On 4/26/07, Oded Arbel [EMAIL PROTECTED] wrote:
I'm not familiar with typo2.
I wouldn't touch typo3 with a laser guided radioactive stick.
Very poorly written php, impossible to install. No documentation.
--
Oded
=
To
On Tue, Mar 20, 2007 at 11:35:35PM +0200, Dmitry Sherman wrote:
New Israeli Debian mirror: archive CD images
Thanks a lot!
http://www.debian.co.il/debian - Archive
http://www.debian.co.il/debian-cd CD-IMAGES
Make sure you publish it in the Debian's mirror list, with
all the crypto
On 26/04/07, Danny Lieberman [EMAIL PROTECTED] wrote:
Gil
You must be kidding. Why in the world would you want a local ISP
Run (do not walk) to Google Applications at www.google.com/a
You have your own email, calendar and web site for free up to 50 users.
I am running two businesses
with
Hi all,
Sorry for being somewhat off-topic.
I am looking, for my workplace, for a company that can come to a lecture
arranged by us, with a presentation pre-prepared by the lecturer and
with his cooperation, video it, and produce content for a web site that
will have both, with some kind of
Problem:
I wish to hack and solve Bidirectionality related bugs in Lyx.
However, I don't want to read all and understand all the code in Lyx,
but only the code related to cursor movement, character insertion,
etc.
How can I find the relevant pieces of code quickly?
Suggested Solution:
Run Lyx
Hi Elazar,
Put some fprintfs into the code, start with main().
Save the output to a file.
This is a quick way to circumvent all the gdb hassle.
This requires some code understanding.
Example:
== ce.h
#include cstdio
static char *cefilename = ce.txt;
#define
Hi Elazar,
Using the cpp macro that I have mentioned in my previous post
eliminates the need to recompile all the LyX source files
with debug information. No more g++ -g !
Elazar Leibovich wrote:
Problem:
I wish to hack and solve Bidirectionality related bugs in Lyx.
However, I don't want to
Amos
Separate paranoia from privacy.
While I am skeptical that Google can afford to make use of privacy
information or allow it to leak
- if I were working on a startup that threatens search engines - I might
also setup a private email system somewhere.
FWIW - it is standard operating procedure
On Wed, 25 Apr 2007 16:09:44 +0300
Uri Even-Chen [EMAIL PROTECTED] wrote:
On 4/25/07, Shachar Shemesh [EMAIL PROTECTED] wrote:
Completeness and Consistency relate to the relationship between the
provability of an expression (syntax) and it's core truthfulness
(semantics, or meaning). Since
* Elazar Leibovich [EMAIL PROTECTED] [070426 16:24]:
Problem:
I wish to hack and solve Bidirectionality related bugs in Lyx.
However, I don't want to read all and understand all the code in Lyx,
but only the code related to cursor movement, character insertion,
etc.
How can I find the
Danny Lieberman wrote:
FWIW - it is standard operating procedure these days for a customer to
insist you use their corporate email.
I have a contract with a US corp. and they insist we use their
corporate (hosted Exchange) email system
It helps them monitor outgoing content for data leakage.
On Wed, 25 Apr 2007 16:27:23 +0300
Uri Even-Chen [EMAIL PROTECTED] wrote:
By the way, it's very easy to prove that for any specific decision
problem, *there is* an algorithm who returns a correct answer in O(1).
Consider these two algorithms: always return 0 and always return
1. At least
On 27/04/07, Danny Lieberman [EMAIL PROTECTED] wrote:
Amos
Separate paranoia from privacy.
While I am skeptical that Google can afford to make use of privacy
information or allow it to leak
- if I were working on a startup that threatens search engines - I might
also setup a private email
13 matches
Mail list logo