Search Results

Search found 42453 results on 1699 pages for 'my question'.

Page 547/1699 | < Previous Page | 543 544 545 546 547 548 549 550 551 552 553 554  | Next Page >

  • jQuery Mobile Frame Forwarding [on hold]

    - by Nizam
    I have a site that does a standard forward to another site [301 Redirect]. In the redirected site, I detect if the device is a mobile using the following code: if (/Android|webOS|iPhone|iPad|iPod|BlackBerry/i.test(navigator.userAgent)) { window.location.replace("Mobile/Login/Login.aspx") } else { window.location.replace("Apps/Login/Login.aspx") } It works and jQuery mobile makes the site fits device very well. To do so, I use the following code in ASPX page: <meta name="viewport" content="width=device-width, initial-scale=1, maximum-scale=1" /> The problem is that I am wanting to frame forward - instead of standard forward - (there are a lot of advantages), but the site is not fitted for the device anymore, and even the icon I have chosen for my page is not well defined anymore. The code I use to set the icon of page is: <link rel="apple-touch-icon" href="../../Apps/Imagens/Icone.png" /> My site is hosted by Mochahost My question is: Is there anything I could do to make it works?

    Read the article

  • As good as no bounces are registered in Google Analytics [on hold]

    - by user29931
    For a client I am having an issue for which I can't find an explanation. For some reason, bounces are no longer measured (or almost none) in GA. In GA I can see that the issue started in January 2013. I have been looking at the code inside and out, but I can't find any reason why. On the production site, there is (will be removed soon) a POST done on page load, so I thought that Google might see this as user interaction, hence never counting a bounce, but on staging i removed this POST and in the GA account for staging, still no bounces are registered. I have also checked if the tracking code appears twice on the page, and this is not the case. I tried with the GA debug plugin in Firefox and Chrome to see if that would learn me anything, but no luck... The site in question is www.kiala.be.

    Read the article

  • What should be learned for someone starting in Android Games?

    - by user14544
    I know this might be a little subjective. But I've read the other questions. A lot of answers kept on popping up like to use box2d, libgdx, andEngine, etc. So the real question is, what would be the best to start off with as a beginner. I have some experience with java code, just by reading about in the Oracle Docs. I've gone through Flash and Eclipse. When i mean gone through, i don't mean i have actually created my own game from Flash or Eclipse, but i just learn things here and there. Currently I'm reading Beginning Android for Beginners but I don't have the knowledge to implement my own Ideas into the game tutorials because of lack of experience. I'm looking for a way to learn how to program to create games for Android. While at the same time get experience from programming. I do not want to learn those drag and drop game making applications such as GameMaker.

    Read the article

  • What happens to my domain if the TLD fails?

    - by KingCrab
    First question, hopefully I don't mess this up. I have recently registered some domains on the basically brand new .directory gTLD. Because of operating costs to maintain a gTLD, it is assumed that many of the hundreds being rolled out this year and next will fail. I will admit I am not very knowledgable on how the TLD process works. What exactly does a new TLD failing mean? I realize that they lose ICANN accreditation, but does that just mean that they will be no longer be sold? If the .directory were to go under, would my .directory domains be affected? I bought it from domain registrar Gandi if that helps.

    Read the article

  • Is there a legit reason as to why Outlook.com premium UI is "not available" in Linux Chrome?

    - by vgaldikas
    Well if you use outlook OWA in Chrome on Ubuntu (or any Linux distro), you will get a stripped down version of it basically. You can get around it by faking your user agent, to appear that you are using FireFox. So my question is.. Is there some legitimate reason Microsoft does that, or are they just being a****s??? I mean once you have the user agent faked, it works perfectly. PS. Just in case anyone else need to use outlook, here is the command to start it with fake useragent: /opt/google/chrome/google-chrome --user-agent="Mozilla/5.0 (Windows; U; Windows NT 5.2; en-US) AppleWebKit/534.4 (KHTML, like Gecko) Chrome/6.0.481.0 Safari/534.4"

    Read the article

  • Ubuntu 12.04 installer does not recognize Windows 7

    - by trainofk
    I recently purchased an ASUS N56VZ-ES71 laptop which came with Windows 7 Home Premium installed on it. I wish to dual boot Windows 7 and Ubuntu 12.04 on it. I shrank the hard drive partitions to leave about 150 GB unallocated for Ubuntu 12.04. When I boot the Live CD of Ubuntu and attempt to install, the installer does not recognize any other operating systems. Through reading a few questions, I have found that this is due to a GPT partitioning table that Windows uses. I ran boot-repair as per other threads' suggestions. This was my output: http://paste.ubuntu.com/1176988/ I suppose my question is: how do I proceed in order to get the installer to recognize Windows, so that I don't have to erase the current partition table and can get a safe install? Thanks in advance.

    Read the article

  • What is realism?

    - by eversor
    Beyond the obvious something that seams real, realism in games is a hard feature to hit. In some cases, things that are completely impossible in real life are seen as realistic by gamers. For instance, in some FPS you can survive being hit by a fair amount of bullets when in real life one is enough, Newton-defying car drifts, etc. So, in some cases, reductions of life-like actions or consequences implies a bigger sense of realism. The root of this pseudo-philosophical question lies in: I am going to create a engine for battles in an online (browser-based) strategic game. Browser-based means that the battle would not be seen. And i do not know how to approach this realism issue.

    Read the article

  • Transfering site from shared to vps account

    - by N e w B e e
    I got a hosting account at HOSTGATOR. it was a shared account and i had three websites present over there. now, i have upgraded my account to VPS at HOSTGATOR and i want to transfer only ONE website over the new VPS. say, mydom.net. this website includes wordpress installation and other custom pages and setup can somebody please guide me How can I transfer the web to my new account? with speed, accuracy, and such that my website remains in working condition.. what will I do about wordpress? simply copy it will work?(I dont thnk so), if not how can I move it? I need guideline. and I am asking the question with a hope that many others will also learn the things just as i am learning,, and one quick thing, answering it like creating a manual can help people a lot...that's my thinking.. thanks to all

    Read the article

  • Licensing my own dh_* scripts

    - by avnik
    I wrote little helper script, for my own buildsystem. This script uses debhelper's Dh_lib to inject pre/post install fragments. use strict; use Debian::Debhelper::Dh_Lib; foreach my $package (@{$dh{DOPACKAGES}}) { autoscript($package, "postinst", "postinst-rock2deb"); autoscript($package, "postrm", "postrm-rock2deb"); } Should it be GPL'ed, because it use GPL'ed Dh_lib, or it uncopyrightable, because no other way to do it? Other scripts in my buildsystem are MIT/X licensed, and I prefer to stay with MIT/X when possible. (question moved from stackoverflow as suggested by few SG members)

    Read the article

  • Samba: map domain group to local one

    - by user285467
    I have a problem with mapping pure domain group to one existing on UNIX system. When I map NT domain account by default samba picks local SID - one that can be acquired via the command; net getlocalsid Instead of SID that comes from domain; net getdomainsid This is the behavior that I do not understand. I can explicitly set the SID to the domain one. E.g.: net groupmap add sid=[DOMAIN SID]-[RID] ntgroup=[DOMAIN group] unixgroup=[UNIX group] type=l However the command getent group | grep 'DOMAIN group indicates this group to be domain one - GID created in accordance to RID backend in use, not the GID of 'UNIX group' as expected. Worth to mention I use the winbind. Strange thing is that I already have such mapping in place for other 'DOMAIN group2' that getent group reports with GID of local UNIX group with all members of the 'DOMAIN group2'. Now the question is how to populate such behavior for other of my groups???

    Read the article

  • Can my computer run Ubuntu? [duplicate]

    - by Harry B
    This question already has an answer here: How do I find out which version and derivative of Ubuntu is right for my hardware in terms of minimal system requirements? 2 answers Just want to check if my computer can run Ubuntu. It is an old IBM ThinkPad, so here are the basic stats I could find: IBM 28832ZU Processor Intel(R) Celeron(R) M processor 1300MHz Processor Speed 1.27 GHz Memory (RAM) 2048 MB Operating System Microsoft Windows XP Professional Operating System Version 5.1.2600 Intel Extreme Graphics 2M And here is some info pulled from the graphics panel NTEL(R) EXTREME GRAPHICS 2 FOR MOBILE REPORT Report Date: 06/28/2013 Report Time[hr:mm:ss]: 17:53:20 Driver Version: 6.14.10.3943 Operating System: Windows NT* 5.1.2600 Service Pack 2 Default Language: English DirectX* Version: 9.0 Physical Memory: 2038 MB Min. Graphics Memory: 8 MB Max. Graphics Memory: 64 MB Graphics Memory in use: 7 MB Processor: x86 family 6 Model 9 Stepping 5 Processor Speed: 1296 MHZ Device Revision: 2 Output Devices Connected to Graphics Accelerator * Active Notebook Displays:1

    Read the article

  • Does Turing-complete implies possibility of malware? [closed]

    - by Mathematician82
    Is it possible to build an operating system that contains some Turing complete compiler (language?) but is unable to run any malware? Or is there any definition for a malware? This question popped on my mind as I was wondering why Windows has more malware than Linux. If Linux contains a C programming language and its compiler, I think it is possible to write a Linux program that works similarly than Windows viruses. But there are less malware for Linux than for Windows although there is a Wine for Linux to simulate Windows programs.

    Read the article

  • Nokia exprime ses craintes quant à son deal avec Microsoft, la firme pense "prendre un risque majeur"

    Nokia exprime ses craintes quant à son deal avec Microsoft, la firme pense "prendre un risque majeur" en misant sur une plate-forme "qui n'a pas encore fait ses preuves" Mise à jour du 16.03.2011 par Katleen Nokia vient de remettre son rapport annuel à la Securities and Exchange Commission américaine. Dans ce document, long de 29 pages, la question du rapprochement entre le constructeur et Microsoft est abordée, de même que les inquiétudes qui y sont liées. Nokia reconnaît notamment "prendre un risque majeur" en misant sur une plate-forme "qui n'a pas encore fait ses preuves". On peut en effet lire dans le rapport les lignes suivantes : " L...

    Read the article

  • When it Comes to SEO Services, There Are Plenty of Link Building Service Providers to Choose From

    How many SEO services providers are out there as of this date is anyone's guess but when it comes to picking one, it's not really easy to pick one out of so many. Since any SEO company can write anything they wish or claim anything on their site, it is important to validate such claim before hiring an SEO company. Do a little research on Google about the SEO Company in question who you want to hire for your link building service. This way you will run into some reviews posted by previous clients based on which you can make a decision.

    Read the article

  • Data structure for file search

    - by poly
    I've asked this question before and I got a few answers/idea, but I'm not sure how to implement them. I'm building a telecom messaging solution. Currently, I'm using a database to save my transaction/messages for the network stack I've built, and as you know it's slower than using a data structure (hash, linkedlist, etc...). My problem is that the data can be really huge, and it won't fit in the memory. I was thinking of saving the records in a file and the a key and line number in a hash, then if I want to access some record then I can get the line number from the hash, and get it from the file. I don't know how efficient is this; I think the database is doing a way better job than this on my behalf. Please share whatever you have in mind.

    Read the article

  • Is the "impossible object" possible in computer graphics?

    - by CPP_Person
    This may be a silly question but I want to know the answer to it. I saw this thing called the "impossible object", while they're many different images of this online, it's suppost to be impossible geometry. Here is an example: Now as far as logic goes, I know you don't have to obey it in games, such as a flying cow, or an impossible object. So that's out of the way, but what stands in my way is whether or not there is a way to draw this onto a 3D scene. Like is there a way to represent it as a 3D object? Thanks!

    Read the article

  • Another website is mirroring my site

    - by Marlboro Goodluck
    Question for you all. There is a site of ill repute known as thedirty which has completely mirrored my site and now has links appearing on Google at the #1 spot using my content. I checked my log file and noticed that this site has been crawling mine from sometime, and also has 10k links from their site to mine. I have blocked user access which is referred from this site and reported them as web spam to Google already. I also disavowed the domain. How are they getting top links in Google (even overtaking mine) for such nefarious tactics? What are the steps to completely eliminating an issue such as this?

    Read the article

  • Are session aware Models a bad thing?

    - by kevtufc
    I'm thinking specifically in Rails here, but I suspect this is a wider question. In a Rails web application I'm using data from the session in models in order that the models know who is logged in. I use this in a method which filters out some data from the database depending on a very simple permissions system. The thing is: using sessions in models in Rails requires a bit of a workaround. It works, but I've a feeling that it's something that I shouldn't be doing and I'm worried there's a big gotcha I'm missing. I suppose the Right Thing To Do would be to return all the data and filter out the not-wanted bits in the controller before passing that to the view, but doing it in the model seems to avoid quite a bit of code duplication and so feels "cleaner." Can anyone tell me why or shouldn't do this? Or that it's not a problem?

    Read the article

  • where do you track team Decisions

    - by rerun
    I have been on many development teams and as the team matures decisions about direction are made. These decisions often come back up over and over. Like why don't we fill in this field why didn't we use memcache over a custom solutions. These decisions add up over time and become a significant part of style guides coding standards and unit tests. My question is I have never run into a good way of tracking these decisions or the discovery that went into making them. Does anyone have a best practice.

    Read the article

  • No panels at all after upgrading from 10.04 to 12.04

    - by user86330
    After upgrading to 12.4 from 10.4 on an AMD64 the situation is as follows: After booting I see the Xubuntu logo splash screen and when I log in I get an error that there is a system crash somewhere (it suggest to click on the notification icon, but no info appears then). FInally I can only see my initial 10.04 Desktop but I have no panels at all, so I can only click on my Desktop objects. Question: Will a clean re intall solve the problem? In such case will my multi partition configuration (Vista+XP+ubuntu partitions) be affected?

    Read the article

  • How to access parent window in dialog

    - by Bruce
    I am using Quickly and created the main window and a dialog. In the main window I am setting access to database (u1db) in the finish_initializing method (self.db=...). After an action I open a dialog where I need access to the database. I thought that I can use self.get_parent() in the dialog to get instance of the main window and access the database, but return value of the get_parent() is None. My question is, how can I access the instance of the parent window in the dialog or perhaps where should I place the instance of the database wrapper? Shortened code: class GuitestWindow(Window): def finish_initializing(self, builder): ... self.db = u1db.open( db_path, create=True ) def on_addaccountbutton_clicked(self, widget): dialog = NewAccountDialog.NewAccountDialog() result = dialog.run() dialog.hide()

    Read the article

  • How important is self-teaching in the programming field? [closed]

    - by ThePlan
    I'm 16. I started programming about a year ago when I was about to start high-school. I'm going for a career in programming, and I'm doing my best to learn as much as I can. When I first started, I learned the basics of C++ from a book and I started to learn things by myself from there on. Nowadays I'm much more experienced than I was a year ago. I knew I had to study by myself because high-school won't (likely) teach me anything valuable about programming, and I want to be prepared. The question here is: how important is it to study programming by oneself?

    Read the article

  • Charakter coding / programming

    - by Jery
    lately I tryed a few times to create charakters for some games, but at some certain point (especially when collision detection came in) everything became messy and the interaction between chars, the world and certain items had a lot of bugs. So here is my question, how do you ussualy keep track of actions that your charakter is allowed to do, or more in general do you have some links / advices how to set up a char efficiantly? I´m working on a char right now, who should at least be able to run, jump, pick items up and use different fighting animations. Most ideas I came up with until now use some kind of action.priority / action.duration system to determain whats possible and what not, or a "action-manager" which defines for every action what is possible from that action on but it all doesnt work that well together =\ thx in advance for some input

    Read the article

  • Java and Eclipse setup properly, how do I install JOGL or LWJGL?

    - by shadowprotocol
    I have my Java environment installed alongside Eclipse, and I was successfully able to create and run a new project (simple System.out.println("Yay I work!"); I have the OpenGL SuperBible, and I primarily want to code 3D things (I'll take my time using the book to learn how to draw shapes in 3D space, etc..) Can you help me get setup with OpenGL in Java? I dont really need LWJGL, although I WILL make games eventually. I just can't even figure out with all of these terrible (and old) tutorials floating around on the net how to install either JOGL or LWJGL. If you can give me a hand with that, I'd appreciate it. I'd like to feel I contributed by having this page show the answer to the question, so that other poor souls googling for this same information can benefit.

    Read the article

  • Is the php method md5() secure? Can it be used for passwords? [migrated]

    - by awiebe
    So executing a php script causes the form values to be sent to the server, and then they are processed. If you want to store a password in your db than you want it to be a cryptographic hash(so your client side is secure, can you generate an md5 using php securely( without submitting the user:password pair in the clear), or is there an alternative standard method of doing this, without having the unecrypted pasword leaving the clients machine? Sorry if this is a stupid question I'm kind of new at this. I think this can be done somehow using https, and on that note if a site's login page does not use https, does that mean that while the databse storage is secure, the transportation is not?

    Read the article

< Previous Page | 543 544 545 546 547 548 549 550 551 552 553 554  | Next Page >