Search Results

Search found 44983 results on 1800 pages for 'the official microsoft iis site'.

Page 124/1800 | < Previous Page | 120 121 122 123 124 125 126 127 128 129 130 131  | Next Page >

  • If an visitors IP address contains "google" or a similar keyword, does this mean they were a crawler?

    - by Roscoe
    Hi, I have a huge list of IP addresses recorded from various visitors to a website. A huge amount of the visitors, in some months over 70%, came from IP addresses that contained keywords such as google, yahoo, bot, crawler, etc. Does this mean that those users were infact search engine crawlers? If so, why are their so many crawlers in my visitor records in comparison to genuine human visitors? (and if not what's the explanation?) Thanks in advance.

    Read the article

  • IIS/MSSQL HA on two servers? NLB + Mirroring

    - by Igor K
    Currently have the one server doing MSSQL/IIS. Can use NLB with two servers running IIS for HA and can use database mirroring and put the failover partner in the connection string for HA. Can we use NLB + Mirroring together? So if one of the servers died (ie power plug removed), everything will continue to work (after the timeout for the mirror to become the principal)?

    Read the article

  • Is Azure Compatible with JPEG XR?

    - by Shawn Eary
    I just put an F#/MVC app into a Windows Azure solution as a Web Role. Before migration, my JPEG XR (*.WDP) files were getting displayed on the client in IE9 without issue via my local and hosted sites. Now, after migration into Windows Azure, my JPEG XR files neither get displayed in my local Windows Azure compute emulator nor do they get displayed when they are deployed to http://*.cloudapp.net. Is there some sort of conflict with Widows Azure and (JPEG XR) *.wdp files? If so, what is the accepted best practice for overcoming this conflict?

    Read the article

  • Microsoft étend son projet 4Afrika à l'Afrique du Sud, pour connecter les zones rurales à Internet

    Microsoft étend son projet 4Afrika à l'Afrique du Sud, pour connecter les zones rurales à Internet Dans le domaine de la télécommunication, une zone blanche correspond à une zone du territoire non couverte par un réseau donné (le plus souvent réseau de téléphonie mobile ou internet). Dans son projet Microsoft 4Afrika, l'entreprise ambitionne d'exploiter ces zones blanches au Kenya. Des parties rurales de la province de Limpopo, au nord-est de l'Afrique du Sud, pourraient se voir connectées à Internet. Le projet pilote qui permettra à cinq écoles primaires et secondaires de surfer sur le web devrait fournir au pays la capacité de fournir à 80 % de sa population l'accès au web d'ici 2020.Paul G...

    Read the article

  • Should users be deleted after inactivity on a website?

    - by Hovaness Bartamian
    When you have a social website or a website where you can register, would you eventually delete them after a certain time (after a year of inactivity) or would you rather keep their account records for ever? I know websites like Facebook have large amount of inactive, duplicated and fake accounts. So I'm wondering if after two years of inactivity it would be alright to send the account a warning email of deletion unless they log in. Just thinking of a clean and efficient database management or any implications this may cause to new potential users.

    Read the article

  • Internet Explorer 10 bientôt disponible pour Windows 7, Microsoft annonce la sortie d'une préversion en novembre

    Internet Explorer 10 bientôt disponible pour Windows 7, Microsoft annonce la sortie d'une préversion en novembre Les utilisateurs de Windows 7 pourront télécharger une préversion d'Internet Explorer 10 à partir de mi-novembre. IE 10 est la prochaine mise à jour majeure du navigateur de Microsoft qui sera disponible en version finale au même moment que Windows 8 annoncé pour le 26 octobre prochain. Cette version se distingue essentiellement par sa nouvelle interface qui repose sur les tuiles Windows 8 et le support de la navigation tactile. Le navigateur dispose de nouvelles capacités de développement et de performances améliorées grâce à l'accélération matérielle. M...

    Read the article

  • Microsoft Surface versus iPad 4 : comparaison au niveau du HTML5 par l'équipe Sencha

    Microsoft Surface versus iPad 4 : comparaison au niveau du HTML5 par l'équipe Sencha. [IMG]http://cdn.sencha.io/img/20121119-surface-vs-ipad-preview.png[/IMG] Sencha fournit des outils de développement pour bureau et mobile. Son équipe a mis l'iPad 4 et la tablette Surface de Microsoft à l'épreuve pour voir comment ils se débrouillent en tant que plates-formes HTML5. Le HTML5 est la prochaine génération de technologies Web qui est adoptée de plus en plus pour développer des applications qui peuvent être rédigées en une seule fois et exécutées sur plusieurs systèmes d'exploitation, les navigateurs et les périphériques. Les tests révèlent que l...

    Read the article

  • System response times --- A good Service Level Agreement?

    - by mpeterson
    In order to view system performance, I have been asked by management to give page response times for a few key pages. I want to make sure I am giving a good picture of the overall health of the system, and not just narrowing in on a single measurement. So my question is: When developing software, what metrics would you provide to your stakeholders to indicate a system that is healthy and running well? (if it is not running well, that should also be evident! Not trying to hide/obscure any problems.)

    Read the article

  • Self-imposed lockout from program

    - by Alex
    I'm plagued with a lack of willpower. I recently started looking for solutions, and came across a program for macs called SelfControl which completely blocks one's access to a given set of websites for a given period of time (you can delete the program/restart your computer/do almost anything and it will still block those sites for the specified time period, and doesn't require a password to do it.) Unfortunately, there are no windows analogues. The one that comes the closest is Cold Turkey. It has the functionality whereby you set a time in the future, specify a list of websites (or programs - eg explorer, firefox, chrome) and you are blocked from accessing them for the whole duration. No password can undo it, no system reboot, etc. The problem is that the program is a buggy piece of garbage, and in order to ensure that you're not locked out from websites forever, you have to run an uninstaller which is just an exe file accessible at any time which completely defeats the purpose of a self-imposed program lockout. I want to make a better version of that program, or find a simple way to prevent access to a given set of programs over a given period of time with no way around it. I've only taken a few introductory courses in java (math major), but the internet is really having a negative effect on my studies, and the only way I can do work is to eliminate all distractions. What do I need to learn in order to make a program with the following properties: Given a set of .exe files, and a time in the future , this program will prevent access to the given .exe files until current time = given time restarting the computer doesn't interfere with the program, one can't uninstall the program until current time = given time, one can't create another instance of the program to block itself I don't care how much programming knowledge i need to acquire in order to make this program, so please give me a specific list of things that I need to study in order to make this happen, or if something like this exists, then please let me know.

    Read the article

  • How do I adjust transparency of watermark in Microsoft Word 2010?

    - by hkBattousai
    I added a watermark to my page from Page Layout Watermark Custom Watermark... Picture Watermark However, the resulting watermark was dim and fainted like it is transparent. I want it to look like the original image; as if I inserted it from Insert Picture. How do I adjust transparency of watermark? Versions: Office: Microsoft Office Professional Plus 2010 Word: 14.0.6112.5000 (64-bit)

    Read the article

  • Microsoft publie deux outils open-source en rapport avec Outlook pour faciliter le développement d'a

    Mise à jour du 27/05/10 Microsoft publie deux outils open-source en rapport avec Outlook Pour permettre l'utilisation plus facile du format PST dans le développement d'applications Microsoft vient de publier deux outils open-source de développement en rapport avec Outlook. Le but affiché est de faciliter la création d'applications qui utiliseront le format de fichier des e-mails et des dossiers personnels de son client de messagerie : le format PST. Les deux outils en questions sont le « File Format Software Development Kit » et le « PST Data Structure View Tool ». Cette annonce est la suite logique...

    Read the article

  • Make your Silverlight applications Speak to you with Microsoft Translator

    One of the announcements that happened during the MIX10 conference was the availability of the V2 of the Microsoft Translator API. This is the engine that powers the translation behind http://www.windowslivetranslator.com and some other Bing-related properties as well. A lot of research has gone into the engine from Microsoft Research and others. Language translation isnt an easy task especially taking into consideration cultural significance of words, etc. I have heard that the most challenging...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Patch Tuesday : Microsoft corrige 14 vulnérabilités, dont 7 critiques, Windows 8, RT et IE 10 concernés

    Patch Tuesday : Microsoft corrige 14 vulnérabilités dont 7 critiques, Windows 8, RT et IE 10 concernés Microsoft a publié hier sa traditionnelle mise à jour de sécurité mensuelle (Patch Tuesday), qui apporte des correctifs pour les dernières versions de ses produits : Windows 8, Windows RT, Windows Server 2012 et Internet Explorer 10. La dernière mise à jour de sécurité (sauf en cas de découverte d'une faille zero-day) de l'année corrige une douzaine de failles dans Windows, IE, Word et Exchange, dont sept ont été marquées comme critique et deux ont été qualifiées d'importants. Ces failles dans l'ensemble peuvent être exploitées par des pirates distants pour prendre le con...

    Read the article

  • After low level formatting can microsoft track previously pirated windows installed on pc

    - by Neelabh
    am getting call from Microsoft and they are forcing me to purchase so many licensed software but my budget is not that much.. So they are asking for On-Site Audit (SAM Review)... So I did low level formatting of my All PC's and Installed Ubuntu. So can they track I installed pirated windows xp earlier on these system or I need to change hardware.. After formatting on what parameter Microsoft Track earlier piracy: 1) By any Harddisk ID 2) By any Motherboard ID 3) By any IP Address Please help me otherwise I have to borrow so much money for licensing fee. Thanks in Advance..

    Read the article

  • Windows Azure : Microsoft va baisser ses prix de 28% pour rendre sa plateforme Cloud "plus accessible"

    Microsoft rend Windows Azure plus accessible avec une réduction de la tarification de 28% Pour la seconde fois en un an, Microsoft revoit à la baisse le prix de sa plateforme Cloud Windows Azure. La société vient d'annoncer dans un billet de blog qu'elle appliquera à compter du 12 décembre prochain une nouvelle grille tarifaire aux clients Windows Azure. Cette nouvelle tarification permettra une réduction de près de 28% en fonction des volumes stockés. La nouvelle grille peut être consultée ci-dessous : [IMG]http://rdonfack.developpez.com/images/Table_Storage.png[/IMG] Les comptes de stockage Windows Azure dis...

    Read the article

  • Free book from Microsoft: - Exploring CQRS and Event Sourcing

    - by TATWORTH
    At http://www.microsoft.com/en-us/download/details.aspx?id=34774, Microsoft are providing a free book on Exploring CQRS and Event Sourcing"This guide is focused on building highly scalable, highly available, and maintainable applications with the Command & Query Responsibility Segregation and the Event Sourcing architectural patterns. It presents a learning journey, not definitive guidance. It describes the experiences of a development team with no prior CQRS proficiency in building, deploying (to Windows Azure), and maintaining a sample real-world, complex, enterprise system to showcase various CQRS and ES concepts, challenges, and techniques. The development team did not work in isolation; we actively sought input from industry experts and from a wide group of advisors to ensure that the guidance is both detailed and practical. "

    Read the article

< Previous Page | 120 121 122 123 124 125 126 127 128 129 130 131  | Next Page >