334305, 0.005785916931927204, 0.066550575...
Everyone is aware of Dijkstra's [Letters to the editor: go to statement considered harmful](http://portal.acm.org/citation.cfm?doid=362947) (also [here](http://www.cs.utexas.edu/%7EEWD/transcriptions/EWD02xx/EWD215.html) .html transcript and [here](http://www.cs.utexas.edu/users/EWD/ewd02xx/EWD215.PDF) .pdf) and there has been a formidable push since that time to eschew the goto statement whenever possible. While it's possible to use goto to produce unmaintainable, sprawling code, it nevertheless remains in [modern programming languages](http://msdn.microsoft.com/en-us/library/13940fs2(VS.71).aspx). Even the advanced [continuation](http://en.wikipedia.org/wiki/Goto#Continuations) control structure in Scheme can be described as a sophisticated goto. What circumstances warrant the use of goto? When is it best to avoid? As a follow-up question: C provides a pair of functions, setjmp() and longjmp(), that provide the ability to
[ 0.2882324755191803, -0.13446080684661865, 0.2473640739917755, 0.13185860216617584, -0.19078391790390015, -0.6041738986968994, 0.4355923533439636, -0.4102826714515686, -0.1767512559890747, -0.14811645448207855, -0.5805869698524475, 0.4381152391433716, -0.172438845038414, -0.1389681845903396...
goto not just within the current stack frame but within any of the calling frames. Should these be considered as dangerous as goto? More dangerous? --- Dijkstra himself regretted that title, for which he was not responsible. At the end of [EWD1308](http://www.cs.utexas.edu/%7EEWD/transcriptions/EWD13xx/EWD1308.html) (also [here](http://www.cs.utexas.edu/%7EEWD/ewd13xx/EWD1308.PDF) .pdf) he wrote: > Finally a short story for the record. > In 1968, the Communications of the ACM > published a text of mine under the > title "*The goto statement considered > harmful*", which in later years would > be most frequently referenced, > regrettably, however, often by authors > who had seen no more of it than its > title, which became a cornerstone
[ 0.1436617374420166, 0.19171977043151855, -0.19028031826019287, 0.05490747094154358, -0.5856666564941406, -0.5056851506233215, 0.6086719632148743, -0.6002486348152161, -0.275646835565567, 0.04803774133324623, -0.04487111046910286, 0.4221952557563782, -0.4537876546382904, -0.0247109327465295...
of > my fame by becoming a template: we > would see all sorts of articles under > the title "X considered harmful" for > almost any X, including one titled > "Dijkstra considered harmful". But > what had happened? I had submitted a > paper under the title "***A case against > the goto statement***", which, in order > to speed up its publication, the > editor had changed into a "letter to > the Editor", and in the process he had > given it a new title of his own > invention! The editor was Niklaus > Wirth. A well thought out classic paper about this topic, to be matched to that of
[ 0.221199169754982, 0.4574110805988312, 0.11107742786407471, -0.053941309452056885, -0.573707640171051, -0.29517340660095215, 0.2616558074951172, -0.44275420904159546, -0.001459687016904354, -0.22046595811843872, -0.16009458899497986, 0.12315645813941956, -0.09673027694225311, 0.14650572836...
Dijkstra, is [Structured Programming with go to Statements](http://www.clifford.at/cfun/cliffdev/p261-knuth.pdf), by Donald E. Knuth. Reading both helps to reestablish context and a non-dogmatic understanding of the subject. In this paper, Dijkstra's opinion on this case is reported and is even more strong: > *Donald E. Knuth:* I believe that by presenting such a > view I am not in fact disagreeing > sharply with Dijkstra's ideas, since > he recently wrote the following: > "Please don't fall into the trap of > believing that I am terribly > dogmatical about [the go to > statement]. **I have the uncomfortable > feeling that others are making a > religion out of it, as
[ -0.13720369338989258, 0.26388901472091675, -0.47100120782852173, -0.1592293381690979, -0.23525963723659515, -0.029284536838531494, 0.6736196279525757, -0.49110737442970276, -0.12434127926826477, -0.0042128246277570724, -0.468063086271286, 0.4482921063899994, -0.22144775092601776, -0.542256...
if the > conceptual problems of programming > could be solved by a single trick, by > a simple form of coding discipline!**" The following statements are generalizations; while it is always possible to plead exception, it usually (in my experience and humble opinion) isn't worth the risks. 1. Unconstrained use of memory addresses (either GOTO or raw pointers) provides too many opportunities to make easily avoidable mistakes. 2. The more ways there are to arrive at a particular "location" in the code, the less confident one can be about what the state of the system is at that point. (See below.) 3. Structured programming IMHO is
[ 0.17505009472370148, 0.2661481499671936, -0.21536968648433685, 0.07410893589258194, -0.09797748178243637, -0.4904749095439911, 0.17117299139499664, -0.43468818068504333, -0.09277833998203278, -0.37486711144447327, -0.2606640160083771, 0.4426167905330658, -0.3002557158470154, -0.19914118945...
less about "avoiding GOTOs" and more about making the structure of the code match the structure of the data. For example, a repeating data structure (e.g. array, sequential file, etc.) is naturally processed by a repeated unit of code. Having built-in structures (e.g. while, for, until, for-each, etc.) allows the programmer to avoid the tedium of repeating the same cliched code patterns. 4. Even if GOTO is low-level implementation detail (not always the case!) it's below the level that the programmer should be thinking. How many programmers balance their personal checkbooks in raw binary? How many programmers worry about which sector
[ 0.36084839701652527, 0.02078966237604618, -0.07748726010322571, 0.38963884115219116, -0.2950829565525055, -0.23069888353347778, 0.17990237474441528, -0.05502546578645706, -0.6350042223930359, -0.35421183705329895, -0.12998999655246735, 0.37896886467933655, -0.23463860154151917, 0.116948999...
on the disk contains a particular record, instead of just providing a key to a database engine (and how many ways could things go wrong if we really wrote all of our programs in terms of physical disk sectors)? Footnotes to the above: Regarding point 2, consider the following code: ```c a = b + 1 /* do something with a */ ``` At the "do something" point in the code, we can state with high confidence that `a` is greater than `b`. (Yes, I'm ignoring the possibility of untrapped integer overflow. Let's not bog down a simple example.) On
[ 0.2533930838108063, 0.3830985128879547, -0.1375766098499298, 0.023739978671073914, 0.06680019199848175, -0.3430287837982178, 0.0062525030225515366, -0.09399137645959854, -0.3664737939834595, -0.23075264692306519, -0.1495378613471985, 0.49430733919143677, -0.09355106949806213, 0.08218914270...
the other hand, if the code had read this way: ```c ... goto 10 ... a = b + 1 10: /* do something with a */ ... goto 10 ... ``` The multiplicity of ways to get to label 10 means that we have to work much harder to be confident about the relationships between `a` and `b` at that point. (In fact, in the general case it's undecideable!) Regarding point 4, the whole notion of "going someplace" in
[ 0.5430651903152466, 0.19988353550434113, 0.12424615770578384, 0.085614413022995, 0.1041589081287384, -0.5259824395179749, 0.410707026720047, 0.1298026740550995, -0.43702659010887146, -0.06505894660949707, -0.3348495364189148, 0.18737980723381042, -0.015420460142195225, 0.1294601559638977, ...
the code is just a metaphor. Nothing is really "going" anywhere inside the CPU except electrons and photons (for the waste heat). Sometimes we give up a metaphor for another, more useful, one. I recall encountering (a few decades ago!) a language where ```c if (some condition) { action-1 } else { action-2 } ``` was implemented on a virtual machine by compiling action-1 and action-2 as out-of-line parameterless routines, then using a single two-argument VM opcode which used the boolean value of the
[ 0.5140119194984436, -0.04185723513364792, -0.14235754311084747, 0.17657218873500824, 0.0196624007076025, -0.10620523244142532, 0.3038281798362732, 0.17280280590057373, -0.1979130506515503, -0.20300062000751495, -0.1258472502231598, 0.5120478868484497, -0.4414755702018738, -0.06032653525471...
condition to invoke one or the other. The concept was simply "choose what to invoke now" rather than "go here or go there". Again, just a change of metaphor.
[ -0.0688035637140274, -0.6458009481430054, -0.2822669744491577, 0.0794745609164238, -0.16337013244628906, 0.12596318125724792, 0.423219233751297, -0.21340717375278473, 0.23344232141971588, -0.3973545432090759, 0.0551677942276001, 0.5142786502838135, -0.3494836688041687, 0.1585785448551178, ...
What's the best way to copy a file from a network share to the local file system using a Windows batch file? Normally, I would use "net use \*" but using this approach how can I get the drive letter? Can you just use the full UNC path to the file? ``` copy \\myserver\myshare\myfolder\myfile.txt c:\myfiles ```
[ 0.5440854430198669, 0.22573362290859222, 0.2839374244213104, 0.11835289001464844, 0.24742211401462555, -0.19555050134658813, 0.05634097382426262, 0.15105076134204865, -0.10066580027341843, -0.9071090221405029, 0.1260434240102768, 0.5802717208862305, -0.18166916072368622, 0.2655060589313507...
I'm looking for a good tool to profile a java webapp. I'd like to get performance information and memory usage if possible. Any suggestions? [JProfiler](http://www.ej-technologies.com/products/jprofiler/overview.html) is a really good one. It integrates with all the major IDEs and application servers.
[ 0.27528470754623413, -0.20966243743896484, -0.007605762220919132, 0.16687743365764618, -0.17424489557743073, -0.27005714178085327, -0.10579250752925873, 0.11080168932676315, -0.2536807358264923, -0.7416814565658569, 0.17566145956516266, 0.349837064743042, -0.051712121814489365, 0.034138709...
just wondering if anyone knows of a truly restful Put/delete implementation asp.net mvc preview 5 preferably. Check out the mvccontrib project at <http://www.mvccontrib.org>. In the source code a restful implementation has been added and it is current up to Preview 5. Check out the source code here - <http://mvccontrib.googlecode.com/svn/trunk/src/MVCContrib/SimplyRestful>
[ 0.16511321067810059, -0.4006468653678894, 0.5888466238975525, 0.17046509683132172, 0.09923054277896881, -0.22312207520008087, 0.37814226746559143, 0.3612382113933563, -0.2842990756034851, -0.6033783555030823, -0.2433592677116394, 0.5348455309867859, -0.036917418241500854, -0.06530335545539...
I'd like to be able to pass a SecureString (a cached passphrase) to a child process in C# (.Net 3.5), but I don't know what the most secure way is to do it. If I were to convert the SecureString back to a regular string and pass it as a command-line argument, for example, then I *think* the value may be prone to disk paging--which would make the plaintext touch the filesystem and ruin the point of using SecureString. Can the IntPtr for the SecureString be passed instead? Could I use a named pipe without increasing the risk? In general you should
[ 0.2943683862686157, 0.19900481402873993, 0.18710696697235107, -0.03910064324736595, 0.07960569113492966, -0.09861108660697937, 0.36086124181747437, 0.12756645679473877, 0.14336606860160828, -0.7157505750656128, -0.10604354739189148, 0.27300670742988586, -0.18812458217144012, 0.161181092262...
define your threat model before worrying about more exotic attacks. In this case: are you worried that somebody shuts down the computer and does a forensic analysis of the harddrive? Application memory can also be swapped out, so the simple fact that *one* process has it in memory, makes it potentially possible for it to end in the swap file. What about hibernation? During hibernation the entire content of the memory is written to the harddisk (including the SecureString - and presumably the encryption key!). What if the attacker has access to the system *while it's running* and can search
[ 0.39856070280075073, -0.19317522644996643, 0.07623660564422607, 0.09423252195119858, 0.2720692753791809, -0.20210762321949005, 0.3616838753223419, -0.10602986812591553, -0.47026756405830383, -0.44138431549072266, -0.17978230118751526, 0.3616611361503601, -0.2815210521221161, 0.019596051424...
through the memory of applications? In general client side security is very tricky and unless you have dedicated hardware (like a TPM chip) it is almost impossible to get right. Two solutions would be: * If you only need to test for equality between two strings (ie: is this string the same as the one I had earlier), store only a (salted) hash value of it. * Make the user re-enter the information when it is needed a second time (not very convenient, but security and convenience are opposed to each other)
[ 0.15251955389976501, 0.1940256655216217, 0.09349258244037628, 0.29381027817726135, 0.0706447884440422, -0.030687550082802773, 0.35964950919151306, -0.05110248923301697, -0.2866806089878082, -0.4501611292362213, -0.04028238728642464, 0.5039221048355103, 0.10182461887598038, 0.15872761607170...
For the following HTML: ``` <form name="myForm"> <label>One<input name="area" type="radio" value="S" /></label> <label>Two<input name="area" type="radio" value="R" /></label> <label>Three<input name="area" type="radio" value="O" /></label> <label>Four<input name="area" type="radio" value="U" /></label> </form> ``` Changing from the following JavaScript code: ``` $(function() { var myForm = document.myForm; var radios = myForm.area; // Loop through radio buttons for (var i=0; i<radios.length; i++) { if (radios[i].value == "S") {
[ 0.3607061505317688, -0.11488325893878937, 0.5993590354919434, -0.34606286883354187, -0.11567994207143784, 0.05415896326303482, 0.46094539761543274, -1.1128259897232056, -0.3327028155326843, -0.5863063931465149, -0.2975373864173889, 0.530158519744873, -0.3906296491622925, 0.0292260572314262...
radios[i].checked = true; // Selected when form displays radioClicks(); // Execute the function, initial setup } radios[i].onclick = radioClicks; // Assign to run when clicked } }); ``` Thanks EDIT: The response I selected answers the question I asked, however I like the answer that uses `bind()` because it also shows how to distinguish the group of radio buttons ``` $(
[ 0.2139793336391449, 0.14374665915966034, 0.6991786360740662, -0.010470529086887836, 0.049240592867136, -0.2712365984916687, 0.4125848412513733, -1.011313557624817, 0.029199866577982903, -0.4212799668312073, -0.24922004342079163, 0.9377437233924866, -0.6450701951980591, -0.09491899609565735...
function() { $("input:radio") .click(radioClicks) .filter("[value='S']") .attr("checked", "checked"); }); ```
[ 0.09503783285617828, -0.18485648930072784, 0.4176669418811798, -0.1874750554561615, 0.17553995549678802, -0.28345808386802673, 0.5323024392127991, -0.588829755783081, 0.1860969513654709, -0.25387755036354065, -0.4809824228286743, 1.1019740104675293, -0.7500040531158447, 0.3793705701828003,...
I'm just curious how most people make their ASP.NET pages printer-friendly? Do you create a separate printer-friendly version of the ASPX page, use CSS or something else? How do you handle situations like page breaks and wide tables? Is there one elegant solution that works for the majority of the cases? You basically make another CSS file that hide things or gives simpler "printer-friendly" style to things then add that with a `media="print"` so that it only applies to print media (when it is printed) ``` <link rel="stylesheet" type="text/css" media="print" href="print.css" /> ```
[ 0.4336744248867035, -0.07638954371213913, 0.49814075231552124, 0.2133042961359024, -0.22618038952350616, -0.25195956230163574, -0.1350056678056717, 0.03952023759484291, -0.5061289668083191, -0.7233616709709167, 0.07094035297632217, 0.4817332625389099, -0.23427385091781616, -0.3324336707592...
I'm working on a C# winforms application (VS.NET 2008, .NET 3.5 sp 1). I have a search field on a form, and rather than have a label next to the search field I'd like to show some grey text in the background of the search field itself ('Search terms', for example). When the user starts entering text in the search field the text should disappear. How can I achieve this? You will need to use some P/Inovke interop code to do this. Look for the Win32 API `SendMessage` function and the `EM_SETCUEBANNER` message.
[ 0.32309937477111816, 0.1693946123123169, 0.32908228039741516, -0.16694757342338562, 0.024801723659038544, -0.1362868994474411, 0.23415955901145935, -0.033008597791194916, -0.3084447383880615, -0.7167683243751526, 0.040612321346998215, 0.5323197245597839, -0.4620424807071686, 0.095916427671...
Is there a good library for extracting text from a PDF? I'm willing to pay for it if I have to. Something that works with C# or classic ASP (VBScript) would be ideal and I also need to be able to separate the pages from the PDF. [This question](https://stackoverflow.com/questions/25665/python-module-for-converting-pdf-to-text) had some interesting stuff, especially [pdftotext](http://en.wikipedia.org/wiki/Pdftotext) but I'd like to avoid calling to an external command-line app if I can. You can use the IFilter interface built into Windows to extract text and properties (author, title, etc.) from any supported file type. It's a COM interface so you would have use the .NET interop
[ 0.09530719369649887, 0.059185028076171875, 0.34460943937301636, 0.2827341556549072, -0.05818970873951912, -0.17751479148864746, -0.040817055851221085, -0.12946730852127075, -0.07861971110105515, -0.5755680203437805, -0.042034462094306946, 0.743421733379364, 0.06248610466718674, -0.00921791...
facilities. You'd also have to download the free PDF IFilter driver from Adobe.
[ 0.07849095016717911, 0.20814242959022522, 0.20958928763866425, 0.38950663805007935, -0.00018608401296660304, -0.2839096486568451, -0.11675609648227692, 0.13475799560546875, -0.07545313239097595, -0.4738295376300812, -0.2278677076101303, 0.624401330947876, 0.532036542892456, 0.0332691818475...
I have a situation where I might have multiple instances of a program running at once, and it's important that just one specific function not be executing in more than one of these instances at once. Is this the proper way to use a mutex to prevent this from happening? ``` lock (this.GetType()) { _log.Info("Doing Sync"); DoSync(); _log.Info("Sync Completed"); } ``` You said multiple instances of one application, so we're talking about two program.exe's running, right? The lock statement won't lock across multiple programs, just within the program. If you want a true Mutex, look at the
[ 0.46978047490119934, 0.06224341318011284, 0.14451132714748383, -0.004690480884164572, 0.31231164932250977, 0.025327077135443687, 0.43255430459976196, -0.4065789580345154, -0.2890563905239105, -0.46974408626556396, -0.09524963796138763, 0.800896167755127, -0.6790863275527954, 0.183715850114...
[System.Threading.Mutex](https://learn.microsoft.com/en-us/dotnet/api/system.threading.mutex) object. Here is a usage example: ``` bool createdNew; using (Mutex mtx = new Mutex(false, "MyAwesomeMutex", out createdNew)) { try { mtx.WaitOne(); MessageBox.Show("Click OK to release the mutex."); } finally { mtx.ReleaseMutex(); } } ``` The createdNew variable will let you know whether or not it was created the first time. It only tells you if it has been created, though. If you want to acquire the lock,
[ 0.38937848806381226, 0.031736694276332855, 0.4075013995170593, -0.36536866426467896, 0.27743035554885864, 0.18171198666095734, 0.363654762506485, -0.23542188107967377, -0.5828059315681458, -0.33689868450164795, -0.30960825085639954, 0.36182013154029846, -0.536274790763855, 0.62832325696945...
you need to call WaitOne and then call ReleaseMutex to release it. If you just want to see if you created a Mutex, just constructing it is fine.
[ 0.49511009454727173, -0.2842307686805725, 0.15454299747943878, 0.09063240140676498, -0.0830727070569992, 0.06716550886631012, 0.09118063002824783, -0.004742736462503672, -0.15479913353919983, -0.573663592338562, 0.17154835164546967, 0.6278712749481201, -0.40550217032432556, 0.3469250500202...
As a follow up to this question: [Developing a online exam application, how do I prevent cheaters?](https://stackoverflow.com/questions/46873/developing-a-online-exam-application-how-do-i-prevent-cheaters) Can I detect when Flex application looses its focus? that is if a user has clicked onto another application or opened a browser tab? I read this: [Detecting when a Flex application loses focus](http://blog.flexmonkeypatches.com/2007/12/07/detecting-when-a-flex-application-loses-focus/) but was not very clear... The key part of the code at that link is the ``` systemManager.stage.addEventListener(Event.DEACTIVATE,deactivate); ``` The Flash player send outs activate and deactivate events when the focus enters and leaves the player. All you need to do is create a listenr for them and react appropriately. A more clear example of how
[ 0.17368103563785553, -0.19842754304409027, 0.21861054003238678, 0.00653718551620841, -0.00029465751140378416, -0.4061864912509918, 0.3072204887866974, -0.21786847710609436, -0.06625742465257645, -0.6122643947601318, -0.052503183484077454, 0.8493364453315735, -0.08899937570095062, -0.257924...