5,727 Posted Topics

Member Avatar for marsangel

the JVM is 3rd party software to both your company (or more likely school) and the operating system, so you can't use it. Java isn't a good platform for what you want to do anyway, use C++ instead (for example, C or assembler even better).

Member Avatar for Majestics
0
69
Member Avatar for t@sos

The ONLY way is through extensive experience using them. I doubt anyone knows every method and field in every class of even the core API and knows its correct usage. And if such a person exists no doubt that knowledge is purely academic and he has no clue as to …

Member Avatar for gyno
0
2K
Member Avatar for happygeek

UK isn't it? Isn't the UK covered by EU consumer protection laws? If it is threatening a lawsuit under those laws will set things moving, as under EU law warranty must cover things that can be reasonably expected to work for a reasonable period. What that entails is described in …

Member Avatar for dews
0
926
Member Avatar for cazaletm

in fact OP most likely doesn't even remember ever visiting this site, if it even remembers the site exists.

Member Avatar for jwenting
0
6K
Member Avatar for MxDev

that said, whizlabs are a reliable company with a quality product. The other one may be, but they're unknown to me after almost 15 years working with Java.

Member Avatar for MxDev
0
99
Member Avatar for KenPeterson

and most of all remember that you're possibly (even likely) violating international copyright law by using images posted by people without their prior permission (if you had that permission, you could just ask them for the images...).

Member Avatar for somrita
0
174
Member Avatar for PHIPH

[QUOTE=NormR1;1593177]I've been trying today to help a couple of OPs to understand the difference between compiling a program and executing it. They had no idea when either step was done. They thought the IDE automatically took care of it.[/QUOTE] Which it does. That automagic IDEs perform is what prevents people …

Member Avatar for jwenting
0
182
Member Avatar for sham51

and no, we're not here at your beg and call to answer your questions immediately. Your tone is extremely rude, suggesting you're more important than anyone else in the world.

Member Avatar for conbot
0
230
Member Avatar for BattlingMaxo

there are many tools that promise you can create the next killer game, the one that will bring you instant fame and megabucks, without any programming in just a few hours or days... None of them deliver of course, no reason to assume this one is any different from the …

Member Avatar for BattlingMaxo
0
233
Member Avatar for Lisa Hoover

The problem with spam is that you can't fix it without introducing a cost to sending a message that's higher than the potential return. So if the potential return on investment from sending a scam email to a million users is $50.000 stolen from the one sucker who fell for …

Member Avatar for diafol
0
385
Member Avatar for gunbuster363

Depending on the exact nature of the complaints (if they're caused by clicking buttons or by your hand position) switching to a pen tablet may help a lot. I use a Wacom Bamboo now at work, which has pretty much ended the chronic pain I used to get in my …

Member Avatar for jwenting
0
183
Member Avatar for chandaboy

another thought: if the software uses external resources which the simulator mocks (mimmicks) for your, latency in accessing those when using the real thing can also cause slowdowns you don't experience when using a simulator. Think network congestion, disk access, etc.

Member Avatar for jwenting
0
150
Member Avatar for Ancient Dragon

[QUOTE=VernonDozier;1580991] The article is a little bare on the specifics and it's unclear to me whether the weapons were in the bag or just the case, but if we have a bunch of guys travelling with guns on a civilian flight landing in a civilian airport and then their bags …

Member Avatar for jwenting
-2
167
Member Avatar for Dean_Grobler

the scanner should have a programming interface you can access. Most likely it stores nothing at all, that's up to you! It just sends you data (when activated) using a specific data format that you then need to interpret in some way to figure out what's there.

Member Avatar for rubberman
0
161
Member Avatar for JamesCherrill

If you're using generated serialversionids you can expect that to happen. Those are generated on the fly and the generation can and often will yield different values when using different jvms. This is well published and there's no excuse for you to not have known this. It's quite possible a …

Member Avatar for Don Corley
1
570
Member Avatar for JavaBean

and anyway, why post nonsense to a thread that was discussed to death 3 years ago?

Member Avatar for stultuske
0
511
Member Avatar for bangor_boy

[QUOTE=JamesCherrill;1576271]break inside a switch breaks out of the switch - ie stops any later cases being executed. So in this case is does NOT break out of the loop, just the switch.[/QUOTE] More generally, a break statement will break out of the containing block only, not out of any higher …

Member Avatar for stultuske
0
180
Member Avatar for PHIPH

even if the device is his, the connection isn't. He'd be stealing bandwidth if he ever succeeded.

Member Avatar for stultuske
-5
93
Member Avatar for Portgas D. Ace

[QUOTE=Portgas D. Ace;1571430]Apprenticeship. Petty cash really. But it's hourly. so I'm happy just relaxing :)[/QUOTE] ah, an intern. Not trusted with the time critical stuff, just given some make-work jobs to keep him from bothering the people doing the actual work with questions that take time to answer.

Member Avatar for Capt. Fantastic
0
208
Member Avatar for thato21math

Extending Thread indicates (in OO design) that you're changing the behaviour of Thread itself. You rarely if ever want to do that. For most if not all purposes you'll ever encounter, implementing Runnable is the correct thing to do.

Member Avatar for stultuske
0
118
Member Avatar for sumeetdesaeee

See page 182 of the Java Language Specification, 3rd edition (may be a different page in other editions). Basically, an inner class contains an implicit reference to the outer class instance that creates it, thus preventing that instance from going out of scope (and thus getting garbage collected). However, method …

Member Avatar for sumeetdesaeee
0
139
Member Avatar for masterofpuppets

The router does the routing of incoming messages to anything residing behind it. Unless each client is accessing your server through a different TCP or UDP port there's no way for the server to distinguish them unless you send specific information in each request/response to the client and the client …

Member Avatar for masterofpuppets
0
1K
Member Avatar for famas
Member Avatar for Sadun89
Member Avatar for WolfShield

started dabbling in GW Basic as a teen. Was the only thing available to me. Didn't get an actual compiler until years later, good old Turbo Pascal.

Member Avatar for thing789
0
315
Member Avatar for Mr Fish
Member Avatar for newsguy

well, after 2.9 there's always 2.10 and you can take that a LOOOOOONG way, especially with the Linux tendency to use ridiculously long strings of subversions. 2.100000999.432325.432321545.35beta143523alpha542323.5234323 anyone?

Member Avatar for Tellalca
0
621
Member Avatar for localp
Member Avatar for Portgas D. Ace
Member Avatar for vegaseat
Member Avatar for bumsfeld
2
494
Member Avatar for Siberian

[QUOTE=sergent;1568705]I think Bill Gates got enough money already? If you think paying $1000 for songs on your I-Pod is alright, and millions of people who download pirated programs is not a sign that there is something wrong with copyright system well... I have nothing to say[/QUOTE] who are you to …

Member Avatar for predator78
0
225
Member Avatar for jonhylever
Member Avatar for Ene Uran
-2
358
Member Avatar for Annuate

I'd just make a method in the Vector2 class that takes 2 instances of Vector2 and creates one that's the addition of them. So you'd get [code]Vector2 newVector = vec1.add(vec2);[/code] or possibly (using static members, not what I'd do) [code]Vector2 newVector = Vector2.createByAddition(vec1, vec2);[/code] Much cleaner than what you yourself …

Member Avatar for jwenting
0
236
Member Avatar for bhanu1607

For security reasons, that's not allowed. You'll have to have some mechanism to transfer data between the applications (secure of course) and you'll need to write it yourself (though some application servers might have things in place to make it easy on you for applications all hosted within the same …

Member Avatar for jwenting
0
134
Member Avatar for Sogo7

Most if not all companies silently ignore this as it's utterly ridiculous. Adding a disclaimer is probably all that most companies will do, as the alternative would be to not use cookies at all which would cripple their sites. A typical law created by bureaucrats who don't have any idea …

Member Avatar for jingda
1
124
Member Avatar for freakvista

and don't call it Tetris. The trademark owners are known to go after anyone using the name, no matter how little.

Member Avatar for freakvista
0
3K
Member Avatar for predator78

Such decisions only you can make. Which is appropriate for the situation depends on the rest of the logic you're employing. Personally, I'd not have that method at all. Rather I'd have a user request a place at the Table, and be added to the Table as a reference in …

Member Avatar for predator78
0
195
Member Avatar for jingda

[QUOTE=sergent;1565043]It is unidentified serial killer in England from late 1800s[/QUOTE] It's not even known whether it's one person or many, how many murders are to be attributed to the Ripper, or which ones.

Member Avatar for jingda
0
235
Member Avatar for thjchhu0ngthu

well, there's no way to be sure an address exists or not at all. The address might exist but the server can be set to bounce or delete all incoming mail from your account or domain. The recipient might choose to ignore your message and not reply to it. An …

Member Avatar for jwenting
0
136
Member Avatar for baby_c

I kinda like Ruby for small things. Larger Ruby programs tend to get hard to read though. Ocalm I don't know, but O'Calm sounds like an Irish brand of beer rather than a programming language, which would explain why Rashakil likes it better than Ruby :) To learn OO concepts …

Member Avatar for jwenting
0
104
Member Avatar for dywlkr365

Yup, you should never store plaintext passwords, and should never decrypt them. Of course if your encryption mechanism doesn't guarantee an identical result for identical input (not sure if such exist, but it's I think possible) you're basically screwed, and will have to choose a different algorithm. Many professional systems …

Member Avatar for jwenting
0
221
Member Avatar for Japus

In general, use reflection only if there's no other way that gets the job done :) IOW, if you don't KNOW you require it, you probably don't. It's there fore specific corner cases, which many people are unlikely to ever come up against, especially in their first years of using …

Member Avatar for jwenting
0
627
Member Avatar for vegaseat

pretty much anywhere with no internet, television, or cellphones... Having electricity and plumbing/running water is a nice plus.

Member Avatar for jwenting
1
160
Member Avatar for hamzamuradkhanh

There is no such thing as "internet booster software". While there are many people selling things called that, in reality those things do nothing whatsoever. At most a few might allow more efficient use of the bandwidth available to the machine, but most don't even do that, they just sit …

Member Avatar for jwenting
0
117
Member Avatar for pardeep3dec
Re: SCJP

you could have found it by now if you'd actually have the level of intelligence needed to pass the exam. So consider trying to find the information yourself to be a good way to test whether you should bother even considering it.

Member Avatar for jwenting
-2
119
Member Avatar for solomon_13000
Member Avatar for AnkitKumar

There is no definition of what is "pure object oriented", so the question cannot be answered. While many people think they know what they talk about when using the term, they all mean something else.

Member Avatar for jwenting
1
326
Member Avatar for jwenting

The question how to create HTML output to the browser from a Servlet based on XML data often comes up. Here's a fully functional example on how to achieve this using Jakarta Xalan 2 and Xerces 2. The system is quite simple, most of the code is concerned with housekeeping …

Member Avatar for lemomo12345
0
933
Member Avatar for SMITA6076
Member Avatar for theinvincible

The End.