Id int64 4 8.51M | PostTypeId int64 1 7 | AcceptedAnswerId int64 7 75.5M ⌀ | ParentId int64 4 41.8M ⌀ | Score int64 -208 27.7k | ViewCount int64 11 12.4M ⌀ | Body stringlengths 0 45k | Title stringlengths 2 150 ⌀ | ContentLicense stringclasses 3
values | FavoriteCount int64 0 225 ⌀ | CreationDate stringdate 2008-07-31 21:42:52 2011-12-14 18:48:47 | LastActivityDate stringdate 2008-08-01 12:19:17 2023-03-05 04:40:26 | LastEditDate stringdate 2008-08-01 13:54:25 2023-03-05 03:12:45 ⌀ | LastEditorUserId int64 -1 21.3M ⌀ | OwnerUserId int64 -1 21.1M ⌀ | Tags listlengths 1 6 ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
20,806 | 2 | null | 20,728 | 14 | null | I would look at using [msbuild](http://msdn.microsoft.com/en-us/library/0k6kkbsd.aspx). It has built in [tasks](http://msdn.microsoft.com/en-us/library/6wc2ccdc.aspx) for handling clickonce deployments. I included some references which will help you get started, if you want to go down this path. It is what I use and... | null | CC BY-SA 2.5 | null | 2008-08-21T19:03:27.523 | 2008-08-21T19:03:27.523 | null | null | 1,117 | null |
20,805 | 2 | null | 20,788 | 5 | null | For .Net we use NDepend. It is a great tool and can be integrated to the build (we use CCNet).
[http://www.ndepend.com/](http://www.ndepend.com/)
HTH.
| null | CC BY-SA 2.5 | null | 2008-08-21T19:03:18.163 | 2008-08-21T19:03:18.163 | null | null | 2,349 | null |
20,809 | 2 | null | 20,788 | 2 | null | Checkstyle, Findbugs, and PMD all work pretty well in Java. I'm currently pretty happy with PMD running in NetBeans. It has a fairly simple GUI for managing what rules you want to run. It's also very easy to run the checker on one file, an entire package, or an entire project.
| null | CC BY-SA 2.5 | null | 2008-08-21T19:04:00.783 | 2008-08-21T19:04:00.783 | null | null | 1,288 | null |
20,813 | 2 | null | 20,787 | 10 | null | Well, 50 bools as a bitset will take 7 bytes, while 50 bools as bools will take 50 bytes. These days that's not really a big deal, so using bools is probably fine.
However, one place a bitset might be useful is if you need to pass those bools around a lot, especially if you need to return the set from a function. Us... | null | CC BY-SA 2.5 | null | 2008-08-21T19:05:30.763 | 2008-08-21T19:05:30.763 | null | null | 1,409 | null |
20,811 | 1 | 36,983 | null | 0 | 6,756 | The university I work at uses Oracle for the database system. We currently have programs we run at night to download what we need into some local Access tables for our testing needs. Access is getting to small for this now and we need something bigger. Also, the nightly jobs require constant maintance to keep working (... | Automate Syncing Oracle Tables With MySQL Tables | CC BY-SA 2.5 | null | 2008-08-21T19:05:20.890 | 2018-05-11T19:51:18.517 | 2008-09-15T12:13:04.777 | 1,340 | 1,340 | [
"mysql",
"database",
"oracle"
] |
20,814 | 1 | 20,885 | null | 8 | 2,241 | In the Visual Studio designer, how do you move a menu item from one menu to another?
I would assume drag and drop would work, but it seems to only work within a menu for me.
I usually resort to editing the .Designer.cs files by hand.
| How do I move an item from one menu to another? | CC BY-SA 3.0 | null | 2008-08-21T19:05:34.180 | 2018-02-13T18:01:16.413 | 2018-02-13T17:59:27.087 | 63,550 | 1,490 | [
"c#",
"winforms",
"visual-studio-2005"
] |
20,808 | 2 | null | 20,788 | 1 | null | [Lint](http://en.wikipedia.org/wiki/Lint_programming_tool) is the only one I have used at a previous position. It wasn't bad, most of the things it suggested were good catches, some didn't make much sense. As long you don't have a process in place to ensure that there are no lint errors or warnings, then it is useful... | null | CC BY-SA 2.5 | null | 2008-08-21T19:03:44.793 | 2008-08-21T19:03:44.793 | null | null | 2,328 | null |
20,792 | 2 | null | 20,731 | 907 | null | For all the standard library types the member function `empty()` is a query, not a command, i.e. it means "are you empty?" not "please throw away your contents".
The `clear()` member function is inherited from `ios` and is used to clear the error state of the stream, e.g. if a file stream has the error state set to `e... | null | CC BY-SA 3.0 | null | 2008-08-21T19:00:25.143 | 2015-09-03T20:31:11.140 | 2015-09-03T20:31:11.140 | 2,642,204 | 1,367 | null |
20,822 | 2 | null | 20,533 | 0 | null | Another vote for Smultron. I used it when doing some XQuery programming and being able to define a keyword files for syntax color highlighting was great.
| null | CC BY-SA 2.5 | null | 2008-08-21T19:08:09.853 | 2008-08-21T19:08:09.853 | null | null | 2,006 | null |
20,821 | 1 | 97,553 | null | 4 | 2,707 | Reading [MSDN](http://msdn.microsoft.com/en-us/library/ms345265.aspx) (and other sources) about custom report items (CRI) for reporting services 2005. It looks like I'm limited to generating a bitmap. Not even with some mapping overlay for detecting mouse clicks on it. Is there away to go around this? There are two thi... | SQL 2005 Reporting Services custom report item (CRI) - what are the limits? | CC BY-SA 2.5 | null | 2008-08-21T19:08:01.430 | 2009-03-07T12:40:04.737 | 2009-03-07T12:40:04.737 | 67,407 | 1,363 | [
"reporting-services",
"reportingservices-2005"
] |
20,825 | 2 | null | 20,734 | 4 | null | Red Black Trees and B-trees are used in all sorts of persistent storage; because the trees are balanced the performance of breadth and depth traversals are mitigated.
Nearly all modern database systems use trees for data storage.
| null | CC BY-SA 2.5 | null | 2008-08-21T19:09:12.363 | 2008-08-21T19:09:12.363 | null | null | 1,638 | null |
20,826 | 2 | null | 20,797 | 0 | null | You can't. What you might want is keep a starting point and number of items; in essence, build iterators. If this is C++, you can just use `std::vector<int>` and use the built-in ones.
In C#, I'd build a small iterator class that holds start index, count and implements `IEnumerable<>`.
| null | CC BY-SA 3.0 | null | 2008-08-21T19:09:13.173 | 2017-06-18T12:35:14.973 | 2017-06-18T12:35:14.973 | 4,284,627 | 414 | null |
20,828 | 2 | null | 20,728 | 5 | null | I've used nAnt to run the overall build strategy, but pass parameters into MSBuild to compile and create the deployment package.
Basically, nAnt calls into MSBuild for each environment you need to deploy to, and generates a separate deployment output for each. You end up with a folder and all ClickOnce files you need... | null | CC BY-SA 2.5 | null | 2008-08-21T19:09:35.200 | 2008-08-21T19:09:35.200 | null | null | 2,194 | null |
20,833 | 2 | null | 9,926 | 2 | null | This a really hard problem for automated tools. You might want to look into [model checking](http://en.wikipedia.org/wiki/Model_checking) your code. Don't expect magical results: model checkers are very limited in the amount of code and the number of threads they can effectively check.
A tool that might work for you i... | null | CC BY-SA 2.5 | null | 2008-08-21T19:11:07.350 | 2008-08-21T19:11:07.350 | null | null | 1,412 | null |
20,839 | 2 | null | 20,734 | 2 | null | BSTs make the world go round, as said by Micheal. If you're looking for a good tree to implement, take a look at [AVL trees](http://en.wikipedia.org/wiki/AVL_tree) (Wikipedia). They have a balancing condition, so they are guaranteed to be O(logn). This kind of searching efficiency makes it logical to put into any kind ... | null | CC BY-SA 2.5 | null | 2008-08-21T19:12:56.270 | 2008-08-21T19:12:56.270 | null | null | 50 | null |
20,840 | 1 | 20,890 | null | 9 | 33,775 | Why should I or shouldn't I use dirty reads:
```
set transaction isolation level read uncommitted
```
in SQL Server?
| SQL Server - Dirty Reads Pros & Cons | CC BY-SA 2.5 | 0 | 2008-08-21T19:12:59.013 | 2015-12-27T05:48:05.460 | null | null | 357 | [
"sql",
"sql-server"
] |
20,841 | 1 | null | null | 5 | 14,510 | I'm working on a DCOM application with the server and client on two machines, both of which are running WinXP with Service Pack 2. On both machines, I'm logged in with the same username and password.
When the client on one machine calls CoCreateInstanceEx, asking the other machine to start up the server application, i... | DCOM: CoCreateInstanceEx returns E_ACCESSDENIED | CC BY-SA 2.5 | 0 | 2008-08-21T19:13:00.840 | 2010-05-18T07:37:29.603 | 2008-08-25T20:06:54.860 | 123 | 179 | [
"security",
"windows-xp",
"dcom"
] |
20,843 | 2 | null | 20,794 | 4 | null | Can I mention testing for hardlinks without python? /bin/test has the FILE1 -ef FILE2 condition that is true when files share an inode.
Therefore, something like `find . -type f -exec test \{} -ef /path/to/file \; -print` works for hard link testing to a specific file.
Which brings me to reading `man test` and the me... | null | CC BY-SA 2.5 | null | 2008-08-21T19:13:46.390 | 2008-08-21T19:13:46.390 | null | null | 459 | null |
20,831 | 2 | null | 20,778 | 0 | null | How are you building your XML document? If you use java's built in XML classes then the string encoding should be handled for you.
Take a look at the javax.xml and org.xml packages. That's what we use for generating XML docs, and it handles all the string encoding and decoding quite nicely.
---EDIT:
Hmm, I think I... | null | CC BY-SA 2.5 | null | 2008-08-21T19:10:31.127 | 2008-08-21T19:10:31.127 | null | null | 1,409 | null |
20,844 | 2 | null | 20,778 | 2 | null | See this question, [How do you embed binary data in XML?](https://stackoverflow.com/questions/19893)
Instead of converting the byte[] into String then pushing into XML somewhere, convert the byte[] to a String via BASE64 encoding (some XML libraries have a type to do this for you). The BASE64 decode once you get the St... | null | CC BY-SA 2.5 | null | 2008-08-21T19:13:56.593 | 2008-08-21T19:13:56.593 | 2017-05-23T12:32:20.053 | -1 | 287 | null |
20,845 | 2 | null | 20,794 | 1 | null | I'm not a python guy but it looks like os.readlink()? The logic I would use in perl is to use readlink() to find the target and the use stat() to test to see if the target exists.
Edit: I banged out some perl that demos readlink. I believe perl's stat and readlink and python's os.stat() and os.readlink()are both wra... | null | CC BY-SA 2.5 | null | 2008-08-21T19:14:01.367 | 2008-08-21T19:56:37.413 | 2008-08-21T19:56:37.413 | 430 | 430 | null |
20,847 | 2 | null | 20,788 | 2 | null | Obviously, the answer depends on the programming languages. [UNO](http://spinroot.com/uno/) is good for C programs.
@Thomas Owens: I think you meant Splint.
| null | CC BY-SA 2.5 | null | 2008-08-21T19:14:40.913 | 2008-08-21T19:14:40.913 | null | null | 1,412 | null |
20,823 | 2 | null | 20,389 | 0 | null | By site-specific, do you mean that the data connections in your forms refer to the server the form is deployed to? If that's the case perhaps you could tweak your connections to use localhost instead of the server name for the hostname part of the data connection URLs.
| null | CC BY-SA 2.5 | null | 2008-08-21T19:08:12.723 | 2008-08-21T19:08:12.723 | null | null | 205 | null |
20,848 | 2 | null | 20,794 | 12 | null | [os.lstat()](https://docs.python.org/2/library/os.html#os.lstat) may be helpful. If lstat() succeeds and stat() fails, then it's probably a broken link.
| null | CC BY-SA 3.0 | null | 2008-08-21T19:15:33.627 | 2015-07-02T19:23:20.133 | 2015-07-02T19:23:20.133 | 768,675 | 893 | null |
20,849 | 2 | null | 20,529 | 3 | null | A lot of the key bindings depend on the perspective and view currently active.
My most used ones for the Java perspective:
- - - - - - - - -
| null | CC BY-SA 3.0 | null | 2008-08-21T19:16:22.407 | 2013-02-06T06:34:57.830 | 2013-02-06T06:34:57.830 | 938,024 | 1,750 | null |
20,850 | 1 | 36,907 | null | 2 | 5,503 | I'm a bit newbieish when it comes to the deeper parts of OSX configuration and am having to put up with a fairly irritating niggle which while I can put up with it, I know under Windows I could have sorted in minutes.
Basically, I have an external disk with two volumes:
One is an HFS+ volume which I use for TimeMach... | How to stop NTFS volume auto-mounting on OS X? | CC BY-SA 3.0 | 0 | 2008-08-21T19:16:27.803 | 2015-07-23T18:16:04.400 | 2015-07-23T18:16:04.400 | 1,783,163 | 1,120 | [
"macos",
"hardware"
] |
20,856 | 1 | 20,871 | null | 333 | 128,878 | I've heard of a few ways to implement tagging; using a mapping table between TagID and ItemID (makes sense to me, but does it scale?), adding a fixed number of possible TagID columns to ItemID (seems like a bad idea), Keeping tags in a text column that's comma separated (sounds crazy but could work). I've even heard so... | Recommended SQL database design for tags or tagging | CC BY-SA 3.0 | 1 | 2008-08-21T19:18:05.773 | 2015-11-28T09:51:15.113 | 2015-02-11T23:09:51.480 | 1,269,037 | 459 | [
"sql",
"database-design",
"tags",
"data-modeling",
"tagging"
] |
20,852 | 1 | null | null | 3 | 519 | I'd like to be able to track file read/writes of specific program invocations. No information about the actual transactions is required, just the file names involved.
Is there a cross platform solution to this?
What are various platform specific methods?
On Linux I know there's strace/ptrace (if there are faster ... | Cross platform file-access tracking | CC BY-SA 3.0 | 0 | 2008-08-21T19:16:51.250 | 2015-08-24T09:16:18.167 | 2015-08-24T09:16:18.167 | 155,077 | 1,164,871 | [
"cross-platform",
"filesystems",
"ptrace"
] |
20,858 | 2 | null | 20,811 | 0 | null | Could you just copy the Oracle tables and then set them up as linked tables in MS Access? This way the front-end stays the same plus you keep everything in Oracle (less moving parts than exporting and importing).
| null | CC BY-SA 2.5 | null | 2008-08-21T19:19:17.110 | 2008-08-21T19:19:17.110 | null | null | 2,006 | null |
20,857 | 2 | null | 7,525 | 1 | null | Other than tools like Boundschecker or Purify, your best bet at solving problems like this is to just get really good at reading code and become familiar with the code that you're working on.
Memory corruption is one of the most difficult things to troubleshoot and usually these types of problems are solved by spendin... | null | CC BY-SA 2.5 | null | 2008-08-21T19:18:44.040 | 2008-08-21T19:18:44.040 | null | null | 2,284 | null |
20,859 | 2 | null | 20,794 | 2 | null | [os.path](http://docs.python.org/lib/module-os.path.html)
You may try using realpath() to get what the symlink points to, then trying to determine if it's a valid file using is file.
(I'm not able to try that out at the moment, so you'll have to play around with it and see what you get)
| null | CC BY-SA 2.5 | null | 2008-08-21T19:19:24.537 | 2008-08-21T19:19:24.537 | null | null | 2,147 | null |
20,787 | 1 | 20,813 | null | 16 | 9,888 | In what situation would it be more appropriate for me to use a bitset (STL container) to manage a set of flags rather than having them declared as a number of separate (bool) variables?
Will I get a significant performance gain if I used a bitset for 50 flags rather than using 50 separate bool variables?
| When to use STL bitsets instead of separate variables? | CC BY-SA 2.5 | 0 | 2008-08-21T18:57:59.830 | 2009-12-10T20:00:53.750 | 2009-12-10T19:59:27.247 | 63,550 | 381 | [
"c++",
"performance",
"bitsets"
] |
20,861 | 1 | 20,982 | null | 5 | 6,604 | I would like to do some integration testing of a web service from within NUnit or MBUnit. I haven't delved into this too deeply yet, but I am pretty sure I will need to spin up WebDev.WebServer.exe within the "unit test" to do this. (I know it's not really a unit test).
Yes, I can test the underlying objects the web s... | Automated Web Service Testing | CC BY-SA 2.5 | 0 | 2008-08-21T19:19:47.173 | 2015-01-10T01:21:34.557 | 2008-09-15T12:51:50.173 | 1,436 | 1,436 | [
"web-services",
"unit-testing",
"integration-testing"
] |
20,873 | 2 | null | 20,856 | 10 | null | I've always kept the tags in a separate table and then had a mapping table. Of course I've never done anything on a really large scale either.
Having a "tags" table and a map table makes it pretty trivial to generate tag clouds & such since you can easily put together SQL to get a list of tags with counts of how ofte... | null | CC BY-SA 2.5 | null | 2008-08-21T19:23:32.360 | 2008-08-21T19:23:32.360 | null | null | 305 | null |
20,870 | 2 | null | 20,127 | 6 | null | I'm just gonna add two links which explain [Java's bytecode](http://www.ibm.com/developerworks/ibm/library/it-haggar_bytecode/) pretty well and some of the [various optimization](http://www.ibm.com/developerworks/java/library/j-benchmark1.html) of the JVM during runtime.
| null | CC BY-SA 2.5 | null | 2008-08-21T19:22:21.300 | 2009-12-17T18:50:57.650 | 2009-12-17T18:50:57.650 | 356 | 198 | null |
20,866 | 2 | null | 20,787 | 4 | null | It depends what you mean by 'performance gain'. If you only need 50 of them, and you're not low on memory then separate bools is pretty much always a better choice than a bitset. They will take more memory, but the bools will be much faster. A bitset is usually implemented as an array of ints (the bools are packed into... | null | CC BY-SA 2.5 | null | 2008-08-21T19:21:03.240 | 2008-08-21T19:21:03.240 | null | null | 1,367 | null |
20,737 | 2 | null | 20,586 | 85 | null | WPF has built-in converters for certain types. If you bind the Image's `Source` property to a `string` or `Uri` value, under the hood WPF will use an [ImageSourceConverter](https://msdn.microsoft.com/en-us/library/system.windows.media.imagesourceconverter(v=vs.110).aspx) to convert the value to an `ImageSource`.
So
`... | null | CC BY-SA 3.0 | null | 2008-08-21T18:38:50.580 | 2017-11-09T10:02:00.580 | 2017-11-09T10:02:00.580 | 1,136,211 | 580 | null |
20,879 | 2 | null | 20,840 | 6 | null | Generally when you need to do a sizeable (or frequent) queries to busy tables, where read committed would possibly be blocked by locks from uncommited transactions, but ONLY when you can live with inaccurate data.
As an example, on a gaming web site I worked on recently there was a summary display of some stats about... | null | CC BY-SA 2.5 | null | 2008-08-21T19:26:02.727 | 2008-08-21T19:26:02.727 | null | null | 315 | null |
20,871 | 2 | null | 20,856 | 467 | null | Three tables (one for storing all items, one for all tags, and one for the relation between the two), properly indexed, with foreign keys set running on a proper database, should work well and scale properly.
```
Table: Item
Columns: ItemID, Title, Content
Table: Tag
Columns: TagID, Title
Table: ItemTag
Columns: It... | null | CC BY-SA 2.5 | null | 2008-08-21T19:22:44.013 | 2008-08-21T19:22:44.013 | null | null | 51 | null |
20,876 | 1 | 20,895 | null | 0 | 10,613 | I'm new to SQL Server Reporting Services, and was wondering the best way to do the following:
> - -
Ideally, the final report columns would look like this:
```
[ID] [property1] [property2] [SELECT COUNT(*)
FROM AnotherTable
WHERE ForeignID=ID]
```
There... | Best way to perform dynamic subquery in MS Reporting Services? | CC BY-SA 3.0 | null | 2008-08-21T19:25:33.680 | 2016-08-03T16:12:05.377 | 2016-08-03T16:12:05.377 | 1,274,572 | 109 | [
"sql",
"sql-server",
"reporting-services",
"service",
"reporting"
] |
20,881 | 2 | null | 20,840 | 0 | null | use it if you want the data back right away and it is not that important if it is right
do not use if if the data is important to be correct or if you are doing updates with it
Also take a look at snapshot isolation which has been introduced in sql server 2005
| null | CC BY-SA 2.5 | null | 2008-08-21T19:26:44.067 | 2008-08-21T19:26:44.067 | null | null | 740 | null |
20,890 | 2 | null | 20,840 | 15 | null | From [MSDN](http://msdn.microsoft.com/en-us/library/aa259216(SQL.80).aspx):
> When this option is set, it is possible to read uncommitted or dirty data; values in the data can be changed and rows can appear or disappear in the data set before the end of the transaction.
Simply put, when you are using this isolation ... | null | CC BY-SA 2.5 | null | 2008-08-21T19:28:31.847 | 2008-08-21T19:28:31.847 | null | null | 51 | null |
20,880 | 1 | 20,901 | null | 8 | 3,433 | I have a Java swing application with a panel that contains three `JComboBoxe`s that do not draw properly.
The combox boxes just show up as the down arrow on the right side, but without the label of the currently selected value.
The boxes will redraw correctly if the window is resized either bigger or smaller by even on... | Java JPanel redraw issues | CC BY-SA 3.0 | null | 2008-08-21T19:26:44.003 | 2016-11-24T10:52:19.600 | 2016-11-24T10:52:19.600 | 1,672,920 | 75 | [
"java",
"swing",
"jpanel"
] |
20,887 | 2 | null | 20,734 | 20 | null | I'd like to address only the question "So what makes binary trees useful in some of the common tasks you find yourself doing while programming?"
This is a big topic that many people disagree on. Some say that the algorithms taught in a CS degree such as binary search trees and directed graphs are not used in day-to-da... | null | CC BY-SA 2.5 | null | 2008-08-21T19:27:33.067 | 2008-08-21T19:27:33.067 | null | null | 2,347 | null |
20,897 | 2 | null | 20,861 | 0 | null | Not sure what you're asking. If you're looking to do this without some sort of webserver in between your test and the service, you're going to be disappointed.
If that's not what you're asking... maybe some clarification?
| null | CC BY-SA 2.5 | null | 2008-08-21T19:29:41.767 | 2008-08-21T19:29:41.767 | null | null | 1,975,282 | null |
20,860 | 2 | null | 20,778 | 36 | null | [String(byte[])](http://docs.oracle.com/javase/7/docs/api/java/lang/String.html) treats the data as the default character encoding. So, how bytes get converted from 8-bit values to 16-bit Java Unicode chars will vary not only between operating systems, but can even vary between different users using different codepages... | null | CC BY-SA 3.0 | null | 2008-08-21T19:19:30.153 | 2013-11-26T04:45:39.710 | 2013-11-26T04:45:39.710 | 1,102,512 | 304 | null |
20,894 | 2 | null | 20,882 | 19 | null | 0.0.0.0 usually refers to stuff listening on all interfaces.
127.0.0.1 = localhost (only your local interface)
I'm not sure about [::]
TIME_WAIT means both sides have agreed to close and TCP
must now wait a prescribed time before taking the connection
down.
CLOSE_WAIT means the remote system has finished sending
and ... | null | CC BY-SA 2.5 | null | 2008-08-21T19:28:47.400 | 2008-08-21T19:28:47.400 | null | null | 1,310 | null |
20,895 | 2 | null | 20,876 | 2 | null | I would recommend using a [SubReport](http://msdn.microsoft.com/en-us/library/ms160348.aspx). You would place the SubReport in a table cell.
| null | CC BY-SA 2.5 | null | 2008-08-21T19:28:49.757 | 2008-08-21T19:28:49.757 | null | null | 299 | null |
20,901 | 2 | null | 20,880 | 6 | null | Can you give us some more information on how you add the combo boxes to the JPanel? This is a pretty common thing to do in Swing so I doubt that it's a JVM issue but I guess anything is possible.
Specifically, I would double check to make sure you're not accessing the GUI from any background threads. In this case, m... | null | CC BY-SA 2.5 | null | 2008-08-21T19:30:02.547 | 2008-08-21T19:30:02.547 | null | null | 1,471 | null |
20,898 | 2 | null | 18,803 | 0 | null | In my experience:
The ability to create and communicate meaningful code diagrams is a necessary skill for any software engineer who is developing new code, or attempting to understand existing code.
Knowing the specifics of UML - when to use a dashed line, or a circle endpoint - is not quite as necessary, but is stil... | null | CC BY-SA 2.5 | null | 2008-08-21T19:29:44.480 | 2008-08-21T19:29:44.480 | null | null | 2,197 | null |
20,904 | 2 | null | 20,718 | 3 | null | This is an excellent question, especially from a TDD point of view and validating code under different trust scenarios.
I think the way I'd approach this would be something along the lines of -
- Create an AppDomain in my TDD code using the AppDomain.CreateDomain() overload that allows you to pass in a PermissionSe... | null | CC BY-SA 3.0 | null | 2008-08-21T19:31:28.097 | 2012-07-25T09:36:23.093 | 2012-07-25T09:36:23.093 | 419 | 419 | null |
20,907 | 2 | null | 20,841 | 1 | null | Three things to check:
1) Go back to dcomcnfg and make try making sure that not just the access security but also the "launch permissions" section contains the appropriate security users or groups.
2) Ensure that the Authentication Level is set to something else other than "None"
3) Also check that the location on d... | null | CC BY-SA 2.5 | null | 2008-08-21T19:31:58.983 | 2008-08-21T19:38:37.750 | 2008-08-21T19:38:37.750 | 1,120 | 1,120 | null |
20,912 | 1 | 20,994 | null | 0 | 1,703 | I'm trying to do a file system backup of a RedHat Enterprise Linux v4 server using Symantec Backup Exec 11d (Rev 7170). The backup server is Windows Server 2003.
I can browse the target server to create a selection list, and when I do a test run it completes successfully.
However, when I run a real backup, the job f... | Symantec Backup Exec 11d RALUS Communications Error | CC BY-SA 2.5 | null | 2008-08-21T19:34:47.060 | 2015-04-16T05:21:56.667 | 2008-08-27T15:39:15.140 | 1,372 | 1,372 | [
"backup",
"redhat",
"backupexec",
"symantec"
] |
20,910 | 1 | 21,035 | null | 70 | 15,422 | My company develops several types of applications. A lot of our business comes from doing multimedia-type apps, typically done in Flash. However, now that side of the house is starting to migrate towards doing Flex development.
Most of our other development is done using .NET. I'm trying to make a push towards doin... | Silverlight vs Flex | CC BY-SA 2.5 | 0 | 2008-08-21T19:34:00.010 | 2022-10-12T17:02:38.627 | 2008-08-21T19:47:23.317 | 1,226 | 1,226 | [
".net",
"apache-flex",
"flash",
"silverlight"
] |
20,916 | 2 | null | 20,787 | 3 | null | RE @Wilka:
Actually, bitsets are supported by C/C++ in a way that doesn't require you to do your own masking. I don't remember the exact syntax, but it's something like this:
```
struct MyBitset {
bool firstOption:1;
bool secondOption:1;
bool thirdOption:1;
int fourBitNumber:4;
};
```
You can reference any... | null | CC BY-SA 2.5 | null | 2008-08-21T19:35:54.827 | 2008-08-22T13:45:02.353 | 2008-08-22T13:45:02.353 | 1,409 | 1,409 | null |
20,923 | 1 | 21,001 | null | 2 | 5,505 | I need to script the creation of app pools and websites on IIS 6.0. I have been able to create these using adsutil.vbs and iisweb.vbs, but don't know how to set the version of ASP.NET for the sites I have just created to 2.0.50727.0.
Ideally I would like to adsutil.vbs to update the metabase. How do I do this?
| VBScript/IIS - How do I automatically set ASP.NET version for a particular website | CC BY-SA 2.5 | null | 2008-08-21T19:39:44.130 | 2013-01-16T12:37:44.690 | 2008-08-21T22:28:39.060 | 234 | 636 | [
"asp.net",
"iis",
"vbscript",
"sysadmin",
"administration"
] |
20,734 | 1 | 20,784 | null | 57 | 15,308 | I've seen binary trees and binary searching mentioned in several books I've read lately, but as I'm still at the beginning of my studies in Computer Science, I've yet to take a class that's really dealt with algorithms and data structures in a serious way.
I've checked around the typical sources (Wikipedia, Google) an... | Red-Black Trees | CC BY-SA 2.5 | 0 | 2008-08-21T18:37:15.620 | 2016-11-03T16:34:30.660 | 2016-11-03T16:34:30.660 | 189,247 | 2,286 | [
"algorithm",
"binary-tree",
"red-black-tree"
] |
20,926 | 1 | 20,944 | null | 12 | 15,651 | Today I was working on a tab navigation for a webpage. I tried the [Sliding Doors](http://www.alistapart.com/articles/slidingdoors2/) approach which worked fine. Then I realized that I must include an option to delete a tab (usually a small X in the right corner of each tab).
I wanted to use a nested anchor, which di... | Nesting HTML- anchor tags | CC BY-SA 2.5 | 0 | 2008-08-21T19:41:07.217 | 2017-10-12T10:35:54.890 | 2008-08-21T19:48:58.087 | 2,078 | 2,078 | [
"html",
"tabs",
"anchor"
] |
20,914 | 2 | null | 20,876 | 0 | null | Simplest method is this:
```
select *,
(select count(*) from tbl2 t2 where t2.tbl1ID = t1.tbl1ID) as cnt
from tbl1 t1
```
here is a workable version (using table variables):
```
declare @tbl1 table
(
tbl1ID int,
prop1 varchar(1),
prop2 varchar(2)
)
declare @tbl2 table
(
tbl2ID int,
tbl1ID int
)
select *,
(... | null | CC BY-SA 3.0 | null | 2008-08-21T19:35:07.777 | 2011-12-17T04:23:30.190 | 2011-12-17T04:23:30.190 | 214,668 | 1,215 | null |
20,933 | 2 | null | 20,910 | 13 | null | The problem with Silverlight, is that there's still a lot of people who don't have it installed. Also, I"m not sure how well your existing .Net developers will be able to leverage their existing skills if they are only familiar with more traditional server-side .Net coding.
What are your reasons for pushing Silverli... | null | CC BY-SA 2.5 | null | 2008-08-21T19:43:22.403 | 2008-08-21T19:43:22.403 | null | null | 1,862 | null |
20,930 | 2 | null | 20,841 | 2 | null | Right, so if your Authentication level is set to Default. What is the authentication level set to in the Default Settings? Just out of interest. (although the fact that it works to a 2000 box probably makes that redundant)
EDIT:
Also: I seem to remember doing a lot of rebooting when I used to play/work with DCOM so m... | null | CC BY-SA 2.5 | null | 2008-08-21T19:42:27.400 | 2008-08-21T19:59:32.087 | 2008-08-21T19:59:32.087 | 1,120 | 1,120 | null |
20,935 | 2 | null | 19,516 | 0 | null | Why not just have both QuoteId and JobId fields in the message table? Or does a message have to be regarding either a quote or a job and not both?
| null | CC BY-SA 2.5 | null | 2008-08-21T19:44:31.217 | 2008-08-21T19:44:31.217 | null | null | 369 | null |
20,940 | 2 | null | 20,054 | 2 | null | There seems to be something of an Access connection adapter here: [http://svn.behindlogic.com/public/rails/activerecord/lib/active_record/connection_adapters/msaccess_adapter.rb](http://svn.behindlogic.com/public/rails/activerecord/lib/active_record/connection_adapters/msaccess_adapter.rb)
The database.yml file would ... | null | CC BY-SA 2.5 | null | 2008-08-21T19:45:02.587 | 2008-08-21T19:45:02.587 | null | null | 1,190 | null |
20,946 | 2 | null | 20,791 | 1 | null | I asked a similar question referencing apache, but someone linked to a microsoft howto on the response. It may be helpful.
[Here](https://stackoverflow.com/questions/18034/how-do-i-create-a-self-signed-ssl-certificate-to-use-while-testing-a-web-app)
| null | CC BY-SA 2.5 | null | 2008-08-21T19:46:32.770 | 2008-08-21T20:04:39.670 | 2017-05-23T11:48:37.237 | -1 | 1,310 | null |
20,947 | 2 | null | 20,882 | 7 | null | 127.0.0.1 is your loopback address also known as 'localhost' if set in your HOSTS file. See here for more info: [http://en.wikipedia.org/wiki/Localhost](http://en.wikipedia.org/wiki/Localhost)
0.0.0.0 means that an app has bound to all ip addresses using a specific port. MS info here: [http://support.microsoft.com/def... | null | CC BY-SA 2.5 | null | 2008-08-21T19:47:20.523 | 2008-08-21T19:47:20.523 | null | null | 419 | null |
20,951 | 2 | null | 20,263 | 2 | null | If version 5.0.37 isn't available, you might want to look at [mytop](http://jeremy.zawodny.com/mysql/mytop/). It simply outputs the current status of the server, but allows you to run EXPLAIN as (mentioned by mercutio) on particular queries.
| null | CC BY-SA 2.5 | null | 2008-08-21T19:47:49.290 | 2008-08-21T19:47:49.290 | null | null | 1,248 | null |
20,899 | 1 | 25,178 | null | 0 | 1,149 | Two RAID volumes, VMware kernel/console running on a RAID1, vmdks live on a RAID5. Entering a login at the console just results in SCSI errors, no password prompt. Praise be, the VMs are actually still running. We're thinking, though, that upon reboot the kernel may not start again and the VMs will be down.
We have d... | My VMware ESX server console volume went readonly. How can I save my VMs? | CC BY-SA 2.5 | null | 2008-08-21T19:29:47.600 | 2013-02-05T21:03:48.693 | null | null | 1,042 | [
"vmware",
"recovery",
"esx"
] |
20,949 | 2 | null | 20,797 | 15 | null | This is how I would do that:
```
using System;
using System.Collections;
using System.Collections.Generic;
class ArrayView<T> : IEnumerable<T>
{
private readonly T[] array;
private readonly int offset, count;
public ArrayView(T[] array, int offset, int count)
{
this.array = array;
thi... | null | CC BY-SA 3.0 | null | 2008-08-21T19:47:39.070 | 2016-03-29T10:17:21.310 | 2016-03-29T10:17:21.310 | 22,656 | 1,534 | null |
20,952 | 1 | 704,817 | null | 14 | 4,230 | I'm trying to unit test a custom ConfigurationSection I've written, and I'd like to load some arbitrary configuration XML into a [System.Configuration.Configuration](http://msdn.microsoft.com/en-us/library/system.configuration.configuration.aspx) for each test (rather than put the test configuration xml in the Tests.dl... | Is there a way to get a System.Configuration.Configuration instance based on arbitrary xml? | CC BY-SA 2.5 | 0 | 2008-08-21T19:49:31.050 | 2009-04-01T09:47:59.610 | null | null | 2,338 | [
"c#",
".net",
"testing",
"configuration",
"configurationmanager"
] |
20,956 | 2 | null | 18,803 | 1 | null | I believe UML is useful just for the fact that it gets people to think about the relationships between their classes. It is a good starting point to start thinking about such relationships, but it is definitely not a solution for everybody.
My belief is that the use of UML is subjective to the situation in which the ... | null | CC BY-SA 2.5 | null | 2008-08-21T19:50:23.730 | 2008-08-21T19:50:23.730 | null | null | 2,329 | null |
20,944 | 2 | null | 20,926 | 9 | null | They must be doing some really crazy stuff with JavaScript to get it to work (notice how neither the parent nor the nested anchor tags have a name or href attribute - all functionality is done through the class name and JS).
Here is what the html looks like:
```
<a class="page_tab page_tab">
<div class="page_title"... | null | CC BY-SA 2.5 | null | 2008-08-21T19:46:12.197 | 2008-08-21T19:46:12.197 | null | null | 51 | null |
20,959 | 1 | 20,974 | null | 10 | 4,515 | How can I determine all of the assemblies that my .NET desktop application has loaded? I'd like to put them in the about box so I can query customers over the phone to determine what version of XYZ they have on their PC.
It would be nice to see both managed and unmanaged assemblies. I realize the list will get long ... | Determine Loaded Assemblies | CC BY-SA 2.5 | 0 | 2008-08-21T19:50:44.167 | 2011-05-01T08:01:48.940 | 2009-04-25T11:25:38.067 | 49,246 | 1,490 | [
".net",
"winforms",
"dll",
"assemblies"
] |
20,958 | 1 | 52,347,423 | null | 474 | 306,413 | I'm designing a database table and asking myself this question:
Does anyone have a list of reasonable lengths for the most common fields, such as first name, last name, and email address?
| List of standard lengths for database fields | CC BY-SA 4.0 | 0 | 2008-08-21T19:50:42.887 | 2022-04-21T08:35:42.010 | 2022-04-21T08:35:42.010 | 5,446,749 | 437 | [
"database",
"standards"
] |
20,966 | 2 | null | 18,803 | 92 | null | > Using UML is like looking at your feet as you walk. It's making conscious and explicit something that you can usually do unconsciously. Beginners need to think carefully about what they're doing, but a professional programmer already knows what they're doing. Most of the time, writing the code itself is quicker and m... | null | CC BY-SA 2.5 | null | 2008-08-21T19:53:54.640 | 2008-08-21T20:00:22.643 | 2008-08-21T20:00:22.643 | 2,284 | 2,284 | null |
20,962 | 2 | null | 20,910 | 1 | null | I think Silverlight and XAML is preferable to ActionScript, and though I'm not familiar with ActionScript IDE's, I am familiar with VS2008 and Expression Web/Blend, and they are very good development environments and getting better all the time. I would go with Silverlight, and I think the key to getting users to inst... | null | CC BY-SA 2.5 | null | 2008-08-21T19:52:34.350 | 2008-08-21T19:52:34.350 | null | null | 856 | null |
20,967 | 2 | null | 20,926 | 0 | null | Actually, the code I had pasted previously was the generated DOM, after all JS manipulation. If you don't have the [Firebug](https://addons.mozilla.org/en-US/firefox/addon/1843) extension for Firefox, you should get it now.
Edit: Deleted the old post, it was no longer useful. Firebug is, so this one is staying :)
| null | CC BY-SA 2.5 | null | 2008-08-21T19:53:57.310 | 2008-08-21T19:59:21.947 | 2008-08-21T19:59:21.947 | 96 | 96 | null |
20,970 | 2 | null | 20,959 | 0 | null | Looks like `AppDomain.CurrentDomain.GetAssemblies();` will do the trick :)
| null | CC BY-SA 2.5 | null | 2008-08-21T19:54:14.640 | 2008-08-21T19:54:14.640 | null | null | 1,490 | null |
20,972 | 2 | null | 18,803 | 13 | null | Throw away only in my opinion. UML is a great tool for communicating ideas, the only issue is when you store and maintain it because you are essentially creating two copies of the same information and this is where it usually blows.
After the initial round of implementation most of the UML should be generated from the ... | null | CC BY-SA 2.5 | null | 2008-08-21T19:54:36.370 | 2008-08-21T19:54:36.370 | null | null | 1,143 | null |
20,963 | 2 | null | 20,529 | 4 | null | - - -
| null | CC BY-SA 3.0 | null | 2008-08-21T19:52:45.377 | 2013-02-06T06:13:42.173 | 2013-02-06T06:13:42.173 | 938,024 | 2,197 | null |
20,973 | 2 | null | 20,958 | 1 | null | Just looking though my email archives, there are a number of pretty long "first" names (of course what is meant by first is variable by culture). One example is Krishnamurthy - which is 13 letters long. A good guess might be 20 to 25 letters based on this. Email should be longer since you might have firstname.lastn... | null | CC BY-SA 2.5 | null | 2008-08-21T19:54:46.357 | 2008-08-21T19:54:46.357 | null | null | 2,346 | null |
20,953 | 2 | null | 20,923 | 2 | null | I found the following script [posted](http://www.diablopup.net/post/Set-an-IIS-Object%27s-ASPNET-Version-Using-VBScript.aspx) on Diablo Pup's blog. It uses ADSI automation.
```
'******************************************************************************************
' Name: SetASPDotNetVersion
' Description: Set th... | null | CC BY-SA 2.5 | null | 2008-08-21T19:49:31.780 | 2008-08-21T19:49:31.780 | null | null | 206 | null |
20,974 | 2 | null | 20,959 | 12 | null | ```
using System;
using System.Reflection;
using System.Windows.Forms;
public class MyAppDomain
{
public static void Main(string[] args)
{
AppDomain ad = AppDomain.CurrentDomain;
Assembly[] loadedAssemblies = ad.GetAssemblies();
Console.WriteLine("Here are the assemblies loaded in this appdomain\n");
... | null | CC BY-SA 2.5 | null | 2008-08-21T19:55:15.573 | 2008-08-21T19:55:15.573 | null | null | 35 | null |
20,975 | 2 | null | 20,959 | 2 | null | Either that, or System.Reflection.Assembly.GetLoadedModules().
Note that AppDomain.GetAssemblies will only iterate assemblies in the AppDomain. It's possible for an application to have more than one AppDomain, so that may or may not do what you want.
| null | CC BY-SA 2.5 | null | 2008-08-21T19:55:18.443 | 2008-08-21T19:55:18.443 | null | null | 1,975,282 | null |
20,976 | 2 | null | 20,529 | 47 | null | This is cool: If someone has emailed you a stack trace, you can copy and . You can then click on class names in the stack trace as if your own code had generated it.
| null | CC BY-SA 2.5 | null | 2008-08-21T19:55:22.487 | 2008-08-21T19:55:22.487 | null | null | 2,197 | null |
20,977 | 2 | null | 1,711 | 2 | null | [Pragmatic Programmer](https://rads.stackoverflow.com/amzn/click/com/020161622X)
| null | CC BY-SA 2.5 | null | 2008-08-21T19:55:25.683 | 2008-08-21T19:55:25.683 | null | null | 1,534 | null |
20,983 | 2 | null | 20,927 | 12 | null | You would also need to then save the message. Then it that should work.
| null | CC BY-SA 2.5 | null | 2008-08-21T19:57:36.410 | 2008-08-21T19:57:36.410 | null | null | 2,168 | null |
20,969 | 2 | null | 1,711 | 6 | null | [The Pragmatic Programmer: From Journeyman to Master](http://www.pragprog.com/the-pragmatic-programmer) without a doubt. The advice in it is so well presented, and simple, that it comes across as if it was 'The Common Sense Programmer'. Love it.
| null | CC BY-SA 2.5 | null | 2008-08-21T19:54:14.437 | 2008-08-21T20:01:03.580 | 2008-08-21T20:01:03.580 | 1,238 | 1,238 | null |
20,984 | 2 | null | 20,958 | -2 | null | it is varchar right? So it then doesn't matter if you use 50 or 25, better be safe and use 50, that said I believe the longest I have seen is about 19 or so. Last names are longer
| null | CC BY-SA 2.5 | null | 2008-08-21T19:57:42.637 | 2008-08-21T19:57:42.637 | null | null | 740 | null |
20,982 | 2 | null | 20,861 | 1 | null | I found [this post](http://haacked.com/archive/2006/12/12/using_webserver.webdev_for_unit_tests.aspx) and [this one](http://www.hanselman.com/blog/NUnitUnitTestingOfASPNETPagesBaseClassesControlsAndOtherWidgetryUsingCassiniASPNETWebMatrixVisualStudioWebDeveloper.aspx) which have some solutions on how to start up WebDev... | null | CC BY-SA 2.5 | null | 2008-08-21T19:57:33.963 | 2008-08-21T20:04:22.947 | 2008-08-21T20:04:22.947 | 1,436 | 1,436 | null |
20,987 | 2 | null | 1,711 | 9 | null | [K&R](https://rads.stackoverflow.com/amzn/click/com/0131103628)
@Juan: I know Juan, I know - but there are some things that can only be learned by actually getting down to the task at hand. Speaking in abstract ideals all day simply makes you into an academic. It's in the application of the abstract that we truly grok... | null | CC BY-SA 2.5 | null | 2008-08-21T19:58:25.350 | 2008-08-21T20:06:37.670 | 2008-08-21T20:06:37.683 | 1,790 | 1,790 | null |
20,988 | 2 | null | 20,958 | 0 | null | I usually go with:
: 30 chars
: 30 chars
: 50 chars
: 200 chars
If I am concerned about long fields for the names, I might sometimes go with 50 for the name fields too, since storage space is rarely an issue these days.
| null | CC BY-SA 2.5 | null | 2008-08-21T19:58:39.543 | 2008-08-21T19:58:39.543 | null | null | 277 | null |
20,992 | 2 | null | 15,376 | 2 | null | You might want to take a look at [MagicDraw](http://magicdraw.com/) or [Visual Paradigm for UML](http://www.visual-paradigm.com/product/vpuml/). Both offer community editions that, of course, don't span the full feature range, but may well be sufficient if you want to create diagrams only and not generate code or do fu... | null | CC BY-SA 2.5 | null | 2008-08-21T19:59:36.280 | 2008-08-21T19:59:36.280 | null | null | 1,793 | null |
20,985 | 2 | null | 20,910 | 3 | null | As Kibbee hinted at above, the argument of leveraging existing .Net developers doesn't hold much water. It is impossible to be an expert in all facets of .Net development. The platform is just too big. The same goes for Java. The only thing Silverlight has going for it from a skills perspective is that you can code... | null | CC BY-SA 2.5 | null | 2008-08-21T19:58:15.333 | 2008-08-21T19:58:15.333 | null | null | 2,351 | null |
20,986 | 2 | null | 20,958 | 392 | null | I just queried my database with millions of customers in the USA.
- The maximum length was 46. I go with 50. (Of course, only 500 of those were over 25, and they were all cases where data imports resulted in extra junk winding up in that field.)- was similar to first name.- maxed out at 62
characters. Most of the... | null | CC BY-SA 2.5 | null | 2008-08-21T19:58:22.230 | 2008-11-14T16:07:15.597 | 2008-11-14T16:07:15.597 | 437 | 1,219 | null |
20,993 | 1 | 21,031 | null | 9 | 2,888 | When creating a web application, and lets say you have a User object denoting a single user, what do you think is the best way to store that the user has logged in?
Two ways I've thought about have been:
- -
Any better suggestions, any issues with using the above ways? Perhaps security issues or memory issues, etc,... | Storing logged in user details | CC BY-SA 2.5 | 0 | 2008-08-21T19:59:57.217 | 2010-06-25T10:36:41.740 | 2008-09-09T22:13:50.840 | -1 | 1,610 | [
"web-applications"
] |
20,994 | 2 | null | 20,912 | 1 | null | Sure sounds like firewall issues. Try stopping iptables, and running again. Also, RALUS can dump a log file - which may give some more to go on.
I use the older UNIX agent myself, which uses port 6101 IIRC - but I believe that the newer client uses tcp/10000 for control and 1024-65535 for transfer.
Last resort is to... | null | CC BY-SA 2.5 | null | 2008-08-21T19:59:57.280 | 2008-08-21T19:59:57.280 | null | null | 2,199 | null |
20,927 | 1 | 20,983 | null | 14 | 2,416 | I've got two models: Message and Attachment. Each attachment is attached to a specific message, using a ForeignKey on the Attachment model. Both models have an auto_now DateTimeField called updated. I'm trying to make it so that when any attachment is saved, it also sets the updated field on the associated message to n... | Updating an auto_now DateTimeField in a parent model in Django | CC BY-SA 4.0 | null | 2008-08-21T19:41:57.870 | 2021-10-27T13:27:40.807 | 2021-10-27T13:27:40.807 | 17,253,130 | 1,914 | [
"python",
"database",
"django",
"orm"
] |
20,999 | 2 | null | 14,032 | 5 | null | I'd definitely recommend [Gliffy.com](http://www.gliffy.com/) for simple ER diagrams; it's an online flash-based tool. I wrote a small [review](http://www.davedevelopment.co.uk/2008/08/11/review-gliffycom/) of it a week ago.
| null | CC BY-SA 4.0 | null | 2008-08-21T20:01:06.823 | 2019-01-18T17:15:50.623 | 2019-01-18T17:15:50.623 | 802,138 | 1,248 | null |
20,885 | 2 | null | 20,814 | 10 | null | Right-click, cut, and paste works just fine for me.
| null | CC BY-SA 3.0 | null | 2008-08-21T19:27:04.770 | 2018-02-13T18:01:16.413 | 2018-02-13T18:01:16.413 | 63,550 | 1,616 | null |
21,001 | 2 | null | 20,923 | 6 | null | @[Chris](https://stackoverflow.com/questions/20923/vbscriptiis-how-do-i-automatically-set-aspnet-version-for-a-particular-website#20953) beat me to the punch on the ADSI way
You can do this using the aspnet_regiis.exe tool. There is one of these tools per version of ASP.NET installed on the machine. You could shell ou... | null | CC BY-SA 3.0 | null | 2008-08-21T20:01:43.327 | 2013-01-16T12:37:44.690 | 2017-05-23T10:33:14.293 | -1 | 419 | null |