Search Results

Search found 17374 results on 695 pages for 'option strict'.

Page 221/695 | < Previous Page | 217 218 219 220 221 222 223 224 225 226 227 228  | Next Page >

  • Compacting solr indexes

    - by womble
    I've got a sizeable Solr server which is chewing a pile of disk. Whilst it is indexing a large amount of data, I'm wondering if there's any operation that will reduce the size of the index, by say dropping deleted-but-still-allocated data in a similar manner to a VACUUM FULL in PostgreSQL, or are the solr indexes kept fairly tidy, and my only option is to just allocate a pile more diskspace?

    Read the article

  • Windows 8 Fails to resume from sleep

    - by AnonymousAppDev
    I have this weird issue. When I put the computer to sleep by pressing the power button, or using the sleep option in Charms, I can wake it up normally. However, if I close the lid, and later reopen it, all the fans come on, but nothing appears on the screen. I didn't have this issue using Windows 7. Here are my system specs: HP G60-235DX Notebook PC Intel Pentium Dual Core T4200 at 2.00Ghz 3 GBS of RAM Intel Graphics Media Accelerator 4500MHD with 1309MB of video memory Windows 8 Pro 64 bit

    Read the article

  • KeePass: use a key file or a regular password?

    - by RCIX
    I'm setting up a KeePass database and it offers the ability to use a key file, which it says is more secure because it can use a longer and more complex password but is easier to break because you only need the key file to open the database. I'll only be using the key file on 2 computers (one desktop and one laptop), wo which is the best option? Note that it's definitely more appealing to use the key file for me because i have a hard time remembering anything close to a random password.

    Read the article

  • Bash or Zsh - which one and why?

    - by Andrew
    So, the question pretty much says it all. I'm on Snow Leopard, and I do a lot of web development, particularly in Rails 3 which makes heavy use of the console. I've seen some notable bloggers etc. mention Zsh as their preference over Bash, but I don't know what difference it would make. Could anyone give me a good comparison of what difference there is and what might make one prefer one option or the other? Thanks!

    Read the article

  • Windows 7: Notification area settings are lost on restart

    - by Radio
    Recently noticed that my icons settings in notification area are getting reset on system restart. For example I specify Skype icon to always show icon and notification. After I restart Windows - it's hidden again. It's not just for one specific icon, it's for all of them. Checking box "Always shows icons and notifications" works, and all icons appear, but this is not an option. Please help. Thanks.

    Read the article

  • How to swap stereo channels in Ubuntu?

    - by Auron
    I'm currently running Ubuntu 9.04. I wanted to swap the stereo channels, but I couldn't find that option in the Volume Control Preferences. Is there a way to do this without touching any configuration file? (I'm not allowed to log as root in this machine)

    Read the article

  • recovering USB printer

    - by shodanex
    I have an USB printer, that was discovered and installed properly. At some point, I suppressed it in the printer view of the config panel. If I try to add a new local printer, it says : Only use this option if you don't have an USP printer ( Windows automatically installs USB printer). How can I make windows automatically reinstall the USB printer I accidentally suppressed ? Edit : It is a dell all-in-one 920 printer, and I just tried to download and reinstall dell software.

    Read the article

  • Can i create a website blacklist with Group Policy?

    - by jimmygee
    Like i can create "whitelist" functionality for blocking all sites and allowing some via the GP setting: "User Configuration Windows Settings Internet Explorer Maintenance Connection/Proxy Settings Exceptions - Do not use proxy server for addresses beginning with" Can i create also a blacklist option like this (or similar) in Group Policy?

    Read the article

  • How to export a brochure into PDF with each layout as a page?

    - by nhj
    I have created a 3-fold brochure in Mac iWork - Pages. If I print the brochure then I can 3-fold it and everything is fine. But if I want to export as PDF then I get a 2-A4 size pages, and this distorts the user the order of the pages, I would like to export each layout as a separate page. The 'Layout Break' option is diabled and I don't know how to enable it? Any ideas? Thanks.

    Read the article

  • Sql Server Managmenet Studio Alternative - Are there any?

    - by JohnM2
    I am looking for lightweight MS SQL Server Managmenet Studio (2005) alternative (open source/freeware is a bonus). Something more like HeidiSQL for MySQL. LINQPad is not an option (although it's great for learning Linq). It can only query database (and has many cons for my needs). I am looking for management/alteration functionality also, not only making queries and viewing the results.

    Read the article

  • How to delete autorun.inf file from USB. It says "Access denied"

    - by krish
    Hi, My system has been infected by autorun.inf trojan. inorder to remove this trojan, i need to delete the autorun.inf file from my usb drive(i am using USB drive to connect to internet). But when i tried to delete the same, it says "access denied". I am unable to uncheck the read-only option. I have tried all the solutions by googling, but no luck. Can you help me out?

    Read the article

  • Scanstate.exe Migration Error

    - by user1438147
    I'm trying to create a migration store on a server using Scanstate and this is the error I recieve: C:\USMTscanstate.exe \(Server_Name)\migration\mystore /f:migdocs.xml /f: migapp.xml /v:13 /f:scan.log Failed. An error occurred processing the command line. scanstate.exe \svdataitfl1\migration\mystore ##ERROR## -- /f:migdocs.xml /f migapp.xml /v:13 /f:scan.log Undefined or incomplete command line option ScanState return code: 11 I can't seem to find the answer to this...need some help.

    Read the article

  • Best method of transferring files over internet?

    - by EsotericHabit
    I have a seedbox (running Ubuntu 9.10) at my (parent's) house and will be leaving it there once I go to college this fall. Currently I'm using samba to transfer files between computers, but I was wondering if once I am on my university's network, whether using FTP would be a better option versus samba over a VPN. The files will range from 100 MB to 17 GB, if that matters. Would one be more efficient over the other? Did I forget any other options?

    Read the article

  • Recommended Server RAM for SQL Full Text Search (FTS)

    - by David
    I gather SQL Server 2008 Express requires a minimum of 512MB RAM to be installed to run on Windows Server 2003, however will this be sufficient to also run Full Text Search on about 50,000 records? I don't want to pay too much and I have seen a 512MB RAM VPS option that interests me. Thanks

    Read the article

  • Getting a hardware profile from Fedora 12 after installation

    - by Chris T
    I've installed Fedora 12 on a computer I found in the trash (Bulk garbage day!) and I'm trying to figure out what's under the hood (seems like a stock dell but I'd like to know the details). Is there a way to get a hardware profile on Fedora after it's already installed on the harddrive? I saw an option at install but I skipped over it.

    Read the article

  • Delete the pendive contents and also trash in mac?

    - by Warrior
    I am using mac pro.I copied some data from my pen drive to my mac and i deleted the content by moving it to trash.After that when i see the info of pen drive it give more value than the original value.If i cleaned the content of the trash only i am able to see the correct value of pen drive and able to copy data. Is mac has been designed like that or is there any other way to delete other than using "move to trash" option? Thanks.

    Read the article

  • How do I allow programs that generate "high" or "severe" alerts in MS Security Essentials?

    - by Alex O
    Microsoft Security Essentials seems to allow only quarantine or delete actions for program that it deems to have "high" or "severe" risk. However, it also assigns these levels to what it considers to be "hacking tools". Is there a way to override this nanny behaviour and force programs on the allowed list? Thank you. EDIT: Here's a screenshot showing the lack of an "Allow" option in the drop-down list: http://img820.imageshack.us/img820/3870/msse.png

    Read the article

  • Trying to use the 7-zip self extracting archive GUI and it fails [closed]

    - by djangofan
    Trying to use the 7-zip self extracting archive GUI and it fails. When I try to create a "Self Extracting Installer" option, at the end of the install it runs my batch file and it appears to be extracting all the files just before it does that, but after extraction, the files are nowhere to be found (except within the .7z archive). Any idea on why this occurs? https://code.google.com/p/sfx-creator/

    Read the article

  • Darwin Streaming Server VOD playlist?

    - by StackedCrooked
    I have a large MPEG4 file split up into a number of smaller files. I would like to make these files available as one movie. So I need something like a playlist. It seems the playlist option for live streaming is not available for VOD. Is there a way to get this functionality somehow?

    Read the article

< Previous Page | 217 218 219 220 221 222 223 224 225 226 227 228  | Next Page >