Search Results

Search found 21331 results on 854 pages for 'require once'.

Page 123/854 | < Previous Page | 119 120 121 122 123 124 125 126 127 128 129 130  | Next Page >

  • Do search engines rank internal redirects negatively?

    - by siverd
    A client is in the late stages (code complete) of a website redesign and unfortunately hasn't implemented 301 redirects to point high traffic pages to the new URL's. As I understand it our only option at this point is to create redirects within the CMS. Our CMS allows us to do this: www.mysite.com/category/current-page.html will redirect to www.mysite.com/new-category-name/new-page.html The site now uses custom logic on our 404 page to check this list of redirects and if one exists forwards the user to the new-page.html I understand that using 301 redirects would be the correct way to maintain our page rank but I think that would require a code change which isn't possible. Question How will search engines respond to this? Will they wait until the redirect happens and allow us to keep our page rank (authority, trust, etc) or will they see the 404 page and down-rank us? Worst case...will they make our new-page.html start from a rank of "0"? Thanks for your help.

    Read the article

  • Scuttlebutt Reconciliation from "Efficient Reconciliation and Flow Control for Anti-Entropy Protocols"

    - by Maus
    This question might be more suited to math.stackexchange.com, but here goes: Their Version Reconciliation takes two parts-- first the exchange of digests, and then an exchange of updates. I'll first paraphrase the paper's description of each step. To exchange digests, two peers send one another a set of pairs-- (peer, max_version) for each peer in the network, and then each one responds with a set of deltas. The deltas look like: (peer, key, value, version), for all tuples for which peer's state maps the key to the given value and version, and the version number is greater than the maximum version number peer has seen. This seems to require that each node remember the state of each other node, and the highest version number and ID each node has seen. Question Why must we iterate through all peers to exchange information between p and q?

    Read the article

  • Speaking at PASS 2012 Summit in Seattle #sqlpass

    - by Marco Russo (SQLBI)
    I will deliver two sessions at the next PASS Summit 2012: one is title Inside DAX Query Plans and the other is Near Real-Time Analytics with xVelocity (without DirectQuery).These will be two sessions that require a lot of preparation and even if I have already much to say, I still have a long work to do this summer in order to go deeper in several details that I want to investigate for completing these sessions.I already look forward to come back in Seattle!In the meantime, you have to study SSAS Tabular and if you want to get a real jumpstart why not attending one of the next SSAS Tabular Workshop Online? We are working on more dates for this fall, but there are a few dates already scheduled.And, last but not least, the early Rough Cuts edition of our upcoming SSAS Tabular book is finally available here (really near to the final print)!

    Read the article

  • Ubuntu 11.10 to 12.04 results in loss of N network capability - how to restore?

    - by user74273
    On Ubuntu 11.10, I had zero issues with N network detection and speed. I cannot remember whether the old driver was iwlagn or iwlwifi. This was with Ubuntu repository Linux kernel 3.0.0-22. Upon upgrading to Ubuntu 12.04, iwlwifi is the available driver and while it detects N networks, upon connection, the speed is cripplingly low and DNS look-ups do not occur (impossible to browse). This is with Ubuntu repository Linux kernel 3.2.0-26. Please note that the 11n_disable flag for the iwlwifi module cannot work for me as I require N network access. Is there another solution? Perhaps, is there a way to easily patch the new kernel with the old wireless module (just copy-and-paste the iwlagn module into the new kernel source and re-compile)? Relevant hardware specs: Dell Inspiron N5110 Network Adapter: Intel® Centrino® Wireless-N 1030

    Read the article

  • Are Intel HD 4000 graphics supported on Ubuntu 10.04 LTS?

    - by user1118764
    I have an intel Core i7-3700 system with Intel HD 4000 integrated graphics with a dual monitor setup (1 connected via VGA, the other via DVI) on Ubuntu 10.04 LTS 64bit. I'm trying to get my monitors correctly detected. Right now, in only 1 unknown monitor is detected with a max resolution of 1280x1024, which is lower than my main monitor connected to DVI. Also, the desktop is mirrored rather than extended. I've previously managed to get a Core i5-2400 system with Intel HD 3000 integrated graphics with the same dual monitor setup and Ubuntu 10.04 LTS 64bit to work using the glasen ppa drivers, but this time, after installing them following the instructions How do I install the Intel HD 3000 video driver? but it doesn't seem to work. Does the Intel HD 4000 require a different driver from the 3000? If so, where can I get it?

    Read the article

  • NHibernate Pitfalls: Private Setter on Id Property

    - by Ricardo Peres
    Having a private setter on an entity’s id property may seem tempting: in most cases, unless you are using id generators assigned or foreign, you never have to set its value directly. However, keep this in mind: If your entity is lazy and you want to prevent people from setting its value, make the setter protected instead of private, because it will need to be accessed from subclasses of your entity (generated by NHibernate); If you use stateless sessions, you can perform some operations which, on regular sessions, require you to load an entity, without doing so, for example: 1: using (IStatelessSession session = factory.OpenStatelessSession()) 2: { 3: //delete without first loading 4: session.Delete(new Customer { Id = 1 }); 5:  6: //insert without first loading 7: session.Insert(new Order { Customer = new Customer { Id = 1 }, Product = new Product { Id = 1 } }); 8:  9: //update without first loading 10: session.Update(new Order{ Id = 1, Product = new Product{ Id = 2 }}) 11: }

    Read the article

  • When should an API favour optimization over readability and ease-of-use?

    - by jmlane
    I am in the process of designing a small library, where one of my design goals is to use as much of the native domain language as possible in the API. While doing so, I've noticed that there are some cases in the API outline where a more intuitive, readable attribute/method call requires some functionally unnecessary encapsulation. Since the final product will not necessarily require high performance, I am unconcerned about making the decision to favour ease-of-use in my current project over the most efficient implementation of the code in question. I know not to assume readability and ease-of-use are paramount in all expected use-cases, such as when performance is required. I would like to know if there are more general reasons that argue for an API design preferring (marginally) more efficient implementations?

    Read the article

  • Java Phones: How to set up JTAPI?

    - by Adam Tannon
    I want to use JTAPI (1.4 - latest) to create an app that will call my phone whenever I need it to. I downloaded JSR043 (JTAPI specification) and have been reading the API docs and it seems pretty straight forward with respect to how to code JTAPI. However I seriously doubt that getting a Java app on my laptop to call my cell phone doesn't require some 3rd party or middle man service provider and possibly other entities/configurations as well. So I ask: besides using the JTAPI in my Java code, what do I need to install or set up to have a Java app that calls my phone? Thanks in advance!

    Read the article

  • collapsible grid in Silverlight 4

    - by prince23
    hi, I want to create a collapsible grid in Silverlight 4. once user clicks on row of the datagrid if that row has any child row it should be shown. if again user clicks the same row should hide the child row what was shown eariler. right now i am able to show data in datagrid once the user clicks any row i am able get the id of the row what i have clicked and go to DB and get the result. but how will i again bind the new datatable to datagrid agin. below the row what i have clciked private void dgData2_MouseLeftButtonUp(object sender, MouseButtonEventArgs e) { if (dgData2.SelectedIndex >= 0) { //Get Selected Row var element = (TextBlock)dgData2.Columns[0].GetCellContent(dgData2.SelectedItem); } } i am new to silverlight please let me know any code that can help e out Thanks in advance for any help prince

    Read the article

  • Education path advice

    - by Miroslav Zadravec
    I'm thinking of continuing my education and going for masters degree. I must decide between two programs. One is CS/IT and focuses on algorithms, math, multimedia, web technologies with optional interesting courses like AI and robotics. Second is about business process management, software architecture and project management. I have some experience in business software and I must say, I never though I need deeper understating of algorithms or program language but I always felt that I'm lacking in project planing or management knowledge. On the other side, CS/IT looks more interesting but what are the chances to find a job that require such skills?

    Read the article

  • Is OpenStack suitable as a fault tolerant DB host?

    - by Jit B
    I am trying to design a fault tolerant DB cluster (schema does not matter) that would not require much maintenance. After looking at almost everything from MySQL to MongoDB to HBase I still find that no DB is easily scalable - Cassandra comes close but it has its own set of problems. So I was thinking what if I run something like MySQL or OrientDB on top of a large openstack VM. The VM would be fault tolerant by itself so I dont need to do it st DB level. Is it viable? Has it been done before? If not then what are the possible problems with this approach?

    Read the article

  • Who makes laptops for Ubuntu?

    - by Tim Lytle
    I'm looking for a laptop and would like to avoid the whole 'is this [specific configuration of hardware] compatible with Ubuntu?' process by finding a laptop manufactured with Ubuntu in mind. I know of system76, but are there any other manufacturers making laptops built to run a standard build of Ubuntu? I'm not counting Dell, as - from my experience - their 'Ubuntu' laptops/netbooks require their build, and because of that have their own set of compatibility issues. UPDATE: And as mentioned in the comments, Dell is no longer selling systems with Ubuntu to consumers.

    Read the article

  • How to include content from remote server while keeping that content secure

    - by slayton
    I am hosting collection of videos, for which I retain the copyright, on a file server that I'd like to share with family and friends. When a user visits the my fileserver via a web browser they are asked to authenticate using HTTP auth and then they are presented with a basic list of the files. I'd like to build web application that provides a clean interface with simply library functionality. However, this app will be hosted on a different server. I'm trying to figure out a security model for my file server that doesn't require the user to login to both the file-server and the hosting-server. I want to make this as easy as possible for my non-tech savy family while still maintaining security for my files.

    Read the article

  • Why do XML namespace URIs use the http scheme?

    - by svick
    A XML namespace should be a URI, but it can use any URI scheme, including those that are not URLs. Then why do all widely used XML namespaces use the http scheme (e.g. http://www.w3.org/XML/1998/namespace), considering that trying to use the URI as an URL by retrieving that document using the HTTP protocol is not guaranteed to do anything useful (and often doesn't)? I understand the usefulness of DNS domains in namespace names to help guarantee uniqueness. But that doesn't require the http scheme, there could be a separate scheme for that (something like namespace:w3.org/XML/1998/namespace). This would avoid the confusion between URIs and URLs, while maintaining domain-based uniqueness.

    Read the article

  • zend_acl: Adding extra resources dynamically and getting a param predispatch

    - by Timmeh
    First sorry about the woffle as I'm not sure how best to describe this. Basically I am not sure how I can get param in the bootstrap before the controller is loaded, but here is the long winded version... I have got an acl class storing all my default resources in. All my page/post content is a database and I want the admin the ability to choose who which role the page would become available. I know it is possible just to loop through the database table and add them all in at once, but I am concerned that this is a drain on resources. I have it working whereby my access check plugin can call a dynamic permission function, but I need to get the parameter of the current page ID and it's permission to set it before the controller is loaded. Does that make sense or am I worry over nothing and I should just get the resources of all the pages at once? thanks in advance for reading my garble!!

    Read the article

  • What are the pros and cons of non-unique display names?

    - by Davy8
    I know of at least big title game (Starcraft II) that doesn't require unique display names, so it would seem like it can work in at least some circumstance. Under what situations does allowing non-unique display names work well? When does it not work well? Does it come down to whether or not impersonation of someone else is a problem? The reasons I believe it works for Starcraft II is that there isn't any kind of in-game trading of virtual goods and other than "for kicks" there isn't much incentive to impersonate someone else in the game. There's also ladder rankings so even trying to impersonate a pro is easily detectable unless you're on a similar skill level. What are some other cases where it makes sense to specifically allow or disallow duplicate display names?

    Read the article

  • Java Error Using Loops [migrated]

    - by Shaun
    I am facing a error in Java using the method Loops. I am a basic user learning Java and I am following a book with teaches you the basics of Java. I have this problem when I use this code in my Java Program. It gives me an red line under my code. Here's my code: public class Game{ public static void main(String[] args){ for (int dex = 0; dex < 1000; dex++) { if (dex % 12 == 0) { System.out.println(“#: “ + dex); } } } } I have been following the tutorials correctly. I am a bit lost where I have gone or done wrong. I have my public static codes and such as you'd require in any Java programming. Here's are the error given): Cannot resolve method: 'Println(? , ?)' Expression expected ',' or ')' expected Unexpected Token ';' expected

    Read the article

  • ajax/jquery disables links after submit

    - by Chocho
    i am working on this form. i am using lightbox and dhtml fade effects. the content in my lightbox is a form. i am using jquery to validate the form. once the form is submitted, i redirect a user back to a thank you page. what i am noticing is that, once all the above events has taken place, i cannot click anywhere on my screen, all the links/buttons are sort of disable. i need to press F5 to refresh the page to be able to click anywhere on the page again? is this happening because i am using jquery validation and an events already took place, how do i resolve this as i am a newbie to jquery. thanks

    Read the article

  • Objective-c class initializer executes multiple times

    - by apisip
    Unless I misunderstood it, this LINK from Apple's documentation clearly states that the class initializer, "+ (void)initialize)", only executes once per class. Here is the excerpt: Special Considerations initialize it is invoked only once per class. If you want to perform independent initialization for the class and for categories of the class, you should implement load methods. However, I'm getting a weird behavior on my project and the initializer is being executed twice. So I have to check if _classContext is null. I only got one class that has this method. What are the possible reasons why this is happening? I'm using XCode 4.5.2 and OS X 10.8.2. I got multiple iOS simulators, iPhone 5.1 and 6.0. + (void) initialize { num++; NSLog([NSString stringWithFormat:@"Times: %i", num]); if(_classContext == nil) _classContext = [[myClass alloc] init]; }

    Read the article

  • Who makes laptops for Ubuntu?

    - by Tim Lytle
    I'm looking for a laptop and would like to avoid the whole 'is this [specific configuration of hardware] compatible with Ubuntu?' process by finding a laptop manufactured with Ubuntu in mind. I know of system76, but are there any other manufacturers making laptops built to run a standard build of Ubuntu? I'm not counting Dell, as - from my experience - their 'Ubuntu' laptops/netbooks require their build, and because of that have their own set of compatibility issues. UPDATE: And as mentioned in the comments, Dell is no longer selling systems with Ubuntu to consumers.

    Read the article

  • Does this factory method pattern example violate open-close?

    - by William
    In Head-First Design Patterns, they use a pizza shop example to demonstrate the factory method pattern. public abstract class PizzaStore { public Pizza orderPizza(String type) { Pizza pizza; pizza = createPizza(type); pizza.prepare(); pizza.bake(); pizza.cut(); pizza.box(); return pizza; } abstract Pizza createPizza(String type) } public class NYPizzaStore extends PizzaStore { Pizza createPizza(String item) { if (item.equals("cheese") { return new NYStyleCheesePizza(); } else if (item.equals("veggie")) { return new NYStyleVeggiePizza(); } else if (item.equals("clam")) { return new NYStyleClamPizza(); } else if (item.equals("pepperoni")) { return new NYStylePepperioniPizza(); } else return null; } } I don't understand how this pattern is not violating open-close. What if we require a beef Pizza, then we must edit the if statement in the NYPizzaStore class.

    Read the article

  • How to deal with "software end-of-life" situations?

    - by rwong
    When a vendor declares that they no longer intend to provide any support or services to a piece of software (and stated the intent to exit the business - offering no upgrade paths), and stated that customers must pay a nominal fee in order to have the existing data exported, what kind of recourse do programmers/customers have? Things I can think of: Need to purchase spare hardware and set up a spare environment on which the software can continue to operate. Various data export methods which do not require vendor involvement. (For example, screen scraping, printing to image followed by re-scanning, etc) Parallel systems where staff will duplicate the old data into a new system manually or semi-automatically Legal means, in case the vendor is in financial trouble Any other ideas? Assuming that there is no "circumvention" involved (no DRM, no DMCA), is data recovery or reverse engineering legal/acceptable?

    Read the article

  • FMW Cloud Forum: Chicago

    - by kellsey.ruppel
      The increasing popularity of cloud computing is changing how enterprise systems are managed and organized--and that change does not stop at the datacenter. Cloud computing is also changing how enterprises develop and build business applications, a shift that will require unprecedented collaboration across the enterprise, from developers to the user community. Are you currently building applications in the Cloud? What concerns or challenges do you forsee in doing so? Oracle experts will be discussing these topics and how with a user experience platform you can leverage new collaborative practices to design and build applications that deliver business value and meet exacting user requirements. Join us in Chicago on June 29th to learn more and hear from Oracle experts. Not located in Chicago? We're coming to a city near you!

    Read the article

  • Should I give up my cushy job to be tech lead for a startup? [closed]

    - by Katie
    I'm in my mid twenties, and I'm in a safe, comfortable job as a Software Developer. The work environment is great, I'm well paid, the benefits are good. I enjoy my job. Some friends passed my name on to some guys starting a new company. I had some informal chats with them and they liked me. They've asked me to joint their start-up as tech lead, designing and building their product from scratch. They're fully funded, and they know what they're doing. Taking the job would require giving up my safe, enjoyable, relaxed job for a risky, stressful, hard one, albeit with the potential to be really great in future. Should I take the job?

    Read the article

  • Why do some open-source projects NOT have a public issue tracker?

    - by linquize
    Why do some open source projects not allow to report issues in a public issue tracker? Those projects require the issues to be reported via email, and the issues may be forwarded to people in a mailing list. Users may repeatedly report the same issue if there is no public issue tracker, as they have no easy way to know what has been reported before. The project team members need to spend extra time answering those repeated issues. Some projects do have a public issue tracker but the issues are still reported through email and they are posted by the project team only after filtering. It does not allow anyone to report directly in issue tracker (example: SVN). Such arrangement is not transparent nor open, which I think violates the philosophy of open source. And it is outdated.

    Read the article

< Previous Page | 119 120 121 122 123 124 125 126 127 128 129 130  | Next Page >