Search Results

Search found 9516 results on 381 pages for 'duplicate resource'.

Page 143/381 | < Previous Page | 139 140 141 142 143 144 145 146 147 148 149 150  | Next Page >

  • creating iTunes listing INCLUDING "Where" information

    - by Hugh
    Although iTunes produces a very good comprehensive listing of all music which can be copied and pasted into excel to give a database of music, unfortunately it does not include"where" information as shown on the "Get Info" summary. As, in my own case, music files are in a number of different locations(drives and folders) I would like to be able to identify, quickly and simply,duplicate tracks as the last column in the excel listing. Is there a way to do this?

    Read the article

  • What is the state of ext3 support in Mac OS X 10.6? [closed]

    - by gzuki
    Possible Duplicate: Mount ext2/ext3 in Mac OS X Snow Leopard I have a 1tb hard drive, I want it to have one partition that can serve as an interchange between linux (ubuntu) and mac (snow leopard). HFS+ scares me a bit, and I can't seem to get a clear picture on whether or not something like fuse can reliably write ext3 partitions in mac. Any good advice on this topic? Should I just pick HFS+ or ext3 and hope for the best (or just deal with only getting read-only on one OS)?

    Read the article

  • App to convert from ANSI to UTF8 on windows [closed]

    - by antoniocs
    Possible Duplicate: Batch-convert files for encoding or line ending under Windows Hey! I have many files that are encoded in the ANSI (iso-8859-1) format and I want to change it to utf8. I am converting one by one using notepad++ but I was wondering if there is any application that will convert them all (I have many files) in a quick and easy way. Anyone know of one app that will do this?? (free app would be great) Thanks

    Read the article

  • How to check properties of an audio [closed]

    - by Ashni Goyal
    Possible Duplicate: Tool to view video/audio file information Soundeffect class in WP7 requires following properties of the .wav file. The Stream object must point to the head of a valid PCM wave file. Also, this wave file must be in the RIFF bitstream format. The audio format has the following restrictions: Must be a PCM wave file Can only be mono or stereo Must be 8 or 16 bit Sample rate must be between 8,000 Hz and 48,000 Hz How can we check these properties for a given audio ?

    Read the article

  • How to audit a specific folder in Windows Server 2003?

    - by saint
    We have had several cases of file deletion in one of our windows file servers. Server is also a domain controller. Unfortunately we kept the auditing disabled completely due it being such a resource hog. So I was wondering If there is a way to audit a specific folder for a specific security group, for just file and folder deletions within the specified folder. Also is there a recommended third party application for auditing or monitoring. Many Thanks.

    Read the article

  • How to process requests twice in Apache

    - by Pieter
    In order to perform realistic tests for a new backend server, I'd like to process all Apache requests twice. So simply handle all the live requests with the old server, as it's done right now, but then also 'duplicate' the requests to a different virtual host, where the new backend is deployed, which will process the request and log the response. What's the best / most simple way to achieve this in Apache? (the backend is a FastCGI process)

    Read the article

  • edit sound files

    - by doug
    I have an audio file with a very bad recording (recording was made in very noisy conditions, at a conference). My recorder was too far from the speakers. Do you have any idea about how to improve the sound quality? Do you know any good resource for that?

    Read the article

  • I can't ping to my EC2 instance although icmp has been set

    - by user79356
    I wasn't able to ping to my ec2 server although I've done the following command: ec2-authorize default -P icmp -t -1:-1 -s 0.0.0.0/0 when I try this again it gives me: Client.InvalidPermission.Duplicate: The permission '0.0.0.0/0-3--1--1' has already been authorized on the specified group now when I ping from my laptop it gives me: PING 54.251.103.225 (54.251.103.225): 56 data bytes Request timeout for icmp_seq 0 Request timeout for icmp_seq 1 Request timeout for icmp_seq 2 Request timeout for icmp_seq 3 any idea on what to try on next?

    Read the article

  • How does Bittorrent work?

    - by mumtaz
    I want to learn more about the bittorrent way of file sharing. I am a technically advanced user (programmer), so technically advanced material is no problem, but it should be concise and to the point. I need a good resource book/web which explains the overall bittorrent architecture. I am not interested in details, just the overall architecture and the terminology like seeds, peers, etc. Any suggestions?

    Read the article

  • I have 2 identical windows 2008 r2 servers with 32G RAM, one shows "Installed Memory(Ram): 32.0GB" a

    - by c0m4
    the server model: HP Poliant DL160 G5, both servers have identical product ID. for some reason one of the servers have 4GB ram reserved. it shows in the memory tab on the Resource monitor as "Hardware Reserved". I've googled it a bit and found some post related to msconfig boot parameters (but mine are properly set) and some post related to memory remap option in the bios but it is not available in my servers bios so in a bit lost... help?

    Read the article

  • How to migrate OS X user from client to server?

    - by Zoran Simic
    I've recently acquired a mac mini server. Would like to migrate my existing (regular OS X) account to the server. I've created a user with same short name on the server side, but can't use it from my client for some reason. Also it is not clear how to add a machine to Workgroup Manager. Would you have a good resource/article to read to find out how to do this properly?

    Read the article

  • How to return corresponding row number in a table if a value falls within the bounds specified? [closed]

    - by Eshwar
    Possible Duplicate: Looking up a value, depending on which set of dates another date falls between Basically I have an excel table with 3 Columns - Month, Start, Finish - where Start and Finish are lower and upper bounds for transaction numbers and Month is a string. In another cell I have a transaction number that I want to find the corresponding month for. e.g. Jan 01 10 Feb 11 15 And if I want to find 12, I should get Feb out. (No VB, macros, etc. Please)

    Read the article

  • What causes "The INF file you selected does not support this method of installation." error?

    - by AndrejaKo
    This question is related to this one. Also, I think it's not duplicate of this question, since I'm not asking about specific device but a more general case. Where can I find information about driver .inf files and how windows checks if they are usable? I know that many people do modify .inf files so there must be some information on the Internet. Basically I have a bad .inf file and would like to see what's wrong with it and how to fix it if possible.

    Read the article

  • Avoid Windows Explorer to load complete executable file

    - by eli.work
    On Windows Vista, when browsing to a network folder containing executables, Windows Explorer seems to load all the files completely just to be able to show the executable icon (the resource monitor indicates loads of traffic during the loading of the directory) On XP only a part of the file is loaded. Is there a way to avoid the complete loading of these files? Note that disabling my anti virus does not help.

    Read the article

  • Outlook data file cannot be accessed. [closed]

    - by Alex
    Possible Duplicate: Outlook data file cannot be accessed. Hello. I am using the beta 2010 Office Outlook. When I try receive or send, i get the following error "outlook data file cannot be accessed." Repair/reinstall office and try to use any different outlook data files is not take any effect.

    Read the article

  • Postgresql Internals - Documentation

    - by NogginTheNog
    I'm looking for some up-to-date information about postgresql internals, specifically the query optimizer. I've found this link (referred to in the "Further Reading" section of the 8.4 docs):- http://db.cs.berkeley.edu//papers/UCB-MS-zfong.pdf but it seems quite old. That in itself is not a problem, but I wanted to be sure that I have information that is relevant. Is this the best resource for understanding how postgresql processes queries (using plans, statistics etc.) or are there others?

    Read the article

  • Need to reformat SQL Cluster Disk. How do I recover my SQL installation?

    - by I.T. Support
    We need to reformat the SQL cluster disk in our SQL cluster. The drive contains the shared installation files for SQL as well as databases. My concern is how SQL/The Cluster will react to after we wipe the disk resource. Questions: Is there a defined procedure for this? How should we backup and restore the disk? After the reformat, how do we get the clustered SQL server back online? Thanks

    Read the article

  • Print Business card

    - by Tural Teyyuboglu
    I'm trying to create business card on adobe Photoshop. But I feel that, PS is not right choose for this reason: First of all after creating 1 business card, I can't duplicate it automatically to fill a4 page. I have to do it manually, one by one by duplicating 1 business card. After googling a bit,I've found another application but it'stoo simple, no way to change standarts templates. Which application is right for professional business card design?

    Read the article

  • Chroot for Mysql running on Ubuntu 10.10?

    - by Calvin Froedge
    Prompted from a question about MySQL server security best practices, I've been running through this list (with a few minor alterations) to properly secure my server database server: http://www.greensql.net/publications/mysql-security-best-practices On step 10, I'm told to change the root directory for the mysql user using chroot, but very few specifics are provided and I'm not sure where to start. Does anyone know of a good resource for walking me through the steps to properly create a chrooted environment for Ubuntu 10.10?

    Read the article

< Previous Page | 139 140 141 142 143 144 145 146 147 148 149 150  | Next Page >