I know I can do this if I call a script to check, but I am curious if I can do this with just the cron.
I need to run a job once/year on the first Saturday of July
If that Saturday is July 4th, run it July 5th.
Possible Duplicate:
Is it possible to install Mac OS X on customized hardware?
Well, I don't think its possible - but I'm curious why not - but can someone install Mac OS's on Intel machines? For along time the architecture was different RISC vs x86, but then later they moved to x86, so how difficult is it to install Snow Leopard on a regular Wintel laptop / desktop?
Hi,
I'm just thinking about famous internet services like facebook or twitter manage fast growing databases.
Which could be a solution for this kind of problem?
What about ids ? I read there is a limit in MySQL - 18446744073709551615 - in unsigned bigint... whow would you generate and manage a bigger value ?
Just a theoric problem, but i'm curious about a possible solution.
Thank you!
I'm just curious, how to compress latest (2.6.32 at time of writing) kernel using UPX?
It worked well for older kernels but now repacked with UPX kernel fails to boot, standard compression methods (gzip, bzip2, lzma) work fine though.
I live in the USA, I am curious about plugging in too many computer items into 1 to 2 power plugin outlets.
Most power outlets have 2 plugins, some have 4 and more though. Many people will plug in a power strib/bar into 1 of these outlets so that they can plugin even more items.
So if I have 2 plugins near my computer, would it be bad to plugin...
- My PC
- 3-4 monitors
- Stereo amp for PC sound
- Lamp
- External drives
- other similar items
I live in the USA, I am curious about plugging in too many computer items into 1 to 2 power plugin outlets.
Most power outlets have 2 plugins, some have 4 and more though. Many people will plug in a power strib/bar into 1 of these outlets so that they can plugin even more items.
So if I have 2 plugins near my computer, would it be bad to plugin...
- My PC
- 3-4 monitors
- Stereo amp for PC sound
- Lamp
- External drives
- other similar items
I know there is a system preferences pane to manually modify the file associations in Mac OS X Leopard. However, I'm curious where does Leopard actually store these information?
UPDATE: as I said, I'm not interested in methods to change them. I want to know the configuration file or database (like registry in Windows) where those mappings are stored.
I'm not running into a problem or anything, I was just curious about this when I saw I have 2 folders with around 20,000 items in each. Everything works fine (using Thunderbird), but I couldn't find anything with Google about this. Anyone ever heard of a limit on this with Courier IMAP?
A friend has a site developed in ColdFusion with MySQL and is looking for better cost-effective hosting as the traffic scales up rapidly. Azure comes to mind.
I haven't used Azure myself, however, I believe it is possible to setup and interact with the web-server via RDP into a hosted Virtual Machine?
I am curious if ColdFusion can be installed in the hosted Azure VM. Also, would the site have to be tweaked to run on Azure SQL, or could it continue to use MySQL?
Thanks.
As the title says. I was reading Yet Another Language Geek: Continuation-Passing Style and I was sort of wondering if MapReduce can be categorized as one form of Continuation-Passing Style aka CPS.
I am also wondering how can CPS utilise more than one computer to perform complex computation. Maybe CPS makes it easier to work with Actor model.
I'm just curious if serious changes to the system were necessary to achieve this; after all, it needed my password during the setup. Also, I may use it in some projects if its not too much of a hack.
I asked if , and would like to know how hackers do it when they try to attack government websites and such. They hack pcs making them zombies and them controlling them, using their victim's ip for example? They connect to it using a VPN, what?
(I'm just curious)
Hi,
I wan't to know why would you use the other method to the other. Why use FTP Client if there is Mapping of Drive or vise versa.
Just curious.
thanks!
CentOS 5.x - SendMail
Hi Guys,
I'm curious -- is there any way to customize the STMP error codes, response text, and/or DSN body text in sendmail?
If so, where is this stored?
Thanks,
Mike
I have a database server with many poorly written queries that causes the sql server to spike then drop constantly ( a massive start from scratch is happening). I need to know if the cpu allocation on the vm to expand as needed is best practice for a case like this. I am wondering if the esxi platform cant expand as fast as the spikes happen.
I am curious what is best practice for vm cpu allocation on sql server (with horribly written queries)
Essentially, I'm looking at the .list files in /etc/apt/sources.list.d/. Each of them has a deb entry; I'm curious to know if there's a way to see if any new distribution exists for any of the entries.
Somehow I ended up with a file named "-r". How do I remove it? rm -r doesn't work. I tried 'rm -i `ls -a`' to step through the file names, but it didn't prompt me to delete this one.
Edit A very hacky approach was to use python's os.unlink function. That worked, but I'm curious to hear other ways.
Hi,
Oh RHEL 5.5, there are 31 ACPI PCI hotplug slots by default:
acpiphp: Slot [1] registered
...
acpiphp: Slot [31] registered
Is there a way to increase this number? I haven't been able to find an argument to supply to modprobe, or a sysctl knob to tweak, but I know there must be ways to get more slots based on some Google sleuthing.
(For the curious, this is just preliminary experimentation to see how many virtual disks I can hot-add to a running KVM guest.)
Curious as to solutions to an LCD monitor making a high-pitched whine. The frequency of the whine changes based on refresh rate selections.
Can this be fixed? Time for new hardware? Other alternatives?
I was curious if there was an equivalent technique in Chrome to do address bar param string replacement like you can do in Firefox. If you create a bookmark and put a %s in the bookmark URL/address part, and set a keyword for the bookmark, you can do things like
URL: http://php.net/%s
Keyword: php
Type in browser: php fopen
End up at: http://php.net/fopen
Is this making its way into Chrome or is there a way to do it?
This is not a programming question, but something I was curious for a long time. I am a web developer myself, but do not know the answer to this question. I notice some websites have just http:// in their address, with no www. (eg. http-colon-//delicious) and other websites have www. in their address (eg. http-colon-//www-dot-yahoo-dot-com)
For now it has been around 4 years that I work as developer. Most of my team mates, from their tech-skill, programming ability and code practices view, are somewhere between junior and senior. In all my previous jobs, there was a real geek who was brilliant at coding/analyzing/lead, but the others were just 'average' programmers.
How would you rank your co-workers as good developers from rank 1 (best) - 5 (worst) ?
I am always curious how some of the functions I use in excel were written, and think it would help at times to see how it was done.
Does anyone know where there is example vba that replicates what some of these functions do?
vlookup, hlookup, dsum, index, actually any or most would be interesting.
I want to teach my son to be a strong PC user. I could try to strike out on my own for this, but I was wondering if there is a good online (or book based) course for this.
Like most kids, he's proficient with Google, YouTube, and Minecraft, but he's very curious, and I would like to teach him more. Even some basic excercises, like working with the file system would be good for him (i would need some help to not make it boring).
I'm curious if it is possible to mount a partition encrypted by cryptsetup with LUKS securely and automatically on Ubuntu 10.0.4 LTS.
For example, if I use the key for the encrypted partition, than that key has to be presented on a device that is not encrypted and if someone steals my disk they'll be able to find the key and decrypt the partition.
Is there any safe way to mount an encrypted partition? If not, does anything exist to do what I want?