Search Results

Search found 30828 results on 1234 pages for 'information rights manage'.

Page 536/1234 | < Previous Page | 532 533 534 535 536 537 538 539 540 541 542 543  | Next Page >

  • Can't install libapache2-mod-php5

    - by chris
    When I try to install libapache2-mod-php5, I get an error: Some packages could not be installed. This may mean that you have requested an impossible situation or if you are using the unstable distribution that some required packages have not yet been created or been moved out of Incoming. The following information may help resolve the situation: The following packages have unmet dependencies: libapache2-mod-php5 : Depends: apache2-mpm-prefork (> 2.0.52) but it is not going to be installed or apache2-mpm-itk but it is not going to be installed E: Unable to correct problems, you have held broken packages. I have tried apt-get clean, update and upgrade, as well as -f install, and no change. Is there a way to fix this, or is there an easy way to manually install the php plugin?

    Read the article

  • Updating "Inactive" Chunks

    - by Conner Bryan
    In my game, the only chunks (4x4 areas of tiles) in memory are the ones that the player is in. However, chunks need to have updates applied to them over time. A (likely) well-known example would be MineCraft: even if the player isn't in a chunk, the wheat still needs to grow over time. My current solution is to call a method and pass in the time since the chunk was active.. but what if the chunk depends on nearby chunks for information, i.e. vines spreading or similar? Is there any reasonable solutions to this problem, or should I simply not depend on nearby chunks?

    Read the article

  • Enhancing Enterprise Planning and Forecasting Through Predictive Modeling

    Planning and forecasting performance in today's volatile economic environment can be challenging with traditional planning applications and manual modeling techniques. To address these challenges, leading edge companies are leveraging predictive modeling to bring statistical analysis and techniques such as Monte Carlo simulations into the mix. Sound too math-intense and complicated? Not anymore. These techniques can be applied by anyone - no prior stats experience required - whether to augment the forecasting performed by line managers or to validate those forecasts based on historical information, and to produce a broader range of scenarios to consider in decision-making.

    Read the article

  • Writing drivers for a printer?

    - by user828584
    My goal is to be able to fax 20 page pdf documents for free. I've looked online, and there are some free fax services, but all of them have their limits. I do have an old fax machine, but the documents that need to be faxed are on the computer, and to print them would be far from free. Unfortunately, the only way to send a fax with the machine is by scanning it. What's strange is that it can scan to the computer and print from it, but it won't fax from it... :(. Is it possible to write something (preferably C#, but it's going to take some learning anyway) that will allow me to send a fax from the computer? I have very little software experience, and none in anything like this, so I have no idea where to start. If it is possible, where can I find all the information needed to write the program?

    Read the article

  • A .NET developers introduction to SharePoint

    - by Sahil Malik
    SharePoint 2010 Training: more information Are you a .NET developer sitting on the edge, looking at the vast space that is SharePoint? Ever wondered what is a typical SharePoint project like? No, not the marketing fluff, but what it is really like, and what does it make to make it work properly. What is all this cloud stuff all about, and how does it affect you?   On February 5th, 2013, I will have a session from 14:00 – 15:00 at DevWeek (www.devweek.com) in London about “A .NET developer’s introduction to SharePoint”.   You can find the full conference agenda here, http://www.devweek.com/sessions/conference1.asp Read full article ....

    Read the article

  • How are you keeping abreast with latest HPC trends?

    - by Fanatic23
    For those of you primarily working on high performance computing for non-scientific purposes (as in no fortran) what are the ways by which you keep yourself abreast of the latest trends out there? Industry gossip? Random blogs from google? Search SO? I am into HPC recently and looking for the high level architectural landscape. Given that everyone from GPGPU coders to FPGA folks to Erlang developers claim they are into HPC, how are you keeping up with so much information?

    Read the article

  • How will this affect my SEO ranking?

    - by dunc
    I run a fishkeeping website based on a WordPress (PHP) CMS. I've recently put a fairly complex "filter" into place which searches my content for mentions of fish species profiles and turns them into an active link. For example, asdasd this is a test about abdomen to see if the caudal fin will work asdadasdas try again with abdomen and A. panduro and Apistogramma panduro ...becomes asdasd this is a test about abdomen to see if the caudal fin will work asdadasdas try again with abdomen and <a href="/?p=1703" class="link_species">A. panduro</a> and <a href="/?p=1703" class="link_species">Apistogramma panduro</a> On the rest of my website, the species are linked with pretty URLs such as /species/apistogramma-panduro/ but due to the way this filter works, the only information I can get access to is the idof the post. As such, I'm using /?p=1703 or whatever the ID is. What I'd like to know is: how much will this affect my SEO rating/ranking? Will it be detrimental if I don't rewrite the function? Thanks in advance,

    Read the article

  • Duplicating content from another site and adding value (summaries, statistics) - ranking and courtesy

    - by Krastanov
    I am working on a site that takes a governmental data base, provides a number of statistical and other summaries and also post the original data. However this data (mostly long pieces of text) is also published on the official governmental site (without the added value of summaries). Should I worry about google ranking due to this duplication? What is the preferred way to point to the official source of the information? There is no advertisement on my site. My site is ".com". The governmental site is ".bg".

    Read the article

  • Which Git-based MIS to track workflow like Trac/Redmine but on console minimastically?

    - by hhh
    Definitions MIS = management information system Some list about console based solutions here and some GUI-hacks here. Been fed up to install all those dependencies and no make -files with GUI -things so which console-based MIS would you suggest for a game-development team with graphical -repo, animation -repo, code -repo, stories -repo, etc ? P.s. I do use Git -submodules and the reason for repo -fragmentation is due to roles and size, certain repos such as graphic -repos tend to be quite large so better to keep them separate. Perhaps useful to readers interested about this http://stackoverflow.com/questions/5881578/trac-vs-redmine https://github.com/jchris/sofa

    Read the article

  • Does Ubuntu 12.04 supports for B75 boards?

    - by rail02000
    I want to build a new computer with Intel G840 CPU and Gigabyte B75M-D3H motherboard and install Ubuntu (or Kubuntu) 12.04 64bit on it. However, I'm worried about whether the chip is too new and whether that Linux Kernel now has support for it. According to the article [Phoronix] Intel Core i7 3770K Ivy Bridge Linux Performance Review ,the Linux kernel is ready to work on the chip. Existing Intel Sandy Bridge motherboards/chipsets are compatible with Ivy Bridge processors, but earlier this month Intel launched the new Panther Point chipsets that are already compatible with Linux too: the B75, H77, Z75, Z77, HM75, HM76, UM77, and HM77. But I didn't find further information or cases about running Ubuntu on the chip. So,is it OK to run Ubuntu on the board? Do I need to upgrade the kernel to a newer version (3.4 or 3.5 etc.) to get the system more smoothly? Or should I choose boards with H61 chip? Thank for your response!

    Read the article

  • Most appropriate diagram for GUI button design?

    - by JustADude
    What is the most appropriate diagram for GUI button design? Specifically, I have numerous buttons that will be changing color based on state information from operator input and input from various subcomponents and sensors. I would like to use UML or some other type of design diagrams to be able to capture the color transition. Some folks have suggested sequence diagrams, but I haven't been able to find any good examples that show how to incorporate this design artifact. I would really like to head in this direction to help developers. Thanks a ton for feedback and insights.

    Read the article

  • Kubuntu 11.10 disable tapclick not working from gui

    - by Star
    Trying to find the script that disables tap-to-click, but can't locate the right settings. here is 50-synaptic.conf: # Example xorg.conf.d snippet that assigns the touchpad driver # to all touchpads. See xorg.conf.d(5) for more information on # InputClass. # DO NOT EDIT THIS FILE, your distribution will likely overwrite # it when updating. Copy (and rename) this file into # /etc/X11/xorg.conf.d first. # Additional options may be added in the form of # Option "OptionName" "value" # Section "InputClass" Identifier "touchpad catchall" Driver "synaptics" MatchIsTouchpad "on" # This option is recommend on all Linux systems using evdev, but cannot be # enabled by default. See the following link for details: # http://who-t.blogspot.com/2010/11/how-to-ignore-configuration-errors.html MatchDevicePath "/dev/input/event*" EndSection Any ideas would be gratefully received, it's driving me mad!

    Read the article

  • Is there a way to publish IOS app from windows/Linux?

    - by user65760
    So I have been using Linux(especially, ubuntu) and windows(windows 7) for a long time . But i dont have a MAC, neither do i have an iphone. I do not actually want to buy them either . So the problem here is :how do i publish my app from windows or linux ? Kindly do understand i am not speaking about jailbroken programs(for jail broken i phones), i do not have any one near me who will lend me a MAC to publish my app . I started learning objective C some time ago. However, whenever i search the internet i get this information that there is no full proof way of publishing an app from windows or Linux . I also do intend to make it a paid app, meaning i dont wanna make it free. It will be very helpful if someone can suggest a way to overcome this problem .

    Read the article

  • Computer science [closed]

    - by user73589
    I'm a computer science graduate Information systems department. I graduated this year with GPA 3.8 but I'm totally lost, we didn't work on making applications and writing a lot of codes at college. I feel that if I applied in any job I won't be taken because I don't have any knowledge. I'm a very hardworker but I don't know from where to start and what to do. Should I go for web design and that staff or for Android and mobile applications? What can I do and how to start?

    Read the article

  • Can't install Ubuntu using Wubi on a Windows dynamic disk [closed]

    - by Tharindu
    Possible Duplicate: I can't able to install ubuntu alongside with Win7 ..: When I try to install ubuntu 12.04 - 64 bit alongside win 7 prof. 64 bit it generated the following error. How could I proceed without having this? I - An error occurred: Error executing command command= C:\Windows\sysnative\bcdedt.exe /set {1 bO4672f-5969-11)-a75c-d3d3Od877b8O} device partition= F: retval=1 stderr=An error has occurred setting the element data. The request is not supported. stdout For more information, please see the log file c\users\dell\appdata\local\temp\wubi-12.04

    Read the article

  • Friday Spotlight: A Webcast You Do Not Want To Miss!

    - by Chris Kawalek
    Happy Friday! Today's Spotlight is about what promises to be an information packed webcast next week. We're really excited about it and hope that you are, too! Oracle Managed Cloud Services uses Oracle VM to serve up thousands of Oracle applications to thousands of end users every day. To do this, they utilize nearly 20,000 instances of Oracle VM. It's an amazing story of high availability in an unrelenting customer environment, and it's all powered by Oracle. You can leverage this team's experience in your own deployments to gain valuable insight and best practices. If you'd like to understand how well Oracle VM can scale for your organization, you do not want to miss this webcast. It is coming up this Tuesday at 10AM Pacific Time. Click the banner below to register and we hope to see you there! Oracle VM: Design Considerations for Enterprise-Scale Deployment  Tuesday, June 10, 2014 10:00 AM PDT / 1:00 PM EDT

    Read the article

  • Do you have any offers in hand [closed]

    - by akp
    Recently, I was asked by an interviewer that - "Do you already have any job offer in hand ?". I am wondering, what could be the intention behind asking this question. What the answer suggests to interviewer? I mean what kind of information he wants dig through this question? YES answer - Does this means that the candidate already has an offer,.. so he wont take this offer seriously and turn out to somebody else. OR No answer - Does this means that candidate is not able to get through any of the interviews before.. Help me to understand this ..

    Read the article

  • Multiple vulnerabilities in Firefox web browser

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2011-3062 Numeric Errors vulnerability 6.8 Firefox web browser Solaris 11 11/11 SRU 9.5 Solaris 10 SPARC: 145080-11 X86: 145081-10 CVE-2012-0467 Denial of service (DoS) vulnerability 10.0 CVE-2012-0468 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability 10.0 CVE-2012-0469 Resource Management Errors vulnerability 10.0 CVE-2012-0470 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability 10.0 CVE-2012-0471 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability 4.3 CVE-2012-0473 Numeric Errors vulnerability 5.0 CVE-2012-0474 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability 4.3 CVE-2012-0477 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability 4.3 CVE-2012-0478 Permissions, Privileges, and Access Controls vulnerability 9.3 CVE-2012-0479 Identity spoofing vulnerability 4.3 This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Looking for Java Developers Using Mac

    - by Shay Shmeltzer
    The Oracle's Middleware User Experience team is currently looking for Java developers on Mac OS . If Mac OS is your primary development platform, we would like to invite you to participate in a customer usability feedback session allowing us to learn more about your experiences developing Java software on Mac OS. Sessions are typically 1.5 hours and would be conducted in your office via web conferencing. If interested, please send an email to this email address with the following information: Name: Job Title / Role: Daytime Phone: Provide a brief description of the programs you create in Java: Is MacOS your primary development platform? What is your primary development environment, tool, or IDE? What version(s) of the JDK do you currently use?

    Read the article

  • FxCop / Code Analysis with VS2010 Ultimate

    - by Cuartico
    I've getting some information about this, but I still can find a proper answer, I was asked recently in my company for this : "run a fxcop analysis on that code and tell me the results". Ok, I have VS2010 Ultimate which has code analysis, but before making any comment, I browse it on the internet cause I want to implement the best choice... So, let's say I'm gonna use the same rules on both analyzers: Should I recommend using one above the other? Should I say "hey, thats kinda old, let's use code analysis!" Should I get the same results on different computers? (for what I undersand, fxcop gives you some "points" and for what I've read, sometimes it gives you diff points on diff computers, I don't know about this with code analysis Thanks, any help would be appreciated

    Read the article

  • Data Source Security Part 4

    - by Steve Felts
    So far, I have covered Client Identity and Oracle Proxy Session features, with WLS or database credentials.  This article will cover one more feature, Identify-based pooling.  Then, there is one more topic to cover - how these options play with transactions.Identity-based Connection Pooling An identity based pool creates a heterogeneous pool of connections.  This allows applications to use a JDBC connection with a specific DBMS credential by pooling physical connections with different DBMS credentials.  The DBMS credential is based on either the WebLogic user mapped to a database user or the database user directly, based on the “use database credentials” setting as described earlier. Using this feature enabled with “use database credentials” enabled seems to be what is proposed in the JDBC standard, basically a heterogeneous pool with users specified by getConnection(user, password). The allocation of connections is more complex if Enable Identity Based Connection Pooling attribute is enabled on the data source.  When an application requests a database connection, the WebLogic Server instance selects an existing physical connection or creates a new physical connection with requested DBMS identity. The following section provides information on how heterogeneous connections are created:1. At connection pool initialization, the physical JDBC connections based on the configured or default “initial capacity” are created with the configured default DBMS credential of the data source.2. An application tries to get a connection from a data source.3a. If “use database credentials” is not enabled, the user specified in getConnection is mapped to a DBMS credential, as described earlier.  If the credential map doesn’t have a matching user, the default DBMS credential is used from the datasource descriptor.3b. If “use database credentials” is enabled, the user and password specified in getConnection are used directly.4. The connection pool is searched for a connection with a matching DBMS credential.5. If a match is found, the connection is reserved and returned to the application.6. If no match is found, a connection is created or reused based on the maximum capacity of the pool: - If the maximum capacity has not been reached, a new connection is created with the DBMS credential, reserved, and returned to the application.- If the pool has reached maximum capacity, based on the least recently used (LRU) algorithm, a physical connection is selected from the pool and destroyed. A new connection is created with the DBMS credential, reserved, and returned to the application. It should be clear that finding a matching connection is more expensive than a homogeneous pool.  Destroying a connection and getting a new one is very expensive.  If you can use a normal homogeneous pool or one of the light-weight options (client identity or an Oracle proxy connection), those should be used instead of identity based pooling. Regardless of how physical connections are created, each physical connection in the pool has its own DBMS credential information maintained by the pool. Once a physical connection is reserved by the pool, it does not change its DBMS credential even if the current thread changes its WebLogic user credential and continues to use the same connection. To configure this feature, select Enable Identity Based Connection Pooling.  See http://docs.oracle.com/cd/E24329_01/apirefs.1211/e24401/taskhelp/jdbc/jdbc_datasources/EnableIdentityBasedConnectionPooling.html  "Enable identity-based connection pooling for a JDBC data source" in Oracle WebLogic Server Administration Console Help. You must make the following changes to use Logging Last Resource (LLR) transaction optimization with Identity-based Pooling to get around the problem that multiple users will be accessing the associated transaction table.- You must configure a custom schema for LLR using a fully qualified LLR table name. All LLR connections will then use the named schema rather than the default schema when accessing the LLR transaction table.  - Use database specific administration tools to grant permission to access the named LLR table to all users that could access this table via a global transaction. By default, the LLR table is created during boot by the user configured for the connection in the data source. In most cases, the database will only allow access to this user and not allow access to mapped users. Connections within Transactions Now that we have covered the behavior of all of these various options, it’s time to discuss the exception to all of the rules.  When you get a connection within a transaction, it is associated with the transaction context on a particular WLS instance. When getting a connection with a data source configured with non-XA LLR or 1PC (using the JTS driver) with global transactions, the first connection obtained within the transaction is returned on subsequent connection requests regardless of the values of username/password specified and independent of the associated proxy user session, if any. The connection must be shared among all users of the connection when using LLR or 1PC. For XA data sources, the first connection obtained within the global transaction is returned on subsequent connection requests within the application server, regardless of the values of username/password specified and independent of the associated proxy user session, if any.  The connection must be shared among all users of the connection within a global transaction within the application server/JVM.

    Read the article

  • Ubuntu 12.04 fails to find Intel HD Graphics 3000

    - by user69785
    On my Windows 7 installation an Intel HD Graphics 3000 card/driver shows. However in Ubuntu 12.04, System ? Administration ? Hardware Drivers shows no proprietary drivers available for the system. I have tried running the following: sudo apt-get install mesa-utils Which results in the graphics driver incorrectly identifying itself as Sandy Bridge Mobile. Running the following results in no change sudo add-apt-repository ppa:xorg-edgers/ppa sudo apt-get update && sudo apt-get upgrade sudo reboot Does anybody have any information on this behavior?

    Read the article

  • Apache directory access with virtual host

    - by alexeygaidamaka
    I have a virtual host with a configuration like that. When i'm trying to get into foobar.com/dir providing valid username/password pair i get 403 forbidden page instead of that directory contents. www.foobar.com/dir has 777 rights, .httpaswd is chmoded 644. But i can't figure out why i am still not seeing contents. Please, give me a hint. ServerAdmin webmaster@localhost ServerName www.foobar.com ServerAlias www.foobar.com DocumentRoot /var/www/foobar <Directory /> Options FollowSymLinks AllowOverride All </Directory> <Directory /var/www/foobar> Options -Indexes FollowSymLinks AllowOverride All Order allow,deny allow from all </Directory> ScriptAlias /cgi-bin/ /usr/lib/cgi-bin/ <Directory "/usr/lib/cgi-bin"> AllowOverride None Options +ExecCGI -MultiViews +SymLinksIfOwnerMatch Order allow,deny Allow from all </Directory> <Directory /var/www/foobar/dir> AllowOverride AuthConfig AuthName "Authorize yourself, please!" AuthType Basic AuthUserFile /etc/apache2/.htpasswd AuthGroupFile /dev/null Allow from All Order Allow,Deny Require valid-user

    Read the article

  • Could not write bytes: broken pipe - looking for log of removed packages

    - by user288987
    I have a dual boot system with 12.04 and windows 7. Ubuntu worked fine yesterday but this morning upon boot I get subject. Searched the forums and unsuccessful with recovery. I tried sudo gedit /var/log/apt/history.log to see the log of removed packages, but get the following... ** (gedit:976): WARNING **: Command line 'dbus-launch --autolaunch=2d7d18532e9953bc8a2b852e00000007 --binary-syntax --close-stderr' exited with non-zero exit status 1: Autolaunch error: X11 initialization failed.\n Cannot open display: Run 'gedit --help' to see a full list of available command line options. Anyone have any suggestions for a fix? Please let me know if you require any additional information. Thanks! Mark

    Read the article

  • XNA: Retrieve texture file name during runtime

    - by townsean
    I'm trying to retrieve the names of the texture files (or their locations) on a mesh. I realize that the texture file name information is not preserved when the model is loaded. I've been doing tons of searching and some experimenting but I've been met with no luck. I've gathered that I need to extended the content pipeline and store the file location in somewhere like ModelMeshPart.Tag. My problem is, even when I'm trying to make my own custom processor, I still can't figure out where the texture file name is. :( Any thoughts? Thanks! UPDATE: Okay, so I found something kind of promising. NodeContent.Identity.SourceFilename, only that returns the location of my .X model. When I go down the node tree he is always null. Then there's the ContentItem.Name property. It seems to have names of my mesh, but not my actual texture file names. :(

    Read the article

< Previous Page | 532 533 534 535 536 537 538 539 540 541 542 543  | Next Page >