It's always been this way. History is repeating itself:
Contrary to popular belief, Adolf Hitler, second cousin to Osama Bin
Laden are currently winning their war against freedom.
Bin Laden's stated objective is to disrupt and destroy our Western
culture and the freedoms associated with it. I wo
This is what I wrote for a client. Maybe it will help. It uses a
couple local UV files built from a UNIX command query(s) and if I
recall user profiles using a "charge to". I'd have to pull it apart
to remember the details but maybe there's something in here that might
help.
There was a UV file w
ALGORITHM = "des-ede3-cbc" ;* 168-BIT KEY DES ALGORITHM
ACTION= "2" ;* 2=ENCRYPT
DTA = "WHOMPUM" ;* DATA OR NAME OF FILE CONTAINING DATA
DATALOC = "1" ;* 1=DATA IS STRING 2=DATA IN FILE
KEY = "PASSWORD" ;* ACTUAL KEY OR FILE NAME CONTAINING THE
Pounding the table, "Setup a web interface to UV and go to jail" bit
did sound a little over the top. Glad to hear I can start my new
project with a clear conscience :) Thanks for the info. Someone needs
a new script.
On 4/19/05, HENDERSON MIKE, MR <[EMAIL PROTECTED]> wrote:
> Folks,
>
> I've sta
I'm not shooting the messenger. My apologies. What Microsoft says
about their licensing they can take up with the EU and other criminal
charges they have and will continue to answer too. It's is a separate
issue unrelated to my discussion about IBM and their product. As is
copyright violation, t
"What people are doing is through special programs and queuing where they can
run several users continuously with several background processes that stay
active. This is what IBM has frowned upon."
-
My brain wiring doesn't allow me to separate this scenario from real
life either.
None
I've been watching this thread and not saying anything because my view
is contradictory to what seems to be the majority.
I have 5 people visiting my web site, some are reading the page, some
have left for coffee after loading the page and others are cutting and
pasting from the page. Nevertheles
Results from UP-UX Universe 10.1
01 RUN PT TEST
VAR1 = 0.26983554628015
VAR2 = 0
VAR3 = 0.73016445371985
VAR4 = 1
Program "TEST": Line 19, Argument domain error in arc-cosine, zero returned.
On 4/13/05, Mike Dallaire <[EMAIL PROTECTED]> wrote:
> Adrian,
> ACOS is the inverse value of COS. At any
There is a new function starting in UV 10.0 that I have never used,
ENCRYPT(). The manual reads like bad stereo instructions.
Has anyone used it or is using it? I'm looking for information on practical
uses, code samples, usage examples, etc.
We have a need to encrypt/decrypt certain attributes
Your understanding of the BASIC select is correct. It starts in group one
and works it's way down. In my early years of PICK programming I learned
this the hard way. As this user hasn't yet seen adverse effects is luck vs.
design.
Probably because of the a change to the least significant portion
Mine is bigger. WooHoo!
510 STR1 SIZE = 51000
511 STR1 SIZE = 51100
Available Memory Exceeded
Abort(coredump)
Sorry, it's early on a Monday.
-[d]-
-Original Message-
From: Marco Manyevere [mailto:[EMAIL PROTECTED]
Sent: Monday, November 22, 2004 3:44 AM
To: [EMAIL PROTECTED]
Sub
What ever you do, don't forget to rewind the floppy. Or, was that just a R83
thing. That one issue had my head spinning for 2 days before I figured it
out. A, the early days.
-Original Message-
From: George Smith [mailto:[EMAIL PROTECTED]
Sent: Friday, November 19, 2004 12:26 PM
To: [E
I had this discussion with Ian Sanders and from what I understood, in
current versions of [UV] that the pointer is now maintained in loops. So
that there is no longer speed related advantages (pointer based) using
REMOVE.
FOR I = 1 TO 1
X = ARRAY
NEXT I
Is equivalent to:
FOR I = 1 TO 1000
13 matches
Mail list logo