- Upvotes Received
- 9
- Posts with Upvotes
- 7
- Upvoting Members
- 4
- Downvotes Received
- 0
- Posts with Downvotes
- 0
- Downvoting Members
- 0
12 Posted Topics
Okay, so, some basics. You said your subnet mask is 255.255.255.224. From the rest of the discussion, you want a network encompassing 192.168.1.0 – 192.168.1.31, yes? First, there's a shorthand for this: 192.168.1.0/27. That means that using a base of 192.168.1.0 (or 11000000.10101000.00000001.00000000 in binary), the first 27 bits are …
So you want to divide up 100.20.10.0/24 into two subnets, one a /30, and one a . . . well, here we have a problem. There's no convenient way to have a single subnet that has just 80 hosts. But you could have one that has 126 hosts if you …
You can coelesce related fields, but that can wind up causing more of a headache than you'd expect at first. As with all things SQL, it's often hard to predict where the bottlenecks in your database are going to be. Most of the time, however, you can analyze slow queries …
Well, one thing I inexplicably see an awful lot of in business database applications is change-logging; that is, for any change to the database, extra code is built to make sure those changes (and who's responsible) are stored somewhere. It's one of the things that triggers are perfect for, but …
First off, asking Daniweb to answer your homework questions is bad form. You're supposed to be learning in class, not cheating by having other people answer your exam questions. But as its been two months, I assume your final is over in CLPI 1599, and I don't see any harm …
Um. Not really. LOOP is for use in stored procedures, not in the context of SELECT statements. I'm not really clear what you're trying to do here, honestly. Perhaps you could explain a bit more about what your intent is.
I have to admit, I’m not clear on the question. Among other things, you don’t mention which version of MySQL you’re running (I can only assume it’s MySQL from the tag); putting more details about the environment is always useful. Also, while I’m assuming the first query (`SELECT COUNT(Software)` …) …
The problem is more complex than a `mod_rewrite` recipe. Rewriting the URL is fairly easily done: RewriteCond %{HTTP_HOST} ^www\.domain\.com$ [NC] RewriteRule .? http://someothername.domain.com%{REQUEST_URI} [R=301,L] So when the browser requests a URL at `www.domain.com`, the server responds with a permanent redirect (a 301 response) that in effect says, “Oh, for that, …
Well, honestly, I can see why nobody answered this: it feels like a troll, and your bio line is basically an advertisement. But I’ll take a crack at it. It is true that Mac OS X doesn’t have antivirus utilities built into the operating system. The same is true of Linux and …
Strictly speaking, that’s not actually a protocol; as you indirectly infer, it’s a “scheme” that in effect tells the browser what to do with the rest of the URI. Unfortunately, as yet, there’s no good cross-browser way to do this. W3C has been working on it, but the only browser …
So, there seems to be some misunderstanding. When you open a file and read it in this way, what you get is the HTML source. When a browser receives the HTML source, it interprets it and comes up with a graphical rendering of that HTML source. What you seem to …
Most of the work has been done for you already, thanks to the [Jabber](http://www.jabber.org/) effort. Once you work your way through that, if you really want a Perl client, start off with [`Net::Jabber`](http://search.cpan.org/~reatmon/Net-Jabber-2.0/lib/Net/Jabber.pm).
The End.
mcglk