Id int64 4 8.51M | PostTypeId int64 1 7 | AcceptedAnswerId int64 7 75.5M ⌀ | ParentId int64 4 41.8M ⌀ | Score int64 -208 27.7k | ViewCount int64 11 12.4M ⌀ | Body stringlengths 0 45k | Title stringlengths 2 150 ⌀ | ContentLicense stringclasses 3
values | FavoriteCount int64 0 225 ⌀ | CreationDate stringdate 2008-07-31 21:42:52 2011-12-14 18:48:47 | LastActivityDate stringdate 2008-08-01 12:19:17 2023-03-05 04:40:26 | LastEditDate stringdate 2008-08-01 13:54:25 2023-03-05 03:12:45 ⌀ | LastEditorUserId int64 -1 21.3M ⌀ | OwnerUserId int64 -1 21.1M ⌀ | Tags listlengths 1 6 ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
20,611 | 1 | 20,625 | null | 49 | 95,333 | The following code should find the appropriate project tag and remove it from the XmlDocument, however when I test it, it says:
Does anyone know the proper way to do this?
```
public void DeleteProject (string projectName)
{
string ccConfigPath = ConfigurationManager.AppSettings["ConfigPath"];
XmlDocument ... | Removing nodes from an XmlDocument | CC BY-SA 2.5 | 0 | 2008-08-21T17:31:27.247 | 2015-12-16T08:18:41.480 | 2008-08-21T17:47:53.103 | 1,965 | 1,965 | [
"c#",
".net",
"xml",
"xmldocument"
] |
20,617 | 2 | null | 20,586 | 8 | null | You need to have an implementation of [IValueConverter](http://msdn.microsoft.com/en-us/library/system.windows.data.ivalueconverter.aspx) interface that converts the uri into an image. Your Convert implementation of IValueConverter will look something like this:
```
BitmapImage image = new BitmapImage();
image.BeginI... | null | CC BY-SA 2.5 | null | 2008-08-21T17:35:54.427 | 2008-08-21T17:35:54.427 | null | null | 1,117 | null |
20,619 | 2 | null | 20,336 | 1 | null | The only thing that I know to be well defined is the processor state immediately after reset.
For the record you can find in [Intel's Software Developer's Manual](http://www.intel.com/products/processor/manuals/) Vol 3 chapter 8: "PROCESSOR MANAGEMENT AND INITIALIZATION" in the table titled " IA-32 Processor States F... | null | CC BY-SA 2.5 | null | 2008-08-21T17:36:57.747 | 2009-01-26T12:14:31.403 | 2009-01-26T12:14:31.403 | 1,084 | 1,084 | null |
20,613 | 2 | null | 20,245 | 3 | null | Use an [IHttpHandler](http://msdn.microsoft.com/en-us/library/system.web.ihttphandler.aspx) and avoid the Page model overhead (which you don't need), but use Request.Form to get the values so you don't have to parse name value pairs yourself. Just pretend you're in PHP or Classic ASP (or ASP.NET MVC, for that matter). ... | null | CC BY-SA 2.5 | null | 2008-08-21T17:33:06.400 | 2008-08-21T17:33:06.400 | null | null | 2,199 | null |
20,625 | 2 | null | 20,611 | 73 | null | Instead of
```
configDoc.RemoveChild(projectNodes[i]);
```
try
```
projectNodes[i].parentNode.RemoveChild(projectNodes[i]);
```
| null | CC BY-SA 2.5 | null | 2008-08-21T17:38:54.670 | 2008-08-21T17:38:54.670 | null | null | 238 | null |
20,622 | 2 | null | 20,597 | 4 | null | It looks like something was recently added to netbeans for php...
[http://blogs.oracle.com/netbeansphp/entry/ftp_support_added](http://blogs.oracle.com/netbeansphp/entry/ftp_support_added)
don't know if you can make use of that...
| null | CC BY-SA 3.0 | null | 2008-08-21T17:37:48.150 | 2012-03-31T11:13:46.010 | 2012-03-31T11:13:46.010 | 48,503 | 2,031 | null |
20,605 | 2 | null | 20,598 | 14 | null | Converting from timestamp to format:
```
date('Y-m-d', $timestamp);
```
Converting from formatted to timestamp:
```
mktime(0, 0, 0, $month, $day, $year, $is_dst);
```
See [date](http://www.php.net/manual/en/function.date.php) and [mktime](http://www.php.net/manual/en/function.mktime.php) for further documentation... | null | CC BY-SA 2.5 | null | 2008-08-21T17:29:34.113 | 2008-08-21T17:29:34.113 | null | null | 2,025 | null |
20,624 | 2 | null | 20,611 | 0 | null | It would be handy to see a sample of the XML file you're processing but my guess would be that you have something like this
```
<Root>
<Blah>
<project>...</project>
</Blah>
</Root>
```
The error message seems to be because you're trying to remove `<project>` from the grandparent rather than the direct parent of... | null | CC BY-SA 3.0 | null | 2008-08-21T17:37:58.447 | 2015-12-16T08:18:41.480 | 2015-12-16T08:18:41.480 | 1,016,716 | 1,769 | null |
20,627 | 1 | 20,637 | null | 7 | 2,737 | I've seen this all over the place:
> Download here! SHA1 =
8e1ed2ce9e7e473d38a9dc7824a384a9ac34d7d0
What does it mean? How does a hash come into play as far as downloads and... What use can I make of it? Is this a legacy item where you used to have to verify some checksum after you downloaded the whole file?
| why are downloads sometimes tagged md5, sha1 and other hash indicators? | CC BY-SA 3.0 | 0 | 2008-08-21T17:39:03.390 | 2013-07-05T08:57:38.883 | 2013-07-05T08:57:38.883 | 1,584,286 | 547 | [
"hash",
"checksum",
"download"
] |
20,628 | 2 | null | 20,450 | 6 | null | I would use a hidden RichTextBox, set the Rtf member, then retrieve the Text member to sanitize the RTF in a well-supported way. Then I would use manually inject the desired formatting afterwards.
| null | CC BY-SA 2.5 | null | 2008-08-21T17:39:40.503 | 2008-08-21T17:39:40.503 | null | null | 1,490 | null |
20,636 | 2 | null | 20,611 | 2 | null | Looks like you need to select the parent node of projectNodes[i] before calling RemoveChild.
| null | CC BY-SA 2.5 | null | 2008-08-21T17:41:22.090 | 2008-08-21T17:41:22.090 | null | null | null | null |
20,634 | 2 | null | 20,059 | 1 | null | Looking at Alice, I see it is "designed for high school and college students". There appears to be another language/version called [Story Telling Alice](http://www.alice.org/kelleher/storytelling/index.html) that is "designed for middle-school students"
[Alice Download Page](http://www.alice.org/index.php?page=downl... | null | CC BY-SA 2.5 | null | 2008-08-21T17:40:52.997 | 2008-08-21T17:40:52.997 | null | null | 1,048 | null |
20,635 | 2 | null | 20,336 | 1 | null | Always assume undefined, otherwise you'll hit bad problems if you ever try to port architectures.
There is nothing quite like the pain of porting code that assumes everything uninitialized will be set to zero.
| null | CC BY-SA 2.5 | null | 2008-08-21T17:40:59.563 | 2008-08-21T17:40:59.563 | null | null | 175 | null |
20,637 | 2 | null | 20,627 | 21 | null | It's a security measure. It allows you to verify that the file you just downloaded is the one that the author posted to the site. Note that using hashes from the same website you're getting the files from is not especially secure. Often a good place to get them from is a mailing list announcement where a PGP-signed ... | null | CC BY-SA 2.5 | null | 2008-08-21T17:41:36.347 | 2008-08-25T12:40:38.503 | 2008-08-25T12:40:38.503 | 430 | 430 | null |
20,641 | 2 | null | 20,627 | 2 | null | A cryptographic hash (such as SH1 or MD5) allows you to verify that file you have has been downloaded correctly and has not been tampered with.
| null | CC BY-SA 2.5 | null | 2008-08-21T17:42:36.157 | 2008-08-21T17:42:36.157 | null | null | 317 | null |
20,642 | 2 | null | 20,627 | 3 | null | SHA1 and MD5 hashes are used to verify the integrity of files you've downloaded. They aren't necessarily a legacy technology, and can be used by tools like those in the openssl to verify whether or not your a file has been corrupted/changed from its original.
| null | CC BY-SA 2.5 | null | 2008-08-21T17:42:38.437 | 2008-08-21T17:42:38.437 | null | null | 1,238 | null |
20,644 | 2 | null | 20,627 | 6 | null | When downloading larger files, it's often useful to perform a checksum to ensure your download was successful and not mangled along transport. There's tons of freeware apps that can be used to gen the checksum for you to validate your download. This to me is an interesting mainstreaming of procedures that popular mp3... | null | CC BY-SA 2.5 | null | 2008-08-21T17:42:59.433 | 2008-08-21T17:42:59.433 | null | null | 2,228 | null |
20,645 | 2 | null | 20,510 | 8 | null | There's no need for the JavaScript function, the first argument to `ExternalInterface` can be any JavaScript code, it doesn't have to be a function name (the documentation says so, but it is wrong).
Try this:
```
ExternalInterface.call("alert('hello')");
```
| null | CC BY-SA 2.5 | null | 2008-08-21T17:43:48.543 | 2008-08-21T17:43:48.543 | null | null | 1,109 | null |
20,629 | 2 | null | 20,611 | 2 | null | try
```
configDoc.DocumentElement.RemoveChild(projectNodes[i]);
```
| null | CC BY-SA 2.5 | null | 2008-08-21T17:39:43.387 | 2008-08-21T17:39:43.387 | null | null | 1,338 | null |
20,640 | 2 | null | 20,627 | 2 | null | It's to ensure that you downloaded the file correctly. If you hash the downloaded the file and it matches the hash on the page, all is well.
| null | CC BY-SA 2.5 | null | 2008-08-21T17:42:23.210 | 2008-08-21T17:42:23.210 | null | null | 1,227 | null |
20,646 | 2 | null | 19,893 | 29 | null | Base64 is indeed the right answer but CDATA is not, that's basically saying: "this could be anything", however it must be just anything, it has to be Base64 encoded binary data. XML Schema defines [Base 64 binary as a primitive datatype](http://www.w3.org/TR/xmlschema-2/#base64Binary) which you can use in your xsd.
| null | CC BY-SA 2.5 | null | 2008-08-21T17:44:17.730 | 2008-08-21T17:44:17.730 | null | null | 1,996 | null |
20,639 | 2 | null | 17,911 | 0 | null | @Brian Warshaw: This issue happens only about 10-20% of the time. Sometimes it hiccups and simply reloading the app will work fine, other times I will spend half an hour reloading the app over and over again to no avail.
This is the original code (when I asked the question):
```
public class BlogReader extends MovieC... | null | CC BY-SA 2.5 | null | 2008-08-21T17:42:08.810 | 2008-08-21T21:06:20.537 | 2008-08-21T21:06:20.537 | 1,306 | 1,306 | null |
20,649 | 2 | null | 20,326 | 5 | null | It's a very specific problem with this code, I doubt it will be useful for someone else, but here it goes:
A check was added to the combo's `onchange` with an if, if the condition was met, an explicit call to the postback function was made.
If the combo was set to `AutoPostback`, asp.net added the postback call again,... | null | CC BY-SA 3.0 | null | 2008-08-21T17:45:30.893 | 2011-12-10T01:54:03.653 | 2011-12-10T01:54:03.653 | 331,508 | 1,782 | null |
20,650 | 2 | null | 20,533 | 22 | null | I thought TextMate was everyone's favourite. I haven't met a programmer using a Mac who is not using TextMate.
| null | CC BY-SA 2.5 | null | 2008-08-21T17:45:36.243 | 2008-08-21T17:45:36.243 | null | null | 1,109 | null |
20,651 | 2 | null | 20,321 | 2 | null | I think this is hard to answer without more information.
I lean on the side of one database. Properly coded business objects should prevent you from forgetting clientId in your queries.
The type of database you are using and how it scales might help you make your decision.
For schema changes down the road, it... | null | CC BY-SA 2.5 | null | 2008-08-21T17:47:11.920 | 2008-08-21T17:47:11.920 | null | null | 1,865 | null |
20,658 | 1 | 20,679 | null | 6 | 14,206 | How, in general, does one determine if a PC supports hardware virtualization? I use VirtualPC to set up parallel test environments and I'd enjoy a bit of a speed boost.
| Determine if my PC supports HW Virtualization | CC BY-SA 2.5 | 0 | 2008-08-21T17:52:09.723 | 2013-11-09T19:43:58.490 | null | null | 1,490 | [
"virtualization",
"virtual-pc"
] |
20,648 | 2 | null | 20,586 | 18 | null | You can also simply set the Source attribute rather than using the child elements. To do this your class needs to return the image as a Bitmap Image. Here is an example of one way I've done it
```
<Image Width="90" Height="90"
Source="{Binding Path=ImageSource}"
Margin="0,0,0,5" />
```
And the class... | null | CC BY-SA 2.5 | null | 2008-08-21T17:45:11.190 | 2008-08-21T17:54:38.657 | 2008-08-21T17:54:38.657 | 312 | 312 | null |
20,659 | 2 | null | 20,658 | 0 | null | Try just turning the option on in VirtualPC. If it doesn't do anything (or the option isn't available), then your PC doesn't.
| null | CC BY-SA 2.5 | null | 2008-08-21T17:52:56.803 | 2008-08-21T17:52:56.803 | null | null | 1,975,282 | null |
20,664 | 2 | null | 20,658 | 1 | null | The first thing is to run VPC, open Options, and see if the HW virtualization option is available.
If it isn't you may still have it. Many machines have HW virtualization disabled in the BIOS. If you believe this is the case you'll need to confirm with your processor mfg that MW virtualization is supported, then find ... | null | CC BY-SA 2.5 | null | 2008-08-21T17:57:03.987 | 2008-08-21T17:57:03.987 | null | null | 100 | null |
20,661 | 2 | null | 20,658 | 0 | null | > Try just turning the option on in VirtualPC. If it doesn't do anything (or the option isn't available), then your PC doesn't.
Some PC's require a BIOS setting to be turned on in order for this option to be enabled. I couldn't find that BIOS setting on my machine, but then again there are a lot of options to comb th... | null | CC BY-SA 2.5 | null | 2008-08-21T17:55:45.207 | 2008-08-21T17:55:45.207 | null | null | 1,490 | null |
20,663 | 1 | 20,698 | null | 38 | 9,266 | [AOP](http://en.wikipedia.org/wiki/Aspect-oriented_programming) is an interesting programming paradigm in my opinion. However, there haven't been discussions about it yet here on stackoverflow (at least I couldn't find them). What do you think about it in general? Do you use AOP in your projects? Or do you think it's r... | Do you use AOP (Aspect Oriented Programming) in production software? | CC BY-SA 3.0 | 0 | 2008-08-21T17:56:10.307 | 2018-10-16T09:13:50.963 | 2012-04-25T18:48:16.993 | 1,332,690 | 1,793 | [
"aop",
"paradigms"
] |
20,662 | 2 | null | 20,201 | 1 | null | Maybe a permissions issue on the Crystal libraries?? I've run into that before with Crystal, not specfically the ImageHandler though.
| null | CC BY-SA 2.5 | null | 2008-08-21T17:55:57.717 | 2008-08-21T17:55:57.717 | null | null | 1,865 | null |
20,654 | 2 | null | 20,627 | 0 | null | With a has (MD5, SHA-1) one input matches only with one output, and then if you down load the file and calculate the hash again should obtain the same output.
If the output is different the file is corrupt.
```
If (hash(file) == “Hash in page”)
validFile = true;
else
validFile = false;
```
| null | CC BY-SA 2.5 | null | 2008-08-21T17:48:03.993 | 2008-08-21T17:48:03.993 | null | null | 2,143 | null |
20,666 | 2 | null | 20,627 | 2 | null | To go along with what everyone here is saying I use [HashTab](http://beeblebrox.org/hashtab/) when I need to generate/compare MD5 and SHA1 hashes on Windows. It adds a new tab to the file properties window and will calculate the hashes.
| null | CC BY-SA 2.5 | null | 2008-08-21T17:57:19.447 | 2008-08-21T17:57:19.447 | null | null | 200 | null |
20,673 | 2 | null | 20,658 | 0 | null | You can take a look in the BIOS of the machine. It indicates if the machine supports hardware virtualization.
You can run programs like virtual pc even if you machine does not support HW virtualization, but if the machine supports it the program take advantage of this extensions.
| null | CC BY-SA 2.5 | null | 2008-08-21T18:01:28.297 | 2008-08-21T18:01:28.297 | null | null | 2,143 | null |
20,668 | 2 | null | 20,598 | 0 | null | A date string of the form:
```
YYYY-MM-DD
```
has no time associated with it. A MySQL Timestamp is of the form:
```
YYYY-MM-DD HH:mm:ss
```
to compare the two, you'll either have to add a time to the date string, like midnight for example
```
$datetime = '2008-08-21'.' 00:00:00';
```
and then use a function to... | null | CC BY-SA 2.5 | null | 2008-08-21T17:57:38.820 | 2008-08-21T17:57:38.820 | null | null | 302 | null |
20,631 | 2 | null | 20,529 | 73 | null | My most commonly used features are
+ quick-fix / spell-checker
opening files
- -
matches are made on the start of the class/filename. start your search pattern with a * to search anywhere within the filename/classname.
Formatting
- -
Generated code
- -
Refactorings
- - -
Running and debugging.
++ is a r... | null | CC BY-SA 3.0 | null | 2008-08-21T17:39:52.110 | 2013-03-22T10:23:21.983 | 2013-03-22T10:23:21.983 | 1,820 | 1,820 | null |
20,670 | 2 | null | 20,227 | 70 | null | Your code was fine except for the Base 64 encoding bit (which you mentioned was a test), the reason the output may not have made sense is that you were displaying a raw byte array (doing toString() on a byte array returns its internal Java reference, not the String representation of the ). Here's a version that's just ... | null | CC BY-SA 2.5 | null | 2008-08-21T17:59:50.767 | 2008-08-21T17:59:50.767 | null | null | 1,996 | null |
20,679 | 2 | null | 20,658 | 11 | null | Download this: [http://www.cpuid.com/cpuz.php](http://www.cpuid.com/cpuz.php)
Also check, [http://en.wikipedia.org/wiki/X86_virtualization](http://en.wikipedia.org/wiki/X86_virtualization)
Edit: Additional, I know it's for XEN but the instructions are the same for all VMs that want hardware support. [http://wiki.xens... | null | CC BY-SA 2.5 | null | 2008-08-21T18:05:10.283 | 2008-08-21T18:21:48.730 | 2008-08-21T18:21:48.730 | 287 | 287 | null |
20,684 | 1 | 20,694 | null | 8 | 5,473 | I've been using Linq to SQL for some time now and I find it to be really helpful and easy to use. With other ORM tools I've used in the past, the entity object filled from the database normally has a property indicating the length of the underlying data column in the database. This is helpful in databinding situations ... | Linq to SQL - Underlying Column Length | CC BY-SA 2.5 | 0 | 2008-08-21T18:07:33.710 | 2014-02-26T19:09:50.387 | null | null | 689 | [
"linq-to-sql"
] |
20,682 | 2 | null | 20,003 | 16 | null | We have a largish application (160+ OSGi bundles where each bundle is a Maven module) and the lesson we learned, and continue to learn, is that flat is better. The problem with encoding semantics in your hierarchy is that you lose flexibility. A module that is 100% say "communication" today may be partly "service" tomo... | null | CC BY-SA 2.5 | null | 2008-08-21T18:07:00.513 | 2010-04-08T10:53:22.233 | 2017-05-23T12:33:27.093 | -1 | 1,996 | null |
20,683 | 2 | null | 20,658 | 0 | null | Your processor does NOT support hardware-assisted virtualization, but as others have said you can still run virtualization tools.
[http://www.intel.com/products/processor_number/chart/pentium_d.htm](http://www.intel.com/products/processor_number/chart/pentium_d.htm)
| null | CC BY-SA 2.5 | null | 2008-08-21T18:07:16.833 | 2008-08-21T18:07:16.833 | null | null | 100 | null |
20,688 | 2 | null | 20,663 | 3 | null | We used aspectJ in one of my big projects for quite some time. The project was made up of several web services, each with several functions, which was the front end for a complicated document processing/querying system. Somewhere around 75k lines of code. We used aspects for two relatively minor pieces of functional... | null | CC BY-SA 2.5 | null | 2008-08-21T18:09:52.147 | 2008-08-21T18:09:52.147 | null | null | 1,322 | null |
20,689 | 2 | null | 20,587 | 9 | null | If you were allowed to implement CLR integration assemblies you could actually use FTP without having to write a temporary file:
```
public static void DoQueryAndUploadFile(string uri, string username, string password, string filename)
{
FtpWebRequest ftp = (FtpWebRequest)FtpWebRequest.Create(uri + "/" + filename)... | null | CC BY-SA 3.0 | null | 2008-08-21T18:09:52.473 | 2011-07-24T12:52:28.373 | 2011-07-24T12:52:28.373 | 419 | 419 | null |
20,681 | 2 | null | 20,003 | 3 | null | I think you're better off flattening your directory structure. Perhaps you want to come up with a naming convention for the directories such that they sort nicely when viewing all of the projects, but ultimately I don't think all of that extra hierarchy is necessary.
Assuming you're using Eclipse as your IDE all of t... | null | CC BY-SA 2.5 | null | 2008-08-21T18:06:52.073 | 2008-08-21T18:06:52.073 | null | null | 1,247 | null |
20,690 | 2 | null | 20,674 | -1 | null | Unless I'm misunderstanding, don't you just need something like this:
```
class Foo
private
def Foo.bar
# Complex logic goes here
puts "hi"
end
public
def bar
Foo.bar
end
end
```
Of course you could change the second definition to use your self.class.send approach if ... | null | CC BY-SA 2.5 | null | 2008-08-21T18:10:05.170 | 2008-08-21T18:15:59.417 | 2008-08-21T18:15:59.417 | 2,168 | 2,168 | null |
20,694 | 2 | null | 20,684 | 7 | null | Using the LINQ ColumnAttribute to Get Field Lengths from your Database :
[http://www.codeproject.com/KB/cs/LinqColumnAttributeTricks.aspx](http://www.codeproject.com/KB/cs/LinqColumnAttributeTricks.aspx)
| null | CC BY-SA 3.0 | null | 2008-08-21T18:11:20.003 | 2014-02-26T19:09:50.387 | 2014-02-26T19:09:50.387 | 888,479 | 414 | null |
20,697 | 2 | null | 19,437 | 0 | null | We had to install NeoDynamic barcode software to render the barcode as an image since we can't include the barcode fonts in PDF exports.
| null | CC BY-SA 2.5 | null | 2008-08-21T18:13:01.687 | 2008-08-21T18:13:01.687 | null | null | 1,545 | null |
20,674 | 1 | 20,746 | null | 17 | 18,662 | Other than `self.class.send :method, args...`, of course. I'd like to make a rather complex method available at both the class and instance level without duplicating the code.
---
@Jonathan Branam: that was my assumption, but I wanted to make sure nobody else had found a way around. Visibility in Ruby is ver... | Is there a way to call a private Class method from an instance in Ruby? | CC BY-SA 3.0 | 0 | 2008-08-21T18:02:04.973 | 2019-04-03T02:43:23.053 | 2012-03-27T23:37:35.330 | 38,765 | 1,190 | [
"ruby",
"scope",
"visibility",
"class-method",
"access-specifier"
] |
20,696 | 1 | 37,438 | null | 1 | 1,948 | In E (specman) I want to declare variables that are lists, and I want to fix their lengths.
It's easy to do for a member of a struct:
```
thread[2] : list of thread_t;
```
while for a "regular" variable in a function the above doesn't work, and I have to do something like:
```
var warned : list of bool;
gen warned... | How do I declare a list of fixed length in specman? | CC BY-SA 2.5 | null | 2008-08-21T18:13:01.157 | 2017-04-18T21:22:32.063 | 2017-04-18T21:22:32.063 | 881,229 | 1,084 | [
"specman"
] |
20,700 | 2 | null | 20,658 | 1 | null | Try [cpu-z](http://www.cpuid.com/cpuz.php) or [SecurAble](http://www.grc.com/securable.htm) on windows or on linux, `cat /proc/cpuinfo` and look for the flags: vmx (Intel) or svm (AMD)
All of those will tell you if the hardware supports it, but as others said it must be enabled in the BIOS. (But checking first will a... | null | CC BY-SA 2.5 | null | 2008-08-21T18:15:48.590 | 2008-08-21T18:15:48.590 | null | null | 1,480 | null |
20,698 | 2 | null | 20,663 | 15 | null | Yes.
Orthogonal concerns, like security, are best done with AOP-style interception. Whether that is done automatically (through something like a dependency injection container) or manually is unimportant to the end goal.
One example: the "before/after" attributes in [xUnit.net](http://www.codeplex.com/xunit) (an open... | null | CC BY-SA 2.5 | null | 2008-08-21T18:14:55.037 | 2008-08-21T18:14:55.037 | null | null | 1,554 | null |
20,712 | 2 | null | 15,880 | 3 | null | It's a "Structured Storage" document. I've successfully used [Andrew Peace's code](http://www.codeproject.com/KB/files/structstor.aspx) to read these in the past, even under .NET (using C++/CLI) - it's clean and fairly easy to understand. Basically, you need to figure out which records you need, and query for those - i... | null | CC BY-SA 2.5 | null | 2008-08-21T18:25:08.303 | 2008-08-21T18:25:08.303 | null | null | 811 | null |
20,710 | 2 | null | 16,656 | 8 | null | Just to clarify:
```
System.IO.Path.GetTempPath()
```
returns just the folder path to the temp folder.
```
System.IO.Path.GetTempFileName()
```
returns the fully qualified file name (including the path) so this:
```
System.IO.Path.Combine(System.IO.Path.GetTempPath(), System.IO.Path.GetTempFileName())
```
is r... | null | CC BY-SA 2.5 | null | 2008-08-21T18:24:07.603 | 2008-08-21T18:24:07.603 | null | null | 373 | null |
20,701 | 2 | null | 826 | 1 | null | This question has been wracking my brain for about a day now. Awesome.
Anyways, you can't get away from the n^2 nature of it easily, but you can do slightly better with the merge since you can bound the range to insert each element in.
If you look at all the lists you generate, they have the following form:
`(a[i], ... | null | CC BY-SA 3.0 | null | 2008-08-21T18:16:13.800 | 2012-07-03T14:49:57.337 | 2012-07-03T14:49:57.337 | 142,162 | 1,799 | null |
20,718 | 1 | 20,904 | null | 5 | 804 | I want to test the behavior of a certain piece of .NET code in partial trust environments. What's the fastest way to set this up? Feel free to assume that I (and other readers) are total CAS noobs.
@Nick: Thanks for the reply. Alas, the tool in question is explicitly for unmanaged code. I didn't say "managed" in m... | Testing .NET code in partial trust environments | CC BY-SA 2.5 | null | 2008-08-21T18:29:42.847 | 2019-01-17T19:12:42.977 | 2019-01-17T19:12:42.977 | 1,555,615 | 533 | [
".net",
"code-access-security"
] |
20,678 | 2 | null | 20,675 | 40 | null | - [Int()](http://www.w3schools.com/Vbscript/func_int.asp)
> The Int function returns the integer part of a specified number.
- [CInt()](http://www.w3schools.com/VBScript/func_cint.asp)
> The CInt function converts an expression to type Integer.
And the best answer comes from [MSDN](http://msdn.microsoft.com/en-us/l... | null | CC BY-SA 2.5 | null | 2008-08-21T18:04:43.407 | 2008-08-21T18:04:43.407 | null | null | 1,291 | null |
20,687 | 2 | null | 6,812 | 1 | null | Running Debian, I had the same issue. What I did is run xev and see what keycode those keys return. Microsoft likes to break standards a little, so some of the multimedia keys just won't work. But the ones that do will return a keycode. Then write a script with xmodmap to map those keys properly.
The [Gentoo Wiki](ht... | null | CC BY-SA 2.5 | null | 2008-08-21T18:09:37.763 | 2008-08-21T21:03:22.853 | 2008-08-21T21:03:22.853 | 2,188 | 2,188 | null |
20,722 | 1 | 26,956 | null | 11 | 8,855 | How can I efficiently and effectively detect the version and, for that matter, any available information about the instance of [Silverlight](http://silverlight.net/) currently running on the browser?
| Version detection with Silverlight | CC BY-SA 2.5 | 0 | 2008-08-21T18:30:49.863 | 2014-07-09T06:13:20.300 | 2014-07-09T06:13:20.300 | 3,302,887 | 375 | [
"silverlight",
"browser",
"ria"
] |
20,665 | 2 | null | 20,346 | 3 | null | Attributes are, essentially, bits of data you want to attach to your (classes, methods, events, enums, etc.)
The idea is that at run time some other type/framework/tool will query type for the information in the attribute and act upon it.
So, for example, Visual Studio can query the attributes on a 3rd party contro... | null | CC BY-SA 2.5 | null | 2008-08-21T17:57:10.990 | 2008-08-21T17:57:10.990 | null | null | 373 | null |
20,675 | 1 | 20,678 | null | 25 | 59,418 | What is the difference in ASP/VBScript between `Int()` and `CInt()`?
| ASP/VBScript - Int() vs CInt() | CC BY-SA 3.0 | 0 | 2008-08-21T18:02:48.263 | 2017-09-18T10:41:23.477 | 2012-04-25T19:39:36.823 | 1,332,690 | 357 | [
"asp-classic",
"vbscript"
] |
20,708 | 2 | null | 20,450 | 5 | null | I'd do something like the following:
```
Dim unformatedtext As String
someRTFtext = Replace(someRTFtext, "\ul", "[ul]")
someRTFtext = Replace(someRTFtext, "\b", "[b]")
someRTFtext = Replace(someRTFtext, "\i", "[i]")
Dim RTFConvert As RichTextBox = New RichTextBox
RTFConvert.Rtf = someRTFtext
unformatedtext = RTFConv... | null | CC BY-SA 2.5 | null | 2008-08-21T18:22:48.247 | 2008-08-21T18:22:48.247 | null | null | 770 | null |
20,713 | 2 | null | 12,509 | 45 | null | If you are asking why the Atom syndication format is not more widely adopted than the various versions of the RSS format, I think it would be difficult to come to an objective answer. A variety of factors like the amount of investment in RSS prior to Atom, the relative ease in implementing RSS versus Atom, and 'marketi... | null | CC BY-SA 2.5 | null | 2008-08-21T18:25:22.403 | 2008-08-26T05:44:58.183 | 2008-08-26T05:44:58.183 | 2,029 | 2,029 | null |
20,723 | 2 | null | 20,107 | 0 | null | I see what you are saying. I guess you can add a CSS rule like this:
```
strong em { font-weight: bold; }
```
or:
```
strong * { font-weight: bold; }
```
| null | CC BY-SA 2.5 | null | 2008-08-21T18:32:40.703 | 2008-08-21T18:32:40.703 | null | null | 653 | null |
20,733 | 2 | null | 19,347 | 2 | null | I strongly recommend that anyone learning C++ reads Stroustrups "The C++ Programming Language." Meyers and Eckel have great stuff, but nothing beats learning from the guy who decided what the language should be and how he intended for it to be used.
| null | CC BY-SA 2.5 | null | 2008-08-21T18:36:57.837 | 2008-08-21T18:36:57.837 | null | null | 1,175 | null |
20,729 | 2 | null | 20,722 | 0 | null | Look in silverlight.js:
[http://forums.asp.net/p/1135746/1997617.aspx#1997617](http://forums.asp.net/p/1135746/1997617.aspx#1997617)
| null | CC BY-SA 2.5 | null | 2008-08-21T18:35:34.423 | 2008-08-21T18:35:34.423 | null | null | 414 | null |
20,732 | 2 | null | 20,731 | 38 | null | ```
m.str("");
```
seems to work.
| null | CC BY-SA 2.5 | null | 2008-08-21T18:36:18.493 | 2008-08-21T18:36:18.493 | null | null | 25 | null |
20,726 | 2 | null | 20,718 | 1 | null | Use the [Microsoft Application Verifier](http://www.microsoft.com/downloads/details.aspx?familyid=bd02c19c-1250-433c-8c1b-2619bd93b3a2&displaylang=en).
AppVerifier helps to determine:
- - - - - - - - -
| null | CC BY-SA 2.5 | null | 2008-08-21T18:34:08.453 | 2008-08-21T18:34:08.453 | null | null | 1,490 | null |
20,728 | 1 | 20,806 | null | 14 | 2,789 | Our team develops distributed winform apps. We use ClickOnce for deployment and are very pleased with it.
However, we've found the pain point with ClickOnce is in the deployments. We have the standard dev/test/production environments and need to be able to create deployments for each of these that install and update ... | What's the best way to create ClickOnce deployments | CC BY-SA 3.0 | 0 | 2008-08-21T18:35:04.410 | 2015-11-30T02:03:49.403 | 2015-11-30T02:03:49.403 | 1,321 | 1,321 | [
"winforms",
"deployment",
"clickonce"
] |
20,727 | 2 | null | 20,047 | 1 | null | You should implement dirty reads.
```
SET TRANSACTION ISOLATION LEVEL READ UNCOMMITTED
```
If you don't absolutely require perfect transactional integrity with your queries, you should be using dirty reads when accessing tables with high concurrency. I assume your Posts table would be one of those.
This may give yo... | null | CC BY-SA 2.5 | null | 2008-08-21T18:34:38.170 | 2008-08-21T18:34:38.170 | null | null | 357 | null |
20,736 | 2 | null | 9,926 | 6 | null | Invest in a copy of Intel's [VTune](http://www.intel.com/cd/software/products/asmo-na/eng/239144.htm) and its thread profiling tools. It will give you both a system and a source level view of the thread behaviour. It's certainly not going to autodocument the thing for you, but should be a real help in at least visualis... | null | CC BY-SA 2.5 | null | 2008-08-21T18:38:14.323 | 2008-08-21T18:38:14.323 | null | null | 2,102 | null |
20,744 | 1 | 886,149 | null | 6 | 11,623 | Using the viewer control for display of SQL Reporting Services reports on web page (Microsoft.ReportViewer.WebForms), can you move the View Report button? It defaults to the very right side of the report, which means you have to scroll all the way across before the button is visible. Not a problem for reports that fit ... | SQL Reporting Services viewer for webpage - can you move the View Report button? | CC BY-SA 2.5 | 0 | 2008-08-21T18:42:14.377 | 2018-10-15T09:46:56.323 | 2009-03-07T12:41:54.140 | 67,407 | 1,215 | [
"asp.net",
"reporting-services",
"reportviewer"
] |
20,745 | 2 | null | 20,722 | 2 | null | I got this from [http://forums.asp.net/p/1135746/1997617.aspx#1997617](http://forums.asp.net/p/1135746/1997617.aspx#1997617) which is the same link [Stu](https://stackoverflow.com/users/414/stu) gave you. I just included the code snippet.
```
Silverlight.isInstalled = function(d)
{
var c = false, a = null;
tr... | null | CC BY-SA 2.5 | null | 2008-08-21T18:42:24.017 | 2008-08-21T18:42:24.017 | 2017-05-23T12:33:27.093 | -1 | 299 | null |
20,750 | 2 | null | 18,194 | 1 | null | I always use the SQL Server 7.0 documentation available on [ddart.net](http://doc.ddart.net/mssql/sql70/8_gs_00.htm).
| null | CC BY-SA 2.5 | null | 2008-08-21T18:43:31.143 | 2008-08-21T18:43:31.143 | null | null | 1,291 | null |
20,754 | 2 | null | 7,440 | 10 | null | We use Watin at my place of employment, we are a .net shop so this solution made a lot of sense. We actually started with Watir (the original ruby implementation) and switched after. It's been a pretty good solution for us so far
| null | CC BY-SA 4.0 | null | 2008-08-21T18:46:18.563 | 2018-06-28T11:10:56.510 | 2018-06-28T11:10:56.510 | null | 2,272 | null |
20,742 | 2 | null | 13,768 | 3 | null | So the OpenID protocol doesn't actually offer a solution for this situation? I would have to rely on individual sites to offer some sort of migration function? That's quite unfortunate. The whole design of OpenID seems focused on a "all your eggs in one basket" approach, i.e. you should try to use your OpenID everywher... | null | CC BY-SA 2.5 | null | 2008-08-21T18:41:42.037 | 2008-08-21T18:41:42.037 | null | null | 48,281 | null |
20,758 | 2 | null | 20,663 | 22 | null | Python supports AOP by letting you dynamically modify its classes at runtime (which in Python is typically called monkeypatching rather than AOP). Here are some of my AOP use cases:
1. I have a website in which every page is generated by a Python function. I'd like to take a class and make all of the webpages genera... | null | CC BY-SA 2.5 | null | 2008-08-21T18:46:36.003 | 2008-08-21T18:46:36.003 | null | null | 1,694 | null |
20,752 | 2 | null | 17,140 | 27 | null | It really depends on what you're trying to do, exactly, as it's:
1. OS dependent
2. Not quite clear what you're trying to do.
Nevertheless, I'll try to provide some information for you to decide.
On UNIX, `fork()` creates a clone of your process from the place where you called fork. Meaning, if I have the followin... | null | CC BY-SA 2.5 | null | 2008-08-21T18:44:38.910 | 2008-08-21T18:44:38.910 | null | null | 2,132 | null |
20,747 | 2 | null | 15,047 | 2 | null | Your on the right track. Basically you will have a model that represents the document. You will use this model in the CutCommand. You will want to change the CutCommand's constructor to accept the information you want to cut. Then everytime, say the Cut Button is clicked, you invoke a new CutCommand and passing the... | null | CC BY-SA 2.5 | null | 2008-08-21T18:42:44.407 | 2008-08-21T18:42:44.407 | null | null | 1,117 | null |
20,777 | 2 | null | 20,762 | 78 | null | It (emphasis added since people missing this disclaimer), but what I've done in that case is below. You can adjust to use with a stream.
```
/// <summary>
/// Removes control characters and other non-UTF-8 characters
/// </summary>
/// <param name="inString">The string to process</param>
/// <returns>A string with no... | null | CC BY-SA 3.0 | null | 2008-08-21T18:50:58.553 | 2015-02-25T20:20:24.570 | 2015-02-25T20:20:24.570 | 1,533 | 1,533 | null |
20,731 | 1 | 20,792 | null | 578 | 490,551 | I've tried several things already,
```
std::stringstream m;
m.empty();
m.clear();
```
both of which don't work.
| How do you clear a stringstream variable? | CC BY-SA 3.0 | 0 | 2008-08-21T18:35:57.997 | 2021-12-22T20:03:58.137 | 2015-09-03T20:29:33.913 | 2,642,204 | 25 | [
"c++",
"stringstream"
] |
20,779 | 2 | null | 20,778 | 21 | null | If you encode it in base64, this will turn any data into ascii safe text, but base64 encoded data is larger than the orignal data
| null | CC BY-SA 2.5 | null | 2008-08-21T18:54:06.487 | 2008-08-21T18:54:06.487 | null | null | 428 | null |
20,765 | 1 | 20,793 | null | 1 | 412 | So I have a database schema like this:
UserId
RoleUserId
RoleId
UserId
RoleId
Name
With foreign keys defined between User & RoleUserXRef and RoleUserXRef & Role. Basically, I have a one to many relationship between users and roles.
How would I model this in dbml, such that the generated User c... | XRef Relationships in dbml | CC BY-SA 2.5 | null | 2008-08-21T18:49:01.990 | 2013-08-24T16:07:00.723 | 2013-08-24T16:07:00.723 | 861,716 | 1,194 | [
"oop",
"linq-to-sql",
"many-to-many"
] |
20,781 | 2 | null | 20,744 | 3 | null | No, you cannot reposition the view report button in the ReportViewer control.
However, you could create your own custom report viewing control. The control would be comprised of fields for report parameters and a button to generate the report. When a user clicks the button you could generate the report in the backgr... | null | CC BY-SA 2.5 | null | 2008-08-21T18:54:50.353 | 2008-08-21T19:00:43.023 | 2008-08-21T19:00:43.023 | 299 | 299 | null |
20,782 | 1 | 23,056 | null | 2 | 520 | I'm using a Visual Studio web setup project to install an application that extends the functionality of Project Server. I want to call a method from the PSI ( Project Server Interface ) from one of the custom actions of my setup project, but every time a get a "401 Unauthorized access" error. What should I do to be abl... | Call Project Server Interface web method from an msi installer | CC BY-SA 4.0 | null | 2008-08-21T18:55:15.907 | 2018-07-12T11:40:34.560 | 2018-07-12T11:40:34.560 | 9,959,912 | 1,360 | [
"windows-installer",
"methods",
"action"
] |
20,762 | 1 | 20,777 | null | 75 | 103,353 | Is there any easy/general way to clean an XML based data source prior to using it in an XmlReader so that I can gracefully consume XML data that is non-conformant to the hexadecimal character restrictions placed on XML?
Note:
- -
I need to consume an XML-based data source that conforms to a specific format (thin... | How do you remove invalid hexadecimal characters from an XML-based data source prior to constructing an XmlReader or XPathDocument that uses the data? | CC BY-SA 2.5 | 0 | 2008-08-21T18:47:49.263 | 2019-12-13T04:16:10.387 | 2013-10-31T13:33:10.627 | 204,690 | 2,029 | [
"c#",
"xml",
"validation",
"encoding"
] |
20,786 | 2 | null | 16,396 | 16 | null | I have searched previously for this, with no luck. There does not seem to be any tools available for this conversion, the manual method thereby becomes the only method. And yes, there are consulting firms who will do the manual work for you, but they still do it manually.
Crystal Reports and Reporting Services have di... | null | CC BY-SA 2.5 | null | 2008-08-21T18:57:49.067 | 2008-08-21T18:57:49.067 | null | null | 1,215 | null |
20,746 | 2 | null | 20,674 | 13 | null | Here is a code snippet to go along with the question. Using "private" in a class definition does not apply to class methods. You need to use "private_class_method" as in the following example.
```
class Foo
def self.private_bar
# Complex logic goes here
puts "hi"
end
private_class_method :private_bar
c... | null | CC BY-SA 2.5 | null | 2008-08-21T18:42:39.663 | 2008-08-21T19:53:04.957 | 2008-08-21T19:53:04.957 | 2,347 | 2,347 | null |
20,788 | 1 | null | null | 31 | 20,159 | [This question](https://stackoverflow.com/questions/20702/whats-youra-good-limit-for-cyclomatic-complexity) on [Cyclomatic Complexity](http://en.wikipedia.org/wiki/Cyclomatic_complexity) made me think more about [static code analysis](http://en.wikipedia.org/wiki/Static_code_analysis). Analyzing code complexity and co... | What tools do you use for static code analysis? | CC BY-SA 2.5 | 0 | 2008-08-21T18:58:51.263 | 2018-12-22T12:25:52.100 | 2017-05-23T12:26:29.837 | -1 | 2,134 | [
"code-analysis"
] |
20,791 | 1 | 22,173 | null | 5 | 303 | I would like to create an SSL connection for generic TCP communication. I think I figured out how to do it in the code, using the info here: [http://msdn.microsoft.com/en-us/library/system.net.security.sslstream.aspx](http://msdn.microsoft.com/en-us/library/system.net.security.sslstream.aspx)
What I'm having trouble w... | How do I set up a test cert for an SSL connection in .NET? | CC BY-SA 2.5 | 0 | 2008-08-21T19:00:04.287 | 2009-03-14T13:46:54.393 | null | null | 2,348 | [
".net"
] |
20,790 | 2 | null | 20,788 | 0 | null | The only time I've ever used one of those tools is Split (C programming language). I thought it was helpful, but I was by no means a power user and I think I barely scratched the surface of what it could do.
| null | CC BY-SA 2.5 | null | 2008-08-21T19:00:04.070 | 2008-08-21T19:00:04.070 | null | null | 572 | null |
20,793 | 2 | null | 20,765 | 1 | null | Creating a many-to-many releationship via simple DBML manipulation is not supported currently. You can extend the partial class to manually create properties, if you really want that sort of functionality "built in".
| null | CC BY-SA 2.5 | null | 2008-08-21T19:00:29.777 | 2008-08-21T19:00:29.777 | null | null | 35 | null |
20,784 | 2 | null | 20,734 | 56 | null | Red Black trees are good for creating well-balanced trees. The major problem with binary search trees is that you can make them unbalanced very easily. Imagine your first number is a 15. Then all the numbers after that are increasingly smaller than 15. You'll have a tree that is very heavy on the left side and has noth... | null | CC BY-SA 3.0 | null | 2008-08-21T18:56:16.917 | 2013-09-11T17:43:24.600 | 2013-09-11T17:43:24.600 | 71,131 | 2,132 | null |
20,794 | 1 | 26,957 | null | 32 | 27,864 | If I call `os.stat()` on a broken `symlink`, python throws an `OSError` exception. This makes it useful for finding them. However, there are a few other reasons that `os.stat()` might throw a similar exception. Is there a more precise way of detecting broken `symlinks` with Python under Linux?
| Find broken symlinks with Python | CC BY-SA 3.0 | 0 | 2008-08-21T19:00:52.053 | 2023-01-23T23:40:02.393 | 2013-12-17T12:43:11.867 | 2,255,305 | 1,892 | [
"python",
"linux",
"symlink"
] |
20,795 | 2 | null | 20,533 | 5 | null | If you ever plan on making a serious effort at learning Emacs, immediately forget about Aquamacs. It tries to twist and bend Emacs into something it's not (a super-native OS X app). That might sound well and all, but once you realize that it completely breaks nearly every standard keybinding and behavior of Emacs, you ... | null | CC BY-SA 2.5 | null | 2008-08-21T19:01:19.370 | 2008-08-21T19:07:00.277 | 2008-08-21T19:07:00.277 | 2,286 | 2,286 | null |
20,801 | 2 | null | 15,047 | 1 | null | Qt uses Command Pattern for Menubar/Toolbar items.
QActions are created seperately from QMenuItem and QToolbar, and the Actions can be assigned to QMenuItem and QToolbar with setAction() and addAction() method respectively.
[http://web.archive.org/web/20100801023349/http://cartan.cas.suffolk.edu/oopdocbook/html/menus... | null | CC BY-SA 3.0 | null | 2008-08-21T19:02:32.160 | 2012-11-29T15:45:24.210 | 2012-11-29T15:45:24.210 | 1,897 | 1,897 | null |
20,796 | 2 | null | 20,788 | 2 | null | I use the PMD plugin for Eclipse a lot. It's pretty nice, and very configurable. CheckStyle is also good, if you're looking for more of a style enforcer.
| null | CC BY-SA 2.5 | null | 2008-08-21T19:01:26.047 | 2008-08-21T19:01:26.047 | null | null | 2,348 | null |
20,804 | 2 | null | 20,529 | 4 | null | One key feature: ++ for the refactoring menu.
| null | CC BY-SA 2.5 | null | 2008-08-21T19:03:05.217 | 2010-09-21T06:15:17.483 | 2010-09-21T06:15:17.483 | 573 | 573 | null |
20,803 | 2 | null | 2,384 | 36 | null | The problem is the s in your struct. I found that marshaling types like byte/short/int is not a problem; but when you need to marshal into a complex type such as a string, you need your struct to explicitly mimic an unmanaged type. You can do this with the MarshalAs attrib.
For your example, the following should work:... | null | CC BY-SA 2.5 | null | 2008-08-21T19:02:50.507 | 2008-08-21T19:02:50.507 | null | null | 227 | null |
20,778 | 1 | 20,779 | null | 30 | 103,514 | I have binary data in a file that I can read into a byte array and process with no problem. Now I need to send parts of the data over a network connection as elements in an XML document. My problem is that when I convert the data from an array of bytes to a String and back to an array of bytes, the data is getting co... | How do you convert binary data to Strings and back in Java? | CC BY-SA 2.5 | 0 | 2008-08-21T18:51:52.933 | 2013-11-26T04:45:39.710 | 2008-11-20T02:31:28.533 | 1,288 | 1,288 | [
"java",
"serialization"
] |