Search Results

Search found 75091 results on 3004 pages for 'person who needs help'.

Page 741/3004 | < Previous Page | 737 738 739 740 741 742 743 744 745 746 747 748  | Next Page >

  • No firmware found for b43 wireless controlloer (BCM4318) on a Dell Latitude D610

    - by Stanton.Sculpture
    Trying to get my 03:03.0 Network controller: Broadcom Corporation BCM4318 [AirForce One 54g] 802.11g Wireless LAN Controller (rev 02) working. I just reformated and installed 12.04 on this old Windows XP machine, and I don't know where to get the firmware for this. This is what I got when I typed sudo lshw -c network: http://pastebin.ubuntu.com/1041161/ Also, when I go to additional drivers in the system settings, no proprietary drivers show up. Any help I can get on this would be Great, Thanks!

    Read the article

  • How to calculate continuous motion with angular velocity in 2d

    - by Rulk
    I'm really new with physics. Maybe someone would be able to help me to solve the next problem: I need to calculate position of an agent on the plane(2D) in next time step where time step is large(20+ seconds) What I know about agent's motion: Initial Position Direction(normalised vector) Velocity(linear function from time ) - object always moves along it's direction Angular Velocity(linear function from time) Optional: External force direction External force (linear function from time) Running discreet simulation with t-0 is not an option.

    Read the article

  • My Ubuntu 12.10 will not start

    - by Adam Sales
    I'll boot my computer, then it'll get going, go to a purple screen and then my monitor goes to sleep, i've restarted it several times, and tried to get it to boot, no matter what it keeps going to the black screen. I've tried reinstalling ubuntu, i've even tried both 64 bit, and 32 bit. i have not once got it to a normal boot successfully either.It just won't run in normal boot, so i'm resorted to using safe mode, please help me, idk what to do.

    Read the article

  • Article Marketing - Must Do SEO Tactic

    Starting a online business it's not a child's play. You need to show your presence to the customers and the individuals and must learn the ways to drive the traffic from various sources such as search engines and achieve higher rank in the search engines. So I have a way which can help you the have a wide presence on the Internet, called Article Marketing. So what is Article Marketing?

    Read the article

  • Can't connect to windows 7 ad-hoc network

    - by Nikolaj
    Good day! I have installed ubuntu 12.04 on my laptop and I need to have network connection on it. Have a desktop PC, where I've created ad-hoc wi-fi network(Windows 7) and can't connect to it. So, problem: I see my network in the list of networks to connect, but I cant connect to it because it's grey color and not active(can't click on it). Could somebody help me to solve that problem? Thanks in advance!

    Read the article

  • Learning SEO For Your Online Business

    One question that pops in my mind relating to SEO is, "Why SEO techniques should be considered for your Online Business?". Maybe one of the possible answers would be, "SEO helps a lot in the promotion of online business like attracting world wide audience." In this article we will take a closer look at how SEO can help in marketing different business online.

    Read the article

  • Creating encrypted database for work

    - by Baldur
    My boss posed this problem to me: Encrypted: We need an encrypted database for miscellanious passwords we use at work that are currently only in people's head. Easily accessable: Someone needs to be able to quickly access specific passwords, possibly at hectic moments. This requires any sort of public key management (keeping it on a USB key in a sealed envelope?) to be relatively easy. Access control: The system should have groups of passwords where only specific people have access to specific groups. Recoverability: We need to make sure passwords from one group aren't lost even if the only users with direct access quit or pass away—hence we need some way where (for example) any two members of senior management may override the system (see the treshold link below) and retrieve all the passwords with their key. The first thing that jumped into my mind was some form of threshold and asymmetric cryptography but I don't want to reinvent the wheel, are there any solutions for this? Any software should preferrably be free and open-source.

    Read the article

  • Is it necessary to have firewalls rules between trusted nodes communicating on their backend interfaces?

    - by Tom
    I have 6 nodes that have internet access on eth1 and private access to one another on eth0. Currently I have firewall rules for eth0, for things like memcached and NFS. Is this necessary? It's a real headache as NFS for example communicates on loads of different ports, and I recently introduced glusterfs which needs more still. Is the headache of figuring out what backend ports to unblock worth the security enhancement? I should mention that I will of course still have a firewall rule on eth0 to block servers owned by others in the same datacenter. Thanks

    Read the article

  • Why doesn’t ISNUMERIC work correctly? (SQL Spackle)

    Another in our series of articles to help you fill in the cracks in your knowledge with SQL Spackle. MVP Jeff Moden shows us how IsNumeric works and how you should use it. Keep your database and application development in syncSQL Connect is a Visual Studio add-in that brings your databases into your solution. It then makes it easy to keep your database in sync, and commit to your existing source control system. Find out more.

    Read the article

  • How to forward http traffic through a specific network adapter.

    - by user18129
    i have the following scenario. Two laptops are connected via a router through the Ethernet ports. These two computers need to be able to communicate together. One computer also needs to access the internet through a different adapter (i.e. we will taking these two laptops two various sites where by the most common type of internet access will be wireless).In isolation all of the various adapters work fine (i.e. the internal network works fine, and the wireless connects to the internet). However,we try to turn on all of the adapters at the same time,the following occurs: If we bridge the two network connections together on the "Server" -The internet connection doesn't work through the wireless If we don't bridge the connections The internet connections don't work It seems like http traffic is trying to be sent through the Ethernet adapter (which of course is not connected to an internet connection). How can we solve this?

    Read the article

  • Small 64-bit linux server distro with low memory footprint?

    - by djangofan
    I am looking for a linux server distro with a low memory footprint. I usually use Ubuntu but I need something with a smaller footprint in order to run a large Java JVM service inside of it and also run X-windows. Any ideas? The Java service needs to handle a 3GB memory heap and so I require a 64-bit OS and JRE. http://en.wikipedia.org/wiki/Comparison%5Fof%5FLinux%5Fdistributions I am thinking that ArchLinux is the only one that I can find right now. It uses 250MB out of the box (without X-win). Any better suggestions?

    Read the article

  • Why Should You Outsource Your Web Development Projects?

    Almost every online business seeks the help of web services providers to strengthen their web presence using services such as web design and Web development, Internet marketing, hosting, etc. The number of firms that offer web solutions is growing with each passing day. Many of these companies have plethora of projects to take care of, and often end up overshooting deadlines and the clients' budgets.

    Read the article

  • Disaster Recovery For Small Business

    You may not be a Boy Scout, but the best way to protect your small business is to be prepared. We look at disaster recovery options to help you stay one step ahead of trouble and to sleep better at night.

    Read the article

  • Disaster Recovery For Small Business

    You may not be a Boy Scout, but the best way to protect your small business is to be prepared. We look at disaster recovery options to help you stay one step ahead of trouble and to sleep better at night.

    Read the article

  • Perfect SEO Keywords

    Having good keywords for your search engine optimisation are a great way to help you improve the search engine rankings for your website and get more traffic coming in. There are a few ways that you can try to find the perfect keywords for your site...

    Read the article

  • Apple Remote Desktop and Screen Sharing

    - by jfm429
    We have a Mac OS 10.8.2 server that we want to be able to administer with Apple Remote Desktop. At the same time, we want normal users to be able to access their account screens (through background login) without being able to view the current screen. However, in order to enable this (by enabling the "normal" Screen Sharing option in System Preferences) Remote Desktop needs to be disabled. The question is - how can we run both Remote Desktop for administrators and VNC screen sharing for normal users while restricting normal users to logging in on a background window instead of viewing the front screen?

    Read the article

  • Integrating Amazon EC2 in Java via NetBeans IDE

    - by Geertjan
    Next, having looked at Amazon Associates services and Amazon S3, let's take a look at Amazon EC2, the elastic compute cloud which provides remote computing services. I started by launching an instance of Ubuntu Server 14.04 on Amazon EC2, which looks a bit like this in the on-line AWS Management Console, though I whitened out most of the details: Now that I have at least one running instance available on Amazon EC2, it makes sense to use the services that are integrated into NetBeans IDE:  I created a new application with one class, named "AmazonEC2Demo". Then I dragged the "describeInstances" service that you see above, with the mouse, into the class. Then the IDE automatically created all the other files you see below, i.e., 4 Java classes and one properties file: In the properties file, register the access ID and secret keys. These are read by the other generated Java classes. Signing and authentication are done automatically by the code that is generated, i.e., there's nothing generic you need to do and you can immediately begin working on your domain-specific code. Finally, you're now able to rewrite the code in "AmazonEC2Demo" to connect to Amazon EC2 and obtain information about your running instance: public class AmazonEC2Demo { public static void main(String[] args) { String instanceId1 = "i-something"; RestResponse result; try { result = AmazonEC2Service.describeInstances(instanceId1); System.out.println(result.getDataAsString()); } catch (IOException ex) { Logger.getLogger(AmazonEC2Demo.class.getName()).log(Level.SEVERE, null, ex); } } } From the above, you'll receive a chunk of XML with data about the running instance, it's name, status, dates, etc. In other words, you're now ready to integrate Amazon EC2 features directly into the applications you're writing, without very much work to get started. Within about 5 minutes, you're working on your business logic, rather than on the generic code that anyone needs when integrating with Amazon EC2.

    Read the article

  • How do you enable wobbly windows in ubuntu 11.04 without using compiz?

    - by Tripod Smurf
    I'm curious if there's a way to enable the more fun UI features in Ubuntu 11.04 that were available in previous versions. The effects I'm most curious about is the wobbly windows and the alt tab program switcher that looked like a rolodex. Those things were delightful. I've been reading about the compiz tool and since I'm a pretty noob user, I don't think I want to risk destroying my desktop for a chance to get these effects back. Any help would be appreciated. Thanks

    Read the article

  • New Interoperability Solutions for SQL Server 2012

    - by The Official Microsoft IIS Site
    I am excited to share some great news about how we are opening up the SQL Server data platform even further with expanded interoperability support through new tools that allow customers to modernize their infrastructure while maximizing existing investments and extending virtually any data anywhere. The SQL Server team today introduced several tools that enable interoperability with SQL Server 2012. These tools help developers to build secure, highly available and high performance applications for...(read more)

    Read the article

  • Top 5 SEO Experts Tips For 2010

    The world of internet marketing and online advertising is so dynamic that it may change almost everyday. The change is not just limited to the content but to how the whole system operates. The rules, guidelines or tips that help you in cutting the competition and bringing out the best content to the world in the best possible manner can also change very rapidly.

    Read the article

  • Exchange 2010 550 5.7.1 unable to relay

    - by isorfir
    I have a website application that needs to send email via our Exchange servers. It sends email internally fine, but when sending to an external address I get the 550 5.7.1 unable to relay error. I followed this guide to create a connector to allow relay. Unfortunately, all office email was trying to use that connector and was not being routed correctly. It also appeared as though it opened it up for spammers to use. This is obviously unacceptable and a secure method is needed.

    Read the article

  • Is IDirectInput8::FindDevice totally broken on Windows 7?

    - by Noora
    I'm developing on Windows 7, and using DirectInput8 for my input needs. I'm tracking gamepad additions and removals (that is, GUID_DEVINTERFACE_HID devices) using the DBT_DEVICEARRIVAL and DBT_DEVICEREMOVECOMPLETE messages, which works fine. However, what I've come to find out is that no matter what I do, passing the received values from DBT_DEVICEARRIVAL to IDirectInput8's FindDevice method, it will always fail to identify the device, returning DIERR_DEVICENOTREG. DirectInput still clearly knows about the device, because I can enumerate and create it just fine. I've tried with three different gamepads, and the error persists, so it's not about that either. I also tried passing some alternative interface GUIDs for the RegisterDeviceNotification call, didn't help. So, has anyone else faced the same problem, and have you found a usable workaround? I'm afraid I'll soon have to stoop down to re-enumerating all devices when something is added or removed, but I'll first give this question one last shot here. EDIT: For the record, I've also tried pretty much every single HID API & SetupAPI function for alternative ways of figuring out the needed GUIDs, with zero success. So if you're facing the same problem as me, don't bother with that route. I'm pretty sure those GUIDs are made up by DirectInput itself somehow. Short of reverse engineering dinput8.dll, I'm truly out of ideas now.

    Read the article

< Previous Page | 737 738 739 740 741 742 743 744 745 746 747 748  | Next Page >