Search Results

Search found 19994 results on 800 pages for 'online store'.

Page 332/800 | < Previous Page | 328 329 330 331 332 333 334 335 336 337 338 339  | Next Page >

  • Canon MP280 All in One prints but scanner not recognized

    - by Chris
    I recently installed Ubuntu 12.04 LTS after not using any Linux distro for several years. My Canon MP280 worked perfectly as far as printing goes and I was even able to set it up on a Samba share and print from a Windows 7 machine. However when I open Simple Scan it does not detect a scanner. I did find some instructions online but the scanner is still not recognized in Simple Scan even after installing a couple .deb packages from the Canon site. I also couldn't seem to find the ScanGear package after installing those .deb packages as well but I haven't had a chance to delve fully into it. Thanks for your time!

    Read the article

  • Usefulness of blogs for multi language ecommerce site

    - by jawilson
    I have a multi-language ecommerce site for which I am trying to improve its online marketing. There's currently a blog for the english shop, on a subdomain, which doesn't really get very much traffic. I'd been recommended to set up blogs for each of the different language shops and try to generate traffic to each of the blogs. I'm wondering if this is really worth the effort and cost (blog devt costs and ongoing translations required). Does anyone have any experience/advice on this at all? Perhaps where they've used this approach successfully or otherwise?

    Read the article

  • What does it mean for SVN "to pollute the local source tree"?

    - by asd
    I'm reading "Professional Team Foundation Server 2010" by Wrox, and in an advantages/disadvantages list, the said: "Like CVS, SVN makes use of .svn directories inside the source folders to store state of the local working copy, and to allow synchronization with the server. However, it can have the affect of polluting the local source tree, and can cause performance issues wiht very large projects or files." What does the bit about pollution mean? I've used SVN for C# & ASP.NET projects for a long time and haven't encountered any problems. What probably does this quote think I should have been watching out for?

    Read the article

  • Are there any off the shelf solutions for feature use analysis?

    - by Riviera
    I write a set of productivity tools that sells online and have tens of thousands of users. While we do get very good feedback, this tens to come from only the most vocal users, so we fear we might be missing the big picture. We would like to know if there is any off the shelf (or nearly so) solution to capture usage of different features and to report usage patterns and trends over time. Note: These tools are native apps, not web-based. I know about Google Analytics and the like. They're great, but I'm looking for native code solutions.

    Read the article

  • Will the Global Demand for Water Outstrip the Supply by 2030?

    - by Evelyn Neumayr
    A recent study conducted by the Economist Intelligence Unit and sponsored by Oracle Utilities, titled “Water for All?”,considers the preparedness of utilities to supply water to the current global population of over 7 billion people, with a further 1 billion expected by 2030. It compares strategies used by utilities in 10 major countries to address this challenge. This study’s findings show that wide-ranging water management efforts and large-scale investments must be made if utilities are to meet near-certain water stress—demand outstripping supply—by 2030. The report is based on an online survey of 244 executives of water utilities in these countries, supplemented by in-depth interviews with 20 water utility executives and independent experts. The research concludes that utilities worldwide expect to meet future demand, despite increased supply pressure on supplies, due to improvements in water productivity that the wide range of measures utilities and governments will take to ensure that water is used more efficiently. Read more about this here.

    Read the article

  • Combo box filter on Extjs4.1.3

    - by saravanakumar
    I have created a window with combo box. Combo configuration is xtype :'combo', fieldLabel : 'Command', labelAlign : 'right', id :'commandInputComboId', store : commandStore, displayField: 'command', valueField : 'id', width : 500, enableKeyEvents : true, allowblank : false, queryMode: 'local', typeAhead : true, triggerAction: 'all', query filter works for normal data. But I have data with escape chars like &lt; because I need to show it as '<' for ex my data is <get-all-users> Filter apply only when I type &lt; not for <. How can apply filter on this data?

    Read the article

  • exchange live feed with pre-recorded video for wireless internet camera to router

    - by nate
    I wasn't sure if this should be asked in Web Applications, or Network Engineering, or what... Long story short, I have a video camera with mic that is wirelessly connected to a router (NETGEAR R6200), which can then be viewed through an online service. I would like to be able to somehow exchange the live feed with a pre-recorded video, or image, preferably with pre-recorded sound (the sound of silence would be easiest). Can I place this inbetween the camera and the router, do I need to redirect the camera feed to my laptop first, and then push out the fake video/audio onto the router, without the service knowing the difference? Thanks much and I hope this is well understood!

    Read the article

  • How can I obtain in-game data from Warcraft 3 from an external process?

    - by Slav
    I am implementing a behavior algorithm and would like to test it with my lovely Warcraft III game to watch how it will fight against real players. The problem I'm having is that I don't know how to obtain information about in-game state (units, structures, environment, etc.) from the running WC3 game. My algorithm needs access to the hard drive and possibly distributed computing, that's why JASS (WC3's editor language) isn't appropriate; I need to run my algorithm from a separate process. Direct3D hooking is an approach, but it wasn't done for WC3 yet and a significant drawback of that approach would be the inability to watch how the AI performs online, since it uses the viewport to issue commands. How I read in-game data from WC3 in a different process in a fastest and easiest way?

    Read the article

  • Why a write-enable ring?

    - by SpashHit
    Here's an "interview question" that while ostensibly about hardware really does inform a software design principal as well. Computers used to (still do I guess, somewhere) use magnetic tape reels to store data. There was a plastic accessory you could attach to a tape reel called a "write-enable ring". If the tape had such a ring, the tape drive allowed writing to the tape... if not, it only allowed read access. Why was the choice to design the system in this way? Why not have a "write protect ring" instead, with the opposite effect?

    Read the article

  • Use of another country domain name can influence search engines results?

    - by DontVoteMeDown
    I'm studing a way to create my company domain based on it's name. Consider that my company's name is Another Store and I want to register a domain like anothersto.re - this is just an example. That domain is strictly chosen by marketing. What happens is that my company is stabilished in Brazil and our domain here is .br. The .re domain stands for an island near France so haves nothing to do with my country. If that domain is chosen what it can imply about SEO questions? Did it will have any influence on search engines results considering that they look over user's region? This kind of domain use became common between modern companies - and marketing strategies - and that is why I'm considering it.

    Read the article

  • Not Just What You Sell but Really How You Sell?

    - by divya.malik
    Sales 2.0 is changing the way customers get influenced and buy the products that they want to purchase. Engaging and listening to your customers and market  regularly is necessary, since they are engaging with other customers like themselves all the time, and online. Creating a consistent customer experience for your customers, across channels is more critical than ever. 2.0 and Social media as a channel need to become a part of your inbound and outbound sales strategy. Oracle has been investing in new capabilities to address the needs of this changing marketplace. Listen to  Mark Woollen, VP of CRM at Oracle discuss these new innovations that are changing the way companies and customer interact today, and the new strategies that will give you the lead in the marketplace. Here is an excerpt from his presentation (, which was featured on SellingPower.com.

    Read the article

  • TGA loader: reverse height

    - by aVoX
    I wrote a TGA image loader in Java which is working perfectly for files created with GIMP as long as they are saved with the option "origin" set to "Top Left" (Note: Actually TGA files are meant to be stored upside down - "Bottom Left" in GIMP). My problem is that I want my image loader to be capable of reading all different kinds of TGAs, so my question is, how do I flip the image upside down? Note that I store all image data inside a one-dimensional byte array, because OpenGL (glTexImage2D to be specific) requires it that way. Thanks in advance.

    Read the article

  • Shinkansen for ASP.NET MVC Now Available

    While building Morts and Elvises with MVC2, I cut over Shinkansen to support MVC syntax within views and master pages. I’ve included a sample MVC project, which you can either download from Codeplex or view online: view or download source code. In either case, peek inside Site.Master and you’ll see CSS includes at the top… <%= ShinkansenMvc.Includes (c = { c.AddCss ("~/assets/css/addthis_widget.css"); c.AddCss ("/assets/css/reset.css"); c.AddCss ("assets/css/sifr.css"); ...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Public JCP EC Meeting on 10 June

    - by Heather VanCura
    The next JCP EC Meeting is open to the public!  We hope you will join us on Tuesday, 10 June at 08:00 AM PDT.  Agenda includes a discussion on the latest JCP.Next news--JSR 364, Broadening JCP Membership. We hope you will join us, but if you cannot attend, the recording and materials will also be public on the JCP.org multimedia page. Meeting details below. ------------------------------------------------------- Topic: Public EC Meeting Date: Tuesday, June 10, 2014 Time: 8:00 am, Pacific Daylight Time (San Francisco, GMT-07:00) Meeting Number: 807 111 580 Meeting Password: 6893 ------------------------------------------------------- To start or join the online meeting ------------------------------------------------------- Go to https://jcp.webex.com/ ------------------------------------------------------- Audio conference information ------------------------------------------------------- +1 (866) 682-4770 (US) Conference code: 5731908 Security code: 6893 Global access numbers

    Read the article

  • Data Source Security Part 1

    - by Steve Felts
    I’ve written a couple of articles on how to store data source security credentials using the Oracle wallet.  I plan to write a few articles on the various types of security available to WebLogic Server (WLS) data sources.  There are more options than you might think! There have been several enhancements in this area in WLS 10.3.6.  There are a couple of more enhancements planned for release WLS 12.1.2 that I will include here for completeness.  This isn’t intended as a teaser.  If you call your Oracle support person, you can get them now as minor patches to WLS 10.3.6.   The current security documentation is scattered in a few places, has a few incorrect statements, and is missing a few topics.  It also seems that the knowledge of how to apply some of these features isn’t written down.  The goal of these articles is to talk about WLS data source security in a unified way and to introduce some approaches to using the available features.  Introduction to WebLogic Data Source Security Options By default, you define a single database user and password for a data source.  You can store it in the data source descriptor or make use of the Oracle wallet.  This is a very simple and efficient approach to security.  All of the connections in the connection pool are owned by this user and there is no special processing when a connection is given out.  That is, it’s a homogeneous connection pool and any request can get any connection from a security perspective (there are other aspects like affinity).  Regardless of the end user of the application, all connections in the pool use the same security credentials to access the DBMS.   No additional information is needed when you get a connection because it’s all available from the data source descriptor (or wallet). java.sql.Connection conn =  mydatasource.getConnection(); Note: You can enter the password as a name-value pair in the Properties field (this not permitted for production environments) or you can enter it in the Password field of the data source descriptor. The value in the Password field overrides any password value defined in the Properties passed to the JDBC Driver when creating physical database connections. It is recommended that you use the Password attribute in place of the password property in the properties string because the Password value is encrypted in the configuration file (stored as the password-encrypted attribute in the jdbc-driver-params tag in the module file) and is hidden in the administration console.  The Properties and Password fields are located on the administration console Data Source creation wizard or Data Source Configuration tab. The JDBC API can also be used to programmatically specify a database user name and password as in the following.  java.sql.Connection conn = mydatasource.getConnection(“user”, “password”); According to the JDBC specification, it’s supposed to take a database user and associated password but different vendors implement this differently.  WLS, by default, treats this as an application server user and password.  The pair is authenticated to see if it’s a valid user and that user is used for WLS security permission checks.  By default, the user is then mapped to a database user and password using the data source credential mapper, so this API sort of follows the specification but database credentials are one-step removed from the application code.  More details and the rationale are described later. While the default approach is simple, it does mean that only one database user is doing all of the work.  You can’t figure out who actually did the update and you can’t restrict SQL operations by who is running the operation, at least at the database level.   Any type of per-user logic will need to be in the application code instead of having the database do it.  There are various WLS data source features that can be configured to provide some per-user information about the operations to the database. WebLogic Data Source Security Options This table describes the features available for WebLogic data sources to configure database security credentials and a brief description.  It also captures information about the compatibility of these features with one another. Feature Description Can be used with Can’t be used with User authentication (default) Default getConnection(user, password) behavior – validate the input and use the user/password in the descriptor. Set client identifier Proxy Session, Identity pooling, Use database credentials Use database credentials Instead of using the credential mapper, use the supplied user and password directly. Set client identifier, Proxy session, Identity pooling User authentication, Multi Data Source Set Client Identifier Set a client identifier property associated with the connection (Oracle and DB2 only). Everything Proxy Session Set a light-weight proxy user associated with the connection (Oracle-only). Set client identifier, Use database credentials Identity pooling, User authentication Identity pooling Heterogeneous pool of connections owned by specified users. Set client identifier, Use database credentials Proxy session, User authentication, Labeling, Multi-datasource, Active GridLink Note that all of these features are available with both XA and non-XA drivers. Currently, the Proxy Session and Use Database Credentials options are on the Oracle tab of the Data Source Configuration tab of the administration console (even though the Use Database Credentials feature is not just for Oracle databases – oops).  The rest of the features are on the Identity tab of the Data Source Configuration tab in the administration console (plan on seeing them all in one place in the future). The subsequent articles will describe these features in more detail.  Keep referring back to this table to see the big picture.

    Read the article

  • Data for animation

    - by saadtaame
    Say you are using C/SDL for a 2D game project. It's often the case that people use a structure to represent a frame in an animation. The struct consists of an image and how much time the frame is supposed to be visible. Is this data sufficient to represent somewhat complex animatio? Is it a good idea to separate animation management code and animation data? Can somebody provide a link to animations tutorials that store animations in a file and retrieve them when needed. I read this in a book (AI game programming wisdom) but would like to see a real implementation.

    Read the article

  • Is there a simple shopping cart I can add to my existing website?

    - by Kalessin
    I created a website for my wife, who knits scarves. The site simply displays the 18 different colours she has created, with a Lightbox-like large photo available when clicked. She would now like to give visitors the option to purchase online and pay with PayPal and possibly Google Checkout. We do not need a full ecommerce solution; I've looked at several and they all seem to be overkill for our requirements. We don't even need categories. "All" I want is something that will add products to a cart, take the customer details and integrate the payment provider. So far, the best solution I have found seems to be this script on Codecanyon and I wanted to find out if anyone knows of any better products before I commit to this route. Thanks for your help!

    Read the article

  • cpu temperature imrpoves very fast

    - by myildirim
    Last few days i found out that when i click google chrome and the open it my laptop starts being angry.That's fans are working hardly and i can not touch the mousepad because of heating.I use Ubuntu 11.10 on my Toshiba A350-22z laptop and monitor cpu and harddrive temperature.Both cores reached 104 Celcius and i read somewhere "if your processor reaches 105Celcius it harms itself".I cleaned inside of laptop a year ago but there is a point : until wheather becomes about 20Celcius there was no problem.I know hardware cleaning is the best solution but how can i solve with another way ? I think problem is about outside's hot wheather.Is there anybody that has the same problem.In addition to Google Chrome i realized that when i open online video the processor temperature increas very fast.

    Read the article

  • What is a modern software engineer's resume supposed to look like? [on hold]

    - by willOEM
    My secondary education was primarily focused on the sciences (Molecular Biology and Bioinformatics), but now I work primarily as a software developer. I feel like my resume is totally inappropriate for my current career goals. Listing laboratory skills and accomplishments is not the same as listing software development skills and accomplishments. Oddly enough, I can't seem to find any resources for writing a engineer's resume online that aren't older than 5 years. GitHub and StackExchange profiles seem like as important resume items as anything, yet I don't know how to list them on a resume, or whether they are appropriate at all. So what is a modern software engineer's resume supposed to look like?

    Read the article

  • Zotero error in libreoffice

    - by arno
    I installed Zotero standalone in 12.10 64bit. Some problems which I managed to fix. The one that remains is an error saying "openoffice.org could not communicate with Zotero. make sure zotero standalone or Firefox are open and set to an online state and try again". That's when I click any button in the Zotero toolbar in libreoffice. Firefox doesn't open with a the plugin installed and a working internet connection. The Zotero troubleshooting which mentions this error was of no help to me. I find reports about this bug going back as far as 2009 but I haven't found anything of help.

    Read the article

  • Broadcasting webinars to and from Ubuntu

    - by Chris Wilson
    I've recently attended an online workshop using Citrix GoToWebinar, a service that allows someone to broadcast their desktop and audio out to all members connected to the presentation as well as receive audio and screencasts from those attendees , and the experience was unbelievable, and I was wondering if there was any such service/software available on Ubuntu. Points to consider include, but are not limited to: Web services or local applications. Free (as in beer) or paid. Free (as in speech) or proprietary. Ease of use Ease of setup Any other point that anyone can thing of

    Read the article

  • Internet keep dropping in Ubuntu 12.04

    - by Kokuryuu
    I am having an issue with my Ubuntu, I keep getting "server not found" errors when I try to go online, I have tried pinging my DNS and Goggle, and it seems like no packets are dropped, but still my Internet is not working Also my other PCs in the house have working Internet connection. I am sure there is no firewall active here, also nothing on my router is blocking, and I checked cables. I have no issues in the same PC in Windows. It is only in Ubuntu. Any ideas?

    Read the article

  • Take Camera Phone Macro Photos with a Cheap Laser Pointer Lens

    - by Jason Fitzpatrick
    Inside those cheap laser pointers you see in the grocery store checkout line there’s a handy little plastic lens that, when slapped on your phone’s camera, makes it easy to take macro photographs. In this tutorial, they take the lens from a laser point and secure it using tape and a bobby pin. An alternative method to achieve the same end (and with a higher quality lens) is to dismantle a CD/DVD drive to source the lens and use painter’s tape to hold the lens in place–this is the technique I used several years ago, check out the tutorial video here. Laser Pointer Macro Lens [via Apartment Therapy] How to Get Pro Features in Windows Home Versions with Third Party Tools HTG Explains: Is ReadyBoost Worth Using? HTG Explains: What The Windows Event Viewer Is and How You Can Use It

    Read the article

  • MCrypt Module, Rijndael-256

    - by WernerCD
    An outside company is redoing our company Intranet. During some basic usage I disovered that the "User Edit" screens, with the "Password: *" boxes have the password in plain text, with the text box "type=password" to "hide" the password. The passwords are not store in the database as plain text, they are stored encrypted using "rijndael-256" cypher using the mcrypt module. I know that if I encrypt a password with SHA*, the password is "Unrecoverable" via one-way encryption. Is the same of MCrypt Rijndael-256 encryption? Shouldn't an encrypted password be un-recoverable? Are they blowing smoke up my rear or just using the wrong technology?

    Read the article

  • IT Sicherheit - (K)ein Thema für Admins!

    - by Anne Manke
    Laut einer Umfrage von Synetics unter rund 1500 Administratoren anlässlich des Tages des Systemadministrators beschäftigen sich 38 % der Befragten überhaupt nicht mit IT-Sicherheit und IT-Sicherheitsmanagement. Nur 32,6 % beschäftigen sich lediglich ein bis 2 Stunden pro Wochen mit dem Thema Sicherheit für ihre Umgebung. Die meiste Arbeitszeit wird indes auf das Servermanagement verwendet. 46,2% der Befragten gaben an 10 Stunden und mehr für das verwalten und instandhalten der Server zu verwenden. Die Befragten sind bei Unternehmen mit einer Mitarbeitergröße zwischen 101 und 1000 Mitarbeiter angestellt. Den kompletten Artikel finden Sie auf der Internetseite Heise-Online!

    Read the article

< Previous Page | 328 329 330 331 332 333 334 335 336 337 338 339  | Next Page >