Search Results

Search found 24475 results on 979 pages for 'vmware view'.

Page 529/979 | < Previous Page | 525 526 527 528 529 530 531 532 533 534 535 536  | Next Page >

  • How to disable Gnome-Shell auto-open in Dashboard

    - by user48027
    I am personalising my Gnome-Shell in Ubuntu 11.10 I would like to disable the feature to open the Gnome's Dashboard when I close the last Window in a Workspace. Edit to clarify: The dashboard is available only in GNOME Shell. The dashboard opens if you press the windows key (aka SUPER) or if you move the mouse to the upper left corner. If you close the last window of a workspace, but there are open windows on other workspaces, the dashboard opens automatically. The latter behaviour is annoying if you do not want to use the dashboard to open new windows or to change workspace. There are many ways to to both (Gnome do, Docky, keyboard shortcuts, clicking on something on the desktop, ...). Edit: There is a related Q&A, which was closed because the asked the same question for Mint: How can I prevent the activity view for opening when I close the last running app?

    Read the article

  • Google devrait-il arrêter le développement de Chrome OS ? La séparation des équipes de Chrome et Android est jugée "stupide"

    Google devrait-il abandonner le développement de Chrome OS ? Un analyste de Bloomberg vient de publier un billet de blog plutôt provocateur. Il y traite Google d'imbécile, du fait de son organisation interne relative au développement de ses deux systèmes d'exploitation. En effet, il faut savoir qu'à Mountain View, une équipe travaille sur Chrome OS, tandis que l'autre s'occupe d'Android. Et ces deux groupes ne collaborent absolument pas, il régnerait même entre eux un fort esprit de compétition, d'après certains salariés de la firme. Pourtant, d'après Brad Stone, Android a largement démontré sa supériorité et sa plus grande popularité que son "concurrent" interne. Il estime donc que le staff ...

    Read the article

  • Access Control Service: Handling Errors

    - by Your DisplayName here!
    Another common problem with external authentication is how to deal with sign in errors. In active federation like WS-Trust there are well defined SOAP faults to communicate problem to a client. But with web applications, the error information is typically generated and displayed on the external sign in page. The relying party does not know about the error, nor can it help the user in any way. The Access Control Service allows to post sign in errors to a specified page. You setup this page in the relying party registration. That means that whenever an error occurs in ACS, the error information gets packaged up as a JSON string and posted to the page specified. This way you get structued error information back into you application so you can display a friendlier error message or log the error. I added error page support to my ACS2 sample, which can be downloaded here. How to turn the JSON error into CLR types The JSON schema is reasonably simple, the following class turns the JSON into an object: [DataContract] public class AcsErrorResponse {     [DataMember(Name = "context", Order = 1)]     public string Context { get; set; }     [DataMember(Name = "httpReturnCode", Order = 2)]     public string HttpReturnCode { get; set; }     [DataMember(Name = "identityProvider", Order = 3)]        public string IdentityProvider { get; set; }     [DataMember(Name = "timeStamp", Order = 4)]     public string TimeStamp { get; set; }     [DataMember(Name = "traceId", Order = 5)]     public string TraceId { get; set; }     [DataMember(Name = "errors", Order = 6)]     public List<AcsError> Errors { get; set; }     public static AcsErrorResponse Read(string json)     {         var serializer = new DataContractJsonSerializer( typeof(AcsErrorResponse));         var response = serializer.ReadObject( new MemoryStream(Encoding.Default.GetBytes(json))) as AcsErrorResponse;         if (response != null)         {             return response;         }         else         {             throw new ArgumentException("json");         }     } } [DataContract] public class AcsError {     [DataMember(Name = "errorCode", Order = 1)]     public string Code { get; set; }             [DataMember(Name = "errorMessage", Order = 2)]     public string Message { get; set; } } Retrieving the error information You then need to provide a page that takes the POST and deserializes the information. My sample simply fills a view that shows all information. But that’s for diagnostic/sample purposes only. You shouldn’t show the real errors to your end users. public class SignInErrorController : Controller {     [HttpPost]     public ActionResult Index()     {         var errorDetails = Request.Form["ErrorDetails"];         var response = AcsErrorResponse.Read(errorDetails);         return View("SignInError", response);     } } Also keep in mind that the error page is an anonymous page and that you are taking external input. So all the usual input validation applies.

    Read the article

  • Is this the correct way to implement .NET MVC website structure?

    - by aspdotnetuser
    I have recently seen a .NET MVC solution in which the markup in the .aspx views have a Controller as their model, and the .ascx user controls they contain use a separate model. I'm new to MVC and I wanted to find out about a few things I'm not clear on. An example of how the code is implemented: UserDetails.aspx view has markup that shows it's using the UserDetailsController.cs as the model. It contains RenderPartial("User_Details.ascx", UserDetailsModel) and passes it the UserDetailsModel. Is this the standard/correct way of implementing MVC? Or just one way to implement it? I also noticed that the classes used as Models appear to be Service classes that have [DataMember] and [DataContract] attributes on the class name and properties - what is the advantage of this implementation?

    Read the article

  • Microsoft publie deux outils open-source en rapport avec Outlook pour faciliter le développement d'a

    Mise à jour du 27/05/10 Microsoft publie deux outils open-source en rapport avec Outlook Pour permettre l'utilisation plus facile du format PST dans le développement d'applications Microsoft vient de publier deux outils open-source de développement en rapport avec Outlook. Le but affiché est de faciliter la création d'applications qui utiliseront le format de fichier des e-mails et des dossiers personnels de son client de messagerie : le format PST. Les deux outils en questions sont le « File Format Software Development Kit » et le « PST Data Structure View Tool ». Cette annonce est la suite logique...

    Read the article

  • How to remotely connect using perfmon?

    - by user36914
    Suprised there is not a ton of information on google when i search for this but there is not. Lot of people asking the question but i none of them have any good answers. I have a remote computer running hyper-v (server) running a Windows 7 x64 guest (guest). Occasionally i won't be able to remote desktop to guest. I will then remote to server and see that the guest instance is constantly using about 25% of the cpu. WHen i try to connect directly from server i will get the login screen but as soon as i type the password in it will just stay at the windows 7 login screen but the account names will disappear and it will not log in. It responds to pings though. I don't know how else to diagnose other than trying to run perfmon remotely. It only happens like every 3 weeks and i run it 24/7. So i'm trying to run remote desktop remotely. I tested this out on a local vm i have running under vmware. When i try to connect using perfmon to my local vm i get this error: "when attempting to connect to the remote computer the4 following system error occurred: the network path was not found" I found in another past to start the remote registry service and when i start the service i get this error: "No such interface supported" Anyways, how do i remotely connect to another machine with perfmon or if anyone has a better idea how i can diagnose the problem above then let me know.

    Read the article

  • Remove a bad/erroneous WebPart from a SharePoint page

    - by KunaalKapoor
    If you've added a poorly written webpart to your 'default.aspx' page, the consequence of this action will be that you won't be able to load the page anymore... Don't be sad, there is still a way to remove the webpart from the page :) (Yes, even removing the webpart from the webpart gallery would not solve this issue).Steps to fix this:1. Append the following query string to your URL: ?Contents=1.Once you've added Contents=1 as a query string to the webpart page's URL it will display the Webpart Maintenance Page. Example: http://mysharepointserver/default.aspx?contents=12. On that page you can now see the webparts added to the page, delete the problematic webpart.Now try reloading the default.aspx page... Tadaaa!!! you can view your page again :)3. Leave a thank you note @ comments section :)

    Read the article

  • How to Use Google Chrome as Your Default PDF Reader (the Easy Way)

    - by The Geek
    If you’re anything like 99% of everybody, you have some sort of PDF viewing software installed on your PC—but did you realize that you can use Google Chrome to view PDFs from your PC? It’s easy! We’re showing off how to do this in Windows, but theoretically it would work for OS X or Linux as well. If you’ve tried it, let us know in the comments Latest Features How-To Geek ETC How to Use Google Chrome as Your Default PDF Reader (the Easy Way) How To Remove People and Objects From Photographs In Photoshop Ask How-To Geek: How Can I Monitor My Bandwidth Usage? Internet Explorer 9 RC Now Available: Here’s the Most Interesting New Stuff Here’s a Super Simple Trick to Defeating Fake Anti-Virus Malware How to Change the Default Application for Android Tasks Final Man vs. Machine Round of Jeopardy Unfolds; Watson Dominates The Legend of Zelda – 1980s High School Style [Video] Suspended Sentence is a Free Cross-Platform Point and Click Game Build a Batman-Style Hidden Bust Switch Make Your Clock Creates a Custom Clock for your Android Homescreen Download the Anime Angels Theme for Windows 7

    Read the article

  • How to Get Help With a Command from the Linux Terminal: 8 Tricks for Beginners & Pros Alike

    - by Chris Hoffman
    Whether you’re an inexperienced terminal user or a grizzled veteran, you won’t always know the right thing to type into the Linux terminal. There are quite a few tools built into the terminal to help you along. These tricks will help you find the command to use, figure out how to install it, learn how to use it, and view detailed information about it. None of these tricks require an Internet connection. Make Your Own Windows 8 Start Button with Zero Memory Usage Reader Request: How To Repair Blurry Photos HTG Explains: What Can You Find in an Email Header?

    Read the article

  • You Can Deliver an Engaging Online Experience Across All Phases of the Customer Journey

    - by Christie Flanagan
    Engage. Empower. Optimize. Today’s customers have higher expectations and more choices than ever before.  To succeed in this environment, organizations must deliver an engaging online experience that is personalized, interactive and consistent across all phases of the customer journey. This requires a new approach that connects and optimizes all customer touch points as they research, select and transact with your brand.  Oracle WebCenter Sites combines with other customer experience applications such as Oracle ATG Commerce, Oracle Endeca, Oracle Real-Time Decisions and Siebel CRM to deliver a connected customer experience across your websites and campaigns. Attend this Webcast to learn how Oracle WebCenter: Works with Oracle ATG Commerce and Oracle Endeca to deliver consistent and engaging browsing, shopping and search experiences across all of your customer facing websites Enables you to optimize the performance of your online initiatives through integration with Oracle Real-Time Decisions for automated targeting and segmentation Connects with Siebel CRM to maintain a single view of the customer and integrate campaigns across channels Register now for the Webcast.

    Read the article

  • Joomla: Prevent certain user from visiting a certain page

    - by MrB
    I have an internal section in my Joomla only for "Registered" users. There they can edit preferences. Multiple users can access the same preferences (different stakeholders). Now I have "smithcorp" and "smithcorp_guest". They should both be able to view the same things, but "smithcorp_guest" shouldn't be able to edit the preferences. Is there a way to forbid "smithcorp_guest" access to this page? I have only seen access regulation via the user level, i.e. unregistered, registered, admin. Thanks, MrB

    Read the article

  • Reader Poll: Are You Switching to Internet Explorer 9?

    - by Jason Fitzpatrick
    The recent release of Internet Explorer 9 polished up the IE line with a new interface, hardware acceleration, and more. Is enough to convince you to switch? Yesterday we gave you a full run down of the Internet Explorer 9 release and highlighted the major improvements including: a totally new interface that’s even more streamlined than that of Google Chrome, direct access to your video card for super fast acceleration, customizable menus for pinned sites, HTML 5 support, and a combined address and search bar, among other improvements. Is it enough to sway you? Cast your vote in the poll below and then sound off in the comments. How-To Geek Polls require Javascript. Please Click Here to View the Poll. How to Create an Easy Pixel Art Avatar in Photoshop or GIMPInternet Explorer 9 Released: Here’s What You Need To KnowHTG Explains: How Does Email Work?

    Read the article

  • Advice for UPC/Surge Protector in home office

    - by Fred
    I'm just starting out as an independant developer, mostly Unix stuff with some Windows thrown in occasionally. I've been running two machines, a linux and a windows dev machine. Long story short, we had a bad storm come through last week and I unplugged one machine, forgot to unplug the other and the p/s and mobo ended up dead. Luckily I backup to an external service religiously (rsync.net for anyone interested), so there was no loss in data, but it did show me a glaring hole in my current setup, namely, lack of UPC and Surge Protection (this has honestly never been an issue before). Can anyone recommend a UPC/Surge Protector for a home office? It only needs to support a single machine (I opted to use vmware instead of rebuilding that machine), but it's a quad core Phenom 2 with a 1k watt p/s. This is outside my experience so I thought I'd get some input from others. I'm looking for something that's reasonably priced and does the job reasonably well. I don't need absolute 100% uptime, just something to protect my PC better than it is now.

    Read the article

  • Disable mobile page redirection for SharePoint 2013

    - by Sahil Malik
    SharePoint, WCF and Azure Trainings: more information SharePoint 2013 (foundation too), detects requests from mobile devices and automatically changes the uRL of the requested non mobile page to its mobile substitute. This logic is now built into SPRequestModule. The mobile view is pretty damned amazing. Even though the set of pages for mobile access is completely different, SharePoint has an entirely separate set of controls for the mobile pages. These are in the Microsoft.SharePoint.MobileControls namespace which inherit from Microsoft ASP.NET controls in the System.Web.UI.MobileControls namespace. These Mobile pages can even use mobile Web Part adapters to mimic the behavior of webparts on mobile webpart pages. Read full article ....

    Read the article

  • EE&CIS Oracle University Partner Enablement Update (5th April)

    - by swalker
    Untitled Document Let Oracle University help you become a BI 11g expert! The 5-day Oracle BI Enterprise Edition 11g Implementation Boot Camp has been scheduled exclusively for our partners in Bucharest (Romania) to give them the opportunity to gain differentiation and a competitive advantage today’s market. Oracle BI Enterprise Edition 11g Implementation Bucharest 11-15 June 2012 Click here * Bookmark the EMEA OPN Only Boot Camp schedule web page to view new locations and dates as they are scheduled ** Your OPN discount applies to these bootcamps. Spaces are limited for these events, so register now to guarantee your seat! For a complete list of OPN Bootcamps - both In Class Events and Live Virtual Classes, please refer to the following OPN Schedule. For more information, advice and assistance, please contact us at: Oracle University Romania+4021 3678820 [email protected] oracle.com/ro/education Stay Connected to Oracle University: LinkedIn OracleMix Twitter Facebook Google+

    Read the article

  • HP/IBM alternative to Buffalo iSCSI TerraStation?

    - by Robin Day
    I'm looking at virtualising some of our infrastructure in order to allow for more resiliance and future expandability. We have successfully virtualised on single servers with Direct Attached Storage and are now looking for a more future proof solution using a high powered host (or two) and a SAN (or two). I'm thinking that the host machine will probably be an HP ProLiant DL360 G7 (all of our exisiting infrastructure is HP). Unfortunately, I am new to the world of SANs. From what I can see, the Buffalo Terrastation III is all I would need in order to setup an iSCSI SAN for VMWare to use. However, I'm a little reticent to go that way as it's a bit too "entry level" for my liking. In particular I would be very keen for more redundancy, power, networking, etc. I'm also very aware that you "get what you pay for". Therefore, can anyone reccommend equivalents from the big boys? HP/IBM? I have searched high and low on the HP site and seen many options but am struggling to work out if it is all the hardware I will need. Some options appear to need separate controllers from disk enclosures, etc.

    Read the article

  • How do I draw a texture to a MSTerrain object?

    - by Brad
    I'm using Farseer to make a game in XNA and I can't seem to figure this out. I've decided to use MSTerrain for making my game's terrain because I wanted destructible terrain and MSTerrain seemed like the best bet. Unfortunately, I'm stumped on how to actually show the terrain. When I generate the terrain it's visible in debug view, but MSTerrain does not have a Draw method, so I'm wondering how it is supposed to be drawn to the screen? Is it worth pursuing? I'm starting to think that MSTerrain is more trouble than it's worth, is there another better way to do this with bodies?

    Read the article

  • Is there an industry standard for systems registered user permissions in terms of database model?

    - by EASI
    I developed many applications with registered user access for my enterprise clients. In many years I have changed my way of doing it, specially because I used many programming languages and database types along time. Some of them not very simple as view, create and/or edit permissions for each module in the application, or light as access or can't access certain module. But now that I am developing a very extensive application with many modules and many kinds of users to access them, I was wondering if there is an standard model for doing it, because I already see that's the simple or the light way won't be enough.

    Read the article

  • How Do You Test Your Software ?

    - by Kubi
    I'm currently working on 2 software projects: A Social Networking Web Site for an NGO A Patient Management System for a hospital Although I've been programming for 5 years, I can't just say that I'm very good at testing or Test Driven Designing an application. How would you arrange your Software Testing before coding phase, during coding and after you finished the coding phase for a. providing stakeholders with information about the quality of the product or service under test. b. providing an objective, independent view of the software to allow the business to appreciate and understand the risks of software implementation. and how do you understand that your program/application/product c. meets the business and technical requirements that guided its design and development d. works as expected p.s. please feel free to edit the question since my english is not very powerful.

    Read the article

  • Isometric tile range aquisition

    - by Steve
    I'm putting together an isometric engine and need to cull the tiles that aren't in the camera's current view. My tile coordinates go from left to right on the X and top to bottom on the Y with (0,0) being the top left corner. If I have access to say the top left, top right, bot left and bot right corner coordinates, is there a formula or something I could use to determine which tiles fall in range? I've linked a picture of the layout of the tiles for reference. If there isn't one, or there's a better way to determine which tiles are on screen and which to cull, I'm all ears and am grateful for any ideas. I've got a few other methods I may be able to try such as checking the position of the tile against a rectangle. I pretty much just need something quick. Thanks for giving this a read =)

    Read the article

  • How does one debug Windows network share authentication?

    - by ajs410
    I have machine0 with 32-bit Vista, logged in as a domain user, running a VMWare image of 32-bit Vista, logged in as a local user, with the VM set to bridge the network. From an administrator account (called admin) within the VM, I try to access the hidden C$ share on machine0 (i.e. start - run - "\\machine0\C$\"). I get no prompts for credentials. Worse, machine0 has an admin account (different password), and machine0\admin gets locked out when VM\admin tries to access the network share. I get a message several seconds later, which feels like a cached credential failure leading to the lockout. I have checked several places for cached credentials; net use, Stored Usernames and Passwords, mapped shares. I rebooted (both machine0 and VM) to make sure the session was clear of any cached credentials. I can force net use to use my domain credentials when accessing machine0, and then I can see the share. I can also see shares that do not require credentials. I decided to try another machine on the network (machine1), 64-bit Vista, local user. This machine has no lockout policy, and after several seconds (feels like failed cached credentials again) it prompts me for credentials. After I enter them, it re-prompts me, saying "logon unsuccessful" (tried my domain credentials, and also machine1\admin's). Which is bogus, because I proceed to log on with remote desktop using the machine1\admin credentials. I have tried this on another machine (machine2, 64-bit Vista), running a copy of the same 32-bit VM, and I don't remember having this problem. machine0 has a fingerprint reader...could that try storing passwords and interfere? Are there any places I'm missing where there could be cached credentials? Is there a way to see what credentials are flying around when I try to connect?

    Read the article

  • Tell a user whether they have already viewed an item in a list. How?

    - by user2738308
    It is pretty common for a web application to display a list of items and for each item in the list to indicate to the current user whether they have already viewed the associated item. An approach that I have taken in the past is to store HasViewed objects that contain the Id of a viewed item and the Id of the User who has viewed that item. When it comes time to display a list of items this requires querying for the items, and separately querying for the HasViewed objects, and then combining the results into a set of objects constructed solely for the purpose of displaying them in the view. Each e.g li then uses the e.g. has_viewed property of the objects constructed above. I would like to know whether others take a different approach and can recommend alternative ways to achieve this functionality.

    Read the article

  • Take a single snaphot from a webcam with a delay

    - by cedivad
    I use gst-launch-0.10 v4l2src num-buffers=1 ! jpegenc ! filesink location=$HOME/Desktop/test.jpg to take snapshots. It works well. However in some light situation I need to drop some of the first frames the webcam outputs so that the webcam white balance doesn't provide me with an impossible to view image. Do you know how could I do that? With the GUI of cheese I can do it without any problem, but I need to automate this via CLI. Many thanks.

    Read the article

  • Best practice for comments above methods in a grails application?

    - by Travis
    I'm writing a grails application and am not sure what the best practice is with regard to comments outside of method blocks. I've done a bit of research and there seems to be conflicting views on how and when these sort of comments should be used. In lots of source code I have seen there seems to be comments above every method detailing what that method does. I'm not sure if grails should be differnet? My question is should I have a comment above each method in my controllers, services and domain objects? i.e /* * This method displays the index page */ def index(){ render view : "index" }

    Read the article

  • No other users can access external hdd since upgrade to 12.10

    - by Victor9098
    Since upgrading to Ubuntu 12.10 no other user can access the external hdd. This is awkward as its a family pc and we use the hdd to store music and save backups across the several accounts. The external hdd seems to mount just to my account now, i.e. /media/[user1]/[ext hdd], and while all the other users can see the drive mounted they can not access as they just receive a file location error. From their perspective it is mounted just in my profile and not in theirs. I have tried editing the properties of the hdd to allow others to view and create files on the hdd but that has not changed anything. I have also read that this is a new feature to Ubuntu 12.10, the way it mounts via /media/[user]/. So is there a way to have it mount to all the other user accounts too? Thanks!

    Read the article

< Previous Page | 525 526 527 528 529 530 531 532 533 534 535 536  | Next Page >