Search Results

Search found 5200 results on 208 pages for '3rd party'.

Page 51/208 | < Previous Page | 47 48 49 50 51 52 53 54 55 56 57 58  | Next Page >

  • Two Different nVidia Cards, One as Graphics, One as Physics - Possible?

    - by Jasarien
    Hey guys, Soon I will have a brand new Geforce GTX 285 to replace my current 8800GT. Will it be possible to move my 8800GT to another PCIX slot, put the GTX 285 into the primary slot and use the nVidia software to make the 8800GT do physics? I have enough PCIX slots on my motherboard (4). The GTX 285 will take up 2, so the 8800GT should fit in the 3rd. If anyone knows if this is possible, I would be grateful to be educated!

    Read the article

  • SQL 2008 Report Manager not working

    - by Fatherjack
    I have a SQL 2008 developer edition with SSRS and the report manager is only available from the local machine. If I try to access it from any other machine I get challenged for my domain u/name and pwd 3 times and then the screen stays blank. I have made changes to some config files (originals copied out) in order to get a 3rd party application to run but that is now uninstalled and the config files are all back to vanilla (originals copied back in) I feel its something to do with authentication but am stuck ... any suggestions welcomed Jonathan

    Read the article

  • How to change the location of pointer (mouse sonar) shortcut in windows?

    - by naxa
    Windows xp+ has a feature in control mouse to show location of pointer when i press the ctrl key. Is it possible to change this shortcut? Possible options (some are [not] mutually exclusive): built-in utility via registry via 3rd party tool or replacement (same feature, other utility) filename of the binary that defines/stores it (for a theoretical hack* ) *: disregarding windows file signatures and self-repair mechanisms for ease

    Read the article

  • Recommended integration mechanism for bi-directional, authenticated, encrypted connection in C clien

    - by rcampbell
    Let me first give an example. Imagine you have a single server running a JVM application. This server keeps a collection of N equations, once for each client: Client #1: 2x Client #2: 1 + y Client #3: z/4 This server includes an HTTP interface so that random visitors can type https://www.acme.com/client/3 int their browsers and see the latest evaluated result of z/4. The tricky part is that either the client or the server may change the variable value at any time, informing the other party immediately. More specifically, Client #3 - a C app - can initially tell the server that z = 20. An hour later that same client informs the server that z = 23. Likewise the server can later inform the client that z = 28. As caf pointed out in the comments, there can be a race condition when values are changed by the client and server simultaneously. The solution would be for both client and server to send the operation performed in their message, which would need to be executed by the other party. To keep things simple, let's limit the operations to (commutative) addition, allowing us to disregard message ordering. For example, the client seeds the server with z = 20: server:z=20, client:z=20 server sends {+3} message (so z=23 locally) & client sends {-2} message (so z=18 locally) at the exact same time server receives {-2} message at some point, adds to his local copy so z=21 client receives {+3} message at some point, adds to his local copy so z=21 As long as all messages are eventually evaluated by both parties, the correct answer will eventually be given to the users of the client and server since we limited ourselves to commutative operations (addition of 3 and -2). This does mean that both client and server can be returning incorrect answers in the time it takes for messages to be exchanged and processed. While undesirable, I believe this is unavoidable. Some possible implementations of this idea include: Open an encrypted, always on TCP socket connection for communication Pros: no additional infrastructure needed, client and server know immediately if there is a problem (disconnect) with the other party, fairly straightforward (except the the encryption), native support from both JVM and C platforms Cons: pretty low-level so you end up writing a lot yourself (protocol, delivery verification, retry-on-failure logic), probably have a lot of firewall headaches during client app installation Asynchronous messaging (ex: ActiveMQ) Pros: transactional, both C & Java integration, free up the client and server apps from needing retry logic or delivery verification, pretty straightforward encryption, easy extensibility via message filters/routers/etc Cons: need additional infrastructure (message server) which must never fail, Database or file system as asynchronous integration point Same pros/cons as above but messier RESTful Web Service Pros: simple, possible reuse of the server's existing REST API, SSL figures out the encryption problem for you (maybe use RSA key a la GitHub for authentication?) Cons: Client now needs to run a C HTTP REST server w/SSL, client and server need retry logic. Axis2 has both a Java and C version, but you may be limited to SOAP. What other techniques should I be evaluating? What real world experiences have you had with these mechanisms? Which do you recommend for this problem and why?

    Read the article

  • How to change background of Windows 8 Startscreen

    - by LoneWOLFs
    I was a big time user of Windows 7 untill switched to Windows 8. I had customized the login screen for Windows 7 and Microsoft had a nice Registry switch to do so. I am looking for a similar way to change background of the start screen and also the login screen where you answer the password without using any 3rd party software Basically I want to know if there's some hidden toggle for that in the OS somewhere and that anyone is aware of it.

    Read the article

  • Evernote Note filesize

    - by grunwald2.0
    I wonder if there is an option (inside of Evernote or outside of it, manually with the help of 3rd party tools) to locate the biggest notes inside of Evernote? I want to remove those or put them into another system. Basically a "order after note(file) size" option is what I need. My EN database is now over 250 MB big due to my increased usage so I need to take some action. Thanks for your help in advance.

    Read the article

  • How to make LibreOffice Calc to connect points in a holed series chart with lines?

    - by Ivan
    I've got a time series data table with one function (row) value available for every month and the second for every 3rd month (every quarter), having holes (empty cell values) for every 2nd and 1st months of a quarter. When I try to make a chart, I can only draw a bar or a point chart, but I want the actual data points to be interconnected with lines visually filling the gaps. How to achieve this in LibreOffice 3.6?

    Read the article

  • What does the directory-name: '~MntWIM' on my Windows 7 / C:\ drive mean?

    - by J Puk
    This '~MntWIM' on my Windows 7 / C:\ drive, is sized: 694 MB (728.418.589 bytes) on harddrive. It contains 3 subdirectories. 1st = Program Files, containg zero volume 2nd = Users, containing zero volume 3rd = Windows, containing 693 MB (726.823.197 bytes) on harddrive It all looks a bit useless to me, so question is: Is it safe to delete the lot? Or does it have an important function there? Hoping for an answer from which I could lern something. B.R. JP

    Read the article

  • hMailserver: Secure SMTP SetUP - Trusted Cert Issue

    - by Peter
    I'm trying to configure hMailserver with a 3rd party SSL cert. I'v 1) Installed the SSL key & cert 2) Placed the hash named CA and intermediate in to the \externals\cs folder Now, the connection between the mail client and the server is secure and works. The issue is that mail clients outlook, apple mail, others issue an untrusted cert warning. I've followed several threads on the forums, but none seem to solve this problem

    Read the article

  • Modifying Google Search Plugin

    - by TimeTrap
    I want Google search results to default with a publish date. I'm trying to change the Google search plugin, but I'd be just as happy using a 3rd-party tool that does this. So I'm using Firefox 15.0.1 and I've tried changing {install dir}/searchplugins/google.xml, but Firefox is just ignoring these changes. For example, I'm adding the below in 3 places in google.xml, but nothing is happening: <Param name="cdr" value="cdr:1,cd_min:01/01/1900,cd_"/>

    Read the article

  • Network via FireWire cable

    - by JIa3ep
    My notebook works under Windows XP and desktop computer under Vista. Seems to be that Windows Vista has no native support for creating network via FireWire cable. Is there 3rd-party solution?

    Read the article

  • Show & Hide hidden files on demand in Windows

    - by matt wilkie
    A little while ago I discovered that on Ubuntu linux one can display or conceal hidden files on demand at run-time by pressing [Ctrl-H]. This is really handy. Is there anyway this can be had on windows? I'm guessing Windows Explorer is not amenable to this, so I'm open to 3rd party file managers provided they're open source, freeware, or cheap (in order of preference). thanks

    Read the article

  • HTC Sync Manager and MKV files

    - by Zundrium
    My problem is pretty straight forward: HTC Sync manager works perfectly with my HTC One X. However, it filters extensions it's not able to use with it's stock applications. (HTC Sense) But 3rd party applications can handle other extensions of course. Is there a way to adjust the HTC Sync Manager so that extensions will not be filtered? And if that's not possible is there a syncronisation tool that synchronises automatically once the android device is connected through USB? (Tried Allway Sync, doesn't work properly)

    Read the article

  • Windows 7: How to disable auto-maximize/resize window (aero-snap) when near screen edge?

    - by glenneroo
    Whenever I drag or resize a window near any edge or corner of either monitor, Windows wants to maximize or resize the window for me in several different ways: dragging a window near a corner offers resize to full-screen dragging directly to the corner offers half-screen maximize resizing to top or bottom edges offers a vertical maximize (one long strip from top to bottom) Actually, now that I think about it the 3rd one isn't so bad, its just the full and half-screen maximize features that drives me mad. Is there a registry hack to disable these settings, preferably independently?

    Read the article

  • Websites that introducing new stuff

    - by user33929
    Is there any blog/website that introducing new funny/fancy websites or new tech (software/hardware)? I am talking about the site that may introduce digg.com, superuser.com, mint.com or delicious.com when these site first come out. Also, introducing new handy/useful 3rd party applications/tools. Thanks.

    Read the article

  • How remove/de-index a page from Google?

    - by Jason
    On the results page when I Google "e-luminate", the 3rd and 4th link seems to point to specific directory deep within the folders which stores the images. How can I get rid of these 2 results from Google search results? How can I get Google to de-index it? I checked on the server and the folders did not seem different from other folders but these 2 paths seems to get indexed by Google. Thank you.

    Read the article

  • Websites that introduce new stuff [closed]

    - by user33929
    Are there any blogs/websites that introduce new funny/fancy websites or new tech (software/hardware)? I am talking about sites that may introduce digg.com, superuser.com, mint.com or delicious.com when these site first come out. I am also looking for sites that introduce new handy/useful 3rd party applications/tools. Thanks.

    Read the article

  • What is the difference between running a Windows service vs. running through shell?

    - by Zack
    I am trying to troubleshoot an issue on a Windows 2008 server where running attempting to connect to a "Timberline Data Source" ODBC driver crashes if the call is in a "service" context, but succeeds if the call is initiated manually in a Remote Desktop session. I have set the service to run as my user. I'm wondering if, all else being equal (user, machine, etc), are there any fundamental security/environment differences between running a process as a service vs manually? --- Implementation Details --- In case it is helpful for anyone, I had a system that started as an attempt to connect to a Timberline Database using ODBC and a Python CGI script called via IIS 7. The script itself works fine, however, as soon as I attempt to perform the ODBC connect function, the script crashes without throwing an exception. The script was able to connect fine when executed via command line. The same thing happened when using a C#/.net service, attempting to run via Apache, Windows Scheduler or even a 3rd party scheduling tool. With the last option (the 3rd party scheduling tool, pycron) I set the service up log in as my user and had the same issue (I confirmed via Task Manager that the process running user was, in fact, me). It just doesn't make sense to me why a service, which should be running as my user, appears to still be operating in a different security context or environment. Also, if it's important, the Timberline database is referenced by computer name on the network ("\\timberline-server\Timberline Office\Accounts\AT" or something to that effect) I also realized that, as Joel pointed out, the server DOES have a mapped drive ("Y:" which is mapped to "\\timberline-server\Timberline Office") The DSN is set up at the "System DSN" level which, according to the ODBC Administration Tool, means that the DSN is available to users and services Since I'm not allowed to answer this question yet, I'll post the solution that I arrived on: As Joel Coel mentioned, there actually was a mapped drive scenario. I didn't realize this because the DSN specified a path using UNC. However, it seems as though the actual Timberline Driver referred to a mapped drive. Since services don't start with the mapped drive, I was forced to add the drive mapping code into my service. Since it was written in python, I used code from a Stackoverflow answer that was able to map the drive on the fly.

    Read the article

  • Up-to-date Comparison of High-Speed USB Flash Drives

    - by Zoredache
    I am looking for comparison of the performance of USB flash drives. I have found several older comparisons, but I am trying to find a more up-to-date comparisons that apply to the larger storage sizes (32-128GB). I can try looking up the specs of various drives, but vendors have been known to exaggerate, or use numbers that are on accurate in tests that do not reflect actual usage. I was hoping to find 3rd party site which had perform testing.

    Read the article

  • How to change user for more rights on a SFTP client?

    - by Zenklys
    It is always suggested on first step to disable the remote root login for the SSH protocol. I have a low-right user able to connect via SSH and once connected, I simply su in order to gain more rights. Now when using a sFTP client, I use my low-right user and am thus able to do next to nothing. My question is : Is it possible to change user after login using 3rd party client, such as Transmit, Cyberduck, Filezilla ? PS : Mac clients would be great ;)

    Read the article

< Previous Page | 47 48 49 50 51 52 53 54 55 56 57 58  | Next Page >