Search Results

Search found 22653 results on 907 pages for 'case insensitive'.

Page 163/907 | < Previous Page | 159 160 161 162 163 164 165 166 167 168 169 170  | Next Page >

  • SEO Services

    With all of the social networking websites popping up all over the internet, many are afraid that all of these new pages will make it increasingly harder for one to get his or her website noticed. This may be the case considering that new people are creating social network web pages at the rate of about one per minute.

    Read the article

  • How to make code-review feel less like a way to *shift* the responsibility? [duplicate]

    - by One Two Three
    This question already has an answer here: How do you make people accept code review? 33 answers Sometimes it seems to me that people ask for code-reviews just so they would be able to say "Xyz reviewed my code!"(1) when something broke. Question, is that ever the case? (Or is it just my imagination) If it is, how do I handle this? (1): What s/he really meant: It's Xyz's fault or something along those lines.

    Read the article

  • install a specific ubuntu version

    - by Dariopnc
    What I'd like to do: have Ubuntu installed on a USB drive and from there install any ubuntu version on a hdd. This is kinda different from using usb-creator because I'd like to have a persistent ubuntu install on the USB drive and not upgrade it every 6 months. From there I'd like to be able to install the most recent ubuntu version. I think it's just a matter of configuring ubiquity, but don't know if this is the case and how exactly do this.

    Read the article

  • Canonical tags for separate mobile URLs

    - by DnBase
    I have a Drupal website serving mobile pages from different urls (starting from /mobile). According to Google recommendations I should use the canonical tag to map desktop and mobile pages. Right now I did this in case I serve the same node (e.g: node/123 and mobile/node/123) but should I do this for other pages as well that are equivalent but share a different content? For example do I need to map the desktop and mobile homepages even if they don't have the same content at all?

    Read the article

  • Grid Game Algorithm

    - by 7Aces
    Problem Link - http://www.iarcs.org.in/inoi/2009/zco2009/zco2009-1a.php You have to find the path with the maximum weight, from the top-left cell to the bottom-right cell. It could've been solved with a simple Dynamic Programming approach, if it were not for the special condition - you are allowed at most one move that can be either to the left or up. How do I now approach the problem with this special case? Also, I'm looking for a time-efficient approach. Thanks!

    Read the article

  • Highlighting repeating groups in SSRS 2008 R2 charts

    In a typical bar chart, the height of the bars represents the value of the data along the X axis and the Y axis represents the category of the data point. All these values can be classified in logical groups depending upon the logic used for analysis. One general requirement that arises in the case of repeating groups, is to highlight these groups without representing it on the X or Y scale. In this tip we will look at how to address this requirement.

    Read the article

  • The Most Viable Options You Can Make If You Need Help Building a Website

    Admit it. You need help building a website. If this is the case and you really need that assistance right at this moment, then good for you. You can easily get the help that you need and build that website using the right tools. All you need to do is to decide based on your circumstances and surely, you will find a solution that will solve the problem for you.

    Read the article

  • Retrieving SQL Server Fixed Database Roles for Disaster Recovery

    We ran into a case recently where we had the logins and users scripted out on my SQL Server instances, but we didn't have the fixed database roles for a critical database. As a result, our recovery efforts were only partially successful. We ended up trying to figure out what the database role memberships were for that database we recovered but we'd like not to be in that situation again. Is there an easy way to do this?

    Read the article

  • Where has /lib/udev/keymap gone? How do I adjust keymaps in Trusty?

    - by dizpers
    I tried to use this tutorial to make scroll switch work on my Microsoft Natural Ergonomic Keyboard 4000. But I face following error: sudo: /lib/udev/keymap: command not found I have udev version 204-5ubuntu20.2 (the version found in Trusty) I noticed that this version doesn't include keymap tool. But I notices that greater udev versions (which available for Debian, for example) include this tool. Could somebody explain this diff for me? =) And what should I do in this case - install package from Debian repo?

    Read the article

  • Why do password strength requirements exist? [migrated]

    - by Bozho
    Password strength is now everything, and they force you to come up with passwords with digits, special characters, upper-case letters and whatnot. Apart from being a usability nightmare (even I as a developer hate it when a website requires a complex password), what are the actual benefits of having strong passwords (for website authentication)? Here are the prerequisites of a system that handles authentication properly: store passwords using bcrypt (or at least use salt+hash) - hard-to-impossible to find the original password when an attacker gets the database lock subsequent password attempts with a growing cooldown - no brute-force via the site

    Read the article

  • Security Advice for Managers

    - by TATWORTH
    Please go to the following for list of free downloads of security advice for managers.http://www.bis.gov.uk/policies/business-sectors/cyber-security/downloadsThere are case studies to explain to managers the effect of failure to maintain good security.At http://www.cpni.gov.uk/advice/cyber/Critical-controls/ there is a list of critical controls developed by GCHQ in conjunction with the SANS insitute.

    Read the article

  • Replicating A Volume Of Large Data via Transactional Replication

    During weekend maintenance, members of the support team executed an UPDATE statement against the database on the OLTP Server. This database was a part of Transactional Replication, and once the UPDATE statement was executed the Replication procedure came to a halt with an error message. Satnam Singh decided to work on this case and try to find an efficient solution to rebuild the procedure without significant downtime.

    Read the article

  • How can I remove all updates installed after a specific date?

    - by creative
    I have allowed the update manager to install a 200 Mib of updates, and I think that these update run my graphics driver into a problem. So, I need a way to remove the updates that have been installed since 30th of may 12 for example (or any other date). If I have to remove them manually (in the case of uninstalling them one by one), you are kindly requested to give me the instructions of how to do that.

    Read the article

  • Is it reasonable to insist on reproducing every defect before diagnosing and fixing it?

    - by amphibient
    I work for a software product company. We have large enterprise customers who implement our product and we provide support to them. For example, if there is a defect, we provide patches, etc. In other words, It is a fairly typical setup. Recently, a ticket was issued and assigned to me regarding an exception that a customer found in a log file and that has to do with concurrent database access in a clustered implementation of our product. So the specific configuration of this customer may well be critical in the occurrence of this bug. All we got from the customer was their log file. The approach I proposed to my team was to attempt to reproduce the bug in a similar configuration setup as that of the customer and get a comparable log. However, they disagree with my approach saying that I should not need to reproduce the bug (as that is overly time-consuming and will require simulating a server cluster on VMs) and that I should simply "follow the code" to see where the thread- and/or transaction-unsafe code is and put the change working off of a simple local development, which is not a cluster implementation like the environment from which the occurrence of the bug originates. To me, working out of an abstract blueprint (program code) rather than a concrete, tangible, visible manifestation (runtime reproduction) seems like a difficult working environment (for a person of normal cognitive abilities and attention span), so I wanted to ask a general question: Is it reasonable to insist on reproducing every defect and debug it before diagnosing and fixing it? Or: If I am a senior developer, should I be able to read (multithreaded) code and create a mental picture of what it does in all use case scenarios rather than require to run the application, test different use case scenarios hands on, and step through the code line by line? Or am I a poor developer for demanding that kind of work environment? Is debugging for sissies? In my opinion, any fix submitted in response to an incident ticket should be tested in an environment simulated to be as close to the original environment as possible. How else can you know that it will really remedy the issue? It is like releasing a new model of a vehicle without crash testing it with a dummy to demonstrate that the air bags indeed work. Last but not least, if you agree with me: How should I talk with my team to convince them that my approach is reasonable, conservative and more bulletproof?

    Read the article

  • Is there a quick way to enter uppercase accented characters?

    - by agnul
    I know I can enter any character I need using the character-map applet, but that means grabbing the mouse/opening the "run" dialog, switching to another window, selecting the character, copying... you get the idea. Is there a quicker way to enter characters that are not available on the keyboard (and are not available as alt-gr combinations)? In my specific case I'm using a laptop with the Italian keyboard layout, but I suspect a general solution exists.

    Read the article

  • how to install oracle 10g xe on ubuntu 11.04

    - by ses
    I have read from here how to install oracle 10g xe in ubuntu 10.x but not in 11.04 (64 bit). But with 11.04 it does not work anymore because of dependency exceptions. So, how to install oracle 10g xe in ubuntu 11.04? I even found some variant how to fix it from here but in my case it does not work - the same exception take place: oracle-xe-universal:i386 depends on libc6 (= 2.3.2); however: Package libc6:i386 is not installed.

    Read the article

  • Oracle 12c: First (and best!) on Solaris

    - by mgerdts
    Oracle 12c is now available for download.  Notice that support for Solaris SPARC and x86-64 are among the operating systems supported on the first day of availability. New database features that relate to Solaris include: I/O outlier support.  This is made possible through the database's use of DTrace, and as such Solaris has a clear edge here. Oracle ACFS Replication and Tagging for Solaris Integration with Solaris resource pools As has been the case for some time, Oracle databases are supported in zones.

    Read the article

  • Farm is unavailable exception

    - by H(at)Ni
    I was faced today by an exception saying that "Farm is unavailable" and the call stack which for sure wasn't useful for diagnosing that type of error. My solution to this error was straight forward and below are the steps that I've followed: 1. Open run and type services.msc 2. Search for the SQL server instance and in my case I've found that it's not running, so simply start it :) After that, refresh the page and everything is normal again !

    Read the article

  • How to suspend a user from coming back on my website and register again? any ideas? [closed]

    - by ahmed amro
    i am an outsourcing person not a programmer and i am working on shopping website like ebay , so my question might be beginner for everyone.my website will need a user suspension in case he violates the terms and conditions. here is some thoughts on my mind: -IP address tracking -User information ( email address or any information are going to be repeated on second time of registration after suspension) -session Id cookies are also a way to identify the users after log in any more creative suggested ideas to avoid fraud and scammers, it it possible to make 100% impossible to avoid those bad users from coming back ?

    Read the article

  • Can't Drag & Drop text to unity launcher (e.g. url's, highlighted text)

    - by patsee
    I'm trying to create a unity launcher icon (.dekstop file) on which you can drop any (selected/highlighted) text from a web browser, google chrome in my case. I know you can use the "MimeType=" key in a .desktop file, but I can't find the right mime type for my scenario. I've tried several text MimeTypes and "text/*", but none of them would work. Does anyone know which MimeType I have to use in order for my launcher icon to accept text when hovering over it?

    Read the article

  • 5 Steps to Impress First Time Site Visitors

    Have you ever given some thought to what you need to do to attract people to visit the website you just created for them? In case you haven't yet done so, let me take you through five basic steps which you should adhere to if you are looking for an increase in the daily hits to your website.

    Read the article

< Previous Page | 159 160 161 162 163 164 165 166 167 168 169 170  | Next Page >