Search Results

Search found 12422 results on 497 pages for 'non disclosure agreement'.

Page 197/497 | < Previous Page | 193 194 195 196 197 198 199 200 201 202 203 204  | Next Page >

  • Can't open any of my drives/devices(not USB drive)

    - by Anontu
    I can't open any of my computer drives (:c/,:d/.....) Every time i tried to open the drives, the following notice appeared: (i'm new in Ask Ubuntu,so,i can't upload the snapshot,i need 10 reputations to do that) **Unable to access "__ Volume"** error mounting/dev/sda7at/media/MyPC/__Volume:Command-Line 'mount-t "ntfs"-o "uhelper=udisk2,nodev,nosuid,uid=1000,gid=1000,dmask=0077,fmask=0177""/ dev/sda7""/media/MyPC/__Volume"' exited with non-zero exit status 14:The disk contains an unclean file system (0,0).| Metadata Kept in Windows cache,refused to mount. Failed to mount '/dev/sda7':Operation not permitted The NTFS partition is in an unsafe state.Please,resume and shutdown Windows fully(no hibernation or fast restarting),or mount the volume read-only with the 'ro' mount option. I have Windows side by side Ubuntu 13.04 in my computer and i have done (like-Shutting down Windows properly...) things as these in the notice. But it's not working.

    Read the article

  • using static methods and classes

    - by vedant1811
    I know that static methods/variables are associated with the class and not the objects of the class and are useful in situations when we need to keep count of, say the number of objects of the class that were created. Non-static members on the other hand may need to work on the specific object (i.e. to use the variables initialized by the constructor) My question what should we do when we need neither of the functionalities? Say I just need a utility function that accepts value(s) and returns a value besed solely on the values passed. I want to know whether such methods should be static or not. How is programming efficiency affected and which is a better coding practice/convention and why. PS: I don't want to spark off a debate, I just want a subjective answer and/or references.

    Read the article

  • Resolution text mode Removing ubuntu-server 10.04

    - by Fabin
    Hello Friends .. I have ubuntu-server on my server and also in terminals and an application squeegee in text mode. This version 9.10 of ubuntu-server system came with a resolution at the terminal, which makes use of the application, the fonts (letters) are very small. Please, if anyone knows how to take the resolution of text mode 10:04 ubuntu server, tell me. To illustrate. I need the resolution is to get as Debian, large fonts! Still using version 9.04, it was the last that still has not implemented the resolution at the terminal (text mode). I remind you that non-use graphical interface. Only text mode. Thanks.

    Read the article

  • A drop in SERP after following webmaster guidelines [on hold]

    - by digiwig
    So here's a puzzle for all you SEO gurus out there. I recently launched my own site. I had target keywords which were ranking very well for about 1 month, within the top five and even appearing in first place. In an attempt to maintain good positioning, I followed guidelines by adding robots.txt, an xml sitemap redirecting non-www to www redirecting index.php to root domain adding htaccess 301 redirect for old pages I added rich snippets created a google+ account, verified my picture to appear, I went through each of the webmaster issues with duplicate titles and meta descriptions and improved header tag document outlines i even created a few more blog posts to keep the content freshing and moving. So now my website appears on page 2 with my target keywords - and all because I followed the guidelines. What is happening? I see competitors with stagnant content superglued to position 1.

    Read the article

  • When to use event.initMouseEvent for simulating mouse clicks?

    - by Protector one
    I wonder if there are benign use-cases for simulating mouse clicks using event.initMouseEvent. I found that it is used for creating pop-under ads in the following way: var e = document.createEvent('MouseEvents'); e.initMouseEvent('click', true, true, window, 0, 0, 0, 0, 0, true, false, false, true, 0, null); a.dispatchEvent(e); This code simulates a click on the opening browser window, to force the newly opened window beneath it. Evil. I'm thinking of simply preventing all simulated clicks in my own browser via a browser extension, but I wonder if I might break useful websites and behavior in the process. Therefore I wonder what situations justify simulating mouse clicks, and if there are big sites that use it in non-evil ways.

    Read the article

  • How to manually list set of urls for search engines to index

    - by MarutiB
    So I have created a video website which has thousands of videos and thousands of videos get added to it on a daily basis. Here is my problem :- I have created a website which basically loads the skeleton in html and puts all the content through javascript and Ajax. The problem is search engines aren't going anywhere except for the home page. Is there a way say in robots.txt where i give a link to a single html which has links to all these videos ? I agree my site is not accessible for a non-javascript user but stats show that this ratio is very low ( 0.2 % ). Is there a way I can still keep the complete AJAX website and still get each individual videos listed on google ?

    Read the article

  • Getting wireless N to work on Dell Vostro 3300?

    - by luisfpg
    I have a Dell Vostro 3300, which has a Broadcom BCM4313 wireless. The point is that I cannot make it work in N mode. NetwotkManager applet says I'm on 54 Mbit/s. Of course, my wireless router is N capable. I've double checked. Anyone knows what to do? Here is the output for lspci -v: 12:00.0 Network controller: Broadcom Corporation BCM4313 802.11b/g/n Wireless LAN Controller (rev 01) Subsystem: Dell Device 0010 Flags: bus master, fast devsel, latency 0, IRQ 17 Memory at fbb00000 (64-bit, non-prefetchable) [size=16K] Capabilities: <access denied> Kernel driver in use: wl Kernel modules: wl, brcm80211 Thanks a lot.

    Read the article

  • Where is the best place to start projects and attract developers?

    - by user49557
    I want to develop software for Linux or cross-platform. I want to work with other open-source and non-profit developers. I want a place where Ubuntu or other developers come to start open-source or commercial projects, and we can join the projects or start our own projects. I know there are social coding sites, but where can I start the project, and invite people or let people join? Then we can submit software to sourceforge.net. I know we can start projects at sourceforge.net, but is there anything more dedicated for Ubuntu developers, especially for Ubuntu and for the Ubuntu Software Center? Would you recommend Launchpad, sourceforge.net, github, gitorous or others?

    Read the article

  • What kind of math should I be expecting in advanced programming?

    - by I_Question_Things_Deeply
    And I don't mean just space shooters and such, because in non-3D environments it's obvious that not much beyond elementary math is needed to implement. Most of the programming in 2D games is mostly going to involve basic arithmetic, algorithms for enemy AI and dimensional worlds, rotation, and maybe some Algebra as well depending on how you want to design. But I ask because I'm not really gifted with math at all. I get frustrated and worn out just by doing Pre-Algebra, so Algebra 2 and Calculus would likely be futile for me. I guess I'm not so "right-brained" when it comes down to pure numbers and math formulas, but the bad part is that I'm no art-expert either. What do you people here suppose I should do? Go along avoiding as much of the extremely difficult maths I can't fathom, or try to ease into more complex math as I excel at programming?

    Read the article

  • Video Bug in Ubuntu 12.10 MSI CX623 laptop

    - by user104731
    http://www.youtube.com/watch?v=5xyJkS8XjgA&feature=youtu.be I managed to take a video with what happens on my Ubuntu 12.10 laptop when I play with the volume and hover with the mouse over the slider and when I press Ctrl + Alt + D (show Desktop/minimize all) The real bugs are those in which the panel becomes transparent on the down side, exactly above the volume slider (and not only when that slider appears, but also when brightness slider appears, and when blocking my touchpad applet appears) and when I have a maximized window, more maximized windows or a non maximized window that touches the panel, while I use Ctrl+Alt+D (show Desktop/hide all normal windows). Is there a way to solve this bug? PS: The other bugs are from Record My Desktop. I didn't have the mentioned bugs in ubuntu 12.04, but I like more the graphics in 12.10.

    Read the article

  • I cannot log in after theme change

    - by sssuizaaa
    After changing the gtk-theme in the gnome tweak took I was taken out of the session to the login screen and now I cannot log in. I can only log in using the guest account. So in the grub menu I selected the recovery mode and in the resulting menu I selected root-drop to root shell prompt. Once there I did a couple of things I've found in several pages and in the forums. 1.gsettings reset org.gnome.desktop.interface gtk-theme This is what I got: (process:642):WARNING: Command line 'dbus-launch –autolunch=4438d024dd45ef7fb2d3f4ab0000000f –binary-syntax --close-stderr' exited with non-zero exit status 1: Autolaunch error: X11 initialization failed.\n and nothing changes 2.gconftool-2 --type=string -s /desktop/gnome/interface/gtk_theme Radiance with this I was trying to change the gtk theme to the Radiance one. No strange message this time but it did not work either. I still cannot log in. Any ideas please?? sssuizaaa

    Read the article

  • how to get more vacation time than "policy" allows

    - by SpashHit
    At my company, the maximum vacation is 3 weeks for everyone but executives. Therefore I cannot even start negotiating for an increase to 4 weeks.. it's a non-starter because it's "against policy"... even though I think my experience and value to the company warrant it, and I've gotten 4 weeks at previous jobs. (I know I could have made a "hard stand" before taking this job, but that's water under the bridge) Any advice? I was kind of thinking of taking the "you want to be competitive" tack to get them to change their policy but I don't know where to find the kind of data I would need to support that.

    Read the article

  • iOS 4.3 est disponible en version bêta, elle apporte le tactile à cinq doigts et transforme les iPhones en spots Wi-Fi

    iOS 4.3 est disponible en version bêta, elle apporte le tactile à cinq doigts et peut transformer les iPhones en spots Wi-Fi Apple vient de rendre disponible, hier soir, la nouvelle version bêta de son système d'exploitation mobile. iOS 4.3 bêta apporte son lot de nouveautés et semble très prometteuse pour les développeurs, qui y découvrent de nombreux et variés potentiels. D'abord, l'accès à AirPlay (plateforme streaming) sera possible pour les tiers et compatible avec les applications des développeurs indépendants, et non plus seulement à quelques applications de la firme comme Safari ou YouTube. Egalement, les possibilités multitouch d'iOS 4.3 se voient renforcée, avec l'apparition de nouvelles poss...

    Read the article

  • Samsung nie exploiter des enfants mineurs en Chine via ses fournisseurs, et assoit sa domination en Europe

    Samsung rejette les accusations d'exploiter de mineurs en Chine Par ses fournisseurs et il assoit sa domination en Europe de l'Ouest Le mois dernier, China Labor Watch avait reporté des violations des lois du travail chinois quant à l'emploi des enfants de moins de 16 ans. Cette organisation non gouvernementale de défense des droits des travailleurs en Chine a mené trois enquêtes durant les mois de juin et juillet 2012 au sein de l'usine HEG Electronics Co. [IMG]http://idelways.developpez.com/news/images/samsung.jpg[/IMG] HEG Electronics Co est l'entreprise de sous-traitance pour Samsung en Chine. L'usine lui produit des téléphones, des lecteurs DVD, des ...

    Read the article

  • Collisions and Lists

    - by user50635
    I've run into an issue that breaks my collisions. Here's my method: Gather Input Project Rectangle Check for intersection and ispassable Update The update method is built on object_position * seconds_passed * velocity * speed. Input changes velocity and is normalized if 1. This method works well with just one object comparison, however I pass a list or a for loop to the collision detector and velocity gets changed back to a non zero when the list hits an object that passes the test and the object can pass through. Any solutions would be much appreciated. Side note is there a more proper way to simulate movement?

    Read the article

  • Math behind multivariate testing for website optimization

    - by corkjack
    I am looking for theoretical resources (books, tutorials, etc.) to learn about making sound statistical inferences given (plenty of) multivariate website conversion data. I'm after the math involved, and cannot find any good non-marketing stuff on the web. The sort of questions I want to answer: how much impact does a single variable (e.g. color of text) have? what is the correlation between variables? what type of distribution is used for modelling (Gaussian, Binomial, etc.)? When using statistics to analyze results - what should be considered as a random variable - the web-page element that gets different variations or the binary conversion-or-no-conversion outcome of an impression? There's plenty of information about different website optimization testing methods and their benefits\pitfalls, plenty of information about multivariate statistics in general, do you guys know of resources that discuss statistics in this specific context of website optimization ? Thanks for any info!

    Read the article

  • Authentication error when trying to upgrade from 11.10 to 12.04

    - by mahmuodmasri
    I wrote : ~$ do-release-upgrade and the system says: Checking for a new ubuntu release Get:1 Upgrade tool signature [198 B] Get:2 Upgrade tool [1551 kB] Fetched 1551 kB in 6s (167 kB/s) extracting 'precise.tar.gz' authenticate 'precise.tar.gz' against 'precise.tar.gz.gpg' exception from gpg: GnuPG exited non-zero, with code 2 Debug information: gpg: Signature made Thu 11 Oct 2012 07:47:10 AM EET using DSA key ID 437D05B5 gpg: can't open `/etc/apt/trusted.gpg' gpg: keydb_search failed: file open error gpg: Can't check signature: public key not found Authentication failed Authenticating the upgrade failed. There may be a problem with the network or with the server. Please help me!

    Read the article

  • Bad search result due to strange linked domains

    - by VDesign
    I have a website which is not scoring good in Google's search results. I use Majestic SEO and Open Site Explorer in order to have a view about my link profile. I now see different backlink domains, some of them already removed, that contains sexual content or other non relative content linking to my domain. How much influence does these strange linked domains have on my search result? Even if some of them are already removed for a couple of months. I have already disavow open sexual domains using the tool that Google provides.

    Read the article

  • Le chef de produit Flash explique les raisons de la fin du Player sur mobiles, il pointe Apple du doigt

    Le chef de produit Flash explique les raisons de la fin du Player Sur Mobiles, il pointe Apple du doigt Mise à jour du 14 novembre 2011 Les arguments avancés par Adobe pour justifier l'arrêt de son Flash Player sur mobiles n'ont pas convaincu les observateurs, pressés de tracer d'autres corrélations. Ils ne s'avèrent pas non plus du goût de certains employés de l'entreprise, principaux concernés par une décision qui leur coûte 750 postes (lire ci-devant). « Je pense que les deux derniers jours étaient les plus difficiles de ma carrière », déclare Mike Chambers, chef de la plateforme Flash à Adobe. « Je voulais ...

    Read the article

  • On pourra bientôt identifier les auteurs de mails anonymes via leurs "empreintes digitales numériques", d'après des chercheurs canadiens

    Des chercheurs proposent d'identifier les auteurs de mails anonymes via leurs "empreintes digitales numériques", cette nouvelle technique pourrait être reconnue comme preuve Débusquer l'expéditeur d'emails anonymes a toujours été un vrai casse-tête, demandant une expertise sans failles pour des résultats non garantis. Aujourd'hui, des chercheurs de l'Université de Concordia proposent une nouvelle méthode pour tenter de résoudre ce type de problèmes. L'équipe de scientifiques est en effet alarmée par la recrudescence de ce type de courriels malveillants (qui peuvent entre autre contenir des virus) dont les auteurs restent inconnus. Ils ont fait des recherches concernant une identification exacte de l'expéditeur.

    Read the article

  • La RC de Internet Explorer 9 disponible pour la clôture des TechDays 2011, téléchargez-là et faîtes nous part de vos avis

    La RC de IE9 est disponible Avec Do Not Track, le support de WebM et met encore plus l'accent sur la sécurité Microsoft vient d'annoncer l'arrivée de la Release Candidate de IE9. Une nouvelle qui clôt en beauté les TechDays 2011, son salon dédiée cette année au Cloud Computing. Avec cette nouvelle étape, Internet Explorer 9 intègre toutes ses fonctionnalités finales. Il ne reste plus à l'équipe du projet qu'à corriger les bogues et les dernières imperfections avant la sortie officielle. Cette RC bénéficie d'un très léger toilettage de l'UI avec des onglets carrés (et non plus aux angles arrondies) qui peuvent à présent être placés en dessous d...

    Read the article

  • Une vulnérabilité du Marketplace de Windows Phone 7 dévoilée permet de télécharger illégalement des applications, un PoC est publié

    Une vulnérabilité du Marketplace de Windows Phone 7 permet de télécharger illégalement des applications, un PoC est publié Une vulnérabilité du Marketplace de Windows Phone 7 qui permet de télécharger et d'installer sans autorisations les applications disponibles sur la galerie vient d'être divulguée. Microsoft aurait été informé de cette faille de sécurité bien avant la divulgation d'une vidéo sous forme de proof-of-concept. Les hackers à l'origine de cette vidéo affirme que leur souci est de défendre les développeurs d'applications piratées sur le Marketplace et de non promouvoir le piratage. « Nous sommes condamnés par beaucoup de « promouvoir la piraterie », ...

    Read the article

  • Quelles sont pour vous les plus belles applications de bureau développées en Java ? Partagez votre expérience

    Même si les applications Web prennent une part non négligeable dans le développement Java, de nombreuses applications de bureau sont encore très demandées. La plateforme Java via ses nombreuses bibliothèques graphiques (JavaFX, Swing, plateforme Eclipse, ...) permet de réaliser des applications de bureau très abouties. Nous vous invitons à partager les applications de bureau qui vous semblent les plus réussis et les plus à même de montrer la maturité de Java dans tous les domaines. Pour chaque application, merci de préciser un lien et un bref descriptif. A noter qu'un débat similaire avait été proposé il y a quelques années concernant

    Read the article

  • Le système de sécurité du Mac App Store déjà cracké, après moins de 24 heures de fonctionnement

    Le système de sécurité du Mac App Store déjà cracké, après moins de 24 heures de fonctionnement Mise à jour du 07.01.2011 par Katleen Lancé depuis à peine moins de vingt quatre heures, la nouvelle boutique d'applications d'Apple a déjà essuyé les plâtres d'internautes malveillants. Des pirates ont profité de plusieurs vulnérabilités repérées dans la plateforme, qui autoriseraient notamment la copie non autorisée. Le Mac Store propose déjà 1000 programmes et a enregistré un million de téléchargements lors de cette première journée d'exploitation. Les affaires se portent donc au mieux, si seulement le système de sécurité du magasin virtuel n'avait pas été cracké. Une première faille dénichée par des hackers conc...

    Read the article

  • Les éditeurs de solutions de sécurité devraient-ils bloquer les malwares gouvernementaux ? F-Secure pense que oui

    Les entreprises de sécurité informatique devraient-elles bloquer les malwares gouvernementaux ? F-Secure pense que oui De récentes révélations accusent les autorités égyptiennes d'avoir acheté puis utilisé un système de surveillance allemand (FinFinder) pour espionner ses citoyens. La société qui le commercialise, Elaman, propose divers produits sous le label de "solutions de sécurité gouvernementale", comme FinSpy qui "garantit un accès total et en temps-réel ainsi que le contrôle à distance de l'ordinateur cible", ou FinFly, un "proxy infectieux utilisé pour propager des malwares intrusifs". Des faits graves qui, bien que non encore confirmés, ont fait bondir la compagnie spécialisée en sécurité info...

    Read the article

< Previous Page | 193 194 195 196 197 198 199 200 201 202 203 204  | Next Page >