Search Results

Search found 30555 results on 1223 pages for 'closed source'.

Page 191/1223 | < Previous Page | 187 188 189 190 191 192 193 194 195 196 197 198  | Next Page >

  • Sound feels to come from far in my headphones [closed]

    - by Rakesh
    I bought new headphones just yesterday. The strange thing is when I hear sound from my headphone I feel like it is coming from far away. Main problem comes in games, when I hear the footsteps of enemies and think he is on the other side of the wall while he is near to me. :D I also heard virtual haircut on youtube . I tried this with my new headphones and HTC desire S earphones. In case of HTC earphones I felt that scissors and electric razor( @ 3:04 ) is too much near to my ear but in case of the headphones I didn't felt such thing. I felt electric razor is almost 6 inches away from my ear. Have you ever encountered such problem? What can I do in this case?

    Read the article

  • Failure Scenarios in IP networks [closed]

    - by Karthik
    I am searching for a list of faults that may occur in a traditional IP network. To give you a better understanding of what I am looking for: For an MPLS-IP network the set of faults may be something as given in this cisco site. I want pointers to such kind of faults for a traditional IP network. Individual suggestions from you are welcome, but in doing so, please also provide a link to the official site from which you came with those failure scenarios.

    Read the article

  • Event Source Live streaming in Ruby on rails onError method

    - by kishorebjv
    I'm trying to implement basic rails4 code with eventsource API & Action controller live, Everything is fine but I'm not able to reach event listner . Controller code: class HomeController < ApplicationController include ActionController::Live def tester response.headers["Content-Type"] = "text/event-stream" 3.times do |n| response.stream.write "message: hellow world! \n\n" sleep 2 end end Js code: var evSource = new EventSource("/home/tester"); evSource.onopen = function (e) { console.log("OPEN state \n"+e.data); }; evSource.addEventListener('message',function(e){ console.log("EventListener .. code.."); },false); evSource.onerror = function (e) { console.log("Error State \n\n"+e.data); }; & When i reloading the page, My console output was "OPEN state" & then "Error State" as output.. event-listener code was not displaying . 1.When I'm curling the page, "message: Hellow world!" was displaying. 2.I changed in development.rb config.cache_classes = true config.eager_load = true 3. My browsers are chrome & firefox are latest versions, so no issues with them, Where I'm missing? suggestions please!

    Read the article

  • laptops with 5.1 surround sound card for external use and not internal [closed]

    - by Jayapal Chandran
    I want to buy a laptop with 5.1 sound card from which i should be able to connect my external 5.1 speakers for example creative inspire 5.1 or similar creative model speakers. Is this option available. It should be and i want suggestions or a list of manufacturers with such option. My friend got one but he said it cannot be use with external speakers it is just built in 5.1 speakers. So i am asking this question.

    Read the article

  • Favourite Open Source iPhone apps

    - by objektivs
    I'm an aspiring iPhone developer and I'm looking for a significant OS iPhone codebase to see how others build apps. I'm especially interested in examples exhibiting some or all of the following: business/enterprise apps apps that interact with web services apps utilising XML apps using oauth or other authenticate Personally, I'm less interested in games, but feel free to include any examples for the benefit of others. I'm asking here because the usual places I've been looking (i.e. sourceforge) don't seem to have the kind of examples I'm looking for.

    Read the article

  • Specifying Struts templates source

    - by Chris
    Say I'm using a form with a text-field. <@s.form action="login" <@s.textfield label="E-mail" name="email"/ <@s.submit value="send"/ How can I specify that the text-form should be generated by a custom template (text_login.ftl) rather than the standard text.ftl?

    Read the article

  • Number of malicious attacks defended/done on the average user daily [closed]

    - by DalexL
    As a web hoster, it is very easy to notice the large amounts of exploit/abuse attempts done on my servers. Out of curiosity, how often are these attempts done on the average user? I'm assuming almost all of them are prevented just by simple security protocols in place by their browsers, local network, etc. How many attempts, on average, are committed against a single user daily through any method? (email, internet, downloads, etc.)? If known, what percentage of these things are blocked by the average users security? I tried googling but I was having a hard time getting the right search terms together.

    Read the article

  • Websites that introduce new stuff [closed]

    - by user33929
    Are there any blogs/websites that introduce new funny/fancy websites or new tech (software/hardware)? I am talking about sites that may introduce digg.com, superuser.com, mint.com or delicious.com when these site first come out. I am also looking for sites that introduce new handy/useful 3rd party applications/tools. Thanks.

    Read the article

  • Etiquette: Version bump my fork of opensource project?

    - by Ross
    This question is about etiquette and open source projects. I have forked an application from github and added two new features. The first feature has been request frequently elsewhere. I have added it. Code & implementation are clean (I think). The second feature is more of a hack. It will be of use to others, but the implementation is a little dirty in useage and more so in code. I need the feature but I don't have the skills to fully implement it properly or to a level that could be considered a worth while contrabution to the main project. How should the versioning work? Do I just bump up my version numbers care-free and push to my master branch? It is annoying to know which version is running, modifed or original, as both have the same version number. But will it be confusing when, months later, my github page has a version number the same as the original but both are actually completely different. (I have made pull requests etc. but that is not the context of my question.) The project I have forked uses ruby jeweler so has a versioning format of: Jeweler tracks the version of your project. It assumes you will be using a version in the format x.y.z. x is the 'major' version, y is the 'minor' version, and z is the patch version. Is this standard for other projects/langauges too? Are my changes patches? Thanks

    Read the article

  • Specific cron at time point [closed]

    - by ARTI
    I have a very specific task, but can't handle it. I am not a programmer and totally n00b on bash scritps. So the question is, how to create a cron job like this: Script A.sh could be called at any time by hands, and it should create cron job to run script B.sh once at the nearest time point. For example I will have 4 time points: 10.00pm, 10.15pm, 10.30pm, 10.45pm. So if trigger a script A.sh at 10.07pm it should creat cron job to run ONCE script B.sh at 10.15h, because 10.15h is the nearest time point in future. Is it possible? How can I write such script A.sh? I use Centos 6 It is very important and urgent for me. Thank you very much.

    Read the article

  • Pushing Large Files to 500+ Computers [closed]

    - by WMIF
    I work with a team to manage 500-600 rented Windows 7 computers for an annual conference. We have a large amount of data that needs to be synced to these computers, up to 1 TiB. The computers are divided into rooms and connected through unmanaged gigabit switches. We prepare these computers ahead of time with the Windows installation and configuration, plus any files that we have available to us before we send the base image in for replication by the rental company. Every year, we have presenters approach on site with up to gigs of data that need to be pushed to the room that they will be presenting in. Sometimes they only have a few files that are small sizes, such as a slide PDF, but can sometimes be much larger 5 GiB. Our current strategy for pushing these files is using batch scripts and RoboCopy. For the large pushes, we actually use a BitTorrent client to generate a torrent file, and then we use the batch-RoboCopy to push the torrent into a folder on the remote machines that is being monitored by an installed BT client. Often times, this data needs to be pushed immediately with a small time window. We have several machines in a control room that are identical to the machines on the floor that we use for these pushes. We occasionally have a need to execute a program on the remote machines, and we currently use batch and PSexec to handle this task. We would love to be able to respond to these last minute pushes with "sorry, your own fault", but it won't happen. The BT method has allowed us to have a much faster response time, but the whole batch process can get messy when there are multiple jobs being pushed. We use Enterprise Ghost for other processes, and it doesn't work well in this large of scale, plus it is really quite expensive for a once-a-year task like this. EDIT: There is a hard requirement that the remote machines on the floor are running Windows. The control machines do not have a hard OS requirement. I would really like to stay away from Multicast because of complications with upstream routers. Is Multicast or BitTorrent the better way to go on this? Is there another protocol that might work better?

    Read the article

  • Dealing with employees that use Hotspots? [closed]

    - by javasocute
    Recently a consultant revealed to me and my superiors that a particular department in my company had a tremendous decline in productivity over the past year. This department happened to mostly work with laptops and tablets and thus had wireless. Our barracuda did not display any vast amounts of internet entertainment and so I was initially puzzled by his statement. However he explained that more and more employees are using "hotspots" that when not broadcasted, become invisible to our network. So basically these people could connect to hotspots and watch youtube all day and we would never know it. The consultant also said that this was becoming an issue for many companies. So my question is, how can I detect invisible hotspots? I was browsing google and there are several different programs that can scan for such access points. But I am hoping to get a recommendation from the serverfault community. Thank you.

    Read the article

  • Pass a variable from the source file to an included file in PHP

    - by Alpha1
    For my website I want to store the general format of the site in a single PHP file in a single location, and each of the different pages content in the local location of the page. I then want to pass the title and content address to the included file via a variable. However I can't get the included format file to read the variables storing the title and content data. AKA, the called file for the individual page would be: <?php $title = 'Some Title'; $source_file = 'content.php'; readfile('http:...../format.php'); ?> The format file would be: <html> ... <title> <?php echo $title; ?> </title> ... <?php include($source_file); ?> ... I recall reading somewhere I need to include something to get the variables at the start of the format file, however I can't remember what it is or find where I found that information.

    Read the article

  • How to report abuse to website hosting company (GoDaddy) [closed]

    - by lgratian
    I'm not sure if this is the right place to ask such a question... Let's say that a website posted a picture of me, without my consent, and I want it to be removed (it's something private, could compromise my career if it's seen by someone that shouldn't). I sent them an email asking nicely that they should remove it, but they didn't respond and the picture is still there. Using 'Whois' I found that the website is hosted by GoDaddy. Is there a way (an email address, for ex.) to report to GoDaddy that one of the sites they're hosting does something illegal and to force them to remove the photo? I searched the site and found nothing about such a thing. Thnaks in advance!

    Read the article

  • Get information about a function in python, looking at source code

    - by Werner
    Hi, the following code comes from the matplotlib gallery: #!/usr/bin/env python from pylab import * x = array([10, 8, 13, 9, 11, 14, 6, 4, 12, 7, 5]) y = array([8.04, 6.95, 7.58, 8.81, 8.33, 9.96, 7.24, 4.26, 10.84, 4.82, 5.68]) I am new to python, and would like to change the content of x and y from an input file. I have two short questions: I could guess what array means, but once I see it on the code, how can I know to which library it belongs and more information about it? Should I use some kind of python debug commands? How do I insert the content of my input file into x? Thanks

    Read the article

  • Assembling a number-crunching computer [closed]

    - by tugrul büyükisik
    What is needed to make a GPU fully fed by CPU? Comparing their flops/s is enough? For example, if i could manage to make a very old(pentium-3) CPU with one of Nvidia-Fermi GPU, it would not be able to fed the gpu with data per sec. What is the criteria to fit CPU to GPU exactly when OpenCL or some similar work needed? Of course RAM and BUS will be chosen in a similar way but how exactly? Assume each GPU-core will calculate a sqrt and a division and an adding for 100 times for every itearation. Thanks.

    Read the article

  • after building in more ram, bios/debian does nothing [closed]

    - by derty
    My private server has 2x1gb Ram working with a 64bit Debian and an Q6600 Intel. This runs 2 virtual mashines on it each one recives 512mb RAM. Which you can immagine is a bit tight for the hole system. Now i got 2x2gb ram from a friend. I'm not sure if thery are clocking at the same speed, but i'm sure my power adaptor is not on his limit and can handle that. So there are 2 ram sockets left at the mainboard. I shuted down the system and build in the 4 gigs and looked what happen. After pressing the start button, everything gets noisy as known BUT the screen shows nothing, not even the bios stuff it usally does. Why isn't the system booting? I can immagine that it does not direkt link between booting debian and the bios not showing a thing. Or is it Grub? I mounted the system disk, and i can see it, switch folders write stuff with "vim" it does not seems like there is a problem.

    Read the article

  • How to remove .htaccess virus? [closed]

    - by bleepingcrows
    Possible Duplicate: My server's been hacked EMERGENCY First time posting so bear with me please! My friend's site has been hacked and the .htaccess file (which I really know nothing about) has been injected with a malicious redirect that forces search engines to the see the site as a "harmful website." If you look at the .htaccess file you can see it's Russian or at least ends in .ru. Seeing as I know very little about this stuff, I simply tried to restore the good .htaccess file back with his host. This doesn't work as the virus just recreates the infected .htaccess file. When I searched through the rest of his directories, I can see the same bad .htaccess file in most of the folders. I can't seem to help him get rid of this virus.

    Read the article

  • High-End Gaming Desktop PC in France [closed]

    - by Lerikunus
    Hello, I was looking to buy an ALIENWARE AREA 51, as my Desktop crashed some days ago. But the Preliminary Ship date is 03.01.11 and I need the new PC until Friday next week =( Does someone know a(n) (online)-store where Build&Shipping time is quite low so I can get it until next Friday? I am living in France (Nice). Or any place I can ask fot his kind of advice? This is my desired configuration: Overclocked Intel® Core™ i7 980x Extreme Six Core Processor (4.0GHz, 12MB Cache) 12GB Triple Channel 1600MHz DDR3 Dual 2GB ATI Radeon™ HD 6950 2TB RAID 1+0 (4x 1TB SATA-II, 7,200 RPM, 32MB Cache HDDs) 2TB RAID 1 (2x2TB SATA-II, 7,200 RPM, 32MB Cache HDDs) Thank you very much!

    Read the article

  • Bulk Deleting All Messages in a Folder in Microsoft Outlook Web Access [closed]

    - by Cerin
    Possible Duplicate: Multiple delete in Microsoft Outlook Web Access How do you delete all messages in a folder in Outlook, preferrably through Web Access? I left my Outlook account unattended for several days (on vacation) and when I got back I found several folders with over 5k emails, mostly error logging or spam. When I try to open the Outlook client, it just locks up, presumably unable to download that many emails. I can view at most 100 emails at a time, but I can't select all emails to delete or permanently delete them immediately, so manually deleting this many emails is going to take a while. Gmail has a similar feature to select and delete all emails in a folder, and that's free so I figure being a quality non-free product from Microsoft, Outlook should have a similar feature (yes that's sarcasm). I've Googled, but I'm not finding anything. Is this possible?

    Read the article

  • Grab latest version of PHP by URL? [closed]

    - by luckytaxi
    I'm unable to find the directory listing of all PHP packages. I'm basically looking for the latest stable version of 5.3 utilizing some sort of script that will go out and check PHP's website. If I can get a directory listing (can't seem to find one), I can do the rest. Figured it out but seeing that someone else posted something similar but for Apache, he got blasted for puttig it on Stackoverflow. I figure I would save myself the trouble and post it here.

    Read the article

< Previous Page | 187 188 189 190 191 192 193 194 195 196 197 198  | Next Page >