Search Results

Search found 5749 results on 230 pages for 'miles away'.

Page 27/230 | < Previous Page | 23 24 25 26 27 28 29 30 31 32 33 34  | Next Page >

  • Curating projects of deceased friends

    - by Ant
    A very good friend of mine, and an avid programmer, recently passed away. He left nearly 40 projects on BitBucket. Most of them are public, but a few of them are marked as private. I've decided to take on curation duties for the projects rather than leave his work to disappear. If you have been in the same situation, what did you do? Did you open-source everything? Continue development? Delete it all? I'm very interested to hear other people's experiences. There are a few reasons why some of the projects are marked as private (private projects on BitBucket are visible only to invited users and the original creator): One of them is an iOS web app that was free in the app store. I've had to remove the app from the store as I'm shutting down his web sites as a favour to his widow. However, I've already made the app public under the GPL v3 (he was a big GPL supporter). One of them contains proprietary code. It can't be open-sourced. Others are very much work-in-progress. I don't know if he intended to make them into hosted, paid services or if he wanted to give the code away under an open-source licence when they were finished. Here's a list of the private projects: Some kind of living cell simulator that uses SBML along with Runge-Kutta and Euler algorithms to do... something. There's a fair amount of code here but I don't know what it does or how far along it is. No docs. An accountacy application; it seems to have a solid DB design behind it but there's little code on top of that. A website whose purpose is to suggest good restaurants. Built on yii. Seems to have a lot of code but I'd need to set up a WAMP stack to see how far along it is. A website intended to host memorials to people who suffered from the same problem he was. Built on Joomla. I'm not sure how much of the code is just Joomla and how much is custom; again, I'd need to get Joomla running to find out. I'd just introduced him to Mercurial and BitBucket. All of the private projects are single commits of codebases he wasn't using version control with/was previously using SVN. I don't have the SVN repositories so I can't see the commit logs.

    Read the article

  • Sample Code for the SSIS Book

    - by KnightReign
    Yes, I know I’ve been gone for a long time. I haven’t professionally blogged for years. But, the good folks here, Adam and Peter have out of the goodness of their hearts, left my blog around and well, I though I’d check in. Since then, I’ve changed jobs, gotten divorced, bought a few more laptops, bunches of guitars, a snowboard or two, iPads, iPhones, a few cars, travel to India, Europe, Middle East, backpacked Scotland (and still damp), Nepal and all over the US. I’m three roles away from the SSIS...(read more)

    Read the article

  • Expected visual behavior of notifications (gnome metacity)

    - by MetaChrome
    I sometimes see notification popups on the right of the screen that specify things like network connectivity status changes mainly. I don't understand their expected visual behavior in that: It would appear that sometimes, when you move your mouse close to them, they disappear to reappear when you move away. It does not appear to be possible to ever click on them or hide them in any way, they generally just flicker, often in a in determinant way. Is the flickering perhaps caused because every flicker is in fact a unique notification?

    Read the article

  • Designing Efficient SQL: A Visual Approach

    Sometimes, it is a great idea to push away the keyboard when tackling the problems of an ill-performing, complex, query, and take up pencil and paper instead. By drawing a diagram to show of all the tables involved, the joins, the volume of data involved, and the indexes, you'll see more easily the relative efficiency of the possible paths that your query could take through the tables.

    Read the article

  • Fireside chats at Google I/O

    At Google I/O (just 2 months away!), we're excited to bring back a series of sessions called fireside chats. Fireside chats are smaller, intimate sessions where Google teams...

    Read the article

  • Grep, no value return

    - by Daniel S.
    I am searching for a word, in this case "hehe" that is located in the file findTest by using grep, but when i initiate the search: grep -r "hehe" or grep -lr "hehe" it starts but after 5 min waiting nothing happens, even if i am in the same directory as the file. the only way i get a results straight away is being in the same directory and typing: grep "hehe" findTest Are their any other ways to search for a word? even if not in the same directory.

    Read the article

  • How can I schedule a nightly reboot?

    - by Richard Edwards
    I'm having some periodic issues running a particular application, XBMC. If I use XBMC regularly I don't seem to have any issues but if I leave it unattended for more than about 12 hours I need to reboot to get it working again. I know a scheduled reboot is NOT the answer but until I can figure out the problem I need to schedule a reboot each morning so my wife can use it if I'm away and it doesn't get thrown out the window :) Any takers?

    Read the article

  • Gnome Shell Blank edge until restart?

    - by jtaillon
    Since I installed Gnome Shell (which I much prefer over Unity), there has been a small annoyance appearing on the right side of my screen. As you can see in the picture below, there is a blank few pixels on the right side of the screen. It goes away if I reload gnome-shell ("r" command), but obviously, I'd prefer that this is not necessary. I'm not sure what exactly is causing this, but was hoping someone might be able to help. I'm running Ubuntu 11.10 on a Lenovo Thinkpad Edge E420s

    Read the article

  • Collecting the Information in the Default Trace

    The default trace is still the best way of getting important information to provide a security audit of SQL Server, since it records such information as logins, changes to users and roles, changes in object permissions, error events and changes to both database settings and schemas. The only trouble is that the information is volatile. Feodor shows how to squirrel the information away to provide reports, check for unauthorised changes and provide forensic evidence.

    Read the article

  • How to calculate direction from initial point and another point?

    - by Dvole
    I'm making a simple game where I shoot things from a certain point on screen (A). I tap the screen and shoot the projectile from initial point(A) to the tap point(B). But I want the projectile to move along the same path instead and fly out of bounds of the screen. How do I calculate a point that is on the same line that these two points, but further away? This is a simple math, but I can't figure it out.

    Read the article

  • Outsource Software Development to India For Maximum Competitive Advantage

    Offshore Software Development is a concept that has been gaining momentum over the years. It is a part of software development services offered by an outside provider located in a country that is far away from the client business geographically. The major driving factor for the companies to opt for outsourcing software development is the elevated development expenses of the domestic service providers.

    Read the article

  • Outsource Software Development to India For Maximum Competitive Advantage

    Offshore Software Development is a concept that has been gaining momentum over the years. It is a part of software development services offered by an outside provider located in a country that is far away from the client business geographically. The major driving factor for the companies to opt for outsourcing software development is the elevated development expenses of the domestic service providers.

    Read the article

  • Google Sync brings back Login Keyring from previous distro: How to remove?

    - by Mridul Malpotra
    I previously had Ubuntu 12.04 and had my Login Keyring set to a password that I don't remember and am not able to guess. I changed my Linux version to Mint 15 Cinnamon recently, but everytime I sync my Google account with my browser, the Login Keyring keeps coming back. I tried the /Preferences/Password method but there is no file as such which is created. Also, .gnome2 folder doesn't have any keyring file. How can I make the box go away for all?

    Read the article

  • Convert video files for home IIS server [closed]

    - by Jey
    I am finally learning to set up an IIS server (personal use only) and I thought it would be cool to have some videos on it for me to watch when I am away from home. Since I'm usually on 3G (iPhone) or work wifi, I'd like to convert them to an optimal format that will stream fast. The video files are mostly avi and mp4 (from 30 minutes to 2 hours in length). What would be an easy and fast way to go about doing this? Thanks.

    Read the article

  • Exchange 2010 SP3 announced!

    - by marc dekeyser
    The exchange team announced Service Pack 3 for exchange 2010 yesterday which will, amongst other things, supply coexistence between 2010 and 2013. It is still a bit away as it will be released somewhere in the first half of 2013 “The Exchange Team is pleased to announce that in the first half of calendar year 2013 we will be releasing Exchange Server 2010 Service Pack 3 (SP3) to our customers. “ Read more here

    Read the article

  • Organic SEO Tips

    In this day and age, the costs associated with getting leads has sky rocketed. Internet business which is 100% based on PPC or Pay Per Click advertising will now see the budget eaten away very quickly, thus ROI or return on investment dive too. This is where the concept of Organic SEO comes into play.

    Read the article

  • Some Common Mistakes in SEO

    SEO is the main essence of online revenues as well as optimistic turnover in a particular organization. It drags away the online traffic and hikes the ranking possibility of the websites in the major search engines.

    Read the article

  • 3 Tools to Automate Your SEO Efforts

    When it boils down to it, a lot of SEO is pretty autonomous and mundane. We all know that we need links to get the high rankings but the thought of having to spend hours submitting to directories is enough to make me find a million and one other jobs - even going as far as calling the in-laws! You can outsource the submission process but it's become debatable just how effective these submissions are, you could be throwing the money away.

    Read the article

  • Are you a SQLBits attendee? get a discount for PASS Europe SQL 2008 R2 Launch

    - by simonsabin
    PASS have given use a number of prizes for SQLBits. We have registrations for PASS Europe and PASS North America as well as DVD sets of the sessions from the North America summit last year to give away. Not only that, if you want to go to PASS Europe and you are a SQLBits user then you can get a promotion code that not only gives you the best price it also raises money for SQLBits. To get the promotion code login and then visit the community page http://www.sqlbits.com/about/Community.aspx  

    Read the article

  • Are you a SQLBits attendee? get a discount for PASS Europe SQL 2008 R2 Launch

    - by simonsabin
    PASS have given use a number of prizes for SQLBits. We have registrations for PASS Europe and PASS North America as well as DVD sets of the sessions from the North America summit last year to give away. Not only that, if you want to go to PASS Europe and you are a SQLBits user then you can get a promotion code that not only gives you the best price it also raises money for SQLBits. To get the promotion code login and then visit the community page http://www.sqlbits.com/about/Community.aspx  

    Read the article

< Previous Page | 23 24 25 26 27 28 29 30 31 32 33 34  | Next Page >