Id
int64
4
8.51M
PostTypeId
int64
1
7
AcceptedAnswerId
int64
7
75.5M
ParentId
int64
4
41.8M
Score
int64
-208
27.7k
ViewCount
int64
11
12.4M
Body
stringlengths
0
45k
Title
stringlengths
2
150
ContentLicense
stringclasses
3 values
FavoriteCount
int64
0
225
CreationDate
stringdate
2008-07-31 21:42:52
2011-12-14 18:48:47
LastActivityDate
stringdate
2008-08-01 12:19:17
2023-03-05 04:40:26
LastEditDate
stringdate
2008-08-01 13:54:25
2023-03-05 03:12:45
LastEditorUserId
int64
-1
21.3M
OwnerUserId
int64
-1
21.1M
Tags
listlengths
1
6
20,611
1
20,625
null
49
95,333
The following code should find the appropriate project tag and remove it from the XmlDocument, however when I test it, it says: Does anyone know the proper way to do this? ``` public void DeleteProject (string projectName) { string ccConfigPath = ConfigurationManager.AppSettings["ConfigPath"]; XmlDocument ...
Removing nodes from an XmlDocument
CC BY-SA 2.5
0
2008-08-21T17:31:27.247
2015-12-16T08:18:41.480
2008-08-21T17:47:53.103
1,965
1,965
[ "c#", ".net", "xml", "xmldocument" ]
20,617
2
null
20,586
8
null
You need to have an implementation of [IValueConverter](http://msdn.microsoft.com/en-us/library/system.windows.data.ivalueconverter.aspx) interface that converts the uri into an image. Your Convert implementation of IValueConverter will look something like this: ``` BitmapImage image = new BitmapImage(); image.BeginI...
null
CC BY-SA 2.5
null
2008-08-21T17:35:54.427
2008-08-21T17:35:54.427
null
null
1,117
null
20,619
2
null
20,336
1
null
The only thing that I know to be well defined is the processor state immediately after reset. For the record you can find in [Intel's Software Developer's Manual](http://www.intel.com/products/processor/manuals/) Vol 3 chapter 8: "PROCESSOR MANAGEMENT AND INITIALIZATION" in the table titled " IA-32 Processor States F...
null
CC BY-SA 2.5
null
2008-08-21T17:36:57.747
2009-01-26T12:14:31.403
2009-01-26T12:14:31.403
1,084
1,084
null
20,613
2
null
20,245
3
null
Use an [IHttpHandler](http://msdn.microsoft.com/en-us/library/system.web.ihttphandler.aspx) and avoid the Page model overhead (which you don't need), but use Request.Form to get the values so you don't have to parse name value pairs yourself. Just pretend you're in PHP or Classic ASP (or ASP.NET MVC, for that matter). ...
null
CC BY-SA 2.5
null
2008-08-21T17:33:06.400
2008-08-21T17:33:06.400
null
null
2,199
null
20,625
2
null
20,611
73
null
Instead of ``` configDoc.RemoveChild(projectNodes[i]); ``` try ``` projectNodes[i].parentNode.RemoveChild(projectNodes[i]); ```
null
CC BY-SA 2.5
null
2008-08-21T17:38:54.670
2008-08-21T17:38:54.670
null
null
238
null
20,622
2
null
20,597
4
null
It looks like something was recently added to netbeans for php... [http://blogs.oracle.com/netbeansphp/entry/ftp_support_added](http://blogs.oracle.com/netbeansphp/entry/ftp_support_added) don't know if you can make use of that...
null
CC BY-SA 3.0
null
2008-08-21T17:37:48.150
2012-03-31T11:13:46.010
2012-03-31T11:13:46.010
48,503
2,031
null
20,605
2
null
20,598
14
null
Converting from timestamp to format: ``` date('Y-m-d', $timestamp); ``` Converting from formatted to timestamp: ``` mktime(0, 0, 0, $month, $day, $year, $is_dst); ``` See [date](http://www.php.net/manual/en/function.date.php) and [mktime](http://www.php.net/manual/en/function.mktime.php) for further documentation...
null
CC BY-SA 2.5
null
2008-08-21T17:29:34.113
2008-08-21T17:29:34.113
null
null
2,025
null
20,624
2
null
20,611
0
null
It would be handy to see a sample of the XML file you're processing but my guess would be that you have something like this ``` <Root> <Blah> <project>...</project> </Blah> </Root> ``` The error message seems to be because you're trying to remove `<project>` from the grandparent rather than the direct parent of...
null
CC BY-SA 3.0
null
2008-08-21T17:37:58.447
2015-12-16T08:18:41.480
2015-12-16T08:18:41.480
1,016,716
1,769
null
20,627
1
20,637
null
7
2,737
I've seen this all over the place: > Download here! SHA1 = 8e1ed2ce9e7e473d38a9dc7824a384a9ac34d7d0 What does it mean? How does a hash come into play as far as downloads and... What use can I make of it? Is this a legacy item where you used to have to verify some checksum after you downloaded the whole file?
why are downloads sometimes tagged md5, sha1 and other hash indicators?
CC BY-SA 3.0
0
2008-08-21T17:39:03.390
2013-07-05T08:57:38.883
2013-07-05T08:57:38.883
1,584,286
547
[ "hash", "checksum", "download" ]
20,628
2
null
20,450
6
null
I would use a hidden RichTextBox, set the Rtf member, then retrieve the Text member to sanitize the RTF in a well-supported way. Then I would use manually inject the desired formatting afterwards.
null
CC BY-SA 2.5
null
2008-08-21T17:39:40.503
2008-08-21T17:39:40.503
null
null
1,490
null
20,636
2
null
20,611
2
null
Looks like you need to select the parent node of projectNodes[i] before calling RemoveChild.
null
CC BY-SA 2.5
null
2008-08-21T17:41:22.090
2008-08-21T17:41:22.090
null
null
null
null
20,634
2
null
20,059
1
null
Looking at Alice, I see it is "designed for high school and college students". There appears to be another language/version called [Story Telling Alice](http://www.alice.org/kelleher/storytelling/index.html) that is "designed for middle-school students" [Alice Download Page](http://www.alice.org/index.php?page=downl...
null
CC BY-SA 2.5
null
2008-08-21T17:40:52.997
2008-08-21T17:40:52.997
null
null
1,048
null
20,635
2
null
20,336
1
null
Always assume undefined, otherwise you'll hit bad problems if you ever try to port architectures. There is nothing quite like the pain of porting code that assumes everything uninitialized will be set to zero.
null
CC BY-SA 2.5
null
2008-08-21T17:40:59.563
2008-08-21T17:40:59.563
null
null
175
null
20,637
2
null
20,627
21
null
It's a security measure. It allows you to verify that the file you just downloaded is the one that the author posted to the site. Note that using hashes from the same website you're getting the files from is not especially secure. Often a good place to get them from is a mailing list announcement where a PGP-signed ...
null
CC BY-SA 2.5
null
2008-08-21T17:41:36.347
2008-08-25T12:40:38.503
2008-08-25T12:40:38.503
430
430
null
20,641
2
null
20,627
2
null
A cryptographic hash (such as SH1 or MD5) allows you to verify that file you have has been downloaded correctly and has not been tampered with.
null
CC BY-SA 2.5
null
2008-08-21T17:42:36.157
2008-08-21T17:42:36.157
null
null
317
null
20,642
2
null
20,627
3
null
SHA1 and MD5 hashes are used to verify the integrity of files you've downloaded. They aren't necessarily a legacy technology, and can be used by tools like those in the openssl to verify whether or not your a file has been corrupted/changed from its original.
null
CC BY-SA 2.5
null
2008-08-21T17:42:38.437
2008-08-21T17:42:38.437
null
null
1,238
null
20,644
2
null
20,627
6
null
When downloading larger files, it's often useful to perform a checksum to ensure your download was successful and not mangled along transport. There's tons of freeware apps that can be used to gen the checksum for you to validate your download. This to me is an interesting mainstreaming of procedures that popular mp3...
null
CC BY-SA 2.5
null
2008-08-21T17:42:59.433
2008-08-21T17:42:59.433
null
null
2,228
null
20,645
2
null
20,510
8
null
There's no need for the JavaScript function, the first argument to `ExternalInterface` can be any JavaScript code, it doesn't have to be a function name (the documentation says so, but it is wrong). Try this: ``` ExternalInterface.call("alert('hello')"); ```
null
CC BY-SA 2.5
null
2008-08-21T17:43:48.543
2008-08-21T17:43:48.543
null
null
1,109
null
20,629
2
null
20,611
2
null
try ``` configDoc.DocumentElement.RemoveChild(projectNodes[i]); ```
null
CC BY-SA 2.5
null
2008-08-21T17:39:43.387
2008-08-21T17:39:43.387
null
null
1,338
null
20,640
2
null
20,627
2
null
It's to ensure that you downloaded the file correctly. If you hash the downloaded the file and it matches the hash on the page, all is well.
null
CC BY-SA 2.5
null
2008-08-21T17:42:23.210
2008-08-21T17:42:23.210
null
null
1,227
null
20,646
2
null
19,893
29
null
Base64 is indeed the right answer but CDATA is not, that's basically saying: "this could be anything", however it must be just anything, it has to be Base64 encoded binary data. XML Schema defines [Base 64 binary as a primitive datatype](http://www.w3.org/TR/xmlschema-2/#base64Binary) which you can use in your xsd.
null
CC BY-SA 2.5
null
2008-08-21T17:44:17.730
2008-08-21T17:44:17.730
null
null
1,996
null
20,639
2
null
17,911
0
null
@Brian Warshaw: This issue happens only about 10-20% of the time. Sometimes it hiccups and simply reloading the app will work fine, other times I will spend half an hour reloading the app over and over again to no avail. This is the original code (when I asked the question): ``` public class BlogReader extends MovieC...
null
CC BY-SA 2.5
null
2008-08-21T17:42:08.810
2008-08-21T21:06:20.537
2008-08-21T21:06:20.537
1,306
1,306
null
20,649
2
null
20,326
5
null
It's a very specific problem with this code, I doubt it will be useful for someone else, but here it goes: A check was added to the combo's `onchange` with an if, if the condition was met, an explicit call to the postback function was made. If the combo was set to `AutoPostback`, asp.net added the postback call again,...
null
CC BY-SA 3.0
null
2008-08-21T17:45:30.893
2011-12-10T01:54:03.653
2011-12-10T01:54:03.653
331,508
1,782
null
20,650
2
null
20,533
22
null
I thought TextMate was everyone's favourite. I haven't met a programmer using a Mac who is not using TextMate.
null
CC BY-SA 2.5
null
2008-08-21T17:45:36.243
2008-08-21T17:45:36.243
null
null
1,109
null
20,651
2
null
20,321
2
null
I think this is hard to answer without more information. I lean on the side of one database. Properly coded business objects should prevent you from forgetting clientId in your queries. The type of database you are using and how it scales might help you make your decision. For schema changes down the road, it...
null
CC BY-SA 2.5
null
2008-08-21T17:47:11.920
2008-08-21T17:47:11.920
null
null
1,865
null
20,658
1
20,679
null
6
14,206
How, in general, does one determine if a PC supports hardware virtualization? I use VirtualPC to set up parallel test environments and I'd enjoy a bit of a speed boost.
Determine if my PC supports HW Virtualization
CC BY-SA 2.5
0
2008-08-21T17:52:09.723
2013-11-09T19:43:58.490
null
null
1,490
[ "virtualization", "virtual-pc" ]
20,648
2
null
20,586
18
null
You can also simply set the Source attribute rather than using the child elements. To do this your class needs to return the image as a Bitmap Image. Here is an example of one way I've done it ``` <Image Width="90" Height="90" Source="{Binding Path=ImageSource}" Margin="0,0,0,5" /> ``` And the class...
null
CC BY-SA 2.5
null
2008-08-21T17:45:11.190
2008-08-21T17:54:38.657
2008-08-21T17:54:38.657
312
312
null
20,659
2
null
20,658
0
null
Try just turning the option on in VirtualPC. If it doesn't do anything (or the option isn't available), then your PC doesn't.
null
CC BY-SA 2.5
null
2008-08-21T17:52:56.803
2008-08-21T17:52:56.803
null
null
1,975,282
null
20,664
2
null
20,658
1
null
The first thing is to run VPC, open Options, and see if the HW virtualization option is available. If it isn't you may still have it. Many machines have HW virtualization disabled in the BIOS. If you believe this is the case you'll need to confirm with your processor mfg that MW virtualization is supported, then find ...
null
CC BY-SA 2.5
null
2008-08-21T17:57:03.987
2008-08-21T17:57:03.987
null
null
100
null
20,661
2
null
20,658
0
null
> Try just turning the option on in VirtualPC. If it doesn't do anything (or the option isn't available), then your PC doesn't. Some PC's require a BIOS setting to be turned on in order for this option to be enabled. I couldn't find that BIOS setting on my machine, but then again there are a lot of options to comb th...
null
CC BY-SA 2.5
null
2008-08-21T17:55:45.207
2008-08-21T17:55:45.207
null
null
1,490
null
20,663
1
20,698
null
38
9,266
[AOP](http://en.wikipedia.org/wiki/Aspect-oriented_programming) is an interesting programming paradigm in my opinion. However, there haven't been discussions about it yet here on stackoverflow (at least I couldn't find them). What do you think about it in general? Do you use AOP in your projects? Or do you think it's r...
Do you use AOP (Aspect Oriented Programming) in production software?
CC BY-SA 3.0
0
2008-08-21T17:56:10.307
2018-10-16T09:13:50.963
2012-04-25T18:48:16.993
1,332,690
1,793
[ "aop", "paradigms" ]
20,662
2
null
20,201
1
null
Maybe a permissions issue on the Crystal libraries?? I've run into that before with Crystal, not specfically the ImageHandler though.
null
CC BY-SA 2.5
null
2008-08-21T17:55:57.717
2008-08-21T17:55:57.717
null
null
1,865
null
20,654
2
null
20,627
0
null
With a has (MD5, SHA-1) one input matches only with one output, and then if you down load the file and calculate the hash again should obtain the same output. If the output is different the file is corrupt. ``` If (hash(file) == “Hash in page”) validFile = true; else validFile = false; ```
null
CC BY-SA 2.5
null
2008-08-21T17:48:03.993
2008-08-21T17:48:03.993
null
null
2,143
null
20,666
2
null
20,627
2
null
To go along with what everyone here is saying I use [HashTab](http://beeblebrox.org/hashtab/) when I need to generate/compare MD5 and SHA1 hashes on Windows. It adds a new tab to the file properties window and will calculate the hashes.
null
CC BY-SA 2.5
null
2008-08-21T17:57:19.447
2008-08-21T17:57:19.447
null
null
200
null
20,673
2
null
20,658
0
null
You can take a look in the BIOS of the machine. It indicates if the machine supports hardware virtualization. You can run programs like virtual pc even if you machine does not support HW virtualization, but if the machine supports it the program take advantage of this extensions.
null
CC BY-SA 2.5
null
2008-08-21T18:01:28.297
2008-08-21T18:01:28.297
null
null
2,143
null
20,668
2
null
20,598
0
null
A date string of the form: ``` YYYY-MM-DD ``` has no time associated with it. A MySQL Timestamp is of the form: ``` YYYY-MM-DD HH:mm:ss ``` to compare the two, you'll either have to add a time to the date string, like midnight for example ``` $datetime = '2008-08-21'.' 00:00:00'; ``` and then use a function to...
null
CC BY-SA 2.5
null
2008-08-21T17:57:38.820
2008-08-21T17:57:38.820
null
null
302
null
20,631
2
null
20,529
73
null
My most commonly used features are + quick-fix / spell-checker opening files - - matches are made on the start of the class/filename. start your search pattern with a * to search anywhere within the filename/classname. Formatting - - Generated code - - Refactorings - - - Running and debugging. ++ is a r...
null
CC BY-SA 3.0
null
2008-08-21T17:39:52.110
2013-03-22T10:23:21.983
2013-03-22T10:23:21.983
1,820
1,820
null
20,670
2
null
20,227
70
null
Your code was fine except for the Base 64 encoding bit (which you mentioned was a test), the reason the output may not have made sense is that you were displaying a raw byte array (doing toString() on a byte array returns its internal Java reference, not the String representation of the ). Here's a version that's just ...
null
CC BY-SA 2.5
null
2008-08-21T17:59:50.767
2008-08-21T17:59:50.767
null
null
1,996
null
20,679
2
null
20,658
11
null
Download this: [http://www.cpuid.com/cpuz.php](http://www.cpuid.com/cpuz.php) Also check, [http://en.wikipedia.org/wiki/X86_virtualization](http://en.wikipedia.org/wiki/X86_virtualization) Edit: Additional, I know it's for XEN but the instructions are the same for all VMs that want hardware support. [http://wiki.xens...
null
CC BY-SA 2.5
null
2008-08-21T18:05:10.283
2008-08-21T18:21:48.730
2008-08-21T18:21:48.730
287
287
null
20,684
1
20,694
null
8
5,473
I've been using Linq to SQL for some time now and I find it to be really helpful and easy to use. With other ORM tools I've used in the past, the entity object filled from the database normally has a property indicating the length of the underlying data column in the database. This is helpful in databinding situations ...
Linq to SQL - Underlying Column Length
CC BY-SA 2.5
0
2008-08-21T18:07:33.710
2014-02-26T19:09:50.387
null
null
689
[ "linq-to-sql" ]
20,682
2
null
20,003
16
null
We have a largish application (160+ OSGi bundles where each bundle is a Maven module) and the lesson we learned, and continue to learn, is that flat is better. The problem with encoding semantics in your hierarchy is that you lose flexibility. A module that is 100% say "communication" today may be partly "service" tomo...
null
CC BY-SA 2.5
null
2008-08-21T18:07:00.513
2010-04-08T10:53:22.233
2017-05-23T12:33:27.093
-1
1,996
null
20,683
2
null
20,658
0
null
Your processor does NOT support hardware-assisted virtualization, but as others have said you can still run virtualization tools. [http://www.intel.com/products/processor_number/chart/pentium_d.htm](http://www.intel.com/products/processor_number/chart/pentium_d.htm)
null
CC BY-SA 2.5
null
2008-08-21T18:07:16.833
2008-08-21T18:07:16.833
null
null
100
null
20,688
2
null
20,663
3
null
We used aspectJ in one of my big projects for quite some time. The project was made up of several web services, each with several functions, which was the front end for a complicated document processing/querying system. Somewhere around 75k lines of code. We used aspects for two relatively minor pieces of functional...
null
CC BY-SA 2.5
null
2008-08-21T18:09:52.147
2008-08-21T18:09:52.147
null
null
1,322
null
20,689
2
null
20,587
9
null
If you were allowed to implement CLR integration assemblies you could actually use FTP without having to write a temporary file: ``` public static void DoQueryAndUploadFile(string uri, string username, string password, string filename) { FtpWebRequest ftp = (FtpWebRequest)FtpWebRequest.Create(uri + "/" + filename)...
null
CC BY-SA 3.0
null
2008-08-21T18:09:52.473
2011-07-24T12:52:28.373
2011-07-24T12:52:28.373
419
419
null
20,681
2
null
20,003
3
null
I think you're better off flattening your directory structure. Perhaps you want to come up with a naming convention for the directories such that they sort nicely when viewing all of the projects, but ultimately I don't think all of that extra hierarchy is necessary. Assuming you're using Eclipse as your IDE all of t...
null
CC BY-SA 2.5
null
2008-08-21T18:06:52.073
2008-08-21T18:06:52.073
null
null
1,247
null
20,690
2
null
20,674
-1
null
Unless I'm misunderstanding, don't you just need something like this: ``` class Foo private def Foo.bar # Complex logic goes here puts "hi" end public def bar Foo.bar end end ``` Of course you could change the second definition to use your self.class.send approach if ...
null
CC BY-SA 2.5
null
2008-08-21T18:10:05.170
2008-08-21T18:15:59.417
2008-08-21T18:15:59.417
2,168
2,168
null
20,694
2
null
20,684
7
null
Using the LINQ ColumnAttribute to Get Field Lengths from your Database : [http://www.codeproject.com/KB/cs/LinqColumnAttributeTricks.aspx](http://www.codeproject.com/KB/cs/LinqColumnAttributeTricks.aspx)
null
CC BY-SA 3.0
null
2008-08-21T18:11:20.003
2014-02-26T19:09:50.387
2014-02-26T19:09:50.387
888,479
414
null
20,697
2
null
19,437
0
null
We had to install NeoDynamic barcode software to render the barcode as an image since we can't include the barcode fonts in PDF exports.
null
CC BY-SA 2.5
null
2008-08-21T18:13:01.687
2008-08-21T18:13:01.687
null
null
1,545
null
20,674
1
20,746
null
17
18,662
Other than `self.class.send :method, args...`, of course. I'd like to make a rather complex method available at both the class and instance level without duplicating the code. --- @Jonathan Branam: that was my assumption, but I wanted to make sure nobody else had found a way around. Visibility in Ruby is ver...
Is there a way to call a private Class method from an instance in Ruby?
CC BY-SA 3.0
0
2008-08-21T18:02:04.973
2019-04-03T02:43:23.053
2012-03-27T23:37:35.330
38,765
1,190
[ "ruby", "scope", "visibility", "class-method", "access-specifier" ]
20,696
1
37,438
null
1
1,948
In E (specman) I want to declare variables that are lists, and I want to fix their lengths. It's easy to do for a member of a struct: ``` thread[2] : list of thread_t; ``` while for a "regular" variable in a function the above doesn't work, and I have to do something like: ``` var warned : list of bool; gen warned...
How do I declare a list of fixed length in specman?
CC BY-SA 2.5
null
2008-08-21T18:13:01.157
2017-04-18T21:22:32.063
2017-04-18T21:22:32.063
881,229
1,084
[ "specman" ]
20,700
2
null
20,658
1
null
Try [cpu-z](http://www.cpuid.com/cpuz.php) or [SecurAble](http://www.grc.com/securable.htm) on windows or on linux, `cat /proc/cpuinfo` and look for the flags: vmx (Intel) or svm (AMD) All of those will tell you if the hardware supports it, but as others said it must be enabled in the BIOS. (But checking first will a...
null
CC BY-SA 2.5
null
2008-08-21T18:15:48.590
2008-08-21T18:15:48.590
null
null
1,480
null
20,698
2
null
20,663
15
null
Yes. Orthogonal concerns, like security, are best done with AOP-style interception. Whether that is done automatically (through something like a dependency injection container) or manually is unimportant to the end goal. One example: the "before/after" attributes in [xUnit.net](http://www.codeplex.com/xunit) (an open...
null
CC BY-SA 2.5
null
2008-08-21T18:14:55.037
2008-08-21T18:14:55.037
null
null
1,554
null
20,712
2
null
15,880
3
null
It's a "Structured Storage" document. I've successfully used [Andrew Peace's code](http://www.codeproject.com/KB/files/structstor.aspx) to read these in the past, even under .NET (using C++/CLI) - it's clean and fairly easy to understand. Basically, you need to figure out which records you need, and query for those - i...
null
CC BY-SA 2.5
null
2008-08-21T18:25:08.303
2008-08-21T18:25:08.303
null
null
811
null
20,710
2
null
16,656
8
null
Just to clarify: ``` System.IO.Path.GetTempPath() ``` returns just the folder path to the temp folder. ``` System.IO.Path.GetTempFileName() ``` returns the fully qualified file name (including the path) so this: ``` System.IO.Path.Combine(System.IO.Path.GetTempPath(), System.IO.Path.GetTempFileName()) ``` is r...
null
CC BY-SA 2.5
null
2008-08-21T18:24:07.603
2008-08-21T18:24:07.603
null
null
373
null
20,701
2
null
826
1
null
This question has been wracking my brain for about a day now. Awesome. Anyways, you can't get away from the n^2 nature of it easily, but you can do slightly better with the merge since you can bound the range to insert each element in. If you look at all the lists you generate, they have the following form: `(a[i], ...
null
CC BY-SA 3.0
null
2008-08-21T18:16:13.800
2012-07-03T14:49:57.337
2012-07-03T14:49:57.337
142,162
1,799
null
20,718
1
20,904
null
5
804
I want to test the behavior of a certain piece of .NET code in partial trust environments. What's the fastest way to set this up? Feel free to assume that I (and other readers) are total CAS noobs. @Nick: Thanks for the reply. Alas, the tool in question is explicitly for unmanaged code. I didn't say "managed" in m...
Testing .NET code in partial trust environments
CC BY-SA 2.5
null
2008-08-21T18:29:42.847
2019-01-17T19:12:42.977
2019-01-17T19:12:42.977
1,555,615
533
[ ".net", "code-access-security" ]
20,678
2
null
20,675
40
null
- [Int()](http://www.w3schools.com/Vbscript/func_int.asp) > The Int function returns the integer part of a specified number. - [CInt()](http://www.w3schools.com/VBScript/func_cint.asp) > The CInt function converts an expression to type Integer. And the best answer comes from [MSDN](http://msdn.microsoft.com/en-us/l...
null
CC BY-SA 2.5
null
2008-08-21T18:04:43.407
2008-08-21T18:04:43.407
null
null
1,291
null
20,687
2
null
6,812
1
null
Running Debian, I had the same issue. What I did is run xev and see what keycode those keys return. Microsoft likes to break standards a little, so some of the multimedia keys just won't work. But the ones that do will return a keycode. Then write a script with xmodmap to map those keys properly. The [Gentoo Wiki](ht...
null
CC BY-SA 2.5
null
2008-08-21T18:09:37.763
2008-08-21T21:03:22.853
2008-08-21T21:03:22.853
2,188
2,188
null
20,722
1
26,956
null
11
8,855
How can I efficiently and effectively detect the version and, for that matter, any available information about the instance of [Silverlight](http://silverlight.net/) currently running on the browser?
Version detection with Silverlight
CC BY-SA 2.5
0
2008-08-21T18:30:49.863
2014-07-09T06:13:20.300
2014-07-09T06:13:20.300
3,302,887
375
[ "silverlight", "browser", "ria" ]
20,665
2
null
20,346
3
null
Attributes are, essentially, bits of data you want to attach to your (classes, methods, events, enums, etc.) The idea is that at run time some other type/framework/tool will query type for the information in the attribute and act upon it. So, for example, Visual Studio can query the attributes on a 3rd party contro...
null
CC BY-SA 2.5
null
2008-08-21T17:57:10.990
2008-08-21T17:57:10.990
null
null
373
null
20,675
1
20,678
null
25
59,418
What is the difference in ASP/VBScript between `Int()` and `CInt()`?
ASP/VBScript - Int() vs CInt()
CC BY-SA 3.0
0
2008-08-21T18:02:48.263
2017-09-18T10:41:23.477
2012-04-25T19:39:36.823
1,332,690
357
[ "asp-classic", "vbscript" ]
20,708
2
null
20,450
5
null
I'd do something like the following: ``` Dim unformatedtext As String someRTFtext = Replace(someRTFtext, "\ul", "[ul]") someRTFtext = Replace(someRTFtext, "\b", "[b]") someRTFtext = Replace(someRTFtext, "\i", "[i]") Dim RTFConvert As RichTextBox = New RichTextBox RTFConvert.Rtf = someRTFtext unformatedtext = RTFConv...
null
CC BY-SA 2.5
null
2008-08-21T18:22:48.247
2008-08-21T18:22:48.247
null
null
770
null
20,713
2
null
12,509
45
null
If you are asking why the Atom syndication format is not more widely adopted than the various versions of the RSS format, I think it would be difficult to come to an objective answer. A variety of factors like the amount of investment in RSS prior to Atom, the relative ease in implementing RSS versus Atom, and 'marketi...
null
CC BY-SA 2.5
null
2008-08-21T18:25:22.403
2008-08-26T05:44:58.183
2008-08-26T05:44:58.183
2,029
2,029
null
20,723
2
null
20,107
0
null
I see what you are saying. I guess you can add a CSS rule like this: ``` strong em { font-weight: bold; } ``` or: ``` strong * { font-weight: bold; } ```
null
CC BY-SA 2.5
null
2008-08-21T18:32:40.703
2008-08-21T18:32:40.703
null
null
653
null
20,733
2
null
19,347
2
null
I strongly recommend that anyone learning C++ reads Stroustrups "The C++ Programming Language." Meyers and Eckel have great stuff, but nothing beats learning from the guy who decided what the language should be and how he intended for it to be used.
null
CC BY-SA 2.5
null
2008-08-21T18:36:57.837
2008-08-21T18:36:57.837
null
null
1,175
null
20,729
2
null
20,722
0
null
Look in silverlight.js: [http://forums.asp.net/p/1135746/1997617.aspx#1997617](http://forums.asp.net/p/1135746/1997617.aspx#1997617)
null
CC BY-SA 2.5
null
2008-08-21T18:35:34.423
2008-08-21T18:35:34.423
null
null
414
null
20,732
2
null
20,731
38
null
``` m.str(""); ``` seems to work.
null
CC BY-SA 2.5
null
2008-08-21T18:36:18.493
2008-08-21T18:36:18.493
null
null
25
null
20,726
2
null
20,718
1
null
Use the [Microsoft Application Verifier](http://www.microsoft.com/downloads/details.aspx?familyid=bd02c19c-1250-433c-8c1b-2619bd93b3a2&displaylang=en). AppVerifier helps to determine: - - - - - - - - -
null
CC BY-SA 2.5
null
2008-08-21T18:34:08.453
2008-08-21T18:34:08.453
null
null
1,490
null
20,728
1
20,806
null
14
2,789
Our team develops distributed winform apps. We use ClickOnce for deployment and are very pleased with it. However, we've found the pain point with ClickOnce is in the deployments. We have the standard dev/test/production environments and need to be able to create deployments for each of these that install and update ...
What's the best way to create ClickOnce deployments
CC BY-SA 3.0
0
2008-08-21T18:35:04.410
2015-11-30T02:03:49.403
2015-11-30T02:03:49.403
1,321
1,321
[ "winforms", "deployment", "clickonce" ]
20,727
2
null
20,047
1
null
You should implement dirty reads. ``` SET TRANSACTION ISOLATION LEVEL READ UNCOMMITTED ``` If you don't absolutely require perfect transactional integrity with your queries, you should be using dirty reads when accessing tables with high concurrency. I assume your Posts table would be one of those. This may give yo...
null
CC BY-SA 2.5
null
2008-08-21T18:34:38.170
2008-08-21T18:34:38.170
null
null
357
null
20,736
2
null
9,926
6
null
Invest in a copy of Intel's [VTune](http://www.intel.com/cd/software/products/asmo-na/eng/239144.htm) and its thread profiling tools. It will give you both a system and a source level view of the thread behaviour. It's certainly not going to autodocument the thing for you, but should be a real help in at least visualis...
null
CC BY-SA 2.5
null
2008-08-21T18:38:14.323
2008-08-21T18:38:14.323
null
null
2,102
null
20,744
1
886,149
null
6
11,623
Using the viewer control for display of SQL Reporting Services reports on web page (Microsoft.ReportViewer.WebForms), can you move the View Report button? It defaults to the very right side of the report, which means you have to scroll all the way across before the button is visible. Not a problem for reports that fit ...
SQL Reporting Services viewer for webpage - can you move the View Report button?
CC BY-SA 2.5
0
2008-08-21T18:42:14.377
2018-10-15T09:46:56.323
2009-03-07T12:41:54.140
67,407
1,215
[ "asp.net", "reporting-services", "reportviewer" ]
20,745
2
null
20,722
2
null
I got this from [http://forums.asp.net/p/1135746/1997617.aspx#1997617](http://forums.asp.net/p/1135746/1997617.aspx#1997617) which is the same link [Stu](https://stackoverflow.com/users/414/stu) gave you. I just included the code snippet. ``` Silverlight.isInstalled = function(d) { var c = false, a = null; tr...
null
CC BY-SA 2.5
null
2008-08-21T18:42:24.017
2008-08-21T18:42:24.017
2017-05-23T12:33:27.093
-1
299
null
20,750
2
null
18,194
1
null
I always use the SQL Server 7.0 documentation available on [ddart.net](http://doc.ddart.net/mssql/sql70/8_gs_00.htm).
null
CC BY-SA 2.5
null
2008-08-21T18:43:31.143
2008-08-21T18:43:31.143
null
null
1,291
null
20,754
2
null
7,440
10
null
We use Watin at my place of employment, we are a .net shop so this solution made a lot of sense. We actually started with Watir (the original ruby implementation) and switched after. It's been a pretty good solution for us so far
null
CC BY-SA 4.0
null
2008-08-21T18:46:18.563
2018-06-28T11:10:56.510
2018-06-28T11:10:56.510
null
2,272
null
20,742
2
null
13,768
3
null
So the OpenID protocol doesn't actually offer a solution for this situation? I would have to rely on individual sites to offer some sort of migration function? That's quite unfortunate. The whole design of OpenID seems focused on a "all your eggs in one basket" approach, i.e. you should try to use your OpenID everywher...
null
CC BY-SA 2.5
null
2008-08-21T18:41:42.037
2008-08-21T18:41:42.037
null
null
48,281
null
20,758
2
null
20,663
22
null
Python supports AOP by letting you dynamically modify its classes at runtime (which in Python is typically called monkeypatching rather than AOP). Here are some of my AOP use cases: 1. I have a website in which every page is generated by a Python function. I'd like to take a class and make all of the webpages genera...
null
CC BY-SA 2.5
null
2008-08-21T18:46:36.003
2008-08-21T18:46:36.003
null
null
1,694
null
20,752
2
null
17,140
27
null
It really depends on what you're trying to do, exactly, as it's: 1. OS dependent 2. Not quite clear what you're trying to do. Nevertheless, I'll try to provide some information for you to decide. On UNIX, `fork()` creates a clone of your process from the place where you called fork. Meaning, if I have the followin...
null
CC BY-SA 2.5
null
2008-08-21T18:44:38.910
2008-08-21T18:44:38.910
null
null
2,132
null
20,747
2
null
15,047
2
null
Your on the right track. Basically you will have a model that represents the document. You will use this model in the CutCommand. You will want to change the CutCommand's constructor to accept the information you want to cut. Then everytime, say the Cut Button is clicked, you invoke a new CutCommand and passing the...
null
CC BY-SA 2.5
null
2008-08-21T18:42:44.407
2008-08-21T18:42:44.407
null
null
1,117
null
20,777
2
null
20,762
78
null
It (emphasis added since people missing this disclaimer), but what I've done in that case is below. You can adjust to use with a stream. ``` /// <summary> /// Removes control characters and other non-UTF-8 characters /// </summary> /// <param name="inString">The string to process</param> /// <returns>A string with no...
null
CC BY-SA 3.0
null
2008-08-21T18:50:58.553
2015-02-25T20:20:24.570
2015-02-25T20:20:24.570
1,533
1,533
null
20,731
1
20,792
null
578
490,551
I've tried several things already, ``` std::stringstream m; m.empty(); m.clear(); ``` both of which don't work.
How do you clear a stringstream variable?
CC BY-SA 3.0
0
2008-08-21T18:35:57.997
2021-12-22T20:03:58.137
2015-09-03T20:29:33.913
2,642,204
25
[ "c++", "stringstream" ]
20,779
2
null
20,778
21
null
If you encode it in base64, this will turn any data into ascii safe text, but base64 encoded data is larger than the orignal data
null
CC BY-SA 2.5
null
2008-08-21T18:54:06.487
2008-08-21T18:54:06.487
null
null
428
null
20,765
1
20,793
null
1
412
So I have a database schema like this: UserId RoleUserId RoleId UserId RoleId Name With foreign keys defined between User & RoleUserXRef and RoleUserXRef & Role. Basically, I have a one to many relationship between users and roles. How would I model this in dbml, such that the generated User c...
XRef Relationships in dbml
CC BY-SA 2.5
null
2008-08-21T18:49:01.990
2013-08-24T16:07:00.723
2013-08-24T16:07:00.723
861,716
1,194
[ "oop", "linq-to-sql", "many-to-many" ]
20,781
2
null
20,744
3
null
No, you cannot reposition the view report button in the ReportViewer control. However, you could create your own custom report viewing control. The control would be comprised of fields for report parameters and a button to generate the report. When a user clicks the button you could generate the report in the backgr...
null
CC BY-SA 2.5
null
2008-08-21T18:54:50.353
2008-08-21T19:00:43.023
2008-08-21T19:00:43.023
299
299
null
20,782
1
23,056
null
2
520
I'm using a Visual Studio web setup project to install an application that extends the functionality of Project Server. I want to call a method from the PSI ( Project Server Interface ) from one of the custom actions of my setup project, but every time a get a "401 Unauthorized access" error. What should I do to be abl...
Call Project Server Interface web method from an msi installer
CC BY-SA 4.0
null
2008-08-21T18:55:15.907
2018-07-12T11:40:34.560
2018-07-12T11:40:34.560
9,959,912
1,360
[ "windows-installer", "methods", "action" ]
20,762
1
20,777
null
75
103,353
Is there any easy/general way to clean an XML based data source prior to using it in an XmlReader so that I can gracefully consume XML data that is non-conformant to the hexadecimal character restrictions placed on XML? Note: - - I need to consume an XML-based data source that conforms to a specific format (thin...
How do you remove invalid hexadecimal characters from an XML-based data source prior to constructing an XmlReader or XPathDocument that uses the data?
CC BY-SA 2.5
0
2008-08-21T18:47:49.263
2019-12-13T04:16:10.387
2013-10-31T13:33:10.627
204,690
2,029
[ "c#", "xml", "validation", "encoding" ]
20,786
2
null
16,396
16
null
I have searched previously for this, with no luck. There does not seem to be any tools available for this conversion, the manual method thereby becomes the only method. And yes, there are consulting firms who will do the manual work for you, but they still do it manually. Crystal Reports and Reporting Services have di...
null
CC BY-SA 2.5
null
2008-08-21T18:57:49.067
2008-08-21T18:57:49.067
null
null
1,215
null
20,746
2
null
20,674
13
null
Here is a code snippet to go along with the question. Using "private" in a class definition does not apply to class methods. You need to use "private_class_method" as in the following example. ``` class Foo def self.private_bar # Complex logic goes here puts "hi" end private_class_method :private_bar c...
null
CC BY-SA 2.5
null
2008-08-21T18:42:39.663
2008-08-21T19:53:04.957
2008-08-21T19:53:04.957
2,347
2,347
null
20,788
1
null
null
31
20,159
[This question](https://stackoverflow.com/questions/20702/whats-youra-good-limit-for-cyclomatic-complexity) on [Cyclomatic Complexity](http://en.wikipedia.org/wiki/Cyclomatic_complexity) made me think more about [static code analysis](http://en.wikipedia.org/wiki/Static_code_analysis). Analyzing code complexity and co...
What tools do you use for static code analysis?
CC BY-SA 2.5
0
2008-08-21T18:58:51.263
2018-12-22T12:25:52.100
2017-05-23T12:26:29.837
-1
2,134
[ "code-analysis" ]
20,791
1
22,173
null
5
303
I would like to create an SSL connection for generic TCP communication. I think I figured out how to do it in the code, using the info here: [http://msdn.microsoft.com/en-us/library/system.net.security.sslstream.aspx](http://msdn.microsoft.com/en-us/library/system.net.security.sslstream.aspx) What I'm having trouble w...
How do I set up a test cert for an SSL connection in .NET?
CC BY-SA 2.5
0
2008-08-21T19:00:04.287
2009-03-14T13:46:54.393
null
null
2,348
[ ".net" ]
20,790
2
null
20,788
0
null
The only time I've ever used one of those tools is Split (C programming language). I thought it was helpful, but I was by no means a power user and I think I barely scratched the surface of what it could do.
null
CC BY-SA 2.5
null
2008-08-21T19:00:04.070
2008-08-21T19:00:04.070
null
null
572
null
20,793
2
null
20,765
1
null
Creating a many-to-many releationship via simple DBML manipulation is not supported currently. You can extend the partial class to manually create properties, if you really want that sort of functionality "built in".
null
CC BY-SA 2.5
null
2008-08-21T19:00:29.777
2008-08-21T19:00:29.777
null
null
35
null
20,784
2
null
20,734
56
null
Red Black trees are good for creating well-balanced trees. The major problem with binary search trees is that you can make them unbalanced very easily. Imagine your first number is a 15. Then all the numbers after that are increasingly smaller than 15. You'll have a tree that is very heavy on the left side and has noth...
null
CC BY-SA 3.0
null
2008-08-21T18:56:16.917
2013-09-11T17:43:24.600
2013-09-11T17:43:24.600
71,131
2,132
null
20,794
1
26,957
null
32
27,864
If I call `os.stat()` on a broken `symlink`, python throws an `OSError` exception. This makes it useful for finding them. However, there are a few other reasons that `os.stat()` might throw a similar exception. Is there a more precise way of detecting broken `symlinks` with Python under Linux?
Find broken symlinks with Python
CC BY-SA 3.0
0
2008-08-21T19:00:52.053
2023-01-23T23:40:02.393
2013-12-17T12:43:11.867
2,255,305
1,892
[ "python", "linux", "symlink" ]
20,795
2
null
20,533
5
null
If you ever plan on making a serious effort at learning Emacs, immediately forget about Aquamacs. It tries to twist and bend Emacs into something it's not (a super-native OS X app). That might sound well and all, but once you realize that it completely breaks nearly every standard keybinding and behavior of Emacs, you ...
null
CC BY-SA 2.5
null
2008-08-21T19:01:19.370
2008-08-21T19:07:00.277
2008-08-21T19:07:00.277
2,286
2,286
null
20,801
2
null
15,047
1
null
Qt uses Command Pattern for Menubar/Toolbar items. QActions are created seperately from QMenuItem and QToolbar, and the Actions can be assigned to QMenuItem and QToolbar with setAction() and addAction() method respectively. [http://web.archive.org/web/20100801023349/http://cartan.cas.suffolk.edu/oopdocbook/html/menus...
null
CC BY-SA 3.0
null
2008-08-21T19:02:32.160
2012-11-29T15:45:24.210
2012-11-29T15:45:24.210
1,897
1,897
null
20,796
2
null
20,788
2
null
I use the PMD plugin for Eclipse a lot. It's pretty nice, and very configurable. CheckStyle is also good, if you're looking for more of a style enforcer.
null
CC BY-SA 2.5
null
2008-08-21T19:01:26.047
2008-08-21T19:01:26.047
null
null
2,348
null
20,804
2
null
20,529
4
null
One key feature: ++ for the refactoring menu.
null
CC BY-SA 2.5
null
2008-08-21T19:03:05.217
2010-09-21T06:15:17.483
2010-09-21T06:15:17.483
573
573
null
20,803
2
null
2,384
36
null
The problem is the s in your struct. I found that marshaling types like byte/short/int is not a problem; but when you need to marshal into a complex type such as a string, you need your struct to explicitly mimic an unmanaged type. You can do this with the MarshalAs attrib. For your example, the following should work:...
null
CC BY-SA 2.5
null
2008-08-21T19:02:50.507
2008-08-21T19:02:50.507
null
null
227
null
20,778
1
20,779
null
30
103,514
I have binary data in a file that I can read into a byte array and process with no problem. Now I need to send parts of the data over a network connection as elements in an XML document. My problem is that when I convert the data from an array of bytes to a String and back to an array of bytes, the data is getting co...
How do you convert binary data to Strings and back in Java?
CC BY-SA 2.5
0
2008-08-21T18:51:52.933
2013-11-26T04:45:39.710
2008-11-20T02:31:28.533
1,288
1,288
[ "java", "serialization" ]