Search Results

Search found 21331 results on 854 pages for 'require once'.

Page 123/854 | < Previous Page | 119 120 121 122 123 124 125 126 127 128 129 130  | Next Page >

  • How to route KVM virtual machine audio to Ubuntu 11.10 host using virt-manager?

    - by iGadget
    I've been using KVM in combination with Virt-Manager and Remmina at a fair success up until now. The issue I need to solve now is to get audio from a virtualized Windows XP and make it audible on the Ubuntu 11.10 host. Remmina / RDP works for 'simple' audio (system sounds and such), but when the source gets trickier (e.g. Flash audio), Remmina / RDP messes up. So I figured I'd just connect to the machine directly using Virt-Manager. Unfortunately, it seems that even though I have successfully configured the AC97 audio device on WinXP, it's unable to get it's output to the Ubuntu host. This is probably because Virt-Manager uses VNC (and AFAIK, VNC doesn't transport audio). Does anyone know if there is a solution to fix this? I've heard of Spice, but the installation required so much voodoo last time I checked, I figured I'd let that solution boil to maturity a little longer ;) But perhaps there are other options I haven't thought of yet (which don't require switching to VirtualBox / VMware)...

    Read the article

  • Is OpenStack suitable as a fault tolerant DB host?

    - by Jit B
    I am trying to design a fault tolerant DB cluster (schema does not matter) that would not require much maintenance. After looking at almost everything from MySQL to MongoDB to HBase I still find that no DB is easily scalable - Cassandra comes close but it has its own set of problems. So I was thinking what if I run something like MySQL or OrientDB on top of a large openstack VM. The VM would be fault tolerant by itself so I dont need to do it st DB level. Is it viable? Has it been done before? If not then what are the possible problems with this approach?

    Read the article

  • Ubuntu 11.10 to 12.04 results in loss of N network capability - how to restore?

    - by user74273
    On Ubuntu 11.10, I had zero issues with N network detection and speed. I cannot remember whether the old driver was iwlagn or iwlwifi. This was with Ubuntu repository Linux kernel 3.0.0-22. Upon upgrading to Ubuntu 12.04, iwlwifi is the available driver and while it detects N networks, upon connection, the speed is cripplingly low and DNS look-ups do not occur (impossible to browse). This is with Ubuntu repository Linux kernel 3.2.0-26. Please note that the 11n_disable flag for the iwlwifi module cannot work for me as I require N network access. Is there another solution? Perhaps, is there a way to easily patch the new kernel with the old wireless module (just copy-and-paste the iwlagn module into the new kernel source and re-compile)? Relevant hardware specs: Dell Inspiron N5110 Network Adapter: Intel® Centrino® Wireless-N 1030

    Read the article

  • How do I use unpackHalf2x16?

    - by user1032861
    I'm trying to use (un)packHalf2x16, without success so far. I'm drawing with: glVertexAttribIPointer(0, 2, GL_UNSIGNED_INT, 0, 0); glEnableVertexAttribArray(0); glBindBuffer(GL_ARRAY_BUFFER, vbo); glDrawArrays(GL_POINTS, 0, n_points); glDisableVertexAttribArray(0); and on the shader #version 330 core #extension GL_ARB_shading_language_packing : require in uvec2 A0; // (...) vec4 t = vec4(unpackHalf2x16(A0.x), unpackHalf2x16(A0.y)); But nothing gets drawn. I'm pretty sure buffer's content is right, and if I use vec4 t = vec4(0); I can see it's working properly. How is this packing / unpacking thing supposed to work? I can't find any example.

    Read the article

  • What are the pros and cons of non-unique display names?

    - by Davy8
    I know of at least big title game (Starcraft II) that doesn't require unique display names, so it would seem like it can work in at least some circumstance. Under what situations does allowing non-unique display names work well? When does it not work well? Does it come down to whether or not impersonation of someone else is a problem? The reasons I believe it works for Starcraft II is that there isn't any kind of in-game trading of virtual goods and other than "for kicks" there isn't much incentive to impersonate someone else in the game. There's also ladder rankings so even trying to impersonate a pro is easily detectable unless you're on a similar skill level. What are some other cases where it makes sense to specifically allow or disallow duplicate display names?

    Read the article

  • clone() only partially doable; how to react?

    - by hllnll
    Suppose we have a class-hierarchy whose base class B requires a clone() method to be defined in its derivations. Whilst this works perfectly for most of them there is this one derivation X that holds an optional reference to a resource/object that can only be referenced from one instance of X. Whilst the rest of X can be cloned without problems this reference would have to be set to null/nil/nullptr. What is the correct way to handle this situation? X::clone() could throw an UncloneableException. Though this would be correct, it is not satisfying. Set the reference to null/nil/nullptr and leave no notice of it. The user of X has to know about Xs "particularities". Require derivations of B to define B::nearestClone(): the user of B has to be aware that the return value might not be a 1:1 clone. Something else?

    Read the article

  • Who makes laptops for Ubuntu?

    - by Tim Lytle
    I'm looking for a laptop and would like to avoid the whole 'is this [specific configuration of hardware] compatible with Ubuntu?' process by finding a laptop manufactured with Ubuntu in mind. I know of system76, but are there any other manufacturers making laptops built to run a standard build of Ubuntu? I'm not counting Dell, as - from my experience - their 'Ubuntu' laptops/netbooks require their build, and because of that have their own set of compatibility issues. UPDATE: And as mentioned in the comments, Dell is no longer selling systems with Ubuntu to consumers.

    Read the article

  • collapsible grid in Silverlight 4

    - by prince23
    hi, I want to create a collapsible grid in Silverlight 4. once user clicks on row of the datagrid if that row has any child row it should be shown. if again user clicks the same row should hide the child row what was shown eariler. right now i am able to show data in datagrid once the user clicks any row i am able get the id of the row what i have clicked and go to DB and get the result. but how will i again bind the new datatable to datagrid agin. below the row what i have clciked private void dgData2_MouseLeftButtonUp(object sender, MouseButtonEventArgs e) { if (dgData2.SelectedIndex >= 0) { //Get Selected Row var element = (TextBlock)dgData2.Columns[0].GetCellContent(dgData2.SelectedItem); } } i am new to silverlight please let me know any code that can help e out Thanks in advance for any help prince

    Read the article

  • ajax/jquery disables links after submit

    - by Chocho
    i am working on this form. i am using lightbox and dhtml fade effects. the content in my lightbox is a form. i am using jquery to validate the form. once the form is submitted, i redirect a user back to a thank you page. what i am noticing is that, once all the above events has taken place, i cannot click anywhere on my screen, all the links/buttons are sort of disable. i need to press F5 to refresh the page to be able to click anywhere on the page again? is this happening because i am using jquery validation and an events already took place, how do i resolve this as i am a newbie to jquery. thanks

    Read the article

  • Are Intel HD 4000 graphics supported on Ubuntu 10.04 LTS?

    - by user1118764
    I have an intel Core i7-3700 system with Intel HD 4000 integrated graphics with a dual monitor setup (1 connected via VGA, the other via DVI) on Ubuntu 10.04 LTS 64bit. I'm trying to get my monitors correctly detected. Right now, in only 1 unknown monitor is detected with a max resolution of 1280x1024, which is lower than my main monitor connected to DVI. Also, the desktop is mirrored rather than extended. I've previously managed to get a Core i5-2400 system with Intel HD 3000 integrated graphics with the same dual monitor setup and Ubuntu 10.04 LTS 64bit to work using the glasen ppa drivers, but this time, after installing them following the instructions How do I install the Intel HD 3000 video driver? but it doesn't seem to work. Does the Intel HD 4000 require a different driver from the 3000? If so, where can I get it?

    Read the article

  • How to deal with "software end-of-life" situations?

    - by rwong
    When a vendor declares that they no longer intend to provide any support or services to a piece of software (and stated the intent to exit the business - offering no upgrade paths), and stated that customers must pay a nominal fee in order to have the existing data exported, what kind of recourse do programmers/customers have? Things I can think of: Need to purchase spare hardware and set up a spare environment on which the software can continue to operate. Various data export methods which do not require vendor involvement. (For example, screen scraping, printing to image followed by re-scanning, etc) Parallel systems where staff will duplicate the old data into a new system manually or semi-automatically Legal means, in case the vendor is in financial trouble Any other ideas? Assuming that there is no "circumvention" involved (no DRM, no DMCA), is data recovery or reverse engineering legal/acceptable?

    Read the article

  • Why do XML namespace URIs use the http scheme?

    - by svick
    A XML namespace should be a URI, but it can use any URI scheme, including those that are not URLs. Then why do all widely used XML namespaces use the http scheme (e.g. http://www.w3.org/XML/1998/namespace), considering that trying to use the URI as an URL by retrieving that document using the HTTP protocol is not guaranteed to do anything useful (and often doesn't)? I understand the usefulness of DNS domains in namespace names to help guarantee uniqueness. But that doesn't require the http scheme, there could be a separate scheme for that (something like namespace:w3.org/XML/1998/namespace). This would avoid the confusion between URIs and URLs, while maintaining domain-based uniqueness.

    Read the article

  • zend_acl: Adding extra resources dynamically and getting a param predispatch

    - by Timmeh
    First sorry about the woffle as I'm not sure how best to describe this. Basically I am not sure how I can get param in the bootstrap before the controller is loaded, but here is the long winded version... I have got an acl class storing all my default resources in. All my page/post content is a database and I want the admin the ability to choose who which role the page would become available. I know it is possible just to loop through the database table and add them all in at once, but I am concerned that this is a drain on resources. I have it working whereby my access check plugin can call a dynamic permission function, but I need to get the parameter of the current page ID and it's permission to set it before the controller is loaded. Does that make sense or am I worry over nothing and I should just get the resources of all the pages at once? thanks in advance for reading my garble!!

    Read the article

  • Does this factory method pattern example violate open-close?

    - by William
    In Head-First Design Patterns, they use a pizza shop example to demonstrate the factory method pattern. public abstract class PizzaStore { public Pizza orderPizza(String type) { Pizza pizza; pizza = createPizza(type); pizza.prepare(); pizza.bake(); pizza.cut(); pizza.box(); return pizza; } abstract Pizza createPizza(String type) } public class NYPizzaStore extends PizzaStore { Pizza createPizza(String item) { if (item.equals("cheese") { return new NYStyleCheesePizza(); } else if (item.equals("veggie")) { return new NYStyleVeggiePizza(); } else if (item.equals("clam")) { return new NYStyleClamPizza(); } else if (item.equals("pepperoni")) { return new NYStylePepperioniPizza(); } else return null; } } I don't understand how this pattern is not violating open-close. What if we require a beef Pizza, then we must edit the if statement in the NYPizzaStore class.

    Read the article

  • Preventing Spoofing with Paypal

    - by wcpro
    I have a scenario where i need to have a user checkout through PayPal and then once we receive the payment then we create a membership record in our membership site. The PayPal requires a "return" field when you submit the form button that will take the user back to our page once the order has been successfully processed. On that page is where we actually track the sale and fire a chunk of javascript to track the sale. So my question is this, how can i make sure that the return page comes from PayPal and is not spoofed by a user in the system. I know there is a way to use the notify_url to have PayPal post back to our system, but in this case i have to run a chunk of javascript. Is there an easy way to do this, or would i have to write some looping/timeout function that checks to see if the notify post has come through? Im using .net to do the posting to paypal

    Read the article

  • Java Phones: How to set up JTAPI?

    - by Adam Tannon
    I want to use JTAPI (1.4 - latest) to create an app that will call my phone whenever I need it to. I downloaded JSR043 (JTAPI specification) and have been reading the API docs and it seems pretty straight forward with respect to how to code JTAPI. However I seriously doubt that getting a Java app on my laptop to call my cell phone doesn't require some 3rd party or middle man service provider and possibly other entities/configurations as well. So I ask: besides using the JTAPI in my Java code, what do I need to install or set up to have a Java app that calls my phone? Thanks in advance!

    Read the article

  • How should I synchronize configurations and data across computers?

    - by lfaraone
    Imagine I have three Ubuntu computers home, laptop, beach-house. They all have the same version of Ubuntu, 10.04 installed, and are kept up to date from the repositories. I use f-spot, thunderbird, and google-chrome on all of the computers. Is there a way to keep the data and configuration in sync across them, without requiring constant connectivity for normal (non-synchronous) usage? For example, they should be usable without network connectivity, so something like NFS won't work. An ideal solution would not require manual action to start the syncing process.

    Read the article

  • Objective-c class initializer executes multiple times

    - by apisip
    Unless I misunderstood it, this LINK from Apple's documentation clearly states that the class initializer, "+ (void)initialize)", only executes once per class. Here is the excerpt: Special Considerations initialize it is invoked only once per class. If you want to perform independent initialization for the class and for categories of the class, you should implement load methods. However, I'm getting a weird behavior on my project and the initializer is being executed twice. So I have to check if _classContext is null. I only got one class that has this method. What are the possible reasons why this is happening? I'm using XCode 4.5.2 and OS X 10.8.2. I got multiple iOS simulators, iPhone 5.1 and 6.0. + (void) initialize { num++; NSLog([NSString stringWithFormat:@"Times: %i", num]); if(_classContext == nil) _classContext = [[myClass alloc] init]; }

    Read the article

  • FMW Cloud Forum: Chicago

    - by kellsey.ruppel
      The increasing popularity of cloud computing is changing how enterprise systems are managed and organized--and that change does not stop at the datacenter. Cloud computing is also changing how enterprises develop and build business applications, a shift that will require unprecedented collaboration across the enterprise, from developers to the user community. Are you currently building applications in the Cloud? What concerns or challenges do you forsee in doing so? Oracle experts will be discussing these topics and how with a user experience platform you can leverage new collaborative practices to design and build applications that deliver business value and meet exacting user requirements. Join us in Chicago on June 29th to learn more and hear from Oracle experts. Not located in Chicago? We're coming to a city near you!

    Read the article

  • Education path advice

    - by Miroslav Zadravec
    I'm thinking of continuing my education and going for masters degree. I must decide between two programs. One is CS/IT and focuses on algorithms, math, multimedia, web technologies with optional interesting courses like AI and robotics. Second is about business process management, software architecture and project management. I have some experience in business software and I must say, I never though I need deeper understating of algorithms or program language but I always felt that I'm lacking in project planing or management knowledge. On the other side, CS/IT looks more interesting but what are the chances to find a job that require such skills?

    Read the article

  • When should an API favour optimization over readability and ease-of-use?

    - by jmlane
    I am in the process of designing a small library, where one of my design goals is to use as much of the native domain language as possible in the API. While doing so, I've noticed that there are some cases in the API outline where a more intuitive, readable attribute/method call requires some functionally unnecessary encapsulation. Since the final product will not necessarily require high performance, I am unconcerned about making the decision to favour ease-of-use in my current project over the most efficient implementation of the code in question. I know not to assume readability and ease-of-use are paramount in all expected use-cases, such as when performance is required. I would like to know if there are more general reasons that argue for an API design preferring (marginally) more efficient implementations?

    Read the article

  • killing a separate thread having a socket

    - by user311906
    Hi All I have a separate thread ListenerThread having a socket listening to info broadcasted by some remote server. This is created at the constructor of one class I need to develop. Because of requirements, once the separate thread is started I need to avoid any blocking function on the main thread. Once it comes to the point of calling the destructor of my class I cannot perform a join on the listener thread so the only thing I can do is to KILL it. My questions are: what happens to the network resoruces allocated by the function passed to the thead? Is the socket closed properly or there might be something pending? ( most worried about this ) is this procedure fast enough i.e. is the thread killed so that interrupt immediately ? I am working with Linux ...what command or what can I check to ensure that there is no networking resource left pending or that something went wrong for the Operating system I thank you very much for your help Regards MNSTN NOTE: I am using boost::thread in C++

    Read the article

  • How should important terms be emphasized in documentation?

    - by John Rasch
    Software will often introduce and formalize concepts that may have ambiguous definitions in the real world. For example, in an attendance tracking system, an Occurrence refers to an Excused Absence, an Unexcused Absence, or a Tardy. In technical documentation (both in helper text and in user guides, etc), should these concepts be proper nouns, and as such, should they be capitalized in usage? In other words, which of the following examples is more appropriate: After an Occurrence has been created, it may be converted into an Excused Absence once the Approval Form has been uploaded. or After an occurrence has been created, it may be converted into an excused absence once the approval form has been uploaded.

    Read the article

  • How to include content from remote server while keeping that content secure

    - by slayton
    I am hosting collection of videos, for which I retain the copyright, on a file server that I'd like to share with family and friends. When a user visits the my fileserver via a web browser they are asked to authenticate using HTTP auth and then they are presented with a basic list of the files. I'd like to build web application that provides a clean interface with simply library functionality. However, this app will be hosted on a different server. I'm trying to figure out a security model for my file server that doesn't require the user to login to both the file-server and the hosting-server. I want to make this as easy as possible for my non-tech savy family while still maintaining security for my files.

    Read the article

  • Should I give up my cushy job to be tech lead for a startup? [closed]

    - by Katie
    I'm in my mid twenties, and I'm in a safe, comfortable job as a Software Developer. The work environment is great, I'm well paid, the benefits are good. I enjoy my job. Some friends passed my name on to some guys starting a new company. I had some informal chats with them and they liked me. They've asked me to joint their start-up as tech lead, designing and building their product from scratch. They're fully funded, and they know what they're doing. Taking the job would require giving up my safe, enjoyable, relaxed job for a risky, stressful, hard one, albeit with the potential to be really great in future. Should I take the job?

    Read the article

< Previous Page | 119 120 121 122 123 124 125 126 127 128 129 130  | Next Page >