Jump to content

Stagg54

Members
  • Posts

    133
  • Joined

  • Last visited

  • Days Won

    5

Everything posted by Stagg54

  1. There is a way to get git to treat specific extensions (and possibly specific files) as binary and not try to merge them... Google the .gitattributes file. It's similar to the .gitignore file and I think it will do what you want.
  2. That is what I typically use... Generally I wrap in a class.
  3. You could call it the jenga or house of cards solution... It works, but if you want to make changes, you better be careful!!
  4. I'm glad that seems to work for you, but... I think you will find the conventional wisdom on version control is that the Golden Rule is "Don't Commit Broken Code". If 1 person checks in broken code, then when everyone else checks it out - if they want to run it, they have to fix what's broken. If 10 different people check it out, then you have 10 different people trying to fix it in 10 different ways and then you have this huge merge problem... Seems like a major headache. If you use a distributed version control system like git or mercurial, you could do local commits of broken code and then only push once it is no longer broken. That way you can save intermediate copies so you can roll back if needed, but no one else is going to check out broken code.
  5. When you are trying to hide something, making it smaller is generally preferable... Making it gigantic almost ensures it will be found...
  6. Just curious how you manage that without committing broken code?
  7. I'm no lawyer, but from the first link: section 0 - 2nd paragraph: "Activities other than copying, distribution and modification are not covered by this License; they are outside its scope." So are you copying, distributing, or modifying SVN? I think likely not. And also the last part of section 2. "In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License." My guess is that IT just wants you to use TSF because it is their standard program that they understand and it's less work for them. This is just a copout for them to justify it.
  8. Also using a turnkey linux virtual machine is simply a super-easy to test out new software packages and play around with them and see if it will meet your needs. Once you figure that out, it's pretty easy to setup a real server somewhere. In the case of the original poster he mentioned wondering if it was the Windows Installer for postgres. Well running it in Linux would help to figure it out pretty quickly. A VM seems to be the quickest and easiest way to do that.
  9. I hardly consider myself part of the "Linux Community". I certainly use it. My answer for any Windows question, starts with why?
  10. You could try running the linux version in a VM.
  11. I've used Postrgres with ODBC and I've had no issues (other than the 32/64 bit problems that it seems you have already figured out). As far as installation and setting it up, I just download the turnkey linux appliance. It already has everything set up.
  12. I think you are going to find you want a seperate emulated class for each instrument. It really depends on what are doing with the data from each instrument when you get it back. If you are just logging it, then maybe everything is fine with just one emulated class, but if you are making any decisions based on it, then it will probably require a seperate emulator for each instrument. And as for manually entering the response, that works as long as the calling entity isn't going to time out. So you either have to add intelligent code to send back the expected response, or you have disable the timeout in the calling code.
  13. We got a new head IT security guy. Shortly after starting, he somehow got a virus on his laptop from a thumb drive he picked up somewhere. The solution was to ban thumbdrives. So he sent out an email to the entire company that said basically: "Due to security risks, we are banning all USB thumbdrives except for these special ones that are encrypted and have fingerprint readers built into them. They cost $200 (for a 4 GB drive). Oh and they are backordered and won't be available for 6 months. If you want one, let us know and we will put you on the waitlist." It was almost universally ignored...
  14. I wrote software that was able to run in nuclear power plants, but was apparently not trustworthy enough to have administrator access on my own laptop. They had no problem giving me administrator access on the machines that the end software got installed on. So I could run the installer on the actual machine, but couldn't test the installer on my own laptop. Seemed kind of schizophrenic to me. One hand they trusted me, and yet on the other hand they didn't. I also worked in an R&D lab where we were constantly evaluating new hardware, which of course involved installing drivers. I would have to put in a ticket and have the local IT guy install it for me. After several hours he would walk over. He had no clue what I was installing and didn't really seem to care much either. I would just start the installer and when it asked for admin credentials, he would come over eventually and put his in. Then he would walk away.
  15. Is there a way to use vi server to communicate across the app instance boundaries to achieve what you want? Seems like that might be doable.
  16. Looks like you are doing sequencing. Instead of reinventing the wheel, perhaps consider using Teststand...
  17. They could also be worried about this: https://www.usbkill.com/
  18. Dynamic Dispatch is your friend. It sounds like you are on the right track, but you just haven't had that epiphany moment yet. It will come. Try and find some example code to look at. I'm sure there's plenty out there (just don't know where off the top of my head).
  19. Do you happen to have a link to that article?
  20. Title says it all. I'm a CLA (been one for over 4 years now) and I'm thinking of moving to Denver and looking for a job out there.
  21. It might be kind of clunky but in this particular case you could convert the I32 to a double and append to either the front or back of the array (so you would just be sending a fixed size array of doubles) and then remove it on the other end.
  22. It you only want to change what is displayed on the graph do the following:1. Right click on the x axis -> Deselect autoscale X2. Highlight the leftmost value on the x axis (in this case 0) and you should be able to change it to whatever you want. You can do the same thing for the leftmost value.If you want to actually remove the samples from the signal and then do some calculations, then it is more complicated.
  23. Yes and No. Consider the case where I lock my bike up and lose the key. It's not illegal for me to break the lock and take my bike back.
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.