Sebastian Krebs wrote:
Didn't you say you use the builtin packages from suse? I guess they are _not_
the latest :X
I'm trying to establish if this is actually correct, and that PEAR has
never been brought up to date, or I'm still hitting a pre E_STRICT
version.
As mentioned: That depends on t
Am 24.07.2012 22:41, schrieb Lester Caine:
Sebastian Krebs wrote:
The question is - Is the result E_STRICT safe?
Would say: Depends on the package you use. I don't use PEAR-packages
myself,
thus I don't really know. I would say: Try it out :) Test it on your
dev-machine, or within a vm and no
Sebastian Krebs wrote:
The question is - Is the result E_STRICT safe?
Would say: Depends on the package you use. I don't use PEAR-packages myself,
thus I don't really know. I would say: Try it out :) Test it on your
dev-machine, or within a vm and nothing can break.
Sebastian I'm asking beca
Am 24.07.2012 18:46, schrieb Lester Caine:
Sebastian Krebs wrote:
Hi,
I'm using Ubuntu, but here you can update the "system packages" with
the pear
executable too
$ sudo pear update-channels && sudo pear upgrade --alldeps
The question is - Is the result E_STRICT safe?
Would say: Depends on
Sebastian Krebs wrote:
Hi,
I'm using Ubuntu, but here you can update the "system packages" with the pear
executable too
$ sudo pear update-channels && sudo pear upgrade --alldeps
The question is - Is the result E_STRICT safe?
I've got what I think is the latest from SUSE12.1 but with PHP5.4 I
Hi,
I'm using Ubuntu, but here you can update the "system packages" with the
pear executable too
$ sudo pear update-channels && sudo pear upgrade --alldeps
Regards,
Sebastian
Am 24.07.2012 17:05, schrieb Lester Caine:
Not sure the best place to ask this ...
I've worked through all of my ow
6 matches
Mail list logo