Welcome to Software Development on Codidact!
Will you help us build our independent community of developers helping developers? We're small and trying to grow. We welcome questions about all aspects of software development, from design to code to QA and more. Got questions? Got answers? Got code you'd like someone to review? Please join us.
Activity for EJP
Type | On... | Excerpt | Status | Date |
---|---|---|---|---|
Comment | Post #286003 |
I strongly recommend you don't do this. The LDAP server has to do it all anyway when you register the user after passing your own code, and you can never have a guarantee that your own code exactly matches the LDAP server's tests. And merely passing a syntax check locally still allows plenty of other... (more) |
— | almost 3 years ago |
Comment | Post #284849 |
`char str = "Hello";` should not compile in any C compiler. (more) |
— | about 3 years ago |
Suggested Edit | Post #284243 |
Suggested edit: Lifted the OP's actual questions into the title. Enough guessing already about what he meant. (more) |
declined | about 3 years ago |
Comment | Post #284178 |
'4.3 billion, which is only 43 $M': no, it is $4,300M. Stil not enough for government work ;-) (more) |
— | over 3 years ago |
Comment | Post #281926 |
PHP is so poorly defined that it would be rather difficult to attach much meaning to the concept of 'syntax error', let alone the extended checking that a lint program would be expected to perform.
(more) |
— | over 3 years ago |
Edit | Post #282010 | Initial revision | — | over 3 years ago |
Answer | — |
A: What makes a software module an "authentication" module? The purpose of authentication is to establish the identity of the peer, and the number of ways to do that is infinite. Any software that accomplishes that objective can be categorized as authantication software. Your question is therefore ill-formed. But no competently written piece of software is... (more) |
— | over 3 years ago |
Comment | Post #281385 |
@JohnDoes 'Ill-formed' in that it proposes a test via specific requirements when the number of ways to accomplish the task is infinite and need not include any of those proposed. (more) |
— | over 3 years ago |
Comment | Post #281418 |
You have confused compression in artefacts like JPEG and MPEG, which are both lossy, with data compression in general, which in general isn't lossy. Defragmentation has absoultely nothing to do with any of it. (more) |
— | over 3 years ago |
Comment | Post #281385 |
The purpose of authentication is to establish the identity of the peer, and the number of ways to do that is infinite. Any software that accomplishes that *objective* can be categorized as authantication software. Your question is therefore ill-formed. But no competently written piece of software is ... (more) |
— | over 3 years ago |
Edit | Post #278659 | Post edited | — | about 4 years ago |
Suggested Edit | Post #278659 |
Suggested edit: (void*) has nothing to do with it. A pointer to any type can be null. (more) |
helpful | about 4 years ago |
Comment | Post #278220 |
Design patterns are largely a solution looking for a problem. The original GoF book was worthwhile, *in part,* but the susbsequent attempt to reduce the whole of computer science to design patterns was not. (more) |
— | about 4 years ago |
Comment | Post #277896 |
@jla Actually you are parsing HTML. No other way to do it. (more) |
— | over 4 years ago |
Comment | Post #277537 |
The paragraph starting 'During optimization, a compiler tries to store as many variables as possible inside registers' needs further work. This is entirely untrue of any variable allocated statically, and it is also untrue of any variable that has its address taken, special compiler optimizations apa... (more) |
— | over 4 years ago |
Comment | Post #277896 |
No. HTML is a context-free language, and regular expressions only handle regular languages. You need a parser. Specifically, you need a schema validator.
(more) |
— | over 4 years ago |