Search Results

Search found 1559 results on 63 pages for 'joe khan'.

Page 25/63 | < Previous Page | 21 22 23 24 25 26 27 28 29 30 31 32  | Next Page >

  • Netbook recomendations for a developer

    - by Joe
    I am thinking about getting a netbook for a secondary laptop. Ideally it would mainly be used for surfing/email/travel, but I would like it to be good enough to be able to run Visual Studio for when I am at conferences and the like. I as thinking it would be nice to be able to put a 16-32GB SSD in it, as well as 2GB of memory. Do you have any recomendations? Will a netbook even suffice, or should I upgrade to a small-form laptop? Edit: I don't need to be able to build software on it. It would just be nice to occasionally be able to try out new tools, APIs, or what have you without getting frustrated due to limited computing power.

    Read the article

  • Fake demostration software for command line

    - by Joe
    I'm looking for some software that would be useful for giving demonstrations. I regularly have to show the effects of scrips ect to classes while talking about their effects, and equaly regularly I have finger trouble and have to rewrite various commands - wasting class time and general energy. I'd like to be able to record a sequence of commands in advance, and then play them back at the speed of my choosing. So I might have a file that containes the commands: echo "hello world!" ls ls -l ls -l | sort I'd like to be able to play these commands back by typing similar ones in. So I'd have a blinking command prompt and if I typed 'echo "hxxx' the command prompt would read home$echo "hell and if I typed any other letters the terminal would fill up with the remainder of the command until I press enter, when it executes the command. The point is that even if I screw up the command when typing it, the command that I'd prepared in advance would be executed. My question is - does similar software exist for giving demonstrations? or even, is this an easy thing to script up...? EDIT - two quick things first of all I'm on osx - but it would be nice to get a general solution for other people who arrive here from google. and second a lot of the comments/answers are concentrating on, in effect, making it fast and easy to enter long commands by means of hotkeys and the like. Actually I'd like it to at least look like I'm typing live - that's why I put in the bit about the one-to-one keymapping, but I don't think I explained that quite as well as I could have...

    Read the article

  • Best way to restrict access to a folder in Dropbox

    - by Joe S
    I currently run a business with around 10 staff members and we currently use Dropbox Pro 100GB to share all of our files. It works very well and is inexpensive, however, I am taking on a number of new staff and would like to move the more sensitive documents into their own, protected folder. Currently, we all share one Dropbox account, I am aware that Dropbox for teams supports this, but it is far too expensive for us as a small company. I have researched a number of solutions: 1) Set up a new standard Dropbox account just for use by management, which will contain all of the sensitive documents, and join the shared folder of the rest of my team to access the rest of the documents. As i understand it, this is not possible with a free account, as any dropbox shared folder added to your account will use up your quota 2) Set up some sort of TrueCrypt container, and install TrueCrypt on each trusted staff member's machine, and store the documents inside that. Would this be difficult to use? I'd imagine the sync-ing would not work so well as the disk would technically be mounted at the time of use and any changes would be a change to the actual container rather than individual files. I was just wondering if anyone knows a way to do this without the drawbacks outlined above? Thanks!

    Read the article

  • Fedora 17 Hangup on Boot (plymouth-quit-wait)

    - by Joe
    I am having an issue after several updates where when I try to boot the boot animation "loads" then flashes with the fedora logo, and then sits there. After checking into it more I found that two services were failing to start. The first is tcsd.service and the second is plymouth-quit-wait.service. I was able to to disable tcsd.service (in the hopes I could boot without it), however I have been unable to do anything to the second service. I am running FC17 and the akmod nvidia drivers, on an ASUSG53SW. Everything is up to date as far as I know. What is the exact problem that I am facing and how can I go about troubleshooting this or fixing it?

    Read the article

  • RDP - Sharing shortcuts and/or toolbars

    - by Joe
    I often have to work across several virtual machines through RDP. I used to work with Terminals, and recently changed to mRemote NG. As of now, I have a checklist that I run on each new VM I create, in order to populate the desktop with the shortcuts and apps that I use regularly. Then, I create a checkpoint and use that when I need to revert to a "clean" machine. However, it's not always practical, and the VMs I have to use are not always created by me so that checkpoint is not always available. I know that I could use a template when creating the VM, but it doesn't solve the problem when I have to use VMs that I do not own. Does anyone know of a way to setup one set of shortcuts/apps and be able to launch them on a remote desktop connection easily? Kind of like a toolbar that is present wherever I'm logged on...

    Read the article

  • Is it possible to remotely login to one domain from another (there is a trust created between them)

    - by Joe
    Two AD server representing a domain each in one forest. There is a 2-way Forest-wide trust created between them, but users of one domain cannot remotely login to a machine in another domain. But a share is accessbile from another domain, confirming that the trust is created. Can users remotely login from one domain to another domain? If so, how? Testing environment very simple: W2k3 server (AD server) : Domain : XYZ.com Machines : xp,vista users : u1,u2 w2k8 server (AD server) : Domain : ABC.com users : u3,u4 Connect remotely to xp machine (RDP). use user credential of u1/u2. - able to connect use user credential of u3/u4. - not able to connect

    Read the article

  • Customising Windows 8 Start Screen Tiles

    - by Joe Taylor
    We are looking for an effective way to manage the start screen in Windows 8. So far using WSIM we can add certain start tiles by using the OOBE System - shell setup - SquareTiles and WideTiles properties. However this only seems to work for square tiles and not wide tiles, if anyone has any insight on this it would eb appreciated. However the main question is has anyone managed to modify this screen using a GPO, we can add application shortcuts to the Start menu list on the All Apps page using a create shortcut to all users start menu policy. However as we occasionally deploy apps throughout the year in line with the courses requirements we would want to be able to put a shortcut on the home screen. Is it possible?

    Read the article

  • Computer to act as keyboard

    - by Joe
    Title explains it. Imagine this example, Host computer connects to a Client computer via male/male usb connection. Client computer acknowledges this connection as a new device, in this case a keyboard. The host computer can now send key events to the client computer and the client computer would process them as a normal keyboard event. I did a whole lot of searching in the internet and really have drove down many dead ends. Any tips would be appreciated. Note* this is a physical connection. The client computer should not have to install any software for this to function (The host will completely spoof as a keyboard).

    Read the article

  • How to tunnel local port through proxy server?

    - by Joe Casadonte
    I have a non-proxy-aware program that I need to get working through an HTTP proxy server. The program (MYPROG) running on a machine I can configure at will (MYSRV) connects to a specific server (DESTSRV) on a specific port (DESTPRT). There is an existing HTTP proxy server (PROXYSRV:PROXYPRT) that will allow the traffic through if MYPROG was proxy-aware, but it isn't. Is there a way to listen locally on a specific port and forward the traffic through the proxy server? I can totally configure where MYPROG points to, so I could point it to MYSRV:4545 with the thought that some wonder program will redirect the data to DESTSRV:DESTPRT through PROXYSRV:PROXYPRT. I'm thinking IP Tables or netcat could do the trick if only I could figure them out... Thanks!

    Read the article

  • Impossible to Remove FTDI driver / FTDI Enumeration on Windows 7

    - by Joe
    I have already read the : Is it possible to reset FTDI virtual com ports enumeration, we easily get hundreds of COM ports in production environment topics which was pretty interesting ! But I got a problem, apparently I can't delete the ftdi driver, so I can't use the previous conclusion of the topic... I'm really stuck and bored of this problem, my com port number is 132 ! Does someone have another solution ?

    Read the article

  • How to schedule a task X minutes after Windows Server 2003 starts?

    - by Joe Schmoe
    How to schedule a task X minutes after Windows Server 2003 starts? In "Scheduled Tasks" one can specify "When my computer starts" but I see no way to specify delay. What I am trying to achieve: there is a service (JIRA) that even though dependent on SQL Server service still doesn't wait long enough for SQL Server to become fully operational. So JIRA service fails to connect to the database and needs to be restarted manually after each server reboot. My plan is to add "SC stop" and "SC start" commands for JIRA service 3 minutes after server starts.

    Read the article

  • How does KMS (Windows Server 2008 R2) differentiate clients?

    - by Joe Taylor
    I have recently installed a KMS Server in our domain and deployed 75 new Windows 7 machines using an image I made using Acronis True Image. There are 2 variations of this image rolled out currently. When I go to activate the machines it returns that the KMS count is not sufficient. On the server with a slmgr /dlv it shows: Key Management Service is enabled on this machine. Current count: 2 Listening on Port: 1688 DNS publishing enabled KMS Priority: Normal KMS cumulative requests received from clients: 366 Failed requests received: 2 Requests with License status unlicensed: 0 Requests with License status licensed: 0 Requests with License status Initial Grace period: 1 Requests with License statusLicense expired or hardware out of tolerance: 0 Requests with License status Non genuine grace period: 0 Requests with License status Notification: 363 Is it to do with the fact that I've used the same image for all the PC's? If so how do I get round this. Would changing the SID help? OK knowing I've been thick whats the best way to rectify the situation. Can I sysprep the machines to OOBE on each individual machine? Or would NewSID work?

    Read the article

  • Create a term-document matrix from files

    - by Joe
    I have a set of files from example001.txt to example100.txt. Each file contains a list of keywords from a superset (the superset is available if we want it). So example001.txt might contain apple banana ... otherfruit I'd like to be able to process these files and produce something akin to a matrix so there is the list of examples* on the top row, the fruit down the side, and a '1' in a column if the fruit is in the file. An example might be... x example1 example2 example3 Apple 1 1 0 Babana 0 1 0 Coconut 0 1 1 Any idea how I might build some sort of command-line magic to put this together? I'm on OSX and happy with perl or python...

    Read the article

  • Chrome to download Gmail attachments to a different place

    - by Joe
    I'm using Chrome and Gmail. When I download stuff from the web, Chrome automatically puts it in Downloads, which is fine. However, I'm aware that everything I download from Gmail is in the cloud anyway and so I don't really need it taking up space on my hard drive as well. Is there a way to have Gmail attachements automatically download to a different folder, say, Downloads\Gmail? That way I could regularly purge the ones that won't be useful for a while. (Yes, I'm aware that Word documents and the like often get changed after they arrive, I'm more focused on images, pdfs, and zip files.)

    Read the article

  • After installing Windows 8, boot hangs before BIOS setup

    - by Joe Purvis
    I have an Alienware M15x, 940MX processor, 16 GB RAM, 512GB M4 SSD, and I was running Win7 64bit. I backed up the disk and ran Win 8 setup. Setup appeared to go well through multiple reboots. After the last reboot, it simply stopped after POST at "Press F2 for bios setup". I have tried powering off, reducing RAM to one stick, removing MOS battery. Now, it gets to the screen with "Press F2 for setup" and "Press F12 for boot options". If I press F2, I get a single beep only. If I press F12, nothing. I cannot get into the BIOS to change boot options to boot from another disk and restore. I do have the latest BIOS. I am going to try replacing the CMOS battery, but I don't think that is likely to help. The computer has been fast and very reliable until now.

    Read the article

  • Why is /dev/urandom only readable by root since Ubuntu 12.04 and how can I "fix" it?

    - by Joe Hopfgartner
    I used to work with Ubuntu 10.04 templates on a lot of servers. Since changing to 12.04 I have problems that I've now isolated. The /dev/urandom device is only accessible to root. This caused SSL engines, at least in PHP, for example file_get_contents(https://... to fail. It also broke redmine. After a chmod 644 it works fine, but that doesnt stay upon reboot. So my question. why is this? I see no security risk because... i mean.. wanna steal some random data? How can I "fix" it? The servers are isolated and used by only one application, thats why I use openvz. I think about something like a runlevel script or so... but how do I do it efficiently? Maby with dpkg or apt? The same goes vor /dev/shm. in this case i totally understand why its not accessible, but I assume I can "fix" it the same way to fix /dev/urandom

    Read the article

  • Is it better to leave your computer on all the time?

    - by Joe Schmoe
    Most of the hardware failures I've had (especially hard drive crashes) have happened when turning the machine on, so is it better to leave your computer on all the time or not? For years, I've heard arguments for... no power surges on start-up steady operating temperature for components and against... unnecessary wear on hard drives power wastage and I'm still not sure.

    Read the article

  • Thunderbird 3.0 - how to prevent new message indicator from clearing?

    - by Joe Casadonte
    I just installed Thunderbird 3.0 and there are a few things driving me batty. When new email is delivered it has a faint star to the left of the subject (this is different than the new star column thing). In the old days (i.e. last week) the new message indicator wouldn't go away until I read the message or left the folder and returned. Now, as soon as I do anything with any email message, all new message indicators are cleared. How can I go back to the old behavior?

    Read the article

  • Does it make a difference to read from a file instead of from MySQL?

    - by Joe Huang
    My web server currently is quite loaded. And I have a PHP file that is accessed very often remotely. The PHP file basically makes a MySQL query and returns a JSON formatted string. I am thinking to use a Cron job to write the necessary data into a file every 15 mins, so the PHP file doesn't make a MySQL query, instead it reads from the file. Does it make a difference? I mean to alleviate the server loading (CPU/MySQL) a bit?

    Read the article

  • Connect to multiple VPNs?

    - by Joe Lyga
    I need a way to connect to multiple VPNs. It's to access camera systems and resources that are on different networks as a client. One VPN could be a company network, and another a city network. Is there a straightforward way to do this? I've experimented with setting up multiple virtual machines in virtualbox already, and I'd like to avoid having to have a full OS installation for every VPN I want to connect to.

    Read the article

  • Problems with Finder background images produced in Mac OS X 10.6?

    - by Joe
    Morning all. I'm creating DMG installers with background pictures. My build machine is 10.6. I'm having problems getting them working consistently: If I create one on 10.4 it works fine in 10.5, 10.5 and 10.6, If I create one for 10.5 it works fine in 10.4, 10.5 and 10.6, But if I create one in 10.6, the background picture shows in 10.6 but does not show in 10.4 or 10.5. I think I recall having seen similar reports in one or two places but there's not much information on the web. Has anyone here come across this problem? Is it recognised? Fixable? Unfortunately I have no option of running 10.5 on my build machine... Thanks! Update: This is a confirmed known bug in 10.6 . I will update this if there is any extra news.

    Read the article

  • Programmatic, script-based, or command line method to change starting program for user on Windows Server 2000/2003?

    - by Joe Majsterski
    I have written an app that we want to distribute to a large number of customers to be used as the shell program when they log onto their server with a particular admin account. I have figured out how to change the starting program by going to Administrative Tools->Computer Management->System Tools->Local Users and Groups->Users, selecting the properties for the user, going to the Environment tab, and changing the program file name under "Starting program" to my new app. But is there a way I could do this with some code that could be sent out and run on all these servers?

    Read the article

  • How do I get a static IP address for my teapot?

    - by Joe
    I maintain this teapot: It returns a 418 error when it is pinged, and it is pinged regularly by people arriving from the relevant Wikipedia page. (For those interested, and there appear to be a few of you, the relevent story is here) It sits on a shelf in my office in the Computer Science department of a university and the support guys were kind enough to give it a dedicated IP address some years ago. My contract is coming to an end in the next few weeks and it's occurred to me that I'm going to have to do something with the teapot. I'd like to take it home but I have no clue how to explain to my home broadband supplier that I want a dedicated IP address coming to my house so that people can ping a teapot. Is there a reasonable way of having a server on a shelf in my house that people can ping via an IP address? What search terms can I use to find a solution to this problem?

    Read the article

< Previous Page | 21 22 23 24 25 26 27 28 29 30 31 32  | Next Page >