Posts
 
Reputation
Joined
Last Seen
0 Reputation Points
100% Quality Score
Upvotes Received
9
Posts with Upvotes
7
Upvoting Members
4
Downvotes Received
0
Posts with Downvotes
0
Downvoting Members
0
0 Endorsements
Ranked #13.1K
Ranked #4K
~4K People Reached
This member's community profile is only visible to logged in members until they have earned 15 reputation points.

12 Posted Topics

Member Avatar for kes166

Okay, so, some basics. You said your subnet mask is 255.255.255.224. From the rest of the discussion, you want a network encompassing 192.168.1.0 – 192.168.1.31, yes? First, there's a shorthand for this: 192.168.1.0/27. That means that using a base of 192.168.1.0 (or 11000000.10101000.00000001.00000000 in binary), the first 27 bits are …

Member Avatar for mcglk
0
2K
Member Avatar for tony75

So you want to divide up 100.20.10.0/24 into two subnets, one a /30, and one a . . . well, here we have a problem. There's no convenient way to have a single subnet that has just 80 hosts. But you could have one that has 126 hosts if you …

Member Avatar for mcglk
0
237
Member Avatar for gil857

You can coelesce related fields, but that can wind up causing more of a headache than you'd expect at first. As with all things SQL, it's often hard to predict where the bottlenecks in your database are going to be. Most of the time, however, you can analyze slow queries …

Member Avatar for Amr.Mohammad87
0
186
Member Avatar for Mohamed_26

Well, one thing I inexplicably see an awful lot of in business database applications is change-logging; that is, for any change to the database, extra code is built to make sure those changes (and who's responsible) are stored somewhere. It's one of the things that triggers are perfect for, but …

Member Avatar for JOSheaIV
0
247
Member Avatar for yash_792

First off, asking Daniweb to answer your homework questions is bad form. You're supposed to be learning in class, not cheating by having other people answer your exam questions. But as its been two months, I assume your final is over in CLPI 1599, and I don't see any harm …

Member Avatar for mcglk
-1
234
Member Avatar for Venus_1

Um. Not really. LOOP is for use in stored procedures, not in the context of SELECT statements. I'm not really clear what you're trying to do here, honestly. Perhaps you could explain a bit more about what your intent is.

Member Avatar for mcglk
0
163
Member Avatar for kayecng

I have to admit, I’m not clear on the question. Among other things, you don’t mention which version of MySQL you’re running (I can only assume it’s MySQL from the tag); putting more details about the environment is always useful. Also, while I’m assuming the first query (`SELECT COUNT(Software)` …) …

Member Avatar for mcglk
0
375
Member Avatar for rsleventhal

The problem is more complex than a `mod_rewrite` recipe. Rewriting the URL is fairly easily done: RewriteCond %{HTTP_HOST} ^www\.domain\.com$ [NC] RewriteRule .? http://someothername.domain.com%{REQUEST_URI} [R=301,L] So when the browser requests a URL at `www.domain.com`, the server responds with a permanent redirect (a 301 response) that in effect says, “Oh, for that, …

Member Avatar for mcglk
0
250
Member Avatar for pintukennady31

Well, honestly, I can see why nobody answered this: it feels like a troll, and your bio line is basically an advertisement. But I’ll take a crack at it. It is true that Mac OS X doesn’t have antivirus utilities built into the operating system. The same is true of Linux and …

Member Avatar for rubberman
-1
172
Member Avatar for phoenix254

Strictly speaking, that’s not actually a protocol; as you indirectly infer, it’s a “scheme” that in effect tells the browser what to do with the rest of the URI. Unfortunately, as yet, there’s no good cross-browser way to do this. W3C has been working on it, but the only browser …

Member Avatar for mcglk
0
157
Member Avatar for kathymac

So, there seems to be some misunderstanding. When you open a file and read it in this way, what you get is the HTML source. When a browser receives the HTML source, it interprets it and comes up with a graphical rendering of that HTML source. What you seem to …

Member Avatar for mcglk
0
219
Member Avatar for Mace_1

Most of the work has been done for you already, thanks to the [Jabber](http://www.jabber.org/) effort. Once you work your way through that, if you really want a Perl client, start off with [`Net::Jabber`](http://search.cpan.org/~reatmon/Net-Jabber-2.0/lib/Net/Jabber.pm).

Member Avatar for mcglk
0
334

The End.