by: filesiteguy |
last post by:
Some partners of mine and I are writing a host-based application,
which would greatly benefit if we could take advantage of a web
services-like function we are formulating.
Unfortunately, this...
|
by: Tim Gosselin |
last post by:
I am writing a tcp tunnel but cannot find a way of detecting when a socket
shuts down its read end without writing to the socket. For testing the
write end of the remote endpoint I just do a:
if...
|
by: Oliver Klozoff |
last post by:
Hi,
I am having a hard time setting up an SQL Server 2000 Developer
Edition instance for remote clients. The instance is running well and
I can connect to it on the local computer. When I try...
|
by: acwomble |
last post by:
I am working with a database on another system via a ssh tunnel using
plink. We have setup an alias the local system for the remote database.
I am able to connect and work from within Visual...
|
by: Reid Priedhorsky |
last post by:
Hi folks,
I would like to access a remote Postgres server from a Python program in a
secure way. Postgres doesn't currently listen to the Internet for
connections, and I'd prefer to keep it that...
|
by: gabriel.altay |
last post by:
hello everyone,
Im trying to write some python code that will return information (file
size, last modified ...) about files on a remote computer that I have
'no password' ssh access to. Ive...
|
by: eggie5 |
last post by:
I have a form where a user can change his password, but I'm confused
on how to prevent this from being transmitted in plain text.
Well, I know how not to transmit it in plain text - use any type...
|
by: Pseudonyme |
last post by:
A Paris
Le 14 Nv MMVII
Dear Madam and Sir,
Do you know how to access a MYSQL DB from an external server ?
We read the information and studied :
|
by: cubangeek |
last post by:
I have an MSACCESS database that I need to be able to access from our
second business location. There will only be 2-3 users at anytime
using the database.
I am wondering what is the most cost...
|
by: ryjfgjl |
last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: Sonnysonu |
last post by:
This is the data of csv file
1 2 3
1 2 3
1 2 3
1 2 3
2 3
2 3
3
the lengths should be different i have to store the data by column-wise with in the specific length.
suppose the i have to...
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
|