Search Results

Search found 19915 results on 797 pages for 'software patent'.

Page 450/797 | < Previous Page | 446 447 448 449 450 451 452 453 454 455 456 457  | Next Page >

  • Python (v2.7) requires to install plugins to create media files of the following type: Vorbis encoder

    - by LibraryGeekAdam
    This is the message I get when I try to rip a cd from any player. I usually use the stock Rhythmbox but have tried others to no avail. I have just updated to 12.10 from 12.04 and I had no problems in 12.04. I have read the other posts and have switched to the Main Server in the Software Sources menu. I have installed Ubuntu Restricted Extras. Nothing seems to help. I would appreciate any help. "Python (v2.7) requires to install plugins to create media files of the following type: Vorbis encoder" Thanks!

    Read the article

  • Is ROA a specific form of doing SOA?

    - by JohnDoDo
    I have read somewhere that ROA (Resource Oriented Architecture) is SOA (Service Oriented Architecture) with specific constraints added. SOA is the abstract concept of combining discrete pieces of software and ROA is an implementation of SOA with all of the constraints of RESTful services applied to it: SOA = the concept ROA = the concept + specific implementation details I also had my share of posts saying that ROA is different than SOA, then simply fallback to statements like "ROA is REST" and "SOA is SOAP" and presenting the same more or less pertinent comparisons and differences between SOAP and REST. So just to clear up my confusion: Is ROA a specific form of doing SOA?

    Read the article

  • What's the difference or purpose of a file format like ELF when flat binaries take up less space and can do the same thing?

    - by Sinister Clock
    I will give a better description now. In Linux driver development you need to follow a specification using an ELF file format as a finalized executable, i.e., that right there is not flat, it has headers, entry fields, and is basically carrying more weight than just a flat binary with opcodes. What is the purpose or in-depth difference of a Linux ELF file for a driver to interact with the video hardware, and, say, a bare, flat x86 16-bit binary I write that makes use of emulated graphics mode on a graphics card and writes to memory(besides the fact that the Linux driver probably is specific to making full use of the hardware and not just the emulated, backwards compatible memory accessing scheme). To sum it up, what is a difference or purpose of a binary like ELF with different headers and settings and just a flat binary with the necessary opcodes/instructions/data to do the same thing, just without any specific format? Example: Windows uses PE, Mac uses Mach-O/PEF, Linux uses ELF/FATELF, Unix uses COFF. What do any of them really mean or designate if you can just go flat, especially with a device driver which is system software.

    Read the article

  • Is ignoring clients data during an automatic upgrading acceptable?

    - by A competent translator
    I recently faced a deletion of my calendar and notes data inside a third party application ( Horde ) on my online space. When I told the web hosting provider they replied that they were doing an upgrade to system software (!!) and client third party applications are not within their reach or backup policy. They don't even have a backup of my data. Is this practice acceptable from a web hosting provider, even for an individual clients ? I know that backing up my data is my responsibility but I anticipated that backup copies done by the host would be available when needed.

    Read the article

  • Systray Icons missing after App Crash

    - by pr0ndigy
    After installing Alarm Clock (alarm-clock) from the Software Center, the program immediately crashed and made the icons in my systray disapear except for Power, Sound, Time/Date, and the Gear. I tried logging off, rebooting, removing the program, and nothing has brought my icons back. I know they are still running up there, because i got Skype setup to autostart and it had an icon up there running before i installed the Alarm Clock program. Is there anything i can do to get my icons back, or do i need to reinstall the OS? I'm running Ubuntu 14.04.1 btw...

    Read the article

  • The White Screen of Death

    - by TATWORTH
    A few days ago I was browsing a particular commerical web site, the site crashed and I encountered the "White Screen of Death". The detailed dump showed me what the site was using:zendMySqlPHPMageMagentoBesides all this detailed information of use to a hacker, the copyright on Magento cited a date of 2009.  Does this means that out of date software was in use?There is a more basic point - in your site please ensure that fatal errors are trapped and redirected to a page that gives away no information useful to a hacker. I suggest also that you provide a means for an administrator to simulate an error to check the error handling.

    Read the article

  • Programming Windows Identity Foundation - ISBN 978-0-7356-2718-5

    - by TATWORTH
    This book introduces a new technology that promises a considerable improvement on the ASP.NET membership system. If you ever had to write an extranet, system you should be aware of the problems in setting up membership for your site. The Windows Identity Foundation promises to be an excellent replacement. Therefore the book Programming Windows Identity Foundation - ISBN 978-0-7356-2718-5 at  http://oreilly.com/catalog/9780735627185, is breaking new ground. I recommend this book to all ASP.NET development teams. You should reckon on 3 to 5 man-days to study it and try out the sample programs and see if it can replace your bespoke solution. Rember this is version 1 of WIF and give yourself adequete time to read this book and familiarise yourself with the new software. Some URLs for more information: WIF home page at http://msdn.microsoft.com/en-us/security/aa570351.aspx The Identity Training Kit at http://www.microsoft.com/downloads/en/details.aspx?displaylang=en&FamilyID=c3e315fa-94e2-4028-99cb-904369f177c0 The author's blog at http://www.cloudidentity.net/

    Read the article

  • Burn MP4 to CD in ubuntu 12.04

    - by xyc
    I have an mp4 file (115,8 mb). I want to burn it to a Sony CD-R (700 mb) to watch on tv. I tried to do it with DeVeDe from ubuntu software center but it always give me this error: "Conversion failed. It seems a bug of Mencoder." Can anyone tell me an other method to burn my mp4 to cd? Or can anyone tell me how to fix DeVeDe's error? I use a TOSHIBA computer (64 bit) with windows 7 home premium and ubuntu 12.04 LTS (installed via wubi.exe). Thx.

    Read the article

  • Oracle Enterprise Manager Cloud Control 12c Release 2 (12.1.0.2) ist da!

    - by Ralf Durben (DBA Community)
    Das zweite Release von Oracle Enterprise Manager Cloud Control 12c ist jetzt verfügbar und zwar für alle Plattformen, auf denen auch das Vorgängerrelease genutzt werden konnte. Das gab es bei Enterprise Manager noch nie: Alle Plattformen haben die gleiche Priorität! In dem neuen Release wurde die Stabilität nochmals verbessert und einige Wünsche unserer Kunden verwirklicht. Auch einige neue Funktionalitäten, wie zum Beispiel "Java as a Service" stehen nun zur Verfügung. Neben dem Cloud Control Framework wurden auch einige Plug-Ins erneuert. Cloud Control 12.1.0.2 ist ein komplettes Release und der Download enthält alles für die Installation des OMS und Agenten. Damit kann mit der Software eine komplette Neuinstallation oder ein Upgrade von EM 10.2.0.5, 11.1 oder 12.1.0.1 (auch ohne Bundle Patch 1) vorgenommen werden. Eine Übersicht über die Neuerungen finden Sie im Oracle Enterprise Manager Cloud Control Introduction Document.

    Read the article

  • Questionable ethics regarding closed source softwares which are supposed to be open source.

    - by edem
    Several days ago I heard a sentence "Cracking company name routers are not a crime.". I asked "Why?" and the guy explained to me that company name used a linux distribution on their routers which source can not be closed because of their license but company name closed it. What do you think about this? Doing otherwise unethical "cracking" becomes ethical, or somewhat neutral if the software in question is "cracked" too? By "cracking" I don't mean breaking into a computer through someones' company name router but "cracking" my own router's OS which otherwise would be unethical.

    Read the article

  • If I intend to use Hadoop is there a difference in 12.04 LTS 64 Desktop and Server?

    - by Charles Daringer
    Sorry for such a Newbie Question, but I'm looking at installing M3 edition of MapR the requirements are at this link: http://www.mapr.com/doc/display/MapR/Requirements+for+Installation And my question is this, is the Desktop Kernel 64 for 12.04 LTS adequate or the "same" as the Server version of the product? If I'm setting up a lab to attempt to install a home cluster environment should I start with the Server or Dual Boot that distribution? My assumption is that the two are the same. That I can add any additional software to the 64 as needed. Can anyone elaborate on this? Have I missed something obvious?

    Read the article

  • URL rewriting via forward proxy

    - by Biggroover
    I have an app that runs inside my firewall and talks out to multiple end points via HTTP/HTTPS on a non-standard port e.g. http://endpoint1.domain.com:7171, http://endpoint2.domain.com:7171 What I want to do is route these requests through a forward proxy that then rewrites the URL to something like http://allendpoints.domain.com/endpoint1 (port 80 or 443) then on the other end have a reverse proxy that unwinds what I did on the forward proxy to reach the specific endpoints. The result being that I can route existing app requests through to specific endpoints across the internet without having to change my app software. My questions are: is this even possible? is it a good idea, are their better ways to do this? Can this be done with IIS and Apache as the proxies?

    Read the article

  • Why a write-enable ring?

    - by SpashHit
    Here's an "interview question" that while ostensibly about hardware really does inform a software design principal as well. Computers used to (still do I guess, somewhere) use magnetic tape reels to store data. There was a plastic accessory you could attach to a tape reel called a "write-enable ring". If the tape had such a ring, the tape drive allowed writing to the tape... if not, it only allowed read access. Why was the choice to design the system in this way? Why not have a "write protect ring" instead, with the opposite effect?

    Read the article

  • What is the formal definition of a meta package?

    - by kojiro
    There are several examples of packaging where an application package is built, named, described, even licensed, but contains only setup code and dependencies -- it has no first-class runtime software of its own. I would call this "meta-packaging". This seems to be particularly popular in the open-source world, including examples like kde-meta (Gentoo Portage), Plone, and I'm sure lots of others. I can see how it's a useful practice, but despite it existing as a practice, I couldn't find a formal definition of either "meta-packaging" or "meta-egg" (Python) in searching the web. Is that not the correct term? If it is, is it such common-sense that it needs no formal definition? If not, what is the correct way to put it?

    Read the article

  • "En 1987, 42% des développeurs étaient des femmes", une professionnelle de l'IT se demande ce qui s'est passé depuis

    En 1987, 42% des développeurs américains étaient des femmes Selon une professionnelle, que s'est-il passé depuis ? Anna Lewis fait partie de l'équipe de FogCreek Software, une société américaine de développement logiciel. Elle vient de publier un billet sur le blog de l'entreprise sur un sujet intéressant : les femmes et l'informatique. L'informatique demeure un secteur majoritairement masculin, que ce soit aux Etats-Unis, en France ou dans la plupart des autres pays. Les femmes achètent pourtant autant de smartphones, de tablettes, d'ordinateurs que les hommes. Elles sont plus présentes sur les réseaux sociaux mais quasi-absentes du domaine de l'informatique notamment dans le ...

    Read the article

  • 301 redirect to 404 page?

    - by Kristian
    Currently i'm migrating www. prefix from my urls and use htaccess to do the job. Since we have new software and cleaned database some of the old urls doesnt exists anymore. Therefore some requests redirect to 404 page. 1. www.domain.com/old-page # htaccess redirect to non-www url, 301 2. domain.com/old-page # page does not exists, 404 Does this method have any SEO issues, or even affect pagerank? Or should i check the page existence before redirecting and show 404 without redirect?

    Read the article

  • How do you stay motivated for hobby projects?

    - by aubreyrhodes
    I started seriously programming as a hobbiest, student and then intern about 4 years ago and I've always done small projects on the side as a learning exercise. Schools over now though, and I spend my days at work as a software developer. I would still love to do projects on the side to learn about areas in computer science that I'm not exposed to at work, but I've noticed that after 8 hours of starring at an IDE it's far to tempting to veg out. Any time I do get up the gumption to work on something for a few hours lately it's gotten left by the wayside. Anyone have any advice for sticking with side projects when you spend most of your day coding?

    Read the article

  • Spezialisierung ohne Grenzen

    - by A&C Redaktion
    Arrow erreicht Exadata Spezialisierung für alle EMEA-Länder “Know-how sells” – das weiß auch unser VAD Arrow. Der IT-Distributor aus Fürstenfeldbruck, nahe München, hat sich auf die Bereitstellung von Enterprise und Midrange Computing Lösungen fokussiert. So auch für die Exadata Technologie von Oracle. Exadata beinhaltet Server, Speicher, Netzwerktechnik und Datenbanksoftware in einem System und hilft so, auch große Datenmengen – die „Big Data“ – spielend zu managen. Die Kombination aus Hard- und Software bietet Oracle Partnern enorme Geschäftspotenziale im Verkauf und im Service, deshalb ist eine Expertise so wichtig. Durch die vier europäischen Demo-Zentren und insgesamt acht komplett installierte Exadata reichlich Erfahrung mit der Oracle Exa-Familie sammeln können. Der VAD bietet Oracle Partnern und Kunden Performance-Tests, Testumgebungen und Proof of Concepts (PoC) an – und das länderübergreifend. Als logische Konsequenz wurde Arrow im August 2012 mit der EMEA Spezialisierung für Exadata von Oracle ausgezeichnet! Wir gratulieren ganz herzlich und wünschen viel Erfolg mit dem Exa-Stack!

    Read the article

  • Spezialisierung ohne Grenzen

    - by A&C Redaktion
    Arrow erreicht Exadata Spezialisierung für alle EMEA-Länder “Know-how sells” – das weiß auch unser VAD Arrow. Der IT-Distributor aus Fürstenfeldbruck, nahe München, hat sich auf die Bereitstellung von Enterprise und Midrange Computing Lösungen fokussiert. So auch für die Exadata Technologie von Oracle. Exadata beinhaltet Server, Speicher, Netzwerktechnik und Datenbanksoftware in einem System und hilft so, auch große Datenmengen – die „Big Data“ – spielend zu managen. Die Kombination aus Hard- und Software bietet Oracle Partnern enorme Geschäftspotenziale im Verkauf und im Service, deshalb ist eine Expertise so wichtig. Durch die vier europäischen Demo-Zentren und insgesamt acht komplett installierte Exadata reichlich Erfahrung mit der Oracle Exa-Familie sammeln können. Der VAD bietet Oracle Partnern und Kunden Performance-Tests, Testumgebungen und Proof of Concepts (PoC) an – und das länderübergreifend. Als logische Konsequenz wurde Arrow im August 2012 mit der EMEA Spezialisierung für Exadata von Oracle ausgezeichnet! Wir gratulieren ganz herzlich und wünschen viel Erfolg mit dem Exa-Stack!

    Read the article

  • Secure Web Apps from SQL Injection in ASP.Net

    In the first part of this two-part series you learned how SQL injection works in ASP.NET 3.5 using a MS SQL database. You were also shown with a real web application which was not secure against SQL injection attacks how these attacks can be used by the hacker to delete sensitive information from your website such as database tables. In this part you will learn how to start securing your web applications so they will not be vulnerable to these kinds of exploits. A complete corrected example of the insecure web application will be provided at the end of this tutorial.... ALM Software Solution ? Try it live! Requirements Management, Project Planning, Implementation Tracking & QA Testing.

    Read the article

  • How to render Minecraft on the GPU?

    - by l0b0
    Hardware: Intel i7 AMD Radeon HD 6970 SSD with plenty of space 6 GB RAM Software OpenJDK 6, 7, and Oracle Java 7 (reproducible with all three) AMD Catalyst 12.8 and open source driver (reproducible with both) Ubuntu 12.04 x86_64 and older Minecraft 1.3.2 vanilla and older On this setup I am getting rubbish frame rates after a short while of playing, dropping from about 45-55 to 15 in a couple of minutes. CPU use is 40-45 even when rendering the opening screen at 1920x1280, and gameRenderer is using about 90% CPU when playing. Rather than trying to eke out a few more FPS out of an obviously broken rendering pipeline, I really hope to find a solution to make the GPU render Minecraft.

    Read the article

  • Upcoming event - Oracle Solaris 11: What?s New Since the Launch

    - by nospam(at)example.com (Joerg Moellenkamp)
    On April 25th an webbased event about Solaris 11 takes place: It's named Oracle Solaris 11: What?s New Since the Launch. Agenda 9:00 a.m. PDTKeynote: Oracle Solaris - Strategy and UpdateMarkus Flierl, Vice President, Oracle Solaris Engineering 9:40 a.m. PDTOracle Solaris 11: Extreme Engineering - A Technical UpdateDan Price, Senior Principal Product Engineer, Oracle Solaris Engineering Bart Smaalders, Senior Principal Product Engineer, Oracle Solaris Engineering 10:20 a.m. PDTCustomers and Partners: Why We Moved to Oracle Solaris 11 A discussion of the reasons why businesses and commercial software developers have adopted Oracle Solaris 11, from the people responsible for these decisions 11:00 a.m. PDTOracle Solaris: Core to the Oracle Systems StrategyJohn Fowler, Executive Vice President of Systems, Oracle 9:00 am PDT is 18:00 in Berlin, 17:00 in London and i assume much to late in Tokyo with 01:00 am the next day ...

    Read the article

  • Will taking two years off for school in a related field destroy a mid level development career?

    - by rsteckly
    Hi, I know some people have asked about getting back into programming after a break and this is a potential duplicate. I just am in a position where I can go back to school for a graduate degree in Stat/Applied Math. But I'm very worried about the impact it will have on my career and ability to find a job afterwards. I have 3 years experience in .NET on top of a couple of years in PHP. Right now, I'm a senior software engineer. Do you think taking two years off to do math is going to dramatically hurt my marketability?

    Read the article

  • Can't install ATI proprietary drivers in 12.10. Unity is Missing

    - by EApubs
    I have a laptop with ATI Radeon 6770M HD Hybrid graphics card. In Ubuntu 12.04, I installed the fglrx driver through "additional drivers" and it worked. (I can even switch GPUs). But in the new Ubuntu 12.10, after installing, Unity won't load. Only the mouse and the wallpaper. If I initialize the settings sudo aticonfig --initial then after rebooting it gives a warning saying I'm in low graphics mode! How to fix this? PS : Earlier i used software source to install the drivers. But when using the terminal, I got this warning : update-alternatives: warning: forcing reinstallation of alternative /usr/lib/fglrx/ld.so.conf because link group x86_64-linux-gnu_gl_conf is broken Update : Filed a bug report in launchpad : https://bugs.launchpad.net/fglrx/+bug/1068661

    Read the article

  • I'm a premature optimizer

    - by Matthew Day
    I work in a small sized software/web development company. I have gotten into the habit of optimizing prematurely, I know it is evil and promotes bad code... But I have been working at this firm for a long while and I have deemed this as a necessary evil. It has never caused me an issue so far in the past, but it might if I get partners or a successor. The point of this long-winded speech is that, should I change my evil practices to 'save face' and to help out in the future?

    Read the article

< Previous Page | 446 447 448 449 450 451 452 453 454 455 456 457  | Next Page >