Are you a programmer? Have you showered recently? You're married.
"J. J. Horner" wrote:
"How do you expect women to know you[']r[e] married if you don't wear the ring?",
[my wife]
asked.
Somebody wrote:
If I'm way off base, please let me know. I'm spending considerable
brain power on this idea and if I'm wasting it, I need to know. I
don't have much spare brain power and I could use it to try to figure
out my wife . . .
You're way off base. Figure out the wife. I've
"Jeffrey W. Baker" wrote:
Machine A is controlling a transaction across Machine X and Machine Y. A
modifies a row in X and adds a row to Y. A commits X, which succeeds. A
commits Y, which fails.
A cannot guarantee a recovery on machine X because there might already be
other transactions
A number of people have been beating around this bush, so why not just mow it down?
A huge win for advocacy would be a small set of complete example applications
targetted at, say, the last two RedHat distros. Each application should install
itself -- .conf files, .htaccess files, dbm's,
You need an Apache book (www.oreilly.com), the Guide
(perl.apache.org/guide), and a Valium, not necessarily in that order ;-)
Jimi Thompson wrote:
I think it's all a hoax
Lorenzo Gordon wrote:
Hello,
I am a software developer for The London School of Hygiene Tropical Medicine, UK.
My query is the following: I have been able to successfully run a Perl script from
MS-DOS that would pull out the necessary info. from an Access database I wrote last
year
Gunther Birznieks wrote:
snip
From: Jan Dubois [EMAIL PROTECTED]
I don't think so. You should never let people execute arbitrary code on
your web server anyways. If you do, then the potential intruder can do
much more nasty things than just snooping around in memory.
-Jan
I think Jan is
Eric Cholet wrote:
Of course the slowest stuff should be optimized first...
Right. Which means the Guide, if it is not already so doing, ought to
rank-order the optimizations in their order of importance, or better, their
relative importance. This one, it appears, should be near the bottom
I've been lurking on this list for a long time, learning tons, implementing some
things on
my own, helping out as I can (which isn't much).
I feel like I know all the frequent posters on the list by now. It's funny how that
happens, but I can recognize each person's "tone," like a familiar
Stas, this thread is very interesting. Guide material?
The troll vanisheth!
- Transcript of session follows -
... while talking to mc5.law5.hotmail.com.:
RCPT To:[EMAIL PROTECTED]
550 Requested action not taken:user account inactive
550 [EMAIL PROTECTED]... User unknown
Stas is right, I've been mass-deleting the "logo" and "demand" threads for
several days, resulting in a quite manageable list. The nice thing is, you
can always search the archive if you accidentally delete something (and you
*should* search the archive before posting, anyway, as well as check
Randal L. Schwartz wrote:
"if (@foo) {...}" is *idiomatic* Perl for "are there any elements in
@foo, and if so, do this". If you don't understand the idioms, please
choose a more familiar language. :)
Don't you think this is a rather nasty response, smiley notwithstanding? Normally I
enjoy
The guide points out that __DATA__ and __END__ tokens are not allowed in Registry
scripts. However, the error generated into the logfile in this case complains
"Missing right bracket", and the line given is the last script line before the
token. Oddly, if one *adds* a (syntactically incorrect)
14 matches
Mail list logo