Skip to content
  • 0 Votes
    2 Posts
    0 Views
    D
    Quote: It is front and center for me, making sure we are winning Windows customers through great experiences at the end of the day,” says Davuluri. “We want them to enjoy Windows, we want them to want it. So I hear you on it.” Evidently you don't, as you are failing miserably. The simplest example: telling us to go f ourselves because your OS won't support our older hardware, even though it is perfectly capable of it. And then there's the non-unified UI, harkening all the way back to Win 3.1, if not older... Our Forgotten Astronomy | Object Oriented Programming with C++ | Wordle solver
  • 0 Votes
    1 Posts
    0 Views
    No one has replied
  • 0 Votes
    5 Posts
    0 Views
    K
    Very true. I was just saying that I had little interest in watching the video to see if they were smart enough to do that. Personally, I doubt it, and the results seem to agree with that conclusion. TTFN - Kent
  • Why did I do it? (FOUND IT!!!!)

    The Lounge design com graphics hardware iot
    4
    0 Votes
    4 Posts
    0 Views
    H
    It was a personal project, and I think I wasn't sure enough about it to make a github repo for it yet. It hadn't really matured to that point, or at least that was probably my reasoning at the time. Anyway, I found it after all. :) Check out my IoT graphics library here: https://honeythecodewitch.com/gfx And my IoT UI/User Experience library here: https://honeythecodewitch.com/uix
  • Foolish me!

    The Lounge visual-studio python sysadmin hardware json
    12
    0 Votes
    12 Posts
    0 Views
    D
    I've been avoiding Windows client OSes (11/10/8.x/7/go back as far as you want) and stick with Windows Server just for that purpose. After all, a server OS should never reboot on its own, no matter the circumstances. Well, Microsoft has proven me wrong on more than one occasion. I've posted about it here in the lounge. Then some people had the audacity of blaming me for giving the okay to install updates but then let it wait for my approval for the actual reboot. I've always done this in prior decades. At some point that behavior, even on server OSes, has changed.
  • And another

    Spam and Abuse Watch com hardware tools question
    1
    0 Votes
    1 Posts
    0 Views
    No one has replied
  • Well that was satisfying.

    The Lounge json design hardware html com
    16
    0 Votes
    16 Posts
    0 Views
    P
    honey the codewitch wrote: parses the number into a double and a long long Because I'm loading to SQL Server, I let the server do that as appropriate. I just send XML and extract individual values via XPath and squirt them into columns.
  • 0 Votes
    10 Posts
    0 Views
    O
    Sorry, but as long as physical theft occurs, even desktop computers are at risk. Most people would be flabbergasted at how much of their financial information is sitting in "unused" parts of their hard drives. Encryption at rest is the best defense for a stolen hard drive, whether it be stolen as part of a computer or snared via dumpster diving. Here's two links showing that encrypting all hard drives is critical. https://www.techradar.com/news/millions-of-deleted-files-recovered-in-hard-drives-purchased-online-finds-research https://insideevs.com/news/419525/tesla-data-leak-personal-info-ebay/
  • Code Signing Changes

    The Lounge css sysadmin hardware cryptography learning
    10
    0 Votes
    10 Posts
    0 Views
    K
    Awesome!!!..adding this to my notes! Thank You! :) "Go forth into the source" - Neal Morse "Hope is contagious"
  • Do you embed classes within classes?

    The Lounge question c++ delphi hardware
    29
    0 Votes
    29 Posts
    40 Views
    S
    Only if there is a specific reason to do so. One use case is that there are a lot of friends of the main class but I want tighter control over users of the embedded class.
  • 0 Votes
    3 Posts
    0 Views
    J
    Heh or could be re-written considering this bit: "blamed poor optimization from Windows running on Arm" and Benchmarks and ARM
  • 0 Votes
    2 Posts
    0 Views
    N
    A.k.a. a "hello world" of 1 gb system place requirements? M.D.V. ;) If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about? Help me to understand what I'm saying, and I'll explain it better to you Rating helpful answers is nice, but saying thanks can be even nicer.
  • 0 Votes
    3 Posts
    8 Views
    F
    To successfully debug the application remotely, follow these steps: Check Network Connectivity: Ensure both the debugging machine and the target device (such as a Raspberry Pi) are connected to the same network and can communicate with each other. Setup Remote Debugging Environment: Depending on the development environment and tools used, configure the IDE or debugger to enable remote debugging. This typically involves specifying the IP address or hostname of the target device and the port for debugging. Verify Debugging Permissions: Ensure that the debugging user has appropriate permissions to access the target device remotely. This might involve setting up SSH keys or configuring user permissions on the target device. Troubleshoot Connection Issues: If the debugger fails to connect remotely, check for firewall settings, network configurations, and any other potential barriers to communication between the debugging machine and the target device. Test Step-by-Step Execution: Once the debugger successfully connects, test step-by-step execution to ensure that you can pause, resume, and inspect the application's execution remotely. Handle Errors and Exceptions: If you encounter errors or exceptions during remote debugging, diagnose them as you would with local debugging. Pay attention to any differences in behavior between remote and local debugging environments. Optimize Performance: Depending on the network conditions and the complexity of the application, optimize the debugging setup for performance. This might involve adjusting debugger settings or optimizing the application code itself. Document Remote Debugging Procedure: Document the remote debugging procedure for future reference, including any specific configurations or troubleshooting steps required. By following these steps, you should be able to debug the application remotely and efficiently troubleshoot any issues that arise during the debugging process.
  • A new era for mixed reality

    The Insider News com hardware question
    2
    0 Votes
    2 Posts
    0 Views
    N
    No way I am letting something from Zuckeberg get that close to my brain M.D.V. ;) If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about? Help me to understand what I'm saying, and I'll explain it better to you Rating helpful answers is nice, but saying thanks can be even nicer.
  • 0 Votes
    9 Posts
    0 Views
    C
    z8s and z8ks are still flying in the world. I hope the DoD did an end of life buy... Charlie Gilley “They who can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.” BF, 1759 Has never been more appropriate.
  • 0 Votes
    1 Posts
    0 Views
    No one has replied
  • Silly Documentation Question

    The Lounge hardware question
    25
    0 Votes
    25 Posts
    0 Views
    H
    I'm not a fan of it myself, but I had to learn my away around it back when I was a software architect by trade. Check out my IoT graphics library here: https://honeythecodewitch.com/gfx And my IoT UI/User Experience library here: https://honeythecodewitch.com/uix
  • 0 Votes
    28 Posts
    0 Views
    C
    "concluding that a good RAID just isn't available at consumer prices." we ended up removing the raid from the system overall, and this was a pure hi-end industrial unit. Typing this reminds me I need to do backups :) Charlie Gilley “They who can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.” BF, 1759 Has never been more appropriate.
  • OBD ? where to start ?

    The Lounge hardware help tutorial question discussion
    11
    0 Votes
    11 Posts
    0 Views
    J
    IDK... but at some point me personally? I'm probably going to try to figure out a way of totally replacing the starter and any other bits so I don't have any usability thwarting electronics integrated. It's just too much $ for too little. If they wanted $300 for that key like that it would make me want to park in their showroom from high speed.
  • 0 Votes
    4 Posts
    2 Views
    O
    A couple of years ago I purchased a couple of AINOPE USB type A 6-ft extension cables. They were highly rated at the time, and have given reliable service. Your mileage may vary. Odds of success go down as cable length goes up.