Search Results

Search found 10511 results on 421 pages for 'clear cycle corp'.

Page 53/421 | < Previous Page | 49 50 51 52 53 54 55 56 57 58 59 60  | Next Page >

  • How do I remove automatically added keyboard layouts?

    - by Diego
    I have a Spanish keyboard on my notebook, but I use it mostly for English and Chinese writing. This is how I configured the languages: However, Windows added some layouts on its own (probably when connecting via Remote Desktop to computers with different languages/layouts): Those layouts are all part of the AltShift cycle, which is extremely annoying. How can I remove ENG/US and ESP, considering they don't show in the configuration list? Is there a way to prevent them from being added again?

    Read the article

  • Remove server from loadbalancer [on hold]

    - by Cris
    Our datacenter is load balancing the traffic to our weblogic servers based on an application deployed on each server called probe.ear It is a simple java app which is accessed by the loadbalancer and if it accessible it will redirect traffic to this server as well. When we want to remove one node from the loadbalancer we just stop the probe app and new traffic is not redirected to it BUT I am asking myself what about the current requests? The responses for the current requests are executed (completed). I did not had time to test (will do that first thing when go back to work) but on theoretical level for me it make sense to do so unless the loadbalancer has some special settings. Does my reasoning make sense to you? Just to make it clear since it was reported the question is not clear. Is there a way to configure a load balancer in a way that from a specific moment will not redirect traffic to a certain server without reseting the current requests ?

    Read the article

  • Restarting an IBM BMC without restarting the server itself

    - by SRobertJames
    I have a few servers with IBM BMC (Baseboard Management Controller). I'd like to power cycle the BMC without restarting the server. Is this possible? How? Note: On one of them, the web interface is down; so I'd need to either do this by physically restarting the BMC (not sure how to do this - even the power button on the server isn't supposed to recycle the BMC, I believe) or via the UDP or SNMP interface (again, not sure how to do that either)

    Read the article

  • Ubuntu server: lost prompt on monitor

    - by Richard
    Hello All, I am running Ubuntu 9.04 server edition. I have a monitor plugged into the box for occasional admin tasks. I pulled out a USB disk (without unmounting) and the screen is now full with this message: Buffer I/O error on device sdc1, logical block 7778778 I can't seem to clear the screen or get a prompt back. Doesn't appear to be registering keyboard strokes. The box is still running fine (I can ssh in from elsewhere and evrything is running as normal). Any ideas on how to clear screen and get my prompt back?

    Read the article

  • Laserjet Experts: How many power cycles per month?

    - by marienbad
    I recently got a nice Laserjet 8100DN for my house. I will probably never print more than 1% of its rated monthly duty cycle. But it runs some fairly noisy fans 24/7 if it's left on, so I am in the habit of turning the machine off as soon as I'm done with it. So, for all you who have a lot of experiencing administrating workgroup LaserJets, do you think I'll end up killing it from too many on-off cycles?

    Read the article

  • Looking at desktop virtualization, but some users need 3D support. Is HP Remote Graphics a viable solution?

    - by Ryan Thompson
    My company is looking at desktop virtualization, and are planning to move all of the desktop compute resources into the server room or data center, and provide users with thin clients for access. In most cases, a simple VNC or Remote Desktop solution is adequate, but some users are running visualizations that require 3D capability--something that VNC and Remote Desktop cannot support. Rather than making an exception and providing desktop machines for these users, complicating out rollout and future operations, we are considering adding servers with GPUs, and using HP's Remote Graphics to provide access from the thin client. The demo version appears to work acceptably, but there is a bit of a learning curve, it's not clear how well it would work for multiple simultaneous sessions, and it's not clear if it would be a good solution to apply to non-3D sessions. If possible, as with the hardware, we want to deploy a single software solution instead of a mishmash. If anyone has had experience managing a large installation of HP Remote Graphics, I would appreciate any feedback you can provide.

    Read the article

  • Is it possible to have zsh+keychain+tmux not ask for keys?

    - by Wayne Werner
    I'm using tmux and zsh, and I've recently been learning about ssh-agent and keychain. From the manpage for zsh, it says that it will source .zlogin only if the shell is, well, a login shell. Following advice I read, I stuck keychain --clear in my .zlogin, which worked perfectly. When I logged into the box I had to unlock my key. However, each time I create a new window in tmux, it clears/makes me re-add my key. This is a little annoying... but I can understand it if, in fact, each new tmux window is a login window. I haven't been able to find much help outside of the manpages on this topic. So is each new tmux window a login shell, or is there any way that I can make it not clear my keys only when I create a tmux window?

    Read the article

  • How to make google Chrome omnibar search sites permanent?

    - by tim
    In google Chrome, when you have visited a site, say wikipedia.com, your can thereafter search the site directly from the omnibar by typing in a few letters then hitting tab. However, I noticed that after I clear my cache, Chrome does not remember the search autofills, and I once again have to visit the site manually for it to take effect. Is there a way to make the omnibar searches permanent even after doing a full cache clear in google Chrome? Thanks. Update: I tried the suggestion below, but bookmarking the site just allowed me to autocomplete the address. It did not allow me the option to hit tab to do the search directly in the omnibar. Any suggestions?

    Read the article

  • Chrome - Why am I automatically authenticated to a web app even after clearing browser cookies?

    - by Howiecamp
    I am accessing a web application using Chrome. If I sign out of the app and clear all Chrome history/cookies/etc (even Flash cookies which are now handled by Chrome in the same Clear History area) and then re-access the site, I am automatically logged in without being prompted for credentials. I then launched Chrome in Incognito mode and was able to reproduce the same behavior. However, the I was prompted upon the first logon while in Incognito mode. The web application behaves as expected in Internet Explorer 10. Some info about the application: It's a Sharepoint site using NTLM authentication The credentials are Active Directory-based, as the username is domain\username My connection is over the Internet and there is no AD relationship between my local Windows account, my Windows PC. In other words I (meaning my locally logged on user and my PC) are not in any way part of their AD domain. The site is running SSL on port 443 Why might Chrome be automatically authenticating me?

    Read the article

  • Multiple keyboard shortcuts for the same command in OS X?

    - by Nik
    I am used to doing Ctrl-Shift-Tab to cycle through tabs. I do slowly pick up the niceness about using Cmd-Shift-[ or ] to do the same on the Mac. I have currently set TextMate to take Ctrl-Shift-Tab to do the tab cycling, but I'd want the Ctrl-Shift-[ or ] in addition to that to perform tab cycling. Is this possible? The reason I ask is because I see that Chrome can do it both ways (not through any configuration of my own of course).

    Read the article

  • Sharepoint insists it knows the link to my UNC and won't let me remove hyperlink formatting

    - by ray023
    We have a file share at work (one I do not have the power to rename) and it contains a space in it: \\WorkFileShare\Visual Studio\SP1 I'm creating a Wiki Entry that informs users they can locate the VS2010 SP1 download on this Share. For some reason, SharePoint will highlight and hyperlink the UNC up to the space. (I've been dealing with this behavior for years in Outlook and I fix by putting focus on the character before the space and then hitting backspace to remove the formatting). Simple enough and SharePoint also removes the formatting when you backspace on the character before the space. However, as soon as I move away from the link, SharePoint goes right back to highlighting and hyperlinking what it thinks is the UNC. Naughty Sharepoint!! So does anyone have any idea how to clear the formatting? NOTE: Highlighting the text and clicking on the "Clear Format" icon does not work.

    Read the article

  • Are there any well known anti-patterns in the field of system administration?

    - by ojblass
    I know a few common patterns that seem to bedevil nearly every project at some point in its life cycle: Inability to take outages Third party components locking out upgrades Non uniform environments Lack of monitoring and alerting Missing redundancy Lack of Capacity Poor Change Management Too liberal or tight access policies Organizational changes adversely blur infrastructure ownership I was hoping there is some well articulated library of these anti-patterns summarized in a book or web site. I am almost positive that many organizations are learning through trial by fire methods. If not let's start one.

    Read the article

  • How can I find out which service is keeping Vista from restarting?

    - by Jeff
    Running Vista on my Toshiba laptop for several years now. Recently, I noticed it will not restart - I have to power cycle it. I have enabled Verbose Status messages, so I know it's stuck at "Stopping services". Is there a way to figure out which service is not stopping? I'm hoping for some kind of log like the bootlog. I've tried looking through the event viewer - no luck there.

    Read the article

  • Would SSL prevent replay tampering by the authenticated user

    - by Coder 42
    In the context of a game (HTML5/Flash/Silverlight) which sends data to an online service to record progress (e.g. player killed an orc), would communicating with the service over SSL implicitly prevent the player from recording and replaying the message? I know SSL includes a nonce, but does it remain constant for the duration of the connection or does it change after each request/response cycle?

    Read the article

  • MacBook Pro dies overnight

    - by fizzy
    I have a 2009 MacBook and if it is not connected to power, it will die overnight. Battery cycle count is 60. Can this behavior be changed to go to "deep sleep" after 30 minutes of inactivity wherein it stops draining the battery?

    Read the article

  • What router hardware or software should be used when multiple public IPs are routed into the same LAN?

    - by lcbrevard
    I am looking for recommendations to replace a set of consumer grade (Linksys, Netgear, Belkin) routers with something that can handle more traffic while routing more than one static public IP into the same LAN address space. We have a block of static public IPs, 5 usable, with Comcast Business. Currently four of them are in use for: General office access Web server Mail and DNS servers Download and backup web server for separate business All systems (a mixture of physical and virtual) are in the same LAN address space (10.x.y.0/24) to enable easy access between them inside the office. There are 30 or more systems in use depending on which virtual machines are currently active. We have a mixture of Windows, Linux, FreeBSD, and Solaris. Currently a separate consumer grade router is used for each of the four static addresses, with its WAN address set to the specific static address and a different gateway address for each: uses 10.x.y.1 - various ports are forwarded to various LAN IPs on systems with gateway 10.x.y.1 uses 10.x.y.254 - port 80 is forwarded to a server with gateway 10.x.y.254 uses 10.x.y.253 - ports for mail and dns are forwarded to a server with gateway 10.x.y.253 uses 10.x.y.252 - ports as needed are forwarded to server with gateway 10.x.y.252 Only router 1. is allowed to serve DHCP and address reservation based on the MAC is used for most of the internal "server" IP addresses so they are at fixed values. [Some are set static due to limitations in the address reservation capabilities of router 1.] And, yes, this really does work! But... I am looking for: better DHCP with more capable address reservation higher capacity so I don't have to periodically power cycle the routers One obvious improvement would be to have a real DHCP server and not use a consumer grade router for that purpose. I am torn between buying a "professional" router such as Cisco or Juniper or Sonic Wall verus learning to configure some spare hardware to perform this function. The price goes up extremely rapidly with capabilities for commercial routers! Worse, some routers require licensing based on the number of clients - a disaster in our environment with so many virtual machines. Sorry for such a long posting but I am getting tired of having to power cycle routers and deal with shifting IP addresses afterwards!

    Read the article

  • VLAN issues between linux kernels 2.6 / 3.3 in an ESX / Cisco environment

    - by David Griffith
    I shall attempt to explain an issue I have encountered - I have a VM running on esx 4.1 with an interface connected to VLAN800 via an access port on a cisco 3750. It runs linux - kernel 2.6.24, and has about 5 to 10 Mbit of chatter on 10.10.0.0/16 and various multicast addresses to look after. I needed to isolate certain devices from certain other devices on the network, with all of them having to talk to that one VM. No, the address space can't be separated, nor can the networks be easily vlan'd apart. The software on the VM listens to one interface only. Private vlans appear to be the way to go. So as a test, I built a bridge on the VM that globs together the vlans as needed. All good, everything works as expected. But occasionally (sigh) there's some latency that trips up a couple of profinet devices on the network because, you know, you're not really supposed to trunk real-time protocols around the place willy-nilly. I shift it to our test/backup server - works nicely, but I don't want it to be running on the test server as we muck around with that a lot. So I says to myself, "I'll put it on a new VM for testing and tweaking." I download a small linux distro with kernel 3.3, and install as a new VM with a the vlans as separate interfaces for testing. I power up the testing VM - ok. I bring up all the separate interfaces - ok. I can ping the production VM, see all sorts of traffic going past with tshark, etc. I build a bridge and put the primary vlan on it - the production VM running 2.6 immediately loses its multicast traffic - Unicast is fine. (?) I shut down the bridge - still no multicast traffic (!?) I power-cycle the production VM(!?!?) - multicast traffic returns. I trunk everything into the testing VM and create vlan interfaces under linux instead - same result, as soon as I start the bridge.... no multicast on the production VM. Ok, so I take a break and leave things alone. I decide to play with a couple of ubiquiti bullet radios - I'm testing various firmware as a side project. I flash a radio with Open-wrt-12.09. I enable a trunk on a port on a cisco on our network so I can muck around with multiple vlans and SSIDs I power up the radio and connect - ok. I create a vlan interface from the trunk.... the same vlan as the production VM wayyyyy over there, three cisco routers away. Ok. I bridge the vlan interface to the wifi interface and immediately get a phone call. The production VM has (suprise!) lost its multicast traffic. Again, nothing comes back until I power-cycle the VM. What the hell is going on?

    Read the article

  • Delete Google Chrome's tab history

    - by wizlog
    After browsing the web for a while, I want to delete my history. So I press CTRL and H keys, and click the Edit items on the blue bar at the top of the page. Then I select the checkboxes for the items I want to remove. Then I click remove selected items. When I go into any of my open tabs, their history isn't deleted. Without restarting the tab or the browser, is there any way to clear the history within a tab? I also want to know how to clear just one tab's history, without needing to know all the pages that the tab had visited, then going to the history page...

    Read the article

  • Setup wiped Polycom phone without SIP server

    - by Justin
    I'm troubleshooting a Polycom SoundPoint IP 550. I have wiped the hard disk of the phone (via a menu option) and now it's stuck in a reboot cycle. Apparently the only way to setup the firmware of the phone is to use a boot server. Does anyone know another way to setup the phone/firmware?

    Read the article

  • What can an effective workflow for changing input methods be on Mac OS X?

    - by Martin Josefsson
    I switch between three languages input methods frequently, sometimes in the same typing session. The default shortcut on a Macintosh seems to be to set keyboard shortcuts for previous/next language (I hit opt-cmd-space to go to previous language) and if you're more than bi-lingual you have to cycle until you find the one for you. The ideal would be something like hitting fn-e for English, fn-j for Japanese and fn-g for German, but anything better than the current state would be a great improvement.

    Read the article

  • Is the guideline: don't open email attachments or execute downloads or run plug-ins (Flash, Java) from untrusted sites enough to avert infection?

    - by therobyouknow
    I'd like to know if the following is enough to avert malware as I feel that the press and other advisory resources aren't always precisely clear on all the methods as to how PCs get infected. To my mind, the key step to getting infected is a conscious choice by the user to run an executable attachment from an email or download, but also viewing content that requires a plug-in (Flash, Java or something else). This conscious step breaks down into the following possibilities: don't open email attachments: certainly agree with this. But lets try to be clear: email comes in 2 parts -the text and the attachment. Just reading the email should not be risky, right? But opening (i.e. running) email attachments IS risky (malware can be present in the attachment) don't execute downloads (e.g. from sites linked from in suspect emails or otherwise): again certainly agree with this (malware can be present in the executable). Usually the user has to voluntary click to download, or at least click to run the executable. Question: has there ever been a case where a user has visited a site and a download has completed on its own and run on its own? don't run content requiring plug-ins: certainly agree: malware can be present in the executable. I vaguely recall cases with Flash but know of the Java-based vulnerabilities much better. Now, is the above enough? Note that I'm much more cautious than this. What I'm concerned about is that the media is not always very clear about how the malware infection occurs. They talk of "booby-trapped sites", "browser attacks" - HOW exactly? I'd presume the other threat would be malevolent use of Javascript to make an executable run on the user's machine. Would I be right and are there details I can read up on about this. Generally I like Javascript as a developer, please note. An accepted answer would fill in any holes I've missed here so we have a complete general view of what the threats are (even though the actual specific details of new threats vary, but the general vectors are known).

    Read the article

  • syslog facilities

    - by user65971
    Hi, I have an application (in java) running in a windows PC and I want to send logging messages to a syslog server running in a linux box somewhere in the network. The problem I have is, that it is not clear to me what should I use as facility in this case. I.e. can I (/should I) send the logging info as one of LOCAL0-LOCAL7? Or are they not supposed to be used by remote applications? It is not clear to me if they are usable or not. Should I use USER instead? Could anyone help me on this please? Thank you

    Read the article

< Previous Page | 49 50 51 52 53 54 55 56 57 58 59 60  | Next Page >