|
Version in Bulgarian (and Russian ?) also available on the site: [^].
Book in English (.pdf): [^].
Impressive collaboration for the public's benefit ! Sponsored by Telerik academy.
«A man will be imprisoned in a room with a door that's unlocked and opens inwards ... as long as it does not occur to him to pull rather than push» Wittgenstein
|
|
|
|
|
Countered univoting idjit.
What do you get when you cross a joke with a rhetorical question?
---
The metaphorical solid rear-end expulsions have impacted the metaphorical motorized bladed rotating air movement mechanism.
---
Do questions with multiple question marks annoy you???
|
|
|
|
|
Downvote countered.
"When you don't know what you're doing it's best to do it quickly"- SoMad
|
|
|
|
|
Let's assume I have a simple look-up table with columns 1, 2, and 3. The valid values for column 1 are A and B and the valid values for column 2 are C and D. Let's assume the look-up table looks like this:
Column 1 Column 2 Column 3
A C Look-up table result E
A D Look-up table result E
B C Look-up table result F
B D Look-up table result G
In the table above it is easy to see that if column 1 is A then column 2 is don't care and the top 2 rows could be combined into 1 that says "Don't care" in column 2. Is there a ready-made application available that could do this for me (of course, with bigger and more complex tables)?
|
|
|
|
|
There is an algorithms forum here where this could be posted, or you could ask this question on the C# language forum, or the C# QA Forum.
This is an interesting problem.
«A man will be imprisoned in a room with a door that's unlocked and opens inwards ... as long as it does not occur to him to pull rather than push» Wittgenstein
|
|
|
|
|
This looks like a standard use of an AI technique for building decision trees.
Normally, in an AI context, the data would be noisy, so we would be looking for rules that apply over a certain threshold.
From your description, it sounds like your data will be clean, and your rules perfect.
Look at a tool called WEKA, it can generate these types of rules, or an algorithm called ID3.
|
|
|
|
|
So I had a look at some tutorials on WEKA and it seems it can take my data in table format and create a decision tree out of it. But is it possible to get a reduced table (with don't cares inserted where applicable) from the decision tree? I want the end result to be a condensed table, not a decision tree.
|
|
|
|
|
Run-time or compile-time? If compile-time, gperf (GNU perfect hash) could probably help.
|
|
|
|
|
Api Monitor[^]
API Monitor is a software that monitors and displays API calls made by applications and services.
|
|
|
|
|
+5 This is free, looks interesting. Down-vote of #2 countered.
«A man will be imprisoned in a room with a door that's unlocked and opens inwards ... as long as it does not occur to him to pull rather than push» Wittgenstein
|
|
|
|
|
|
Link broken.
«A man will be imprisoned in a room with a door that's unlocked and opens inwards ... as long as it does not occur to him to pull rather than push» Wittgenstein
|
|
|
|
|
|
Does anyone work with HTML Tree Grid?
http://www.htmltreegrid.com/Home/Demo[^]
I am having an issue with that, my situation is i need to bind an HTML table as a data source to the HTML Tree Grid.
So much complexity in software comes from trying to make one thing do two things.
Sibeesh
modified 10-Nov-14 10:39am.
|
|
|
|
|
That is a commercial software tool; this is a forum for "Free Tools."
« I am putting myself to the fullest possible use which is all, I think, that any conscious entity can ever hope to do » HAL (Heuristically programmed ALgorithmic computer) in "2001, A Space Odyssey"
|
|
|
|
|
ok sorry.
So much complexity in software comes from trying to make one thing do two things.
Sibeesh
|
|
|
|
|
Is is possible to delete this thread?
So much complexity in software comes from trying to make one thing do two things.
Sibeesh
|
|
|
|
|
USBDeview[^]
USBDeview is a small utility that lists all USB devices that currently connected to your computer, as well as all USB devices that you previously used.
For each USB device, extended information is displayed: Device name/description, device type, serial number (for mass storage devices), the date/time that device was added, VendorID, ProductID, and more...
USBDeview also allows you to uninstall USB devices that you previously used, disconnect USB devices that are currently connected to your computer, as well as to disable and enable USB devices.
You can also use USBDeview on a remote computer, as long as you login to that computer with admin user.
New version: WinHeist Version 2.1.0 Beta
Have you ever just looked at someone and knew the wheel was turning but the hamster was dead?
Trying to understand the behavior of some people is like trying to smell the color 9.
I'm not crazy, my reality is just different than yours!
Not my circus not my monkey's!
|
|
|
|
|
|
If you are looking for a free .NET based, open-source bugtracking system then look no further than BugTracker.NET[^]
It is free, you get the full source-code, there is an active community that can help with your questions should you need help (including the author Corey Trager).
It has seamless integration with many version control systems inc. Mercurial and Subversion, giving you the ability to check the changes made against a defect.
The Subversion integration is a Python script. If you would rather use something written in .NET then I developed my own which I have uploaded onto Github[^]
It can also be themed and styled with your corporate branding. I use this and can highly recommend it
|
|
|
|
|
We used this for ages and as a simple tool is was a fine, if basic, tool.
cheers
Chris Maunder
|
|
|
|
|
|
Richard Deeming wrote: The mention of SQL Injection vulnerabilities in part 2 was enough to put me off.
Because you wanted to expose your bug tracking tool directly to the internet?
|
|
|
|
|
Would you implicitly trust all of your employees to have complete control of the bug database?
"These people looked deep within my soul and assigned me a number based on the order in which I joined."
- Homer
|
|
|
|
|
In terms of SQL injection attacks???
Then yes. In the last two companies I was the only one with enough SQL experience to do anything real in a SQL database. In the company before that there were probably between 2 and 10 developers with that sort of experience but I would not really expect them to spend their time figuring out how to attack the bug database (that company had very serious big money attack targets.)
|
|
|
|