Search Results

Search found 11277 results on 452 pages for 'jeff certain'.

Page 131/452 | < Previous Page | 127 128 129 130 131 132 133 134 135 136 137 138  | Next Page >

  • Are there any custom keyboard available for laptops

    - by Ahe
    My work laptop is a HP elitebook 8560w which I mainly use for programming. Usually I have a external keyboard but recently I have been working out of office and therefore have been using the laptops own keyboard. One thing has really started to bug me. The keyboard layout of this 15.6" laptop contains numpad but the arrow keys are really bad (too small). Also when programming, I really miss a standard inverted T-arrow keys and the home/end/PgUp/PgDn buttons. Then it occurred to me; I would rather give up a numpad than a standard arrow keys. (The keyboard real estate in 15.6" laptop would allow this, and I really have to agree with Jeff Atwood here http://www.codinghorror.com/blog/2009/02/have-keyboard-will-program.html) Which brings me to my question. Do any laptop manufacturers make custom keyboards for their laptops or is there some third party manufacturer who could supply these kind of special keyboards? Quick googling on this doesn't give any meaningful results. Looks like that I have to carry an external keyboard with me if someone here can't give any pointers.

    Read the article

  • Does BitLocker reduce write reliability?

    - by Unsigned
    For the purposes of this question, BitLocker refers to the BitLocker-to-go variety on a disk with write-caching disabled. NTFS supports metadata journaling, which, although not completely failsafe, does mitigate certain types of potential filesystem errors. Assuming an NTFS volume is protected with BitLocker, does this reduce the failure tolerance? Would a power failure during a write to an NTFS volume, that's protected with BitLocker, be more prone to corruption than on an unencrypted NTFS volume?

    Read the article

  • Apache mod_proxy vs mod_rewrite

    - by Scott
    What is the difference between using mod_proxy and mod_rewrite? I have a requirement to send certain url patterns through the tomcat, which runs on the same host but under port 8080. I know this is something for mod_proxy, but I"m wondering why I can't just use mod_rewrite, or what the difference is? Probably has to do w/ reverse proxy, and also when in the pipeline it gets handled? Thanks.

    Read the article

  • Accessing MySQL server via VPN in python

    - by user210481
    Hi I have a MySQL server that I need access through a VPN. I use MySQLdb package to access MySQL server in Python. When I can access the server without VPN, it works fine, but when I'm at certain locations, I need to connect through VPN. My computer is connected to the VPN and I can access the database through PHPMyAdmin, but MySQLdb gives me an error message: OperationalError: (2003, "Can't connect to MySQL server on 'MY_IP' (10061)") Any ideas on why it's not working? Thanks

    Read the article

  • How to 'code collapse' wiki syntax on Notepad++ (or any other text editor)?

    - by meiryo
    I'm familiar with Notepad++'s code collapse for certain programming languages but recently I've been working with a plain text file that uses with Wiki syntax. For example: ==Heading1== Content ===Heading2=== Content ===Heading3=== Content ==Heading1.1== into (when I collapse Heading1): ==Heading1== ==Heading1.1== I want to be able to collapse these headings and all their contents down at different levels, much like how Notepad++ can collapse tags in HTML, hiding all other tags inside it. I think that's as clear as I explain it any suggestions?

    Read the article

  • Visual Studio Palette Window Background

    - by tsilb
    So Visual Studio has tons of options for fonts and colors; but I can't seem to find the background/foreground colors for certain windows, such as: Solution Explorer Error List Test Results Pending Changes Properties I find it strange I can change Output and Immediate but not these ones. Is there a place to change these settings?

    Read the article

  • Explaining odd sound effects during BSOD

    - by bizzz
    Hello, over the years of using Microsoft operating systems, I many times encountered the situation that I only now want to understand. When you get BSOD while listening to music, there is a short period of time (1-2 sec), when screen freezes and the last part of music is repeated several times, before everything falls into blue abyss. Today I became very curious about mechanics behind this situation - what makes that certain part of audio to loop? I beg you, kind sirs, to satisfy my curiosity.

    Read the article

  • Disable zsh autocorrect entirely

    - by Collin Peters
    How do you disable zsh autocorrect entirely? I am aware of the 'nocorrect' option which only applies to certain commands. But I want it off entirely so that when I type 'lear' instead of 'clear', it won't prompt for a correction. I should note that 'unsetopt correctall' doesn't seem to do anything for me collin@mandalay ~ % unsetopt correctall collin@mandalay ~ % lear zsh: correct 'lear' to 'clear' [nyae]? n zsh: command not found: lear

    Read the article

  • Remote Desktop triggers a loud Beep on local machine - how to shut it up?

    - by codeulike
    When I remote desktop into a server, I get a loud beep coming out of my local machine whenever certain messageboxes pop up. (An example is to search for something in the Event Log - when the search finds no results, I get a message box accompanied by a loud beep) Annoyingly, the beep still happens even if I have sound turned off locally or the volume right down - it seems to be hooking in to some low level OS-beep mechanism. Any way to turn it off?

    Read the article

  • Can I have nginx put stuff on memcached?

    - by adamo
    It is my understanding that nginx can query memcached for data that it serves, but you have to place them there using some other (homegrown) program. So the question is, can I have nginx fetch data from the backend and place them into memcached for future use for certain locations? Sort of not having to place all files from /images in it "by hand" but having them (mem)cached after being fetched for the first time? Any backend other than memcached would suffice also.

    Read the article

  • Sharing VirtualBox snapshots

    - by JesperE
    Is it possible to "share" a VirtualBox snapshot? I have a "baseline" VirtualBox machine, and I would like to be able to take a snapshot, and send it to another user which has the same baseline machine. The scenario is that the baseline machine is used for testing, and I want to allow testers to create snapshots which describe a certain system state, and send that snapshot to developers to further examination. EDIT: To clarify, I would like to be able to export snapshots "incrementally" without having to export the entire machine as an appliance.

    Read the article

  • configure monit on linux to monitor a process and then reboot

    - by Elad Dotan
    I would like monit to monitor my service and once it's stopped then I want the computer to reboot. The process don't have a certain port that I can monitor. This is what I did: check process chat with pidfile /var/run/chat.pid start program = "/etc/init.d/chat start" stop program = "/etc/init.d/chat stop" if changed ppid then exec /sbin/reboot I tried all sort of things but it only restart my service. Any suggestion.

    Read the article

  • Differences between how OS X Snow Leopard and Lion interface with a proxy?

    - by Antoni
    We have a proxy at school, which requires a login/password, and blocks a certain number of sites that aren't "school related" (facebook, youtube, etc.) While I'm able to get through to most things, people who've upgraded to Lion can't get through to anything, even though I've replicated my proxy/network settings on their machines. Is it possible that the difference in OS versions is causing this? I have Snow Leopard, they have Lion.

    Read the article

  • Is it possible to find deleted objects in active directory without the assistance of a DLP software?

    - by Itai Ganot
    It seems like a large number of security groups have been deleted from the organization's AD. i was able to find the tombstones but i see there 1400 objects from the last 180 days and i know for certain that the important groups which have been deleted, have been deleted somewhere between yesterday's night and now. Is there a way, maybe by using power shell to extract the names of all objects which have been deleted through out the night? Thanks in advance Itai

    Read the article

  • Amazon EC2 Ami recommendations for free tier?

    - by Console
    Amazon web services recently introduced a free tier, where you basically get free stuff to try out AWS and run tiny sites and projects. Basically it's free as long as you remain below a certain limit of bandwidth, disk storage etc. Since going over the limits can quickly become quite expensive (for a hobbyist) I would like some recommendations or suggestions about which AMI's I can run on the free tier, for the purpose of trying out Ruby on Rails and/or Django.

    Read the article

  • "Back" command for org-mode

    - by obvio171
    When I type C-c C-v to see the list of TODOs, or C-/ m to see headlines with a certain tag, org-mode shows me a sparse tree with the results. How do I then go back to seeing the tree the way it was before I issued this command? Note that I haven't changed the file in any way, so this isn't your normal "undo", it's about going back to how org-mode was displaying the tree before.

    Read the article

  • Latency in TCP/IP-over-Ethernet networks

    - by aix
    What resources (books, Web pages etc) exist out there that: explain the causes of latency in TCP/IP-over-Ethernet networks; mention tools for looking out for things that cause latency (e.g. certain entries in netstat -s); suggest ways to tweak the Linux TCP stack to reduce TCP latency (Nagle, socket buffers etc). The closest I am aware of is this document, but it's rather brief. Alternatively, you're welcome to answer the above questions directly.

    Read the article

  • Configure host access rights in OpenLDAP

    - by Anonymous Coward
    I've set up an OpenLDAP-Server to authenticate users to our Ubuntu-servers. The authentication works quite well but I'd like to restict the user's access to certain servers. I know this can be done through nss_base_something in the client's ldap.conf. However, this requires the group restrictions to be specified on the client. I wonder if the restrictions can be set completely in OpenLDAP. If it is, I'd like to know how. Thanks, AC

    Read the article

  • Is virtualenv suitable for a production server?

    - by gnufs
    I'm planning to set up a Python app (Pyblosxom) on my server and considering to run it in its own virtualenv sandbox with --no-site-packages. I'm hoping that such a setup would be easily portable and maintainable over the years. However, I've only used virtualenv for development environments that recreate a certain server setup locally, and most sources about virtualenv seem to also mention virtualenv for such a use. Is there any drawback to running a Python app from a virtualenv on a live server?

    Read the article

  • Apache: Limit the Number of Requests/Traffic per IP?

    - by Ian Kern
    I would like to only allow one IP to use up to, say 1GB, of traffic per day, and if that limit is exceeded, all requests from that IP are then dropped until the next day. However, a more simple solution where the connection is dropped after a certain amount of requests would suffice. Is there already some sort of module that can do this? Or perhaps I can achieve this through something like iptables? Thanks

    Read the article

< Previous Page | 127 128 129 130 131 132 133 134 135 136 137 138  | Next Page >