Search Results

Search found 5998 results on 240 pages for 'rise against'.

Page 70/240 | < Previous Page | 66 67 68 69 70 71 72 73 74 75 76 77  | Next Page >

  • Megaman and Protoman versus Decepticon Transformers [Video]

    - by Asian Angel
    What happens when Megaman infiltrates a Decepticon stronghold? Trouble with a capital S when Starscream shows up! Watch as Protoman arrives to help even up the odds in the battle against the Decepticons. Rockman and Transformers Stop motion : Go! Rockman! [via Geeks are Sexy] HTG Explains: What Are Character Encodings and How Do They Differ?How To Make Disposable Sleeves for Your In-Ear MonitorsMacs Don’t Make You Creative! So Why Do Artists Really Love Apple?

    Read the article

  • C2C - Customer 2 Cloud Program

    - by Hartmut Wiese
    What´s in it for partners? A special Webinar for EMEA partners The Blog Entry is referring to this EMEA CRM Community blog entry here. The new Oracle Customer 2 Cloud (C2C) Program offers sizeable CX Cloud business opportunities for our partners into their existing Siebel, Peoplesoft or Oracle eBusiness Suite customers installed base, leveraging financial incentives that allow customers switching part of their On Premises solutions' maintenance fees against Cloud subscriptions from the market leading provider of CX Cloud business solutions. Look at this introduction video to have a first feeling about the C2C program and then join us on Tuesday June 10th at 9am CET (8am UK) to find out how you and your customers can benefit from this program to secure existing Siebel, Peoplesoft or Oracle eBusiness Suite accounts while generating new business opportunities. Register here! added by Hartmut Wiese: JD Edwards is not explicitly mentioned for this program but I also did not found a remark that it is not included.

    Read the article

  • In a team practicing Domain Driven Design, should the whole team participate in Stakeholder meetings?

    - by thirdy
    In my experience, a Software Development Team that comprises: 1 Project Manager 1 Tech Lead 1 - 2 Senior Dev 2 - 3 Junior Dev (Fresh grad) Only the Tech Lead & PM (and/or Senor Dev/s) will participate in a meeting with Clients, Domain Experts, Client's technical resource. I can think of the ff potential pitfalls: Important info gets lost Human error (TL/PM might forgot to disseminate info due to pressure or plain human error) Non-verbal info (maybe a presentation using a diagram presented by Domain Expert) Maintaining Ubiquitous language is harder to build since not all team members get to hear the non-dev persons Potential of creative minds are not fully realized (Personally, I am more motivated to think/explore when I am involved with these important meetings) Advantages of this approach: Only one point of contact Less time spent on meetings? Honestly, I am biased & against this approach. I would like to hear your opinions. Is this how you do it in your team? Thanks in advance!

    Read the article

  • Encryption Password help!

    - by Carlos L.
    Ok so let me summarize this up. I encrypted my Home to protect against hackers of course when I first installed Ubuntu. It loaded up the Terminal and was attempting to show me my encryption password incase it ever needed to be used. So I thought "Ehh what the heck, I can find it out later..." So I closed Terminal and went on with the (amazing!) Ubuntu life. But now I am having to install Java JDK 7.0.0.4 onto my computer to ya know, play games and such. But it is asking for my password for the encrypted Home folder but it never gave it to me... HELP!!! Does anyone remember the command for Terminal to give you you're randomly generated Encryption password pop up on the famous purple window? Please give legitimate answer and fast please!

    Read the article

  • Distributed cache and improvement

    - by philipl
    Have this question from interview: Web Service function given x static HashMap map (singleton created) if (!map.containsKey(x)) { perform some function to retrieve result y map.put(x, y); } return y; The interviewer asked general question such as what is wrong with this distributed cache implementation. Then asked how to improve on it, due to distributed servers will have different cached key pairs in the map. There are simple mistakes to be pointed out about synchronization and key object, but what really startled me was that this guy thinks that moving to database implementation solves the problem that different servers will have different map content, i.e., the situation when value x is not on server A but on server B, therefore redundant data has to be retrieved in server A. Does his thinking make any sense? (As I understand this is the basic cons for distributed cache against database model, seems he does not understand it at all) What is the typical solution for the cache growth issue (weak reference?) and sync issue (do not know which server has the key already cached - use load balancing)? Thanks

    Read the article

  • Small maximum number of connections on a Linux router

    - by Eugene
    I have a Linux box acting as a router with no iptables or other firewall and no networking applications running on it, just pure router. I've put it in a test environment that generates many TCP connections, each having unique source and destination IP, and those connections go through this router. I'm observing that number of connections successfully created rise to approximately 500 and then no more connections can be created for several minutes, then another 100 connections can be created and there is another pause, and so on. If 10 connections for each source-destination pair are created, then maximum numbers go about 10 times up, so the problem is probably with many connections from different IPs. As traffic is simply routed, it doesn't have to do with number of file descriptors, iptables connection tracking and other things often proposed to check in similar cases. The box has plenty of free RAM and CPU, both NICs are gigabit. The kernel is 2.6.32. I've already tried increasing net.core.*mem_max, net.core.netdev_max_backlog and txqueuelen on both NICs, with completely no effect. What else should I check ? Is there some rate-limit in the kernel itself ?

    Read the article

  • GPG and libpcap help

    - by Johnq
    I was trying to install the newest version of libpcap (as the version in the repositories doesn't seem current) and ran into the following problem. I copied the tcpdump-workers.asc text from the tcpdump website (which hosts libpcap as well) and imported the key to my keyring using gpg --import tcpdump-workers.asc. That when all well and fine but when I tried to verify the libpcap-1.4.0.tar.gz file against the key with gpg --verify, I ended up getting the message that unexpected data. was found. I am wondering if anyone else has run into this problem as the ancient technique of googling my problem has done little to answer my question.

    Read the article

  • Sign E-Business Suite JAR Files Now

    - by Steven Chan (Oracle Development)
    Oracle E-Business Suite uses Java, notably for running Forms-based content via the Java Runtime Environment (JRE) browser plug-in.  The default security settings for the JRE plug-in are expected to become more stringent over time.  To prepare for upcoming changes to Java security, all EBS 11i, 12.0, 12.1, and 12.2 system administrators must follow the procedures documented here: Enhanced Signing of Oracle E-Business Suite JAR Files (Note 1591073.1 ) More information about Java security is available here: Security of the Java Platform Getting help If you have questions about Java Security, please log a Service Request with Java Support. If you need assistance with the steps for signing EBS JAR files, please log a Service Request against the "Oracle Applications Technology Stack (TXK)" > "Java."

    Read the article

  • Why not write all tests at once when doing TDD?

    - by RichK
    The Red - Green - Refactor cycle for TDD is well established and accepted. We write one failing unit test and make it pass as simply as possible. What are the benefits to this approach over writing many failing unit tests for a class and make them all pass in one go. The test suite still protects you against writing incorrect code or making mistakes in the refactoring stage, so what's the harm? Sometimes it's easier to write all the tests first as a form of 'brain dump' to quickly write down all the expected behavior in one go.

    Read the article

  • New VHD for testing IE6 and IE7

    - by TATWORTH
    Regrettably old versions of IE (6 and 7)  are still in use and it is necessary to test against them. Microsoft recommended using a Virtual Machine to run these old versions. To this end, Microsoft provide free VHD images at http://www.microsoft.com/downloads/en/details.aspx?FamilyID=21eabb90-958f-4b64-b5f1-73d0a413c8ef&displaylang=en These downloads need to be unpacked and run by Virtual PC which isa free download from http://www.microsoft.com/windows/products/winfamily/virtualpc/default.mspx. If your host PC is Windows 7, use XPMORE from http://xpmore.codeplex.com/ to run the images.

    Read the article

  • Alternative Web model

    - by Above The Gods
    One of the problems web apps have against native apps, especially on the mobile front, is the constant need to re-download each web page on request. Ultimately, this leads to slower performance. Why if web apps only download new pages if they're actually needed, not because they're simply requested. For example: perhaps the server can store a web page version in a cookie. Every slight change to the page on the server-side changes the version number. Now instead of the browser requesting a new page each time, why not just check the version number and have the server send the page if they're different? If the page similar, the user can just use a cached page. I'm sure browsers doesn't necessarily have to change to accommodate changes to this, correct?

    Read the article

  • iOS NSError with global handler

    - by Sebastian Dressler
    I am in the beginning of programming an iOS app. Having read the Apple guides on how to deal with errors, I got the following most important points: Exceptions are for programmers Use NSError for the user Now, NSError is usually passed as out-argument which can then be used inside and has to be checked by the caller. However, I'm asking myself whether it is a good idea to use a global error handler, say a singleton which wraps around NSError and could be used to trigger errors and error handling from within the called function. Is there anything against that method or would it be a bad practice?

    Read the article

  • Limit website usage in court

    - by steveo225
    I run a few websites for a non-profit organization. Recently, our neighbor has been taking us to court and attempting to sue over everything he can. He made a comment to a supporter of ours that he wants the land and knows we won't sell, so he is trying to use his money to break us, and get the land for cheap. One of his latest tactics was to use excerpts from our website to take us to court about potential zoning violations for ideas we spit-balled on a forum with our supporters. I am trying to find a legal disclaimer that prevents somebody from using any information from our sites against us in court. Can this be done? If so, is there a default disclaimer on the web that would fit our needs? Thanks!

    Read the article

  • Getting started with SOAP [closed]

    - by EmmyS
    A site I developed has a new requirement to get weather data from the National Weather Service. They have quite a bit of info on how to use SOAP to get their data and display it in the browser, but what we need to do is use a cron job to get the data at specific intervals, then parse the data out into a database. I have no problem writing PHP code that will run an XSLt and parse xml records out into SQL queries, but I have no idea how to handle this with SOAP (which I've never worked with.) Do I get the data via a SOAP request, save it to an XML file on my web server, then run the XSLt against that? Or is there some other way to go about this?

    Read the article

  • How to find 2D grid cells swept by a moving circle?

    - by Nevermind
    I'm making a game based on a 2D grid, with some cells passable and some not. Dynamic objects can move continuously, independent of the grid, but need to collide with impassable cells. I wrote an algorithm to trace a ray against the grid, that gives me all cells that ray intersects. However, actual object are not point-sized; I'm currently representing them as circles. But I can't figure out an effective algorithm to trace a moving circle. Here's a picture of what I need: The numbers show in what order the circle collides with grid cells. Does anybody know the algorithm to find these collisions? Preferably in C#. Update The circle can be bigger than a single grid cell.

    Read the article

  • Archiving your contact form data.

    I get TONS of email from customer. Over time, this email helps me to determine what areas in our product collection are opportunities for enhancement or improvement. I store the email that comes from my blog contact form in folders and then search through them looking for trends periodically. It occurred to me that, while I need to get the emails because many of them are actionable, it would be great if I could use reporting and analysis tools against the collection. So I whipped together...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Games with user-supplied artifical intelligence (AI) engines?

    - by RoboShop
    I remember Microsoft used to have this AI game for the .NET framework which allowed you to program a species and this species could be introduced to an "ecosystem" full of species that other people had programmed and they could interact with each other, etc. I can't remember what it was called, but I remembered thinking it was a pretty good idea. Are there any other similiar sites like that, which allows you to design some sort of AI engine and pit it against other programmer's creations? It could be an ecosystem type thing, or it could be a card or board game.

    Read the article

  • How can I change the icon in Thunderbird's "New Mail" popup?

    - by Jakob
    When I recieve new mails in Thunderbird a popup-message tells me about that. Does anyone know where this icon is stored and how it is named? I want to change it that it fits the Faenza-theme. I use Thunderbird 10.0.2 with following addons (all preinstalled): EDS Contact Integration 0.3.9 Global Menu Bar integration 2.0.2 Messaging Menu and Unity Launcher integration 0.8.3 Update: The Addons don't have any influence on the icon - I checked this by disabling them. I downloaded the source code and scanned it for the icon. I found it as comm-release/mail/themes/gnomestripe/mail/icons/new-mail-alert.png: Since I couldn't find this file (I searched for the name) on my PC I guess it is somehow built into Thunderbird and protected against changes. Or should there be an easy solution (not to built your own deb-file)? (In the same manner I'd like to change downloadIcon.png in Firefox: )

    Read the article

  • Are there Any Concerns with Importing Document Files From a Competing Product?

    - by Thunderforge
    I have a new product that serves the same purpose as my competitor's long-standing product. One thing I have considered doing is allowing my program to import document files created by their product in order to provide an easy way for users to migrate towards mine. Naturally, this would be done without the competitor's permission, as it goes against their interests. I've seen this done before with office suite software (e.g. Open Office and Apple Pages can import MS Word documents), but I'm wondering if there are any concerns, legal or ethical, with me doing this. I fully expect any answers will most likely fall under the "I am not a lawyer" clause, but it would be helpful to have a starting point for anything I would need to be aware of, or if I shouldn't need to worry.

    Read the article

  • How do I upgrade from 9.04 to 10.04.2?

    - by Yadnesh
    I'm currently runing Ubuntu 9.04 Jaunty. I want to upgrade to 10.04.02, but whenever I use the Update manager to do this, it fails with the error "An upgrade from 'jaunty' to 'lucid' is not supported with this tool". I also tried to run sudo do-release-upgrade -d, but it fails with the same error message: Checking for a new ubuntu release Done Upgrade tool signature Done Upgrade tool Done downloading extracting 'lucid.tar.gz' authenticate 'lucid.tar.gz' against 'lucid.tar.gz.gpg' tar: Removing leading `/' from member names Reading cache Checking package manager Can not upgrade An upgrade from 'jaunty' to 'lucid' is not supported with this tool.

    Read the article

  • Impact of migrating home page from http to https on search results

    - by 2Stroke SEO
    Guys - I've just had to change one of my site's home page to https from http. I had plenty links coming into the http page and was performing well in Google against many of my targeted search phrases. I did a 301 redirect from the http page to transfer the link juice to the https page (and to prevent duplicate content issues), but my search rankings have tanked which indicates no link juice has been transferred. My PR has vanished - which I'd expect - but I'm really surprised that the SERP rankings fell off the face of the earth. Anyone have any ideas how I can recover this. I've waited a couple of months since the changes took effect just in case Google was taking time to check it out.

    Read the article

  • Silverlight Release History : Q1 2010 SP1 (version 2010.1.0422)

    Q1 2010 SP1 Common for all Controls: Q1 2010 SP1 RadControls_for_Silverlight_4_2010_1_0422 are built against the official Silverlight 4 version 4.0.50401.0 New Controls: RadRichTextBox RadRichTextBox offers broad editing and formatting capabilities which come with unmatched performance. This example demonstrates how RadRichTextBox can provide MS Word-like editing experience. Support for import/export .txt and .xaml formats is also available in the CTP. Changes: RadGrid Important Changes:...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Moving from an IT department to a proper technology company

    - by user2434
    I have been working with Java/web applications in an IT department of a retail company. As much as work goes, there is nothing much to say. Fixing couple of if/else loops, writing some simple business logic etc., is all what I have been doing. Having said that, I feel I have a good technical knowledge, and I am willing to move to companies like Microsoft/Google/Amazon etc., [I want to work in these places, because I feel I am a technical guy, and I am working in a place where most people freak out when the words like 'algorithm' are heard] I can of course prepare algorithms/computer science fundamentals etc.,(I hold a 4 year degree in computer science program) but beyond that, will my experience hold against me ? I doubt I'll even get a call from them seeing my work experience. What kind of questions(apart from the algorithm types) can I expect ?

    Read the article

  • Windows 7 Safety Tips

    The introduction of Microsoft's Windows 7 operating system meant many new features for its users in the way of both functionality and security. With Windows 8 on the horizon, Microsoft customers can expect even more improvements, including integrated security features to help provide a solid barrier against malware and other malicious creations that have made their way into the tech landscape. The Windows 8 release is still not here, however, so many running Windows 7 will have to wait for such enhancements. That is no excuse for security lapses though, as there are many steps you can take...

    Read the article

  • Writing the tests for FluentPath

    Writing the tests for FluentPath is a challenge. The library is a wrapper around a legacy API (System.IO) that wasnt designed to be easily testable. If it were more testable, the sensible testing methodology would be to tell System.IO to act against a mock file system, which would enable me to verify that my code is doing the expected file system operations without having to manipulate the actual, physical file system: what we are testing here is FluentPath, not System.IO. Unfortunately, that...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

< Previous Page | 66 67 68 69 70 71 72 73 74 75 76 77  | Next Page >