Search Results

Search found 16383 results on 656 pages for 'bi applications'.

Page 380/656 | < Previous Page | 376 377 378 379 380 381 382 383 384 385 386 387  | Next Page >

  • Setting up lvm with HDD and SSD

    - by stonegrizzly
    My current hard drive is just about full and rather than just toss it and get a new one (since it works fine), I want to get a new drive and set them both up using lvm. While I'm at it, I also want to get an SSD to install the OS and applications on. This is my plan: Put / on the SSD (one partition) Put /tmp on a ram disk Put /var on a partition on my new drive Put /home on the rest of the new drive and my current drive using lvm. My goals are: Speed up boot time and application launch Minimize unnecessary writes to the SSD Never have to worry about which disk/partition to store my files on. I want the OS & lvm to take care of that Does this make sense? I'm fairly experienced with Ubuntu but I've never dealt with lvm before.

    Read the article

  • Toutes les semaines un peu de code pour aller plus loin avec Windows 7, L'assistant de résolution de problème

    En cette fin d'année, la communauté de Developpez.com s'est alliée avec Microsoft France pour relayer une série de questions / réponses sur le développement Windows 7. A partir d'aujourd'hui, nous poserons une question chaque lundi sur une fonctionnalité propre au développement d'applications Windows 7. La bonne réponse de la question de la semaine sera ensuite dévoilée la semaine suivante avec un exemple de mise en pratique. Êtes-vous prêt à relever le défi ? Pensez-vous bien connaître les possibilités que proposent les API Windows 7 ? C'est ce que nous allons voir dès aujourd'hui, nous attendons vos propositions ! La réponse de la semaine : Quel est l'outil qui permet de cr...

    Read the article

  • Secure Open Source?

    - by opatachibueze
    I want to make a delicate application of mine (an antivirus actually) open source but I want to have a control on who really obtains the source or not. Preferably they should apply and I or administrators approve their applications. Is there any online platform for this? The main reason for the control/security is to possibly prevent malware makers to easily discover how to bypass the stealth checking methods it utilizes for malware detection. Edit: I am looking for advice - possibly to hear from someone who has done something similar. Thanks!

    Read the article

  • How to fix “Error: This solution contains no resources scoped for a Web application and cannot be deployed to a particular Web application.”

    - by ybbest
    Problem: When I try to deploy my custom wsp solution to a specific web application, I got the error below: This solution contains no resources scoped for a Web application and cannot be deployed to a particular Web application. Analysis: The error message itself explains why you cannot deploy the solution to a web application. However if you do not like to deploy the solution to all the web applications and only like to deploy your solution to a specific application , you need to change the solution settings Assembly Deployment Target from GlobalAssemblyCache to WebApplication. From: TO: Solution: After you change the Assembly Deployment Target and run the script again, you will have the solution deployed successfully. References: http://blogs.msdn.com/b/jjameson/archive/2007/06/17/issues-deploying-sharepoint-solution-packages.aspx

    Read the article

  • Ubuntu 12.10 beta 2 has awfull 3d performance and Video Tearing do something about this [closed]

    - by digitalcrow
    Ubuntu 12.10 beta 2 has awfull 3d performance and Video Tearing do something about this. Tearing is common issue on linux and makes linux sucks. Ubuntu also is bloated and uses compiz , i hope ubuntu developers should be more serious cause even a noob should know that compiz sucks now. I have no screen tearing and full opengl 3d performance on cinnamon ! And thats why i like linux mint 13. Ubuntu is so slow applications launching time is bigger compared to linux mint or xubuntu and many many times slower compared to arch linux. I was sattisfied before the 12.04 version now i'm just dissapointed..... (downvoters are simply noobs or silly fanboys and they deserve ubuntu)

    Read the article

  • Is there any simple way to access installed programs?

    - by Anentropic
    Just installed Ubuntu for the first time... Is there any simple way to browse installed programs? On Mac there is the Applications top-level folder... here I see Desktop, Documents, Downloads etc but no Apps? That'd be a good idea, no? (is there some way to create this myself?) On Windows there is the Start menu... Here it seems like I have to click the 'Dash Home' and then I can see 'Recent Apps' ... I can search for them (I'd rather not) ...or I can click the ruler/pencil icon at the bottom and see 'Recent Apps' and click to expand 'Installed Apps' ...ok that's all of them - is it possible to get a straight list view instead of the hard-to-scan wrapped rows? Also, is there any way to get rid of the pointless random selection of 'Apps available for download' at the bottom?

    Read the article

  • Apps Foundry Contest : 36h pour créer une application mobile, les gagnants présenteront leur création devant 600 décideurs IT

    Apps Foundry Contest : 36h pour créer une application mobile Les gagnants présenteront leur création devant 600 décideurs IT Le développement mobile prend de l'ampleur. Mais malgré la montée en puissance d'Android et la progression continue de l'App Store et des autres galeries d'applications, les « best practices » dans la conception et le développement mobile sont encore peu établies. C'est en tout cas l'avis des co-organisateurs de l'Apps Foundry Contest, un challenge qui se tiendra au mois de juin et qui proposera de créer une application mobile, sur la plateforme de son choix, en 36 heures chrono. Ces organisateurs savent a priori de quoi ils parlent. Le concours est p...

    Read the article

  • How to remove geoclue-master?

    - by dunderhead
    Looking in System Monitor I saw a process called geoclue-master. As far as I can tell, this reports my precise location to applications and the internet. This computer is sitting in the same office all the time so I have no need whatsoever for such a thing, and would rather have the memory and processor cycles that this unnecessary service uses up - however small - free for things that I do need and want. I could not find instructions for disabling and removing this service so I renamed the file, but then the calendar disappeared from the notification area. Is there a way to remove this service but leave the calendar? I'm using 11.10.

    Read the article

  • Live Webcast: Introducing Oracle Identity Management 11gR2

    - by B Shashikumar
    Please join Oracle and customer executives for the launch of Oracle Identity Management 11g R2, the breakthrough technology that dramatically expands the reach of identity management to cloud and mobile environments. Until now, businesses have been forced to piece together different kinds of technology to get comprehensive identity protection. The latest release of Oracle Identity Management 11g changes all that. Only Oracle Identity Management 11gR2 allows you to: Unlock the potential of cloud, mobile, and social applications Streamline regulatory compliance and reduce risk Improve quality of service and end user satisfaction Don't leave your identity at the office. Take it with you on your phone, in the cloud, and across the social world. Register now for the interactive launch Webcast and don’t miss this chance to have your questions answered by Oracle product experts.Date: Thursday, July 19, 2012 Time: 10am Pacific / 1pm Eastern

    Read the article

  • CRM: How to Use iSurvey With iSupplier in R12

    - by LuciaC
    In Oracle Applications it is possible to configure iSupplier to link to an Oracle iSurvey, and for the Oracle iSurvey to be executed for a Supplier. This integration requires: An Oracle Script An Oracle iSurvey linked to the Oracle Script iSupplier Configuration to reference the iSurvey. Once set up, the iSurvey will be available from the supplier tab from the Purchasing Responsibilities and from the iSupplier Portal.  Responses to the survey can be viewed from the Survey Administrator Responsibility. Take a look at Doc ID 1589371.1 for step-by-step details of how to configure and use iSurvey with iSupplier.

    Read the article

  • Microsoft publie le Patch Tuesday du mois de mars, qui corrige sept failles de sécurité dont 2 critiques dans Visual Studio

    Le Patch Tuesday concerne aussi Windows 8 Consumer Preview et apporte plusieurs correctifs de bogues à l'OS Mise à jour du 15/03/2012 Le Patch Tuesday publié mardi dernier par Microsoft apporte quelques correctifs à Windows 8 Consumer Preview. Ces mises à jour intègrent 8 correctifs pour des bugs dans l'OS. Le premier concerne une mise à jour de compatibilité des applications. Le second corrige un problème dans « Broker Infrastructure Service », pouvant conduire au ralentissement des connexions. Un Patch corrige deux bugs dans IE10, pouvant conduire à une fuite de mémoire. Les autres correctifs améliorent la préc...

    Read the article

  • Toutes les semaines un peu de code pour aller plus loin avec Windows 7, Les extensions PowerShell

    En cette fin d'année, la communauté de Developpez.com s'est alliée avec Microsoft France pour relayer une série de questions / réponses sur le développement Windows 7. A partir d'aujourd'hui, nous poserons une question chaque lundi sur une fonctionnalité propre au développement d'applications Windows 7. La bonne réponse de la question de la semaine sera ensuite dévoilée la semaine suivante avec un exemple de mise en pratique. Êtes-vous prêt à relever le défi ? Pensez-vous bien connaître les possibilités que proposent les API Windows 7 ? C'est ce que nous allons voir dès aujourd'hui, nous attendons vos propositions ! La réponse de la semaine : Comment appelle-t-on les extensio...

    Read the article

  • Ruby Installation System similar to NSIS (Nullsoft Scriptable Install System), feasibility?

    - by Chris Valentine
    I'm learning (relearning) how to use NSIS as I have not touched it in a bit. I also have recently become familiar with the Ruby language and find it very pleasing and actually a bit fun. And upon reading about the history of Rake I had a thought. What are the pros/cons of someone making (or migrating, or something) an installation system similar to NSIS in Ruby. It seems the learning curve would be far easier (NSIS seems so low level) and probably get the same job done in far less scripting. NSIS seems very outdated. Seems it would tie into things like Rake easier and Ocra and make Ruby distribution simpler for applications too. Maybe even give me a project to work on. Any thoughts on this?

    Read the article

  • New &lt;%: %&gt; Syntax for HTML Encoding Output in ASP.NET 4 (and ASP.NET MVC 2)

    [In addition to blogging, I am also now using Twitter for quick updates and to share links. Follow me at: twitter.com/scottgu] This is the nineteenth in a series of blog posts Im doing on the upcoming VS 2010 and .NET 4 release. Todays post covers a small, but very useful, new syntax feature being introduced with ASP.NET 4 which is the ability to automatically HTML encode output within code nuggets.  This helps protect your applications and sites against cross-site script injection...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Gnome/X logs off immediately after login -- which logfiles are relevant?

    - by joebuntu
    I've been tinkering with fingerprint-gui as well as X/xrandr resolution settings. When I start my machine, it boots up normally. As soon as X and gnome have finished starting, it logs me off automatically and brings me back to the gdm login prompt with the user list. Then I am, however, able to log in using "Ubuntu Desktop Fail-safe". I've checked the list of start-up applications, but everything seems fine there. I can't yet put my finger on what exactly might be responsible for this: X, gnome or some messed up pam.d settings. So far I've checked /var/logs/X11/xorg.0.log, /var/logs/auth.log and ~/.xsession-errors. In addition, I don't quite seem to understand the "interplay" between X, GDM, GNOME, GNOME-policykit, PAM.d and all that. Are there any other relevant log files that could point me to what's broken? Specs: Ubuntu 10.10 Maverick Meerkat IBM/Lenovo Thinkpad R60, ATI Radeon x1400 Mobility all updates installed Linux User 1 year+,

    Read the article

  • Database in the cloud?

    - by Jlouro
    Some of my recent clients are asking for remote connections to the office server, for standalone work, etc, in winForm applications. Since the concept of the web is remote connection to a server both of data and resources, it should be possible to place both of this in cloud and have the winForm apps connect to it as if web Apps. As any one tested this, is working like this? Is it fast enough? Is it secure? What is the best cloud host for this type of work ?

    Read the article

  • Mobile Compatibility: traditional website look vs native application ?

    - by Siddiqui
    I have a question related to mobile compatible websites, I have seen two type of websites One in which they adopt traditional website look and adjust website according to mobile screen, if they have lot of information which can not be adjust according to screen then they expand the height of page, so that user can scroll the page to see more information... In the second approach they used native application look means use navigation-bar, tab-bar, tool-bar, scroll-view just like in native applications. Height and width of page adjust according to screen size, if they have more information then they use scroll-view etc... My question is: which approach is better then other, in which approach you feel more comfortable to use website.

    Read the article

  • Should I create an Enum mapping to my database table

    - by CrazyHorse
    I have a database table containing a list of systems relevant to the tool I am building, mostly in-house applications, or third-party systems we receive data from. This table is added to infrequently, approx every 2 months. One of these systems is Windows itself, which is where we store our users' LANs, and I now need to explicitly reference the ID relating to Windows to query for user name, team etc. I know it would be bad practice to embed the ID itself into the code, so my question is what would be the best way to avoid this? I'm assuming my options are: create a global constant representing this ID create a global enum containing all systems now create a global enum and add systems to it as & when they are required in the code retrieve the ID from the database based on system name I appreciate this may seem a trivial question, but I am going to have many situations like this during the course of this build, and although we are in complete control of the database I would like to conform to best practice as far as possible. Many thanks!

    Read the article

  • Learning PHP MySQL [closed]

    - by Keith Groben
    I've been a designer for several year now. I'm now very interested in learning PHP, MySQL. I've read through W3Schools already and it helped me become familiar. I now want to know where I could go to start building some simple database and php applications so I could be come familiar with coding and start to improve. I think hands on application is the best way to learn. Since I'm a beginner, much of what I've found so far is sort of advanced to me.

    Read the article

  • How can an application (like Firefox) be forced to use a certain network interface?

    - by Lekensteyn
    I've two interfaces: eth0 and wlan0 on a notebook. Possible use cases: eth0 grants me Internet access, and wlan0 is currently connected to a router which does not have Internet-connectivity. For development purposes, I need to connect to the wlan0 by default, but use eth0 for surfing eth0 and wlan0 are both connected to the Internet. For a torrent application, eth0 should be used for speed, but for portability of the notebook, SSH should have a connection over wlan0 eth0 is a wire connection, wlan0 is a wireless one. Sensible data should be transferred over eth0, but other traffic can go over wlan0 as well. Is there a way to force applications (like nc.traditional or firefox) to use a certain network interface? A wrapper like example-wrapper eth0 program is fine too if such program exist. It would be nice if it could configured within Firefox (in runtime). I'd like to avoid IPTables solutions if possible.

    Read the article

  • Toutes les semaines un peu de code pour aller plus loin avec Windows 7, l'accélération matérielle

    En cette fin d'année, la communauté de Developpez.com s'est alliée avec Microsoft France pour relayer une série de questions / réponses sur le développement Windows 7. A partir d'aujourd'hui, nous poserons une question chaque lundi sur une fonctionnalité propre au développement d'applications Windows 7. La bonne réponse de la question de la semaine sera ensuite dévoilée la semaine suivante avec un exemple de mise en pratique. Êtes-vous prêt à relever le défi ? Pensez-vous bien connaître les possibilités que proposent les API Windows 7 ? C'est ce que nous allons voir dès aujourd'hui, nous attendons vos propositions ! La réponse de la semaine : Quelle est le nom de la nouvelle ...

    Read the article

  • Certain windows are not opening in the last position/size I used them at

    - by Spacecraft
    Certain windows are not opening in the last position/size I used them at. Opening "compose a message" with evolution through the message menu on the toolbar opens a window that is always in the top left of my screen. Opening Firefox 4.0 always opens maximized, even if i last used it in "windowed" mode. Other things I've tried that won't remember my custom positions: ccsm, terminal, gedit, sound recorder, calculator. Some other stuff works fine like banshee, empathy, shutter, deluge. Is this a bug? Is there a way to make these applications open in their last used positions/sizes?

    Read the article

  • Office 365 : plus que quelques heures pour tester la beta de la nouvelle suite professionnelle hébergée de Microsoft

    Office 365 : sortie officielle avant la fin du mois Pour le successeur de BPOS et de Online Services, plus que quelques jours pour tester la beta publique La nouvelle suite d'applications professionnelles de Microsoft en mode Cloud devrait faire ses débuts officiels dans le courant du mois. C'est en tout cas ce qu'à laissé entendre Steve Ballmer, le PDG de Microsoft, lors d'une intervention en Inde. « Nous travaillons dur dans le domaine des outils de productivité. Nous allons lancer notre service Office 365, qui vous donnera Lync et Exchange et SharePoint et Office et plus encore sous la forme de services hébergés disponibles par abonnement », a-t-il déclaré. « Ce lanc...

    Read the article

  • Triple Monitor Setup with Nvidia and Compiz

    - by AndrewX192
    I have a triple monitor setup with two video cards on Ubuntu 10.04. I have the monitors and graphics cards currently setup as follows: Nvidia Geforce 210 #1 - 1920x1080 Monitor (Twinview) [Center - Monitor #1] - 1920x1080 Monitor (Twinview) [Right - Monitor #2] Nvidia Geforce 210 #2 - 1920x1080 Monitor (Separate X Screen) [Left - Monitor #3] This works fine, except when I open a program, it shows up in between monitor #1 and #2 - meaning I have to drag it to one screen before I can use the window. Gnome2's gnome-panel also does not work on the twinview setup; it spans between both monitors, but it does not redraw (ex: the clock never changes). In addition, when I maximize an application, it spans both monitors, which is not acceptable. When I enable Xinerama for my setup, gnome-panel no longer spans two monitors, and applications maximize as expected, but compiz does not work, as X11 compositing is not available. The lack of desktop compositing causes problems with dragging windows between screens (redraws take forever). Is there anything I can do to fix these issues without opting for different graphics cards?

    Read the article

  • Un certificat d'Adobe utilisé pour signer des malwares par des pirates depuis un serveur compromis de la société, le certificat révoqué

    Un certificat d'Adobe utilisé pour signer des malwares par des pirates depuis un serveur compromis de la société, le certificat sera révoqué Adobe va révoquer un certificat de signature de code après avoir découvert que celui-ci avait été utilisé pour signer numériquement des applications malveillantes. Cette action serait la conséquence d'un accès à l'un des serveurs internes de la société par des pirates qui ont utilisé un certificat de signature de code valide pour signer des utilitaires malveillants, afin de les faire passer pour des solutions Adobe légitimes aux yeux des antivirus. Pour l'instant, Adobe dit n'avoir trouvé que deux logiciels malveillants qui utilisent cette ...

    Read the article

< Previous Page | 376 377 378 379 380 381 382 383 384 385 386 387  | Next Page >