Tom Buskey writes:
There was a neat article in Linux Journal (?) that compared
compression/decompression time, bandwidth, data compressibility and cpu
speed.
Thank you very much for the very interesting article.
Back when I was playing around with the HPN SSH, I was sort-of
guessing that
Mark Komarinski writes:
HPN SSH (patches to boost ssh performance) allows for no encryption
of the data stream but IIRC the authentication is encrypted. That
doesn't bypass authentication so this may not be related
The following statement is based on my experience with these patches:
I
Joshua Judson Rosen writes:
Michael ODonnell writes:
I don't know what your situation is but if there's a managed
switch involved I believe that some of them can be rigged to
echo traffic to one or more specified ports for analysis/debug.
Mm. Good point. I don't think I have any
Ed lawson writes:
I'm sure someone in the group has a real world answer to this
question. My local school is seeking to have Wi-Fi in every classroom
with each classroom having up to 30 devices using the network
simultaneously. I questioned this and was told the appropriate
commercial
Curt Howland writes:
I have a background process running from which I would like, from time
to time, to check the console output. I do not want to dedicate a
console window to it, and since I start it from a script the console
output is usually just lost to the akashic ethers.
[...]
Lloyd Kvam writes:
* Public Key Encryption
I took a class at UNH when I was a high-school senior (wooly mammoths
were still wandering around campus back then...). It was a class with a
topic of number theory. I liked all of the math proofs in the class
-- very cool stuff. I really
maddog wrote:
The class should always start with this is why you use this and why
you will want to know it.
I do think that you're right about this.
However, (1) the class was free (no cost to me) and (2) at the time I
was just some guy who didn't know anything about anything [1].
I can't
Joshua Judson Rosen writes:
Not that I'm objecting, but more for my own edification: are there
actually systems out there that don't set the sticky bit on /tmp?
That just seems... insane
I can't recall a standard, multi-user Unix-flavored system on which
/tmp didn't have the sticky-bit
Bill Freeman writes:
I'm trying to figure out whether to force the removal of an almost
certainly stale pid file or not in the service start case.
I'm not specifically answering your question here, but, here is some
code that I believe to be reasonable and related to the problem you
appear to
David Rysdam writes:
There used to be a site out there that was like geektours.com or
engineeringvacations.com or something like that. It had computer
history and science museums, civil engineering projects, factory tours
and all kinds of great stuff listed on it. Does anyone else remember
David Tina Ohlemacher writes:
The Dell one comes with onsite service and individual toner carts. Looks
good... Until I looked for a PPD. Yes the generic PPD will likely work to
print, but the right PPD will make it work much better (toner levels,
color, meaningful errors, scanning I
Bill Freeman writes:
Scenario,
Apache or nginx is serving a file, in response to an AJAX request, because
serving static files is fast. The file contains data to be displayed on a
web page (via jQueryUI bar graphs, among, if that's of interest).
While I might come up with a scheme for
Lloyd Kvam writes:
Should I simply disable IPMI or is it likely to be useful even in my
circumstances?
Do you have any need to manage your server remotely using the
functionality that IPMI provides? How easy is it for you to
physically access your server?
I've been giving IPMI some
Matt Minuti writes:
I believe UNH's CS department was quite linux-centric. The first
programming course for engineers was C++ using GCC and VI, and required
ssh'ing into a server to submit work. That's about all I can speak to,
though.
That said, I think they've switched over to Java for
Ken D'Ambrosio writes:
Per-process I/O accounting. Every now and then, I see a system load
spike through the roof -- but disk I/O is okay, likewise CPU. Which
really pretty much leaves network. But I'm unaware of any tool that
spits out per-process network utilization statistics. One
Can you send us the kernel .config that goes along with the kernel
that you are running on your target machine?
Regards,
--kevin
--
alumni.unh.edu!kdc / http://kdc-blog.blogspot.com/
GnuPG: D87F DAD6 0291 289C EB1E 781C 9BF8 A7D8 B280 F24E
And the Army Ants, they leave nothin' but the
Bruce Dawson writes:
Does anyone have any experience with this system call?
Can you give us some code with your exact setup for
sched_setscheduler()?
Using this call requires a bit of setup ; there are a quite a few
things that could go wrong or not be setup correctly, etc. Being able
to
Strange. I made a few minor changes (see attached patch)
and when I run your code on my test machine running Linux kernel
2.6.35 I get the following output:
$ sudo ./latencytest
./latencytest starting...
My original scheduling policy is SCHED_OTHER (0)
The original minimum scheduling
michael miller writes:
I was happy with ubuntu 10.04, but built a new computer (intel i5, msi
mb) and was having trouble finding drivers for some of the hardware so I
upgraded to 12.04. Everything works fine, except that frequently it
boots to a command line instead of the gui. One to three
Ben Scott writes:
On Tue, Oct 23, 2012 at 10:54 AM, Kevin D. Clark wrote:
4: what happens when you type telinit 5?
FYI, Debian and (IIRC) Ubuntu don't use runlevel 5 normally. They
normally boot to runlevel 2, and use a service to start/stop an X
display manager. So, I think
I've thought about this problem during my commute for a week now, and
I haven't been able to come up with a simple solution that satisfies
the constraints.
I think that a lot of effort could be put into solving this problem
with these constraints...or...the problem could be solved simply with
a
Bill Freeman writes:
Can anyone offer personal experience stories on the Dell Inspirons?
I've got a Dell Inspirion 1525 that I paid $400 for at the Dell
refurbished outlet (online). The machine is 3-4 years old at this
point. I use it for a couple of hours most days.
It's a $400 laptop. It
Susan Cragin writes:
New problem: What's the best way to learn lisp? Anyone have a
favorite book or on-line site?
I always thought that _The Little Lisper_ was pretty good.
Unfortunately, this book is out of print. However, it has been
replaced with a Scheme variant, and this might not be a
Susan Cragin writes:
Does anyone know how to enable at-spi2 support in emacs?
Obviously, I think that you are smart enough to find atspi.el here:
http://delysid.org/atspi.el
...and of course the comments in the elisp code list some
dependencies.
After you'll pulled down everything and
Jerry Feldman writes:
I agree. I don't think my Apple ][ floppies were partitioned. Back in
the day there were a plethora of floppies. You had 8 in., 5 in. There
were a number of Word Processors in the 70s that used floppies. The PC
changed the landscape for both floppies and HDs, and also
M D L writes:
Attempting to update Fedora 15 I've been having errors:
ERROR with rpm_check_debug vs depsolve:
libibus-1.0.so.0()(64bit) is needed by eekboard-1.0.5-1.fc15.x86_64
libibus-1.0.so.0()(64bit) is needed by ibus-hangul-1.4.0-1.fc15.x86_64
Please report this error in
My solution was to flip gnome 3 the bird and switch to XFCE.
Me, too - I switched to the XFCE-based Xubuntu.
I couldn't figure out Gnome3 when I upgraded to Fedora 16. It just
threw me for a loop. I tried out LXDE and then I found that XFCE
suited me better.
YMMV.
--kevin
--
Joshua Judson Rosen writes:
It's funny what non-hackers notice and appreciate :)
The feature that I *cannot* live without is virtual desktops. I
prefer to have 16 or 25 of them, in a 4x4 or 5x5 format. I logically
separate my work onto these desktops, and I navigate between these
with my
Joshua Judson Rosen writes:
This has always been one of my favourite things about the unix world--
and, to some extent, computing in general: that the founders are
still around, and many of them even *respond to e-mail*.
The analogies for other domains are things like `exchanging
post-cards
We have lost a giant in our industry -- truly a great man.
He will be missed.
--kevin
--
Believe me on this. The free cocaine was nowhere in
evidence, I consumed no cigar-sized hash bombers, the
insistent, complaisant lovelies were elsewhere by the time
I got back from dinner. Indeed, the
Michael ODonnell writes:
It seems likely that there is (possibly substantial!) value to
a recruiter in being able to see my connections, but is there
value (or harm) to me?
There is a setting in LinkedIn called Select who can see your
connections. One of the reasons why I have set this to
http://broadcast.oreilly.com/2011/06/helios-project-director-felled.html
___
gnhlug-discuss mailing list
gnhlug-discuss@mail.gnhlug.org
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss/
Drew Van Zandt writes:
/etc/rc2.d/S40init_xuarts start
root 498 0.0 0.8 2808 504 ttyS0S+ 00:00 0:00 \_
/bin/sh /etc/rc2.d/S40init_xuarts start
root 500 0.1 0.9 1676 576 ttyS0S+ 00:00 0:00 \_
sed s/ttyname=//
.
# Barcode
ln -s -f
Ryan Lee Stanyan writes:
I barely trust people to drive in two dimensions, let alone three!
My commute takes me a little while, so I have to drive in four.
A physicist that I listened to one even speculated that it was even
more complicated than this, but my car does not look like a police
Dan Coutu writes:
My local high school's tech center is looking for learning materials
(e.g. books) that will help students to understand the basics of how to
use MySQL. Ideally some discussion of database normalization and how to
design a database schema for an application would also be
Lloyd Kvam writes:
I do agree with his basic point. Use the system tools to glue your
processing into a series of simple steps.
Shell scripts are very powerful. I don't take anybody seriously who
thinks otherwise.
I wrote a shell script once that automated an extremely tedious (took
Greg Rundlett writes:
I have a strange problem where one (and only one as far as we know)
particular website becomes inaccessible to our office.
So, you are telling us that the site becomes inaccessible in the
sense that it seems to fall out of the DNS?
Any ideas on what could cause this
Suggestion: suppose you have setup your system with a uid that is
protected by some iptables rules (call this UNTRUSTED), and futhermore
also suppose that the binary that you really want to protect against
is called DOCREADER.
Well, then, you might want to consider replacing every occurence of
Benjamin Scott writes:
On Tue, Aug 17, 2010 at 8:43 AM, Kevin D. Clark
Well, then, you might want to consider replacing every occurence of
the DOCREADER binary on your system's disk with a script that
basically does this:
#!/bin/sh
exec sudo -u UNTRUSTED DOCREADER-original
Michael ODonnell writes:
I'm now working with a cantankerous old app that can't easily be
modified and it'd be handy to have multiple sequential invocations of
that app each spew some logging data into a FIFO (without blocking)
so it could be processed by a single persistent instance of a
Ted Roche writes:
Oh, a reminder: a fellow GNHLUGer told a tale not too long ago about
testing ssh changes: always keep an exiting connection open when
you're making changes. This way, when you lock yourself out of making
new connections with the changes, you can use your old connection to
Gerry Hull writes:
What are your thoughts/recommendations?
Fedora 12 (x86_64) works fine for me on both a laptop and a desktop.
I installed Sun's Java, the flash plugin (although I don't usually let
that run) and VirtualBox (I have to virtualize some 64-bit OS's).
Everything works pretty well
How are you invoking Valgrind? Where is the Valgrind output for the
9x9 run?
--kevin
--
alumni.unh.edu!kdc / http://kdc-blog.blogspot.com/
GnuPG: D87F DAD6 0291 289C EB1E 781C 9BF8 A7D8 B280 F24E
Wipe him down with gasoline 'til his arms are hard and mean
From now on boys this iron boat's
Bruce Labitt writes:
If anyone has a few spare moments, I'd appreciate a quick look and any
helpful comments you may have. FWIW, I used valgrind and saw that even
when I got the correct answer, there were tons of warnings and errors
reported. (These errors were DEEP inside of the
[please don't top-post]
Bruce Labitt writes:
Is there an equivalent tool for the stack?
I don't know of a reliable one.
--kevin
--
alumni.unh.edu!kdc / http://kdc-blog.blogspot.com/
GnuPG: D87F DAD6 0291 289C EB1E 781C 9BF8 A7D8 B280 F24E
Wipe him down with gasoline 'til his arms are
Jerry Feldman writes:
On 05/19/2010 03:22 PM, Bruce Labitt wrote:
Is there an equivalent tool for the stack?
Purify. Purify is a commercial product (expensive too) that instruments
every load and store operation whether that be on the heap or the stack.
While valgrind is a great tool,
Jerry Feldman writes:
Several years ago, someone at a BLU meeting mentioned he was having a
problem with some code in a phone switch, and his company and Verizon
were pointing fingers, especially because a previous problem was theirs.
He tried a number of different solutions, and after
Benjamin Scott writes:
Kevin's wget-based implementation worked (thanks again, Kevin!), but
was slow due to repeated invocations of wget.
Yeah, the big design principal behind my implementation was that I was
trying to get it done in less than ~30 minutes...before I had to get
going home.
B280 F24E
Wipe him down with gasoline 'til his arms are hard and mean
From now on boys this iron boat's your home
So heave away, boys.
-- Tom Waits
#!/usr/bin/perl
# author: kevin d. clark (alumni.unh.edu!kdc)
use warnings;
use strict;
use Getopt::Long;
use IO::File;
# given a ftp
I wrote:
[attached] gives a big skeleton of what you are looking for. The code
itself could definitely be improved.
Oh yeah, invoke it thusly:
remote-du --url 'ftp://ftp.gnu.org/pub/old-gnu/Manuals/bfd-2.9.1/'
--kevin
--
alumni.unh.edu!kdc / http://kdc-blog.blogspot.com/
GnuPG: D87F
Joshua Judson Rosen writes:
(we're a Debian household)
I found this phrase to be entertaining...it just rolled off Joshua's
tongue with the same ease that somebody might say:
we're a vegetarian household
we're a kosher household
we have cats in our household
we watch the Boston Bruins in
Benjamin Scott writes:
Stumbled across this today, seemed to be rather more useful than
most of the content-free hype I got when I tried looking up what
NoSQL meant.
http://blog.nahurst.com/visual-guide-to-nosql-systems
This is a very interesting link!
I mean, I thought key-value went
Tom Buskey writes:
Because we can't keep track of 100 systems what they do in our head. But
using a naming scheme means you can script it. We don't really care about
the names otherwise. Oh, and only one name because if there's another name,
we'll get a ticket to fix it by the name we
Tom Buskey writes:
On Thu, Apr 8, 2010 at 10:42 AM, Kevin D. Clark wrote:
The problem that I had was that I frequently had to deal with the
situation of this particular problem only really efficiently runs on
1, 4, or 16 nodes in the cluster or this problem only really
efficiently runs
Mark Komarinski writes:
Maybe I'm not understanding the issue, but isn't the above why queuing
systems were made? We're using a dirt-old version of Platform LSF and
it already solves the 'running on heterogeneous systems distributed
across an arbitrary number of nodes' problem. While
Benjamin Scott writes:
On Mon, Apr 5, 2010 at 9:15 AM, Kevin D. Clark wrote:
Is there anything like a diff utility for pcap captures?
I'm still giving some thought into how I'd actually do this in general.
Hmmm.
The application I was thinking of was taking captures at various
Benjamin Scott writes:
On Sat, Apr 3, 2010 at 5:19 PM, Kevin D. Clark
One thing that I've done to help me understand what is going on is to
rigorously go through each packet (sent and received) and verify that
what got sent is the same as what got received ...
Wireshark's ability
Joshua Judson Rosen writes:
Well, there's an alternative to wide-screen monitors allowing for
wider windows: wide-screen monitors allowing for *more numerous*
80-column windows. :)
Me too.
Speaking for myself, as a programmer, if I am given a wide-screened
monitor to work on, I use the extra
Jerry Feldman writes:
I usually set emacs up to close to full screen, with many more than 25
lines. I certainly like to see entire blocks of code. I still like to
keep individual lines of code and comments to under 80 columns.
Again -- me too!
Regards,
--kevin
--
alumni.unh.edu!kdc /
Michael ODonnell writes:
I'm capturing dumps of Enet traffic on the client and server boxes at
a remote customer site thus:
dumpcap -i eth0 -w /tmp/`hostname`.pcap
...and then copying them back to HQ where I feed them to Wireshark.
I am not (yet?) rigged up so I can sniff traffic
Bill McGonigle writes:
2a) possibly run ssh with the null cipher, so you just get session
setup. Then you're only talking about stream
encapsulation/multiplexing time as a resource drag, and that can be
incredibly efficient code (OS's do this all day long, layer upon
layer).
This is not
Bill McGonigle b...@bfccomputing.com writes:
On 03/23/2010 06:13 PM, Kevin D. Clark wrote:
This is not possible with any SSH implementation that I am familiar
with.
Ah, found it:
http://www.psc.edu/networking/projects/hpn-ssh/
Oh, that. Yes, now I remember that. I experimented
Greg writes:
I have a problem and not sure the best approach to isolate and resolve
it. My home network seems to have momentary (1-15 seconds) lapses in
response time or connectivity. The network setup is pretty standard.
Broadband connection, Linksys router running Tomato, a couple of
Drew Van Zandt writes:
code-editing screen, here I come!
(late response due to no power)
Hurray! Another person who understands that all of these wide-screen
monitors aren't entirely optimal for programmingunless you rotate
them, of course
Regards,
--kevin
--
alumni.unh.edu!kdc
Drew Van Zandt drew.vanza...@gmail.com writes:
My first thought on seeing them was Oh good, rotate them and they're
perfect.
Now the question is this:
Do I want a 1680x1050 rotated to 1050x1680, or a 1600x1200 rotated to
1200x1600? That's close enough on height that the increased total
Lori Nagel writes:
1) User interfaces tend to be poor and over compilcated, with a
bunch of skills and stats taking up the whole screen in a way you
can't close as opposed to the whole screen being immersed in the
game.
This is a valid complaint. The reason for this is probably because
Jake Tingley writes:
My name is Jake and I live in Warner. I am a high school math
teacher in Lebanon and I am interested in working with Linux and
doing some programming.
What is the best way to get started?
Is there a particular distribution I should be looking at?
What is a good first
Joshua Judson Rosen writes:
I guess this means that I have to figure out a different reason to
curmudge on microblogging as a whole, now Thanks a lot, Arc... ;)
{curmudgeon-mode=on}
You could start by pointing out that the body of Arc's email took up
at least 383 characters... (-:
Arc Riley writes:
@Kevin ah but this is email, not microblogging
Yes, I know.
Kind regards,
--kevin
--
alumni.unh.edu!kdcGod, I loved that Pontiac.
http://kdc-blog.blogspot.com/ -- Tom Waits
GnuPG: D87F DAD6 0291 289C EB1E 781C 9BF8 A7D8 B280 F24E
Paul Lussier writes:
Openfire docs don't seem to have a lot of information on performance
tuning, does anyone here have any experience with tuning this thing for
use in large environments with lots of users ?
I don't have too many helpful things to say here except:
1: It sounds like you're
Ben Scott writes:
While still true, there are cases where it's less cut-and-dry: In
other protocols, I've seen clients do the equivalent of repeated
malloc without free. Of course, the server should place limits on
resources a client can allocate, but some people consider that kind of
Bill McGonigle writes:
On 12/28/2009 04:22 PM, Kevin D. Clark wrote:
In fact, my relative is interested in just
retrieving a few files from this machine.
Assuming you haven't found the rare part yet ... if you're going
inside anyway, just pull the drive and hook it up to a USB dongle
I have a relative who has a Power Mac G4 Cube, like this:
http://en.wikipedia.org/wiki/Power_Mac_G4_Cube
My relative suspects that the power supply might be br0ken.
The power supply looks like this:
Tom Buskey writes:
The DOS version of Kermit is still out there at Columbia. C-Kermit
is also there for Unix. It's an excellent VT100 emulator as well if
you want to turn a PC into a VT100 terminal.
The syntax is more VMS like, but once you learn it, it works well.
This reminds me of an
Michael ODonnell writes:
I'm looking at some supposedly identical CentOS5.3 systems that are
behaving strangely and while grasping at straws I generated lists of
the MD5 sums of all the files on the root partitions and I'm seeing
differences in the on-disk images of things like /sbin/mount
Ken D'Ambrosio writes:
Hey, all. I ran into an interesting problem that drove me outright
bonkers and thought I'd share the insights for those who might run into
similar issues. Most of my Subversion repositories I just back up via
straight flat file; one, however, being sent off-site,
Ben Scott writes:
On Thu, Oct 29, 2009 at 11:01 PM, Greg Rundlett (freephile)
g...@freephile.com wrote:
So, you've worked out a magnificent one-liner solution to a
interesting and recurring task. How do you 'remember' your solution?
They get saved in a file under $HOME/bin under an
Ed lawson writes:
Of course hindsight is more perceptive than foresight,
(but I am responding to nobody in particular)
Remember, there was even some sentiment on *this very list* that it
would be better if Fairpoint was running all of this rural telco gear.
The fact of the matter is
Ben Scott dragonh...@gmail.com writes:
FWIW, I know rather more than I want to about Active Directory,
Windows systems admin, and Linux/Samba/AD integration, so if there's
anything I can do to help on that front, post and I might be able to.
Thank you for the kind offer. Like I said, I am
Suppose that I know enough about LDAP to be dangerous, but I want to
know more. Suppose I want to more fully understand:
1: the mindset of people who use LDAP for solutions
2: the information schema in Active Directory
3: the information schema in eDirectory
I've observed some very
Mark Komarinski writes:
Kevin D. Clark wrote:
So, my request is this: what resources (books, websites, etc.) do
people recommend to learn more about this subject?
Honestly? Trial and error. [...]
I'm getting this impression as well. At least I am mastering the
error part
Ben Scott writes:
I was tempted to do something goofy, like reverse all the characters
in your text, just to get you going, but I'm too tired to go to the
effort right now. ;-)
perl -0777 -ne 'print join , reverse split //'
Regards,
--kevin (who sends all of his email using technology
Ted Roche writes:
I think I saw this written up in one of ACM's magazines, but those don't
get a lot of traffic. NPR did a story on a group at Stanford doing
computational photography - camera hardware with a Linux backend.
Another interesting thing is CHDK:
Ted Roche writes:
For folks just tuning in, the Canon Hack Development Kit is an add-on to
the firmware for the Canon Powershot series of cameras that offers lots
of extensions to the functionality. Sadly, my Powershot passed away a
while ago, or I'd have fun testing this stuff.
I have
Lori Nagel writes:
It took me half a year just to figure out how to add the math
library into the compiler so I could compile some basic C programs
from one of the C programing books I have.
Sorry, I must politely disagree that a situation like this relates in
any way to any of the negative
For no particular reason, I will mention that I think that this is a
really good document.
http://catb.org/~esr/faqs/smart-questions.html
I hope that others enjoy it as well.
Kind regards,
--kevin
--
GnuPG ID: B280F24EGod, I loved that Pontiac.
alumni.unh.edu!kdc
Lori Nagel writes:
For no particular reason, I will say I do not think very highly of
that document.
Everybody is entitled to their opinion. In fact, I do not agree with
every aspect of that document. But overall I like it.
Kind regards,
--kevin
--
GnuPG ID: B280F24EGod,
Ken D'Ambrosio writes:
He's clearly been a force for good. But there's been an awful lot of
baggage he's dragged around with him, and it seems to seep into most all
his writings to some extent or another.
Ken has expressed here, more elegantly than I could have, my main
objections to this
Greg Rundlett (freephile) writes:
Yes, I can use Meld, but like the song says: lyrics artist=ZZ TopI
want my MTV/lyrics I want my KDiff3
Hmm. I don't know if Meld does what you want here, but I am a big fan
of Meldit's the prettiest diff too I've ever used.
I'm also a big fan of ediff
Bill McGonigle writes:
You can number and name VLAN's. The range is 1-4092, but I read only 64
simultaneous are available.
Yes, this is because each VLAN on the switch is modeled as being its
own seperate instantation of a bridge, and each instance takes up
system resources.
[...]
There's
Arc Riley writes:
The sandisk is a much better deal.
2gigs flash for just $30 *and* has a microSDHC slot. Mounts as a standard
USB drive. Small, bright OLED screen, and you can dual purpose it to play
all your .ogg and .flac files.
downside is voice recording only works to .wav - you
Derek Atkins writes:
Perhaps you need an 'extern C' in there so C++ knows how to call the C
functions?
To cut to the chase, Bruce probably should make sure that all of his C
functions are declared in C-specific header files that have the
following pattern:
#ifndef UTIL_H
#define UTIL_H
bruce.labitt writes:
I've not seen this type of code before. I wonder why all of my
previous code even works. Surely it is a way to do it. Is there a
simpler way? (Not that the above is hard by any means.)
Can you tell us, which books on C and C++ do you have in
your work area right now?
bruce.lab...@autoliv.com writes:
Kevin Clark wrote:
bruce.labitt writes:
I've not seen this type of code before. I wonder why all of my
previous code even works. Surely it is a way to do it. Is there a
simpler way? (Not that the above is hard by any means.)
Can you tell
bruce.lab...@autoliv.com writes:
There are two files that need to be compiled with gcc, and five with g++.
(completely un-tested)
MYFLAGS=-g -Werror -Wall -Wcast-qual
CFLAGS=$(MYFLAGS)
CXXFLAGS=$(MYFLAGS)
# we define _XOPEN_SOURCE because
# we define _GNU_SOURCE because
# modify to
bruce.labitt writes:
Kevin D. Clark wrote on 09/17/2009 12:03:20 PM:
# we define _XOPEN_SOURCE because
# we define _GNU_SOURCE because
# modify to suit to your situation
CPPFLAGS=-D_XOPEN_SOURCE=500 -D_GNU_SOURCE
where are CPPFLAGS used below?
They're not ; my example
Bruce Labitt writes:
Three questions:
1. Is it possible to have a project that some files are compiled with
g++ and others gcc?
Yes. I do this all the time.
2. In the link phase one needs to use g++, correct?
Yes, if you are trying to link together a collection of C and C++
files and
Bruce Labitt writes:
Kevin D. Clark wrote:
2: Typically, binary stuff is sent over the network in network byte
order and network byte order is big-endian. This statement is not
universally agreed to -- in fact I used to work at a shop where they'd
never even considered this problem
Ben Scott writes:
We keep seeing the recommendation to use highly-portable encodings
when possible, e.g., ASCII, or some kind of self-descriptive encoding.
Which I fully agree is a very good idea.
But assume for the sake of discussion we want to keep overhead as
low as possible for
bruce.lab...@autoliv.com writes:
Anyways, the program seems to run out of memory after processing many
blocks. So either there is a memory leak, or something else going on.
Any suggestions?
...
Any good memory tracking tools? I have used valgrind but not gained much
insight. Must be
1 - 100 of 582 matches
Mail list logo