by: Per Magnus L?vold |
last post by:
Hi,
I am working with a simple Java program which communicates over the
serial port with a GSM modem.
Using Hypertermial, I can send messages and need to press control-z to
process the messages....
|
by: Pierre Barbier de Reuille |
last post by:
Ok, I first want to stress that I looked through the newsgroups archives
(on Google) for an answer to my question, but I didn't find it.
It's about the interface of the set classes as defined in...
|
by: perseus |
last post by:
I think that everyone who told me that my question is irrelevant,
in particular Mr. David White,
is being absolutely ridiculous. Obviously, most of you up here
behave like the owners of the C++...
|
by: Just D |
last post by:
All,
What are advantages and disadvantages of these two different approaches?
1 . I create a base class with a few virtual methods, then I derive my
classes from this class, override these...
|
by: Comconix |
last post by:
I have some ideas that I would like to try in eliminating DoS, unwanted SMTP
connections/sessions, etc. to my Exchange server. To do this I need to write
code that examines each SMTP attempt to...
|
by: steve |
last post by:
// What I want to do
Use enumerated types with the Interlocked.Exchange methods
Suggestions please
// My estimation of problem
Seems like Interlocked.Exchange only works with ints,...
|
by: George Durzi |
last post by:
We recently upgraded to Exchange2K3/W2K3 from Exchange2K/W2K, and some of my
c# code that I used to access users' contacts using WebDAV has stopped
working. I'm getting a 401 unauthorized error....
|
by: Tony Wang |
last post by:
I've searched and searched, but I can't seem to find any documentation on how
to hit Exchange 5.5 with VB.NET. I need to simply log into Exchange and
read the appoinments of the user currently...
|
by: Cyberdyne |
last post by:
Hello everybody,
I am looking for the time out policy in exchange server 2003 sp1 when it comes to the web based login as in https://server/exchange/
I want to extend the time of inactive lock...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 3 Apr 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome former...
|
by: ryjfgjl |
last post by:
In our work, we often need to import Excel data into databases (such as MySQL, SQL Server, Oracle) for data analysis and processing. Usually, we use database tools like Navicat or the Excel import...
|
by: taylorcarr |
last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
|
by: Charles Arthur |
last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
|
by: aa123db |
last post by:
Variable and constants
Use var or let for variables and const fror constants.
Var foo ='bar';
Let foo ='bar';const baz ='bar';
Functions
function $name$ ($parameters$) {
}
...
|
by: emmanuelkatto |
last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud.
Please let me know.
Thanks!
Emmanuel
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: Sonnysonu |
last post by:
This is the data of csv file
1 2 3
1 2 3
1 2 3
1 2 3
2 3
2 3
3
the lengths should be different i have to store the data by column-wise with in the specific length.
suppose the i have to...
|