Search Results

Search found 24132 results on 966 pages for 'non clustered index'.

Page 445/966 | < Previous Page | 441 442 443 444 445 446 447 448 449 450 451 452  | Next Page >

  • Video Bug in Ubuntu 12.10 MSI CX623 laptop

    - by user104731
    http://www.youtube.com/watch?v=5xyJkS8XjgA&feature=youtu.be I managed to take a video with what happens on my Ubuntu 12.10 laptop when I play with the volume and hover with the mouse over the slider and when I press Ctrl + Alt + D (show Desktop/minimize all) The real bugs are those in which the panel becomes transparent on the down side, exactly above the volume slider (and not only when that slider appears, but also when brightness slider appears, and when blocking my touchpad applet appears) and when I have a maximized window, more maximized windows or a non maximized window that touches the panel, while I use Ctrl+Alt+D (show Desktop/hide all normal windows). Is there a way to solve this bug? PS: The other bugs are from Record My Desktop. I didn't have the mentioned bugs in ubuntu 12.04, but I like more the graphics in 12.10.

    Read the article

  • I cannot log in after theme change

    - by sssuizaaa
    After changing the gtk-theme in the gnome tweak took I was taken out of the session to the login screen and now I cannot log in. I can only log in using the guest account. So in the grub menu I selected the recovery mode and in the resulting menu I selected root-drop to root shell prompt. Once there I did a couple of things I've found in several pages and in the forums. 1.gsettings reset org.gnome.desktop.interface gtk-theme This is what I got: (process:642):WARNING: Command line 'dbus-launch –autolunch=4438d024dd45ef7fb2d3f4ab0000000f –binary-syntax --close-stderr' exited with non-zero exit status 1: Autolaunch error: X11 initialization failed.\n and nothing changes 2.gconftool-2 --type=string -s /desktop/gnome/interface/gtk_theme Radiance with this I was trying to change the gtk theme to the Radiance one. No strange message this time but it did not work either. I still cannot log in. Any ideas please?? sssuizaaa

    Read the article

  • Getting wireless N to work on Dell Vostro 3300?

    - by luisfpg
    I have a Dell Vostro 3300, which has a Broadcom BCM4313 wireless. The point is that I cannot make it work in N mode. NetwotkManager applet says I'm on 54 Mbit/s. Of course, my wireless router is N capable. I've double checked. Anyone knows what to do? Here is the output for lspci -v: 12:00.0 Network controller: Broadcom Corporation BCM4313 802.11b/g/n Wireless LAN Controller (rev 01) Subsystem: Dell Device 0010 Flags: bus master, fast devsel, latency 0, IRQ 17 Memory at fbb00000 (64-bit, non-prefetchable) [size=16K] Capabilities: <access denied> Kernel driver in use: wl Kernel modules: wl, brcm80211 Thanks a lot.

    Read the article

  • Are there disadvantages an literal + instead of an encoded + (%2B) in an URL?

    - by M_rk
    A client of mine has a product ending with a plus-sign (e.g. Google+) and would like the webpage of this product to have an URL that is human-readable (i.e. an URL that doesn't contain %2B). Since our projects use the following .htaccess RewriteRule RewriteRule ^(.*)$ index.php?$1 it is possible to use an urlencoded space in an URL like that. However, while the url would read like /google+, the actual meaning of the URL would be /google[space]. (The markup won't let me place a real space there.) Now my concern is that this would have disadvantages for SEO. Is this concern valid and/or are there other culprits to this approach?

    Read the article

  • how to get more vacation time than "policy" allows

    - by SpashHit
    At my company, the maximum vacation is 3 weeks for everyone but executives. Therefore I cannot even start negotiating for an increase to 4 weeks.. it's a non-starter because it's "against policy"... even though I think my experience and value to the company warrant it, and I've gotten 4 weeks at previous jobs. (I know I could have made a "hard stand" before taking this job, but that's water under the bridge) Any advice? I was kind of thinking of taking the "you want to be competitive" tack to get them to change their policy but I don't know where to find the kind of data I would need to support that.

    Read the article

  • What is best way to create a cross fade effect?

    - by Starx
    While creating an Image Slider, cross-fade is one of most popular effects so far. Various slider on the internet use various techniques to create such effect. Major technique I have found so far are two: Some use a overlay and underlay div and fade in and out each others visibility. While others, create a div of exact size of the slider on the slider-initialization and play with its z-index property and then fade each other consequently. Disregarding them, what is a proper way or much better way to create a cross fade effect. P.S: I would love to read answer in form of algorithm.

    Read the article

  • Multiple Passwords on One Account

    - by user110789
    I'd like to join three ideas into one interesting and sometimes useful feature. There was a question about using multiple passwords earlier this year, but it didn't receive much attention. I'd like to ask the question again after showing an interesting and new way to use the feature. The three original posts I found to be interestingly combined were: (1) Multiple passwords per user (2) http://blog.littleimpact.de/index.php/2009/09/14/automatic-encryption-of-home-directories-using-truecrypt-62-and-pam_exec/ (3) http://www.truecrypt.org/docs/hidden-volume Basically I'd like to login to my account with two passwords and depending on the password I use, I would get a different content in my home directory. In a way I would get a cryptographically hidden account into my system. So the question is, is it possible to allow multiple passwords to log on to Ubuntu/Linux for the same user?

    Read the article

  • Free eBook: SQL Server Execution Plans, Second Edition

    Every day, out in the various online forums devoted to SQL Server, and on Twitter, the same types of questions come up repeatedly: Why is this query running slowly? Why is SQL Server ignoring my index? Why does this query run quickly sometimes and slowly at others? My response is the same in each case: have you looked at the execution plan? "A real time saver" Andy Doyle, Head of IT ServicesAndy and his team saved time by automating backup and restores with SQL Backup Pro. Find out how much time you could save. Download a free trial now.

    Read the article

  • Authentication error when trying to upgrade from 11.10 to 12.04

    - by mahmuodmasri
    I wrote : ~$ do-release-upgrade and the system says: Checking for a new ubuntu release Get:1 Upgrade tool signature [198 B] Get:2 Upgrade tool [1551 kB] Fetched 1551 kB in 6s (167 kB/s) extracting 'precise.tar.gz' authenticate 'precise.tar.gz' against 'precise.tar.gz.gpg' exception from gpg: GnuPG exited non-zero, with code 2 Debug information: gpg: Signature made Thu 11 Oct 2012 07:47:10 AM EET using DSA key ID 437D05B5 gpg: can't open `/etc/apt/trusted.gpg' gpg: keydb_search failed: file open error gpg: Can't check signature: public key not found Authentication failed Authenticating the upgrade failed. There may be a problem with the network or with the server. Please help me!

    Read the article

  • Le chef de produit Flash explique les raisons de la fin du Player sur mobiles, il pointe Apple du doigt

    Le chef de produit Flash explique les raisons de la fin du Player Sur Mobiles, il pointe Apple du doigt Mise à jour du 14 novembre 2011 Les arguments avancés par Adobe pour justifier l'arrêt de son Flash Player sur mobiles n'ont pas convaincu les observateurs, pressés de tracer d'autres corrélations. Ils ne s'avèrent pas non plus du goût de certains employés de l'entreprise, principaux concernés par une décision qui leur coûte 750 postes (lire ci-devant). « Je pense que les deux derniers jours étaient les plus difficiles de ma carrière », déclare Mike Chambers, chef de la plateforme Flash à Adobe. « Je voulais ...

    Read the article

  • La RC de Internet Explorer 9 disponible pour la clôture des TechDays 2011, téléchargez-là et faîtes nous part de vos avis

    La RC de IE9 est disponible Avec Do Not Track, le support de WebM et met encore plus l'accent sur la sécurité Microsoft vient d'annoncer l'arrivée de la Release Candidate de IE9. Une nouvelle qui clôt en beauté les TechDays 2011, son salon dédiée cette année au Cloud Computing. Avec cette nouvelle étape, Internet Explorer 9 intègre toutes ses fonctionnalités finales. Il ne reste plus à l'équipe du projet qu'à corriger les bogues et les dernières imperfections avant la sortie officielle. Cette RC bénéficie d'un très léger toilettage de l'UI avec des onglets carrés (et non plus aux angles arrondies) qui peuvent à présent être placés en dessous d...

    Read the article

  • On pourra bientôt identifier les auteurs de mails anonymes via leurs "empreintes digitales numériques", d'après des chercheurs canadiens

    Des chercheurs proposent d'identifier les auteurs de mails anonymes via leurs "empreintes digitales numériques", cette nouvelle technique pourrait être reconnue comme preuve Débusquer l'expéditeur d'emails anonymes a toujours été un vrai casse-tête, demandant une expertise sans failles pour des résultats non garantis. Aujourd'hui, des chercheurs de l'Université de Concordia proposent une nouvelle méthode pour tenter de résoudre ce type de problèmes. L'équipe de scientifiques est en effet alarmée par la recrudescence de ce type de courriels malveillants (qui peuvent entre autre contenir des virus) dont les auteurs restent inconnus. Ils ont fait des recherches concernant une identification exacte de l'expéditeur.

    Read the article

  • Collisions and Lists

    - by user50635
    I've run into an issue that breaks my collisions. Here's my method: Gather Input Project Rectangle Check for intersection and ispassable Update The update method is built on object_position * seconds_passed * velocity * speed. Input changes velocity and is normalized if 1. This method works well with just one object comparison, however I pass a list or a for loop to the collision detector and velocity gets changed back to a non zero when the list hits an object that passes the test and the object can pass through. Any solutions would be much appreciated. Side note is there a more proper way to simulate movement?

    Read the article

  • Math behind multivariate testing for website optimization

    - by corkjack
    I am looking for theoretical resources (books, tutorials, etc.) to learn about making sound statistical inferences given (plenty of) multivariate website conversion data. I'm after the math involved, and cannot find any good non-marketing stuff on the web. The sort of questions I want to answer: how much impact does a single variable (e.g. color of text) have? what is the correlation between variables? what type of distribution is used for modelling (Gaussian, Binomial, etc.)? When using statistics to analyze results - what should be considered as a random variable - the web-page element that gets different variations or the binary conversion-or-no-conversion outcome of an impression? There's plenty of information about different website optimization testing methods and their benefits\pitfalls, plenty of information about multivariate statistics in general, do you guys know of resources that discuss statistics in this specific context of website optimization ? Thanks for any info!

    Read the article

  • Quelles sont pour vous les plus belles applications de bureau développées en Java ? Partagez votre expérience

    Même si les applications Web prennent une part non négligeable dans le développement Java, de nombreuses applications de bureau sont encore très demandées. La plateforme Java via ses nombreuses bibliothèques graphiques (JavaFX, Swing, plateforme Eclipse, ...) permet de réaliser des applications de bureau très abouties. Nous vous invitons à partager les applications de bureau qui vous semblent les plus réussis et les plus à même de montrer la maturité de Java dans tous les domaines. Pour chaque application, merci de préciser un lien et un bref descriptif. A noter qu'un débat similaire avait été proposé il y a quelques années concernant

    Read the article

  • Git dont sync files untill committed even if checkout different branch

    - by DertWaiter
    Ok i have git 1.7.11.1 on windows and i have local test reposotory with 2 branches one is master with index.php help.php then i create another branch called slave :) I run from git bash rm help.php and it dissapears from the folder, but i dont stage anything. I switch to checkout master branch and it supposed to restore file help.php because its not modified in master branch isnt it? And it does not do it. When i back to slave branch and commit and then switch to checkout master then help.php appears. is that the way it supposed to be why?

    Read the article

  • Une vulnérabilité du Marketplace de Windows Phone 7 dévoilée permet de télécharger illégalement des applications, un PoC est publié

    Une vulnérabilité du Marketplace de Windows Phone 7 permet de télécharger illégalement des applications, un PoC est publié Une vulnérabilité du Marketplace de Windows Phone 7 qui permet de télécharger et d'installer sans autorisations les applications disponibles sur la galerie vient d'être divulguée. Microsoft aurait été informé de cette faille de sécurité bien avant la divulgation d'une vidéo sous forme de proof-of-concept. Les hackers à l'origine de cette vidéo affirme que leur souci est de défendre les développeurs d'applications piratées sur le Marketplace et de non promouvoir le piratage. « Nous sommes condamnés par beaucoup de « promouvoir la piraterie », ...

    Read the article

  • Bad search result due to strange linked domains

    - by VDesign
    I have a website which is not scoring good in Google's search results. I use Majestic SEO and Open Site Explorer in order to have a view about my link profile. I now see different backlink domains, some of them already removed, that contains sexual content or other non relative content linking to my domain. How much influence does these strange linked domains have on my search result? Even if some of them are already removed for a couple of months. I have already disavow open sexual domains using the tool that Google provides.

    Read the article

  • Site gone from google due to dmca complain

    - by whatismyans
    My sites traffic gone null but after Google recieve one dmca complain for my site. My site is a mp3 search engine so I can index copyright mp3 out of my knowledge. I recieved a message in webmasters tools in and I have removed the copyright content from my site but traffic from Google is not increasing. What is the problem? Do I need to tell Google that I have removed the copyright content from my site? If yes then why I have lost my site traffic from Google forever?

    Read the article

  • In-memory DB to perform intersects on set slices

    - by IanC
    I have a specific programming need where I need to efficiently store large sorted sets in memory, query them for ranges, and intersect them against other sets that are also queried for ranged. I am looking at Redis, but I can't see a range slice command. MongoDB can only use 1 index, so it has to perform row-level scans, whereas I wish to process using columns that are intersected. I'm also looking at Counchbase, but can't easily determine from the documentation if it is suited to this. I know it uses Memcached, which is AFAIK not suited to this usage. Could anyone share potential solutions for this specific problem? EDIT For example, I need to perform the following: Get the IDs of all cars where the price is between 2000 and 3000, and intersect that will all cars where the engine capacity is between 3000 and 4000.

    Read the article

  • Les éditeurs de solutions de sécurité devraient-ils bloquer les malwares gouvernementaux ? F-Secure pense que oui

    Les entreprises de sécurité informatique devraient-elles bloquer les malwares gouvernementaux ? F-Secure pense que oui De récentes révélations accusent les autorités égyptiennes d'avoir acheté puis utilisé un système de surveillance allemand (FinFinder) pour espionner ses citoyens. La société qui le commercialise, Elaman, propose divers produits sous le label de "solutions de sécurité gouvernementale", comme FinSpy qui "garantit un accès total et en temps-réel ainsi que le contrôle à distance de l'ordinateur cible", ou FinFly, un "proxy infectieux utilisé pour propager des malwares intrusifs". Des faits graves qui, bien que non encore confirmés, ont fait bondir la compagnie spécialisée en sécurité info...

    Read the article

  • Quel antivirus payant utilisez-vous en 2011 ? et pourquoi ?

    Quel Antivirus payant utilisez-vous en 2011 ? et pourquoi ? Quel est l'antivirus payant que vous utilisez en 2011 ? Quels sont ses points forts ? Et quelles sont ses fonctionnalités les plus utiles? Faites savoir si l'antivirus que vous utilisez ne figure pas dans cette liste. Notez bien que ce sondage porte sur l'antivirus PAYANT que vous utilisez et non sur votre antivirus préféré (quel qu'il soit gratuit ou payant). En dehors de cette simple question "Quel antivirus payant utilisez-vous en 2011 ?", ce thread est l'occasion de partager vos expériences avec les antivirus payants. N'hésitez pas à préciser :

    Read the article

  • L'impact de Google sur l'économie des USA serait de 54 milliards de dollars, selon un rapport publié

    L'impact de Google sur l'économie des USA serait de 54 milliards de dollars, selon un rapport publié par la firme Google, non content d'enchainer les annonces innovantes ces dernières jours depuis sa conférence I/O, a décidé de s'envoyer des fleurs en ayant calculé combien ses activités rapportent à l'économie américaine, et en l'annonçant publiquement. Une belle opération de marketing ! La firme s'est basée sur ses propres chiffres pour réaliser son étude. Et les résultats sont à la hauteur de l'étendue de son empire : Google aurait généré 54 milliards de dollars de richesse dans l'économie des Etats-Unis. Au niveau des résultats Etat par Etat, c'est en Californie que Google a eu le plus d'influence avec 14,1 millia...

    Read the article

  • Le système de sécurité du Mac App Store déjà cracké, après moins de 24 heures de fonctionnement

    Le système de sécurité du Mac App Store déjà cracké, après moins de 24 heures de fonctionnement Mise à jour du 07.01.2011 par Katleen Lancé depuis à peine moins de vingt quatre heures, la nouvelle boutique d'applications d'Apple a déjà essuyé les plâtres d'internautes malveillants. Des pirates ont profité de plusieurs vulnérabilités repérées dans la plateforme, qui autoriseraient notamment la copie non autorisée. Le Mac Store propose déjà 1000 programmes et a enregistré un million de téléchargements lors de cette première journée d'exploitation. Les affaires se portent donc au mieux, si seulement le système de sécurité du magasin virtuel n'avait pas été cracké. Une première faille dénichée par des hackers conc...

    Read the article

  • I want to begin in this world, where can i meet information,help and people to start? [on hold]

    - by SYNOXYS
    So like the question says, I really want to begin to create something,or help creating something. I mess around with some 2d and 3d softwares like unity,gamemaker,UE... and tried to modelate (maya,3dmax),I use them a little,nothing professional, but all i've got is the sensation that i can't go really far. I feel like i am learning really slow, even having the will and some basics knows. But I want to change that, i want to really learn, to progress. I think that a good idea is meeting people like me, and start a non-commercial project or something. Thanks for your time,really. Greetings, SYNOXYS.

    Read the article

< Previous Page | 441 442 443 444 445 446 447 448 449 450 451 452  | Next Page >