Search Results

Search found 31882 results on 1276 pages for 'mailing list'.

Page 636/1276 | < Previous Page | 632 633 634 635 636 637 638 639 640 641 642 643  | Next Page >

  • Subversion BI experience - not a very good one, but working now

    - by Kevin Shyr
    Suffice to say there is now a document in place and I'm the drill sergeant, harassing people to do proper check in, and throw out those who don't.Some people suggest that in a SSIS project, it doesn't really matter if developers don't have the latest version of the project since package check in put the package in the repository, which we can pull out later.  I beg to differ because:When people don't see the package, they might start creating one because their user story require the use of the table.  So they will proceed to create a package and override whatever might already be in the repository.I didn't really see anywhere in the repository to say that which packages were for "deletion".  So I ended up restoring them all, and send the list out to developers.  Then we get into the area where we are relying on people's memory.I'd love to hear other people's experience using Subversion to manage a BI project.

    Read the article

  • Using normals in DirectX 10

    - by Dave
    I've got a working OBJ loader that loads vertices, indices, texture coordinates, and normals. As of right now it doesn't process texture coordinates or normals but it stores them in arrays and creates a valid mesh with the vertices and indices. Now I am trying to figure out how can I make the shader use the correct normal in the array for the current vertex if I can't setnormals() to my mesh. If I were to just use an index in my array of normals corresponding to the index in the vertices, how would I retrieve the current index the shader is processing? BTW: I am trying to write a blinn-phong shader technique. Also when I create the input layout and I've added the semantic NORMAL to it, how would I list the multiple semantics in that single parameter? Would I just separate it with a space? PS: If you need to see any code, just let me know.

    Read the article

  • What is the traditional way to maintain extensibility in a database-driven application like this?

    - by Jsess
    I'm working on a simple application for a game in Java that allows a user to record whether they have collected a given item and how much experience it contains. This will work for multiple item types (weapons, armor) and each will have its own tab with a list of all items that qualify under it. Making changes as new types are added is not such a big deal (if a clothing slot is added, for instance), but new items are added to the game all the time in biweekly patches, and I'm not sure what the traditional/customary way to make sure the application is user-extensible without requiring me to would be. Whether that would be adding a configuration menu that allows users to add news items (new rows to the local SQLite database) or a text file with something similar, but I'm certain there's a well-accepted way to do this that I'm not aware of. I'm new to databases and ignorant of the solution, so what's the professional/futureproof way to do this?

    Read the article

  • How well does an INCA IM-201W Wireless work?

    - by Eray
    I'm using Ubuntu 11.04 . I'll buy a wireless modem, Inca IM-201W . But i'm looking supported OS of modem : Windows XP , Vista, 7 . There isn't Ubuntu in list.SO what's the meaning of this ? Shouldn't I buy this modem ? I will use wireless connection. (PS. Sometimes, while i'm trying to connect a Wireless network on any cafe, i'm having problem. My laptop isn't connecting to wireless networks sometimes . )

    Read the article

  • E: Unmet dependencies. Try 'apt-get -f install' with no packages (or specify a solution)

    - by B Jo
    I would like to upgrade to Ubuntu 13.04 since almost a month now. Am a pretty novice in linux and in software in general. My /boot is full : bijo@bijo-AMILO-Xi-2428:~$ df -h Filesystem Size Used Avail Use% Mounted on /dev/mapper/ubuntu-root 228G 7.7G 208G 4% / udev 1001M 4.0K 1001M 1% /dev tmpfs 404M 836K 403M 1% /run none 5.0M 0 5.0M 0% /run/lock none 1008M 156K 1008M 1% /run/shm none 100M 48K 100M 1% /run/user /dev/sda1 228M 222M 0 100% /boot I tried the : sudo apt-get purge $( dpkg --list | grep -P -o "linux-image-\d\S+" | grep -v $(uname -r | grep -P -o ".+\d") ) but i got this as reply E: Unmet dependencies. Try 'apt-get -f install' with no packages (or specify a solution). infact I'm going round and round ... Can someone guide me through please? Thanks in advance for ur time

    Read the article

  • how to get started with a game engine [closed]

    - by user19343
    I'm a 3rd year Computer Science student and I would like to get started with building a game engine or at least tinkering with making one. I am curious if there are any good resources to use to get started. I get the idea behind different pieces in the engine, but I'm not really sure about how they fit together. Is there anything out there to help teach me the skeleton of a game engine? So far I've been playing with the idea of a game engine that uses modules built in a circular linked list so that each can do it's computing and then pass move to the next piece of the engine to work.

    Read the article

  • mobile broadband quick connect..how to?

    - by Ubuntuser
    Hello all, I have a Reliance broadband + mobile broadband connection. It connects fine, but the only problem is it takes more than 2 -3 mins to get the connection started. If I plug in the USB datacard, the network manager applet dothes not show up the mobile broadband connection immediately. It takes a good 2-3 mins to detect the connection before I can select Reliance connection from the dropdown list. Is there any way of getting a shortcut of that connection on the desktop or on the panel? Thanks, Sayantan

    Read the article

  • How to specify 'root' in path in text file

    - by DeanGrobler
    I'm following this tutorial located here on how to create a launcher for eclipse in unity. Everything is going pretty well so far, I've managed to successfully create the launcher but when I click on it, my system complains that the path to the exec is wrong. My exec for eclipse is located here: ~/opt/eclipse/eclipse And if you look at the tutorial you have to create a file and set it's contents like so: [Desktop Entry] Type=Application Name=Eclipse Comment=Eclipse Integrated Development Environment Icon=eclipse Exec=./opt/eclipse/eclipse Terminal=true Categories=Development;IDE;Java; In my case I have to provide the full location for the exec and there are a number of things that I tried that didn't work I set 'exec' to 'Exec=~/opt/eclipse/eclipse' , 'Exec=/opt/eclipse/eclipse' and 'Exec=root/opt/eclipse/eclipse' and none of these worked.. What should I set it to in order to fix the path so that my luancher works? Update------------------ I tried to list those 2 directories and what i get is this:

    Read the article

  • How to setup an intranet in ubuntu using wifi?

    - by ved2254
    I want to set up a VPN on my laptop but I don't know what and how to set it. My requirements are : Intranet with a customizable list of shared folders. Intranet outsourced via computer wifi. Possibly assigning individual private IP addresses to all connected. Facility to share internet (if hassel free). Can I do this using Gnome Network Manager or do I need another program? I'll be happy even if I get one folder to share for the time being and no internet if I could only outsource one file/folder.

    Read the article

  • Help me start my Atheros AR9285 working on Ubuntu 12.10

    - by user100449
    Could you, pls, help me with my wireless card Atheros AR9285 on Ubuntu 10.12.. I've already went through all possible advices and still cannot start my wireless card. I have a laptop Toshiba Portege Z830 where Wifi've already worked under Windows 7. But after migration on Ubuntu 10.12. I'm not able get it work. My actual situation is on image bellow This is what I see on command lshw *-network UNCLAIMED description: Network controller product: AR9285 Wireless Network Adapter (PCI-Express) vendor: Atheros Communications Inc. physical id: 0 bus info: pci@0000:02:00.0 version: 01 width: 64 bits clock: 33MHz capabilities: pm msi pciexpress bus_master cap_list configuration: latency=0 resources: memory:c0500000-c050ffff This is what I see on command rfkill list 0: Toshiba Bluetooth: Bluetooth Soft blocked: yes Hard blocked: no 1: hci0: Bluetooth Soft blocked: yes Hard blocked: no Any idea? Thank you Michal

    Read the article

  • Requirement, architecture data capture tool

    - by Deno
    Are there any tools available for the following use case: I am planning to write a complex application and now I just know about the basic functional requirments. I am refining the functionality with more and more details. I am also writing down how to implement this in software architecture perspective. I am in a situation where there are multiple ways implement a certain functionality and based on the selected approach, other parts of the program will also change. At this moment, I don't want to decide on the approach to use, I just want to list down all the options, present to a wider audience and get it finalized. Are there any standard software tools to do this? I know I can use MS excel or some mind mapper tools, but just thinking of some standard tools (not just for programmers, but for managers and other) availability Thanks, Den

    Read the article

  • What grammatical tense should I write my specifications in?

    - by John
    We are currently writing functional and technical specifications in a two column format; summary sentence and technical detail. The details often refer to an appendix with diagrams, layout designs ect. However I am struggling with what tense to write it in: With past tense as if the work is done I struggle to show highlight extensions of exiting work. Future tense as in it needs to do X starts to sound like a to do list or Tense neutral very hard as it has either going to be done or is done. To add further confusion this specification may be read by people who do not have English as a first language.

    Read the article

  • Accidental deletion of the Gmail (IMAP) Trash 'System Label' in Evolution

    - by user20635
    I am using 11.04 and Evolution 2.32.2 I accidentally deleted the Gmail (IMAP) Trash 'System Label' in Evolution. Because this is Gmail object and (not a label per say), it is not deletable in Gmail. Under my Gmail account settings, I have made sure that both, 'Show in Label List' and 'Show in IMAP' are checked. That being said, I cannot seem to restore this IMAP folder in Evolution. I deleted the affected mail account, re-created, restarted Evolution, and no change. Any thoughts? Thanks.

    Read the article

  • How to Create a Folder from Selected Files in Windows

    - by Lori Kaufman
    We’ve previously written about a tool that allows you to create a bunch of folders at one time from a list of words or phrases. However, what if you want to create one or more folders from a bunch of selected text files? There’s a simple, free tool, called Files 2 Folder, that allows you to do that. Installing Files 2 Folder adds an option to the context menu for Windows Explorer. Simply extract the .zip file you downloaded (see the link at the end of this article). Right-click on the Files2Folder.exe file and select Run as administrator. If the User Account Control dialog box displays, click Yes to continue. 8 Deadly Commands You Should Never Run on Linux 14 Special Google Searches That Show Instant Answers How To Create a Customized Windows 7 Installation Disc With Integrated Updates

    Read the article

  • Attention All Procurement Buyers!

    - by LuciaC
    Have you discovered the power of the Buyer Work Center?   Released in Procurement 12.0 the Professional Buyer Work Center (BWC) is a web based interface that provides a central 'launch pad' from which you can efficiently perform your daily tasks, including:  You can manage your requisitions and create them to Purchase Orders (like manual autocreate) Create new standard purchase orders, blanket purchase agreements, or contract purchase agreements Create and maintain supplier information If Oracle Sourcing is licensed and implemented, you can create buyer's auctions or sourcing RFQs If Oracle Services Procurement is licensed and implemented you can create and maintain purchase orders for complex work payments If Oracle Procurement Contracts is licensed and implemented you can handle author contract terms and manage deliverables Globally for the BWC: Create and personalize your own document views including list of columns, where conditions and sort sequences. You can additionally use predefined document views. Accessed from the Purchasing responsibility as we see in the screenshot here, the Buyer Work Center has links to launch to the areas you want to access. See these documents for more information on the BWC: Doc ID 1301969.1: FAQ - Buyer Work CenterDoc ID 1394392.1: Assistant: Oracle Purchasing Purchasing Buyer Work Center Search Helper.

    Read the article

  • How to reverse file ownership and permission settings

    - by pandisvezia
    I installed LAMP and WordPress on my system a week ago. Since I couldn't create Child Themes in WordPress and work with PHP folders for my other projects collocated in var/www without using Nautilus I wanted to solve the permissions issue. I hoped to bring a solution carrying out the commands on this page for my WordPress folder: http://wiki.apache.org/httpd/FileSystemPermissions. This allowed me to play with any file in the folder like creating and modifying .css files through WP Admin, etc. But after a restart I discovered that I can't change DNS settings of my network connections in the list anymore because it is asking me the root password and even though I enter the password it doesn't let me do the action giving "insufficient privileges" error. Can you help me correct the mistake I possibily made during the configuration and, maybe, configure again the permission and ownership settings for var/www/somefolder as it is adviced to be configured under general circumstances? Thanks in advance!

    Read the article

  • Steps after SQL Injection detected

    - by Zukas
    I've come across SQL injection vulnerabilities on my companies ecommerce page. It was fairly poorly put together. I believe I have prevented future attempts however we are getting calls about fraudulent credit card charges on our site and others. This leads me to believe that someone was able to get a list of our credit card numbers. What doesn't make sense is that we don't store that information and we use Authorize.net for the transaction. If someone was able to get the CC#s, what should I do next? Inform ALL of our customers that someone broken into our system and stole their information? I have a feeling that will be bad for business.

    Read the article

  • Google Analytics - Traffic Source - Search engine - (Not Provided)

    - by Dharmavir
    I am using Google Analytics, now here when I go to "Traffic Source Overview" under that it shows Keyword as "(Not provided)" which is almost 40% of my traffic source. Now more than 90% of search engine traffic is from Google and still out of that for more than 40% of keywords are "(Not provided)". Can anyone explain me what is going wrong here or how can I get that data? Because that comes as 1st option and is biggest keyword in the list. Will that be some crawler or secure google search?

    Read the article

  • How to disable integrated webcam and still be able to use an external one

    - by alikasundara
    I am looking for a way to disable the webcam that is integrated into my laptop. The webcam is using uvcvideo module but I do not want to blacklist it since it is also being used by an external webcam I have. Is there any way of disabling the device itself without touching the modules list? This is how the webcams are listed by lsusb. The first one is an integrated one (It is identified by some apps as BisonCam NB Pro), the second one is the external Logitech C525: Bus 002 Device 004: ID 5986:0361 Acer, Inc Bus 003 Device 002: ID 046d:0826 Logitech, Inc. I have already checked BIOS - there is no way of disabling the webcam from there. Besides I would love to learn how to disable the device by ID anyway. Thanks!

    Read the article

  • Security Alert for CVE-2011-5035 Updated

    - by Eric P. Maurice
    Hi, this is Eric Maurice again.  Oracle has just updated the Security Alert for CVE-2011-5035 to announce the availability of additional fixes for products that were affected by this vulnerability through their use of the WebLogic Server and Oracle Container for J2EE components.  As explained in a previous blog entry, a number of programming language implementations and web servers were found vulnerable to hash table collision attacks.  This vulnerability is typically remotely exploitable without authentication, i.e., it may be exploited over a network without the need for a username and password.  If successfully exploited, malicious attackers can use this vulnerability to create denial of service conditions against the targeted system. A complete list of affected products and their versions, as well as instructions on how to obtain the fixes, are listed on the Security Alert Advisory.  Oracle highly recommends that customers apply these fixes as soon as possible.

    Read the article

  • Is it safe to configure "Shutdown" on "When laptop lid is closed" ?

    - by Takkat
    To setup a laptop owned by a complete PC novice any settings that may become hard to tackle remotely need to be avoided. The laptop will be administrated via SSH. One thing in my list are problems arising from improper wake-ups from suspend or hibernate as they may also affect network accessibility. This is why I thought setting up power management to "shutdown" on closing the laptop lid could be a good idea. However I am not sure if this is a safe way to do. What problems in addition to software not closing properly (and thus not saving their data) could I be faced if I proceeded as planned?

    Read the article

  • Callbacks: when to return value, and when to modify parameter?

    - by MarkN
    When writing a callback, when is best to have the callback return a value, and when is it best to have the callback modify a parameter? Is there a difference? For example, if we wanted to grab a list of dependencies, when would you do this: function GetDependencies(){ return [{"Dep1" : 1.1}, {"Dept2": 1.2}, {"Dep3" : 1.3}]; } And when would you do this? function RegisterDependencies(register){ register.add("Dep1", 1.1); register.add("Dep2", 1.2); register.add("Dep3", 1.3); }

    Read the article

  • Deleting a game object causing an access violation

    - by Balls
    I tried doing this but it cause an access violation. void GameObjectFactory::Update() { for( std::list<GameObject*>::iterator it=gameObjectList.begin() ..... (*it)->Update(); } void Bomb::Update() { if( time == 2.0f ) { gameObjectFactory->Remove( this ); } } void GameObjectFactory::Remove( ... ) { gameObjectList.remove( ... ); } My thoughts would be to mark the object to be dead then let the factory handle it the on next frame for deletion. Is it the best and fastest way? What do you think?

    Read the article

  • Internet Connection Problems

    - by Confused One
    I just installed Ubuntu 11.04 onto a laptop. There is no list of automatic connections when I click on the internet connection symbol. Enable Wireless was unchecked, so I checked it. However, it continues saying "wireless is disabled." Soft is blocked, and when I tried rfkill unblock wifi it told me that the device was not ready. I tried to counter this with what I found on this thread but nothing worked. I have tried manually entering my Wireless information, but this does not help. Is there a solution?

    Read the article

  • Kansas City SQL Saturday 2012: BBQ Crawl

    - by Bill Graziano
    The next Kansas City SQL Saturday is coming up on August 4th.  We’ll have the usual SQL Saturday goodness: lots of technical sessions, great networking events and a fantastic speaker dinner.  And we’ll have the Third Annual Kansas City SQL Saturday BBQ Crawl.  On Friday afternoon we’ll visit a few BBQ places in town.  We tend to order big sampler plates and just share everything around.  It’s a great way to try a variety of styles.  This year we’ll be hitting an all new selection of BBQ joints. You don’t need to be a speaker to attend.  However the call for speakers is open until June 28th (hint, hint).  Locals and out-of-towners are all welcome. If you’re interested in attending send me an email and I’ll get you added to the list. We finish in plenty of time to get you to the speaker dinner – as if you could eat any more.

    Read the article

< Previous Page | 632 633 634 635 636 637 638 639 640 641 642 643  | Next Page >