OpenSUSE :: Drawbacks Of Implementing WebGL In FF4
May 30, 2011
there have been many posts about trying to use FF4 with graphic acceleration and i ran into an article that discusses some of the ramifications in doing so: Context and from the information presented, it appears that mozilla's approach is to blacklist graphic drivers that are not sufficiently "malware-proof" since code from the webpage is presented directly to the graphics driver.
i was not aware of this side issue and figured many others were also uninformed, but my thoughts are that some careful consideration should be done before implementing this new functionality. Perhaps someone more knowledgable could chime in with more concise information.
View 1 Replies
ADVERTISEMENT
Jul 5, 2011
well i thought about trying out the new webgl feature , however i didn't get off to a good start as , all apps that i've seen on the web aren't running ?
complaining about incompatibility , what the heck ?
isn't FF 5.0 supposed to be this new Uber release with the most advanced technologies enabled?
View 14 Replies
View Related
Dec 5, 2015
Here's a report:
name of display: :0.0
display: :0 screen: 0
direct rendering: No (If you want to find out why, try setting LIBGL_DEBUG=verbose)
server glx vendor string: ATI
server glx version string: 1.4
server glx extensions:
GLX_ARB_multisample, GLX_EXT_import_context, GLX_EXT_texture_from_pixmap,
[Code] ......
View 2 Replies
View Related
Mar 5, 2010
i am trying to implement DSR algo by tcl in ns2.but the problem i am facing is that i cannot make out how to circulate the ROUTE-REQUEST & ROUTE-REPLY packet in the established network.
View 2 Replies
View Related
Sep 5, 2010
I have been giving the task of shell scripting in C++ for implementation of Secure command in my shell. The Secure command will prompt for the filename and the password (like *****) and can only be displayed when ls -secure and password is provided. For example
>> LS
File1 File2
>> Secure File1
Password:*****
[code].....
View 1 Replies
View Related
Jun 28, 2011
whether Fedora / Gnome are planning on implementing a 2D version of Gnome 3? (i.e same GUI but without the bling). Like what Ubuntu did with Unity 2D. Unfortunately, my old laptop cannot run Gnome 3 due to the graphics specs and fallback mode doesn't work so I'm stuck with KDE.
View 2 Replies
View Related
Feb 13, 2010
What is a Reverse Proxy? And what is the use of implementing a Reverse Proxy???
View 1 Replies
View Related
Aug 12, 2010
What is a Reverse Proxy? And what is the use of implementing a Reverse Proxy?
View 2 Replies
View Related
Jun 25, 2011
connecct to net with Konqurer.
View 1 Replies
View Related
May 17, 2009
Myself and a friend have our own small IT business; we mainly design and build web sites for other small businesses. One of the things we would like to offer to clients is the ability to relay email addressed to their company's domain to their own personal email address (either web-based, or hosted by their ISP).
Now, clearly there is a risk of our mail relay being marked as "open", and therefore becoming black listed as a source of spam. Not something that we want to happen!setting up such a system? I understand how I would go about configuring an MTA like Postfix or Sendmail to perform such a task, but I'm unsure how I would ensure that relayed mail is delivered and we're not labeled as spammers.
I did wonder if perhaps the "mail forwarding" options in a mail server like Zimbra would get around the issue by forwarding on messages inline or as attachments within new emails (so the messages would appear to be from the account hosted on our server).
View 8 Replies
View Related
Aug 27, 2009
I'm interested in writing a generational garbage collector in C++. This is for a Python-like programming language project. I have used Boehm's garbage collector before, but I'm worried that it will have noticeable pause times (unacceptable for interactive programs). Since I can't really find any other C++ established GCs out there, I have been thinking of simply writing my own.
However, there are two essential ingredients I need for this:
- Some kind of write barrier mechanism that will notify my collector when something is written to a part of the heap
- A way for me to know the addresses and sizes of the stack, heap and global storage (the root sets)
how to implement write barriers (and how to get the stack, heap and global storage information) on the Linux platform? As an alternative, if you know of C++ GCs other than Boehm, I would also be interested.
View 14 Replies
View Related
Oct 17, 2010
I am working on xlib project to develop text editor without using help from any of toolkit/widgets.I get stuck in scrollbar.I have no idea how they work and developed.It become more difficult as I am using low-level C library - xlib.
View 1 Replies
View Related
Sep 8, 2011
I have scoured the internet in search of a way to implement this 301 redirect on Apache2 to no avail. My distro is Debian 5.0 Lenny. I want all request to sepserver.net to be 301 redirected to [URL]. Does anyone know how to do this? I have never done this before so I could really use a detailed explanation of how to implement this type of 301 that will work.
View 2 Replies
View Related
May 20, 2011
is there a way to implement fault tolerance in case of LAN failure on SUSE 10 sp3 i.e. if 1 LAN port fails then the 2nd LAN port should take over ..
View 2 Replies
View Related
Dec 14, 2009
How can I implement logical operators in grep? I checked the man info and couldn't figure it out. For example, I'd like to display lines in file1.txt that contains word1 OR word2.
cat file1.txt | grep word1 OR word2
View 3 Replies
View Related
Oct 14, 2010
steps for implementing vcp protocol in linux kernal module
View 1 Replies
View Related
Mar 31, 2011
Though I have developed some web applications (automation tools) using PHP which have been primarily meant for Intranet (within the organizations I have worked for), I have paid little attention to SEO (it was not required until now). But now I want to understand how do we go about implementing SEO and where do we fit this mechanism in a system / website?
Do we need any other tools or learn some specific programming /scripting language to achieve it?Will implementing a good SEO yield identical results irrespective of what search engine (be it Google or Yahoo!) is being used by users?
View 1 Replies
View Related
Sep 12, 2010
implementing hamming code in c: Calculating the Hamming Code The key to the Hamming Code is the use of extra parity bits to allow the identification of a single error. Create the code word as follows:
Mark all bit positions that are powers of two as parity bits. (positions 1, 2, 4, 8, 16, 32, 64, etc.)
All other bit positions are for the data to be encoded. (positions 3, 5, 6, 7, 9, 10, 11, 12, 13, 14, 15, 17, etc.)
[code]....
View 2 Replies
View Related
May 13, 2011
i am running linux kernel 2.6.32-30 and my aim is to do packet aggregation in linux,so i created a qdisc simple one like sch_fifo.c and i wanted to put upon the dequeue function but when i attach my qdisct with tc qdisc add dev wlan0 root aggregate my screen just go black and in var/log/messages it says 31 m of stolen memory.graphic perfomance may suffer. can you somebody pls help me. Below is my dequeue function.
static struct sk_buff *aggregate_dequeue(struct Qdisc *sch)
{
struct sk_buff *skb;
struct packet_buffer *packet_buffer = {0};
packet_buffer->size=0;
skb = __skb_dequeue(&sch->q);
[Code]...
View 1 Replies
View Related
Sep 29, 2010
I have installed CentOS 5.5 on a computational cluster and want to limit the disk space used per user to 10GB. I do not know what is the relation between blocks and the the volume i want (10GB). What is the values I should used in the file opend by "edquota username" command? What is the usage of inode? there are soft and hard items in columns 3 ,4 and 6,7. Which of them should be configured? here is the example by CentOS documents. I only changed the file system which is in my case /dev/sdb0 (this is mounted as /home in my system. What changes I should do to this example to limit the user to 10GB disk scape?
Disk quotas for user testuser (uid 501):
Filesystem blocks soft hard inodes soft hard
/dev/sdb0 440436 0 0 37418 0 0
View 3 Replies
View Related
Sep 12, 2013
I run Wheezy Xfce 64-bit. I went through the Synaptic listings and added Python 3.3.2 and Tkinter for it, and that works fine; but for some reason PyGtk is available only for Python 2.7, not for Python 3.3, unless I'm just using the wrong way to try to find it. Is there a PyGtk available for Python 3.3 in Wheezy, and, if so, how do I install it and then import it once it's installed?
View 1 Replies
View Related
Nov 15, 2010
Options:A double linked list with fixed size character arrays. New nodes will be added when previous ones get filled. Dynamic arrays using realloc(). Linked list has the disadvantage of not having an O(1) search like an array but I think using realloc() will be more dangerous since it moves the whole block to a new location and if the new location is not big enough to hold the whole block, realloc fails !! this case will not occur with the linked list since its nodes are scattered.
View 14 Replies
View Related
Aug 22, 2010
I need to implement AIDE on my client machines. The builds on these machine are different, so each workstation will have its own specific db generated through running AIDE initially. It is not good practice to just leave the db on the machine, since an "attacker" would be able to view this information. However, at the same time I do not want to pull back over 100 different aide db's to the ftp server and have an update pull each specifically every time I need to run the check. The plan is to leave the db on the client machine, but encrypt it (using public/private keys). I need to be able to encrypt the file on the client machine. I will use a cron on the client to pull an update (from my ftp server) that runs AIDE. This update needs to be able to decrypt the file, use it running AIDE, then re-encrypt the file on the client.
View 1 Replies
View Related
Mar 21, 2011
I seek a GNU Common LISP package which implements forkpty(); openpty() would also be a big plus, and login_tty() would be a luxury I could live with.
View 3 Replies
View Related
Oct 11, 2010
I'm working on a problem in which i have to implement the regular sleeping barber problem with multiple (say n) barbers. The code i'm using is this :
#include<stdio.h>
#include<stdlib.h>
#include<unistd.h>
#include<pthread.h>
#include<errno.h>
#include<sys/ipc.h>
#include<semaphore.h>
[Code]...
how to implement the modification? (there are many more such modifications where i'm stuck , but will ask about those later)
View 6 Replies
View Related
Jul 23, 2009
I've a java program which needs to be executed regardless of whether a user is logged in or not. Currently I've a shell script which executes the java program. I login to the server and run this shell script when the server is rebooted. I would like to start this script automatically preferably as a service so that I can stop and restart this service whenever I update the java program.
View 3 Replies
View Related
Sep 20, 2010
I'm having a hard time googling for answers because I keep using the word "keyword."
I've never really used any kind of database before, but I want to learn the basics, so I'm playing with it a little bit at work. What I want to do is make a database to hold information on various articles. For example, with columns for the title, author, and date. Those are all easy. The tricky part is that I'd also like to be able to label articles with keywords so I can search for certain topics.
Since there's no way to know ahead of time how many keywords, if any, each article might warrant, I'm not sure how to put this in database form. There's no variable-sized array data type. It seems sloppy to just list them all in a single VARCHAR column. Making several columns that may or may not be left null and putting one keyword in each seems wasteful.
View 2 Replies
View Related
Feb 8, 2010
I am new comer in this forum and the beginner on freeBsdI have a problem on how to implement the spam filter program on mail server, the problem is i have no idea on how to implement and test the spam filter program on the mail server and where should i put the program? is it in pop3?
View 3 Replies
View Related
Feb 5, 2010
I need to control matrix 5x4 keypad, on a processor
i am doing by making one row low at a time, and keeping all other rows high,
by scaning coloums, the corresponding key value becomes low.
my problems is that it is taking much time to respond, like to make gpio
low to high and high to low...
View 1 Replies
View Related
Jul 8, 2009
I am working on the beginning of implementing a two-node cluster with shared storage (GFS) and IP address. Both machines are virtual on VMware ESX 3.5, that should not make a difference, but that is the background.current status is that I have a single node cluster built with only the IP address configured within the cluster. The issue that I am having is that I have configured a service to contain only the IP address resource, however, when I go into cluster management that "service" does not register. As such, I cannot bring it online, ping it, etc. below is my cluster.conf configuration:
<?xml version="1.0"?>
<cluster alias="tmbackup" config_version="10" name="tmbackup">
<quorumd device="/dev/sdb1" interval="1" min_score="3" tko="10" votes="3">
[code]....
View 1 Replies
View Related