Search Results

Search found 9983 results on 400 pages for 'fuzzy c means'.

Page 148/400 | < Previous Page | 144 145 146 147 148 149 150 151 152 153 154 155  | Next Page >

  • Are some DSL modems cheaper to operate than others? (power usage question)

    - by SetJmp
    I recently have started using a Motorola 2210 in conjunction with AT&T's DSL service in the Silicon Valley area. That gadget runs hot to the touch! Which means... I assume it is gobbling lots of electricity even when I am not using it. Has anyone studied this subject in a rigorous way? Which leads to the question... if the 2210 is very energy inefficient are some DSL modem models cheaper to operate than others? -SetJmp

    Read the article

  • Migrate servers and mailboxes?

    - by johnnietheblack
    I am moving a website from one hosting provider to another, and this of course means that I need to migrate all the mailboxes as well. Do I have to manually move all the old emails from one server to another, or will all the email clients "save" a copy of the old emails on each computer? UPDATE Pardon, the naivety - I hope this additional info helps: I'm doing this remotely, so I am not sure which email client(s) people will be using at the office, but I will need to be prepared for both POP and IMAP setups. Also, the server they currently have is on VPS.net (cPanel), and we are migrating to a MediaTemple Dedicated Virtual (Plesk). Both Linux.

    Read the article

  • why Apache with ssl but back end weblogic without ssl works?

    - by huangli
        Hello everyone. my question is very simple . The link below is a picture about my architecture. https://docs.google.com/open?id=0BxSXbpgYIZVOR212RVk4ZDN1Sm8.      The pic above shows the architecture right now and it works correctly ! which means I could visit apache with url https//apchehost:8080, could not visit the web app with https served by weblogic but I could visit these app with https served by Apache(Apache is proxy server).      My question is why the Apache is configured with ssl but weblogic without ssl works ? I think weblogic should also configured with ssl . If this works , what about security level ? Is the ssl really works if only Apache configured with ssl but Weblogic without it ? Thanks . condition: Apache 2.2.17 with weblogic module mod_wl_22.so Weblogic: 10.3 OS: Windows server 2003

    Read the article

  • What to have in sources.list on an Ubuntu LTS server (production)?

    - by nbr
    I have several Ubuntu 10.04 LTS servers in production and I'm using apticron to check that my software is up to date, security-wise. However, by default, Ubuntu has the lucid-updates repository enabled. This means lots of low-priority updates (such as this) that I don't need and thus, extra work for me. Is it okay to just remove the lucid-updates line(s) in sources.list? I still get security updates via lucid-security, right? So, this is what my sources.list would look like. deb http://se.archive.ubuntu.com/ubuntu/ lucid main restricted deb http://se.archive.ubuntu.com/ubuntu/ lucid universe deb http://security.ubuntu.com/ubuntu lucid-security main restricted deb http://security.ubuntu.com/ubuntu lucid-security universe

    Read the article

  • Pass parameters to a script securely

    - by codeholic
    What is the best way to pass parameters to a forked script securely? E. g. passing parameters through command line operands is not secure, since someone who has an account on the host can run ps and see them. Unnamed pipe is quite secure, as far as I understand, isn't it? I mean, passing parameters to STDIN of the forked process. What about passing parameters in environment vars? Is it secure? What about passing parameters by other means I didn't mention?

    Read the article

  • What does the term 'overinstallation' mean?

    - by Kent Pawar
    I came across this term here: "11882875 -- Essbase Server does not start after an overinstallation." I know that a clean install is a software installation in which any previous version is removed. Googling 'overinstallation' turned up nothing, and I don't like to just assume it simply means 're-install'. UPDATE: So my understanding now is - the term "re-install" can be a bit ambiguous as it could either signify an installation after an uninstallation or otherwise. On the other hand the term "over-installation" specifically talks about installing something over an existing installation, that involved no uninstallations.

    Read the article

  • Hyper-V Server 2008 Configuration

    - by Eternal21
    I need to set-up Lync on a Server 2008 machine. The problem is that Lync cannot be set up on a Domain Controller. That means I need to have one Server 2008 that's a domain controller and another that's Server 2008 running Lync. I figured the best way would be hosting it on a single machine, using virtual machines. I installed Server 2008, but now my question is this. Do I add two virtual machines (Domain Controller and Lync), or do I only add one virtual machine for Lync, and the 'parent' Server 2008 can act as a domain controller?

    Read the article

  • some questions about raid card

    - by cpps
    I have some questions about raid card. Use LSI MegaRAID® SAS 9260-8i raid card as a example. There is only two connection ports on the raid card, and they provide two cables that can connect 8 SAS/SATA storages. The document say it can connect "Maximum 32 drives per controller", I want to know how can I connect more than 8 hard disks with this card. Is that they say "Eight internal SATA+SAS ports" means they provide two cables which can connect 8 hard drives, but you can use other way to connect Maximum 32 drives? The other question. I see host bus adapter has raid integrated , so what is the difference between host bus adapter and raid card. Are they the same? I also know is SAS/SATA Expander's function only to connect more hard drives? Thanks in advance.

    Read the article

  • Bluetooth connectivity

    - by Viniketa
    computer: Samsung All in One PC OS: Windows 7 (up-to-date) BT Radio: Broadcom I have Bluetooth speakers I have successfully used with the system in the past. In fact, I had them set as default speakers so audio would transfer when I turned them on. No longer. Now, they show as 'disconnected'. Asking for connection gives no response. Option to set as default is greyed out. Bluetooth view utility gives an error of 10049 when I try to connect (supposedly, the means an invalid device address). I uninstalled the device and re-installed. No help. Any advice? Thanks in advance.

    Read the article

  • Please define: "Maximum Memory Supported - 10GB, Service Upgradable Only"

    - by Droogans
    I am assuming this means that the RAM modules can only be inserted/removed from some place very inconvenient? Maybe under the keyboard? Or does this mean something more strict, as in the only way to get an upgraded module in the laptop is via some special toolset, or verified through the hardware to allow the system to recognize the new memory? I ask because I'd want to know if I need to buy my own additional RAM, since I can't seem to find a way to get to 8GB. A Google search result turned up very little other than hits for shopping. Here is the laptop in question: http://www.tigerdirect.com/applications/SearchTools/item-details.asp?EdpNo=4817549&sku=T78-144301

    Read the article

  • High CPU Steal percentage on Amazon EC2 Instance

    - by Aditya Patawari
    I am experiencing high CPU steal percentage in a Amazon EC2 large instance. I know it means that my virtual CPU is waiting on the real CPU of the machine for time. My question is that what can I do to reduce this percentage and get maximum out of the CPU? Steal percentage is consistently at 20%. System load crosses 10 when this happens. I have checked memory and network and I am sure that they are not the bottleneck. Is that normal for such environment? Also are there any system level optimization techniques for reducing steal percentage form the virtual instance? avg-cpu: %user %nice %system %iowait %steal %idle 52.38 0.00 8.23 0.00 21.21 18.18

    Read the article

  • EC2 custom topology

    - by Methos
    Is there any way to create a desired topology of EC2 instances? For example, can I create a 3 node topology of nodes A, B, C where C gets the public IP address and B and A are connected to it. Something like: Internet <-- C <-- B <-- A B and A only get private IP addresses and there is no way for the traffic to reach A before hitting B and C. This means I can install whatever I want to install on C and B to filter, cache etc. I'm going through EC2 documentation but so far I have not seen anything that talks about it. I will really appreciate if anyone knows how to do this on EC2

    Read the article

  • Intel T5600 to upgrade T5250

    - by galets
    I want to upgrade my laptop which has T5250 CPU with a T5600 CPU to support virtualization. I ordered T5600 on ebay, but it didn't fit. It says T5250 supports PPGA478 socket, so I assume that is what I have. T5600 says supports "PBGA479, PPGA478". Since T5600 didn't fit as a replacement, I assume it means there are 2 models of T5600, one supports PBGA479, another one supports PPGA478, and not like I thought - one CPU supports both. Is that a correct statement? Does anybody know if it's even possible to do such an upgrade, or I'm wasting time?

    Read the article

  • Tracking down laptops Google has never heard of

    - by John
    Using MS tools to get information on PCs using our software, our customers have sent several Lenovo systems which have names we simply cannot find using Google... no search results at all. Considering these names/ids are returned by querying the system directly, not asking the customer to write it down by looking at the box, this seems odd. The ones we have so far (more than one of each) are: Lenovo 2241BL9 Lenovo 6463Y4H My guess is these are Thinkpads after Lenovo took over the brand, but can anyone help me out with this detective work? edit: the 2nd one does turn up some driver downloads and this page, but it's unclear what any of that means. Is the 6463y4h just a T61? http://smolts.org/reports/view_profile/%20ThinkPad%20T61

    Read the article

  • MySQL Cluster transaction isolation level - READ_COMMITTED

    - by Doori Bar
    I'm learning by mostly reading the documentation. Unfortunately, http://dev.mysql.com/doc/refman/5.1/en/set-transaction.html#isolevel_read-committed doesn't say anything, while it says everything. Confused? Me too. ndb engine supports only "READ_COMMITTED" transaction isolation level. A. It starts by saying "sets and reads its own fresh snapshot", which I translate to: The transaction is having a separated 'zone' which whatever it stores there - is what it reads back. B. While out-side of the transaction, the old-values are unlocked. C. It continues with: "for locking reads" sentence - No idea what it means. Question: they claim only READ_COMMITTED transaction isolation level is supported, but while handling a BLOB or a TEXT, they say the isolation is now "locked for reading" too. So is it a contradiction? can a transaction LOCK for reading just as well while handling something other than BLOB/TEXT? (such as integers)

    Read the article

  • Deleting sender from Outlook Safe Senders using GPO?

    - by Hutch
    We're having an external company do a mailshot to our users. The message contains images that are linked rather than embedded in the image (bandwidth isn't an issue). So of course on recent versions of Outlook you're prompted to download the images, not the end of the world, but it would be nice if that didn't happen. There's a bug in the Office/Outlook ADM/ADMX templates that means that a custom list of Safe Senders won't import unless you follow this: http://support.microsoft.com/kb/2252421 Thing is, if I remove an entry from the Safe Senders file, it doesn't seem to remove it from Outlook, which seems odd?

    Read the article

  • How to set up VLAN network

    - by Paddington
    I'm changing my network from having every device on flat network to using VLans. My problem is that we already have a lot of devices on this network(192.168.20.0/24). From theory, I read that each Vlan has to be a different subnet and then I need to configure virtual interfaces on my Cisco router to cater for inter vlan routing. 1) How can I segment this network with minimum down time on the devices already on the network? 2) Can I just create Vlans and leave all these Vlans in the same layer 3 network so that they can go out of the network (I am not too concerned about inter-Vlan routing) or I have to create subnets which means reconfiguring the existing devices (something I do not want).

    Read the article

  • Windows XP freezes completely

    - by Max
    Lately my Win XP SP3 started to make problems. From time to time it freezes completely. Which means that the system does not react to mouse and keyboard. Keyboard led indicators also do not react to CAPS-, SCROLL-, NUM- LOCK keys. The problem is that I don't understand what causes this behavior and it seems to happen randomly. System event log also does not contain any clues. I'm thinking this could be some driver/hardware problem, but I don't know which. Are there any tools that would help me figure out the cause of this problem? Does anybody have any clue how can I fix this?

    Read the article

  • Run single php code using multiple domains

    - by Acharya
    Hi all, I have a php code/site at xyz.com. Now I want to run the same site using multiple domains means when somebody open domain1.com, domain2.com ,domain4.com, so on urls, it should run the code/side that is at xyz.com I know one way to do this. I can host all these domains to the server where xyz.com is hosted so all domains will point to same peace of code/site. n above solution i need to hosted the domains manually. Is there any other way to do this as I want to add domains dynamically? Thanks in advance!

    Read the article

  • How to make sure clients update their browser cache when my website is updated?

    - by user64204
    I am using the HTTP 1.1 Cache-Control header to implement client-side caching. Since I update my website only once a month I would like the CSS and JS files to be cached for 30 days with Cache-Control: max-age=2592000. The problem is that the 30-day period defined by Cache-Control doesn't coincide with the website update cycle, it starts from the moment the users visit the site and ends 30 days later, which means an update could occur in the meantime and users would be running with outdated content for a while, which could break the rendering of the website if for instance the HTML and CSS no longer match. How can I perform client-side caching of content for periods of several days but somehow get users to refresh their CSS/JS files after the website has been updated? One solution I could think of is that if website updates can be schedule, the max-age returned by the server could be decreased every day accordingly so that no matter when people visit the website, the end of caching period would coincide with the update of the website, but changing the server configuration every day goes against one of my sysadmin principles (once it's running, don't touch it).

    Read the article

  • Make a animation path separated by clicks

    - by Tomáš Zato
    I have a long text on powerpoint slide. Instead of separating it on multiple slides, I made an animation that moves it up using animation path, so that text hidden at bottom appears while text on top goes off screen. However, I need more move animations to reaveal more text (the text takes more than 2 screens). This means, I need two (or more) animation paths (of the same length) and I want them to move obejct from position, where the last path has left it. Instead, multiple animations always operate with objects original position. That's useless. You can download test document, where I made an example of what I want: animation test.pptx

    Read the article

  • Prevent Windows Exporer to extract metadata

    - by olafure
    Windows Explorer (windows 7 x64) crashes when it sees allegedly corrupted .wav files. I'm dealing with this problem and the hotfix doesn't work for me: http://support.microsoft.com/kb/976417/en-us The hotfix says that this happens if the .wav file is corrupt (which btw I don't think it is). What makes this even worse is that I can't access the file in any program! As soon as the open dialog sees the file, windows tries it's metadata extraction trick and exporer.exe halts. So my question: Can I by any means tell windows to stop this "metadata extraction" action ? (I have seen multiple problems associated with it in the past).

    Read the article

  • What does the red x icon mean next to a user in folder permissions (Windows 7)

    - by Scott Szretter
    In trying to debug various strange issues on a machine, I found something strange - when I go to C:\Users\administrator and get properties, security tab, it lists the users (the local admin account, system, and 'administrator' which is the domain administrator account). It all looks fine in terms of permissions (full control, etc.) compared to other machines. The one difference is there is a small red circle with an X to the left of the user icon/name. Additionally, there are various folders where it says access denied under there - for example, my documents! Even logged in as the local machine administrator account (which is not named administrator), I am unable to change the permissions - it says access denied. Any ideas what this means and how to fix it? I even tried re-joining the machine to the domain.

    Read the article

  • List of recent motherboards with BIOS / without UEFI [on hold]

    - by jmn
    I am building a new desktop PC and I want to have full disk encryption on it. TrueCrypt doesn't support UEFI as of now. Are there still recent motherboards out there without UEFI ? I didn't find any list and I am afraid that I will have to study each potential candidate's technical sheet before purchase. I want to buy 2 or 3 of the same model to be future proof. Newegg links will not help, I don't live in the USA ... this means that this post is a legitimate target for PRISM ;-) Thanks for your help.

    Read the article

  • Problem with fitting graphics card

    - by Gary Robinson
    I have recently purchased a new radeon hd5670 graphics card. The problem I have is that it is what I might call a double height card. So the end where you fix the card to the case is twice the size of the card it is replacing. But this means that it is blocked by the rear of the network card. The only way I can see it to cut that part of the fixture part out then I won't have a problem. But has anyone any suggestions what I could use? To be clear it is not the actual card it is the fixture part which is 90 degress to the card that is causing the problem. Unless someone knows of another solution - some kind of pci-e extender that I could use as I could easily

    Read the article

< Previous Page | 144 145 146 147 148 149 150 151 152 153 154 155  | Next Page >