Search Results

Search found 31311 results on 1253 pages for 'oracle product info'.

Page 822/1253 | < Previous Page | 818 819 820 821 822 823 824 825 826 827 828 829  | Next Page >

  • If all variables are a subset of the superkey, is the database design 5NF? [migrated]

    - by Lukazoid
    I have a table called LogMessages, which has the following columns: Level A numeric value which represents Trace, Debug, Info, Warning, Error or Fatal Time A UTC time Message Foreign key to a Messages table Source Foreign key to a Sources table User Foreign key to a Users table From what I can see, all of these columns are a part of the super key; if any single value differs to an existing row, a new row can be created. My question is, does this design comply to fifth normal form? I am unsure as some groups of data will be repeating, however I don't believe this violates 5NF? (correct me if I'm wrong)

    Read the article

  • Samsung dévoile sa plateforme mobile Bada 2.0, sa boutique d'applications Samsung Apps passe les 80 millions de téléchargement

    Samsung dévoile sa plateforme mobile Bada 2.0 Sa boutique d'applications Samsung Apps passe les 80 millions de téléchargments Le secteur des OS mobiles est en plein ébullition avec les procès (brevets, Oracle Android, etc.) et la décision de Nokia de choisir Windows Phone. Quel avenir pour MeeGo ? Pour Symbian ? Android va-t-il essayer d'exploiter l'affaire (a priori oui) ? Sur ce marché agité, un constructeur est bien loin de tous ces tracas et propose une stratégie multi-plateforme qui semble lui réussir. Samsung possède en effet des modèles sous Android, Windows Phone 7... et sous Bada, sa plateforme maison. Lors du Mobile Word Congress de Barcelone, le Coréen v...

    Read the article

  • Energy saving with two batteries (Gigabyte S1080 and similar)

    - by user37155
    my today question is: how do I manage a tablet (Gigabyte 1080) with an additional battery in Ubuntu ? The control bar shows two separate batteries but starts to suck all the energy from the secundary battery, not leaving any power in it and ruining it (if I don't remove it earlier), and then starts with the primary battery. Here you find a description of the secundary battery: http://www.gigabyte.com/products/product-page.aspx?pid=3837#kf Do you have some solutions for a more confortable use of te device, with windows-like drivers maybe ? Is there a graphical tool to manage two batteries in Linux, in order not to ruin them, and possibly to save energy with them ? Many thanks and greetings, Francesco

    Read the article

  • Verification as QA - makes sense?

    - by user970696
    Preparing my thesis, I found another interesting discrepancy. While some books say verification it terms of static analysis of work products is quality control (looking for defects), other say it is actually quality assurance because the process of checking is decreasing the probability of real defects when these deliverables will be used for product manufacture. I hesitate as both seems to be correct: it is a way of checking for defects (deviation from requirements, design flaws etc.) so it looks like quality control, but also it is a process which does not have to be done and if done, can yield better quality.

    Read the article

  • Largest successful JavaScript project? [closed]

    - by 80x24 console
    A common theme in the GWT community is "I wouldn't want to build a project of THAT size using a pure JavaScript library!" What is the largest project that you have successfully delivered with frontend functionality written in JavaScript? (not Java or GWT) Please provide at least a hand-wavy SLOC estimate of the unique JS code (not including libraries, frameworks, toolkits, test code, generated code, server-side processing such as PHP, etc.) that was in the finished product. Note to GWT advocates: Please read the question carefully before answering. I've heard plenty of stories about JS failures and GWT successes, but I'd like to hear some quantified JS successes. Note to mods: This is primarily a business-of-software question, not a tools question. It factors into a real-world business decision.

    Read the article

  • How to do a login page for third party service without letting them sign on?

    - by AAA
    We have a unique situation (at least for me, first time seeing this). We have a web form where accountants can fill in requests and that part is taken care of. But after their login we redirect them to a third-party website where we need more information from them. The process is crazy right now since we have to give our account login info to all people filing with us. So is there a way in PHP or any other solution where we can after that form on our website auto login with our information to that third party website in a way that our credentials are not visible to the users using the service?

    Read the article

  • How do I analyze vague Google Analytics data re traffic from Facebook?

    - by user6982
    We have one Facebook fan page and two personal profiles that could be sending traffic and then there are the many facebook pages of friends etc. I am also running an ad campaign from my FB account for my husband's business which has a link from his personal FB profile and his fan page. On Google analytics for his business we get the following referring sites from Facebook: /ajax/emu/end.php which is listed under facebook.com / referral /l.php (which is a not-found page at FB /ajax/emu/end.php which is listed under apps.facebook.com Both of the working links send me to the home page of my profile, which is the account I am working from to create and review the FB ad campaign that we are running. Is this info telling me any useful information at all? Is there a best practice for tracking and analyzing Facebook traffic that is a lot more granular? thanks!

    Read the article

  • How can I determine the trending pages on my site?

    - by Dogweather
    I'm looking to what what the "hot" pages are on one of my sites. I want to see for various timeframes, what the top-50 pages are. I'm going to create a data feed with this info which will be input to another app. I have Apache logs, and complete control of the machine to install what I want. I'm mostly wondering if there's something out there already that I can use, or if I have to implement it myself, what good algorithms or strategies might be. Thanks.

    Read the article

  • Aptana Studio 3 does not start up in Ubuntu 12.10

    - by Agent47DarkSoul
    I followed the instructions provided here to install Aptana Studio 3 in my Ubuntu 12.10. I have completed all the steps with out any problems. When I click the Aptana icon in my Unity bar nothing happens. No error pops up! I gave permission on the sh file and on the directory (/opt/Aptana_Studio_3) but still same problem. If I try executing the sh file in the /opt/Aptana_Studio_3 folder, it says "Syntax error: "(" unexpected Aptana". Also I cannot execute the Aptana binary file directly. I have been trying to solve the problem for a while now. Any help would be much appreciated. EDIT: I have Oracle Java 7 installed. I have read some post about backwards compatibility problem with Java 6 but dont know whether that's the issue. I will edit the question if I find something new.

    Read the article

  • As a software architect, am I supposed to focus that much on analysing the logs and fixing other's bugs?

    - by Hatem81
    Since my graduation (late 2005) I was working for the same company as a c++ software engineer. A year ago I was promoted as a software architect but I have found myself involved more and more in qualification and fixing bugs, level 2 support. 50% of my time spent in Notepad++ analysing the software logs and trying to figure out what went wrong. 30% fixing other's bugs and the remaining (if any) reviewing developers spaghetti code. I started hating this product and thinking about an exit strategy out of this company. What do you think I can do in this situation? do you other software architect still fixing bugs in the code?

    Read the article

  • Where to hire a scenario writer for a small interactive story game?

    - by Alexander Gladysh
    I need a scenario for a small dialog-based game / interactive story. The game would be used as an example for a middleware tool we're developing. I would like to buy an existing story (it should be dynamic of course — with branching dialogs etc.), or hire someone to write a new one. Please advise, where to go to find such person / service? We're based in Russia, so getting a talented enough native English writer locally is a bit of a problem. Update: To be extra clear: We must get all necessary rights to reuse the story and make a derived work (i.e. the game we're talking about) from it. This is a commercial product. Borrowing someone else's work at random and using it just not going to work.

    Read the article

  • Google I/O 2012 - Making Good Apps Great: More Advanced Topics for Expert Android Developers

    Google I/O 2012 - Making Good Apps Great: More Advanced Topics for Expert Android Developers Reto Meier In a follow-up to last year's session, I'll demonstrate how to use advanced Android techniques to take a good app and transform it into a polished product, without being a resource hog. Features advanced coding tips and tricks, bandwidth-saving techniques, implementation patterns, exposure to some of the lesser-known API features, and insight into how to minimize battery drain by ensuring your app is a good citizen on the carrier network. For all I/O 2012 sessions, go to developers.google.com From: GoogleDevelopers Views: 2193 69 ratings Time: 58:35 More in Science & Technology

    Read the article

  • Salting a public hash

    - by Sathvik
    Does it make any sense at all to salt a hash which might be available publicly? It doesn't really make sense to me, but does anyone actually do that? UPDATE - Some more info: An acquaintance of mine has a common salted-hash function which he uses throughout his code. So I was wondering if it made any sense at-all, to do so. Here's the function he used: hashlib.sha256(string+SALT).hexdigest() Update2: Sorry if it wasn't clear. By available publicly I meant, that it is rendered in the HTML of the project (for linking, etc) & can thus be easily read by a third party. The project is a python based web-app which involves user-created pages which are tracked using their hashes like myproject.com/hash so thus revealing the hash publicly. So my question is, whether in any circumstances would any sane programmer salt such a hash? Question: Using hashlib.sha256(string+SALT).hexdigest() vs hashlib.sha256(string).hexdigest() , when the hash isn't a secret.

    Read the article

  • How can a Cisco Aironet wireless card connect to a WPA encrypted network?

    - by Aibara Iduas
    I have a Thinkpad T40 running Ubuntu 10.10. I want to connect to wireless networks with WPA encryption; they appear in the network list, but are grayed out. The card does support WPA, since it works in Windows. In 10.10 the wireless works just fine with unprotected and WEP networks, but cannot connect to any WPA networks. The card is a Cisco Aironet Wireless 802.11b. I've been reading a lot of forum posts trying to find a solution, but either encounter threads where no solution was found or answers longer apply (most date from 2007, since this isn't the newest of computers). Here is the output of sudo lshw -c network: *-network:1 DISABLED description: Wireless Interface product: Cisco Aironet Wireless 802.11b vendor: AIRONET Wireless Communications physical id: 2 bus info: pci@000:02:02.0 logical name: eth1 version: 00 serial: 00:02:8a:78:6a:44 width: 32 bits clock: 33MHz capabilities: pm vpd bus_master cap_list rom ethernet physical wireless logical configuration: broadcast=yes driver=airo latency=64 maxlatency=4 mingnt=4 multicast=yes wireless=IEEE 802.11-DS Thanks, any help would be greatly appreciated!

    Read the article

  • In C++, is it a reflection of poor software design if objects are deleted manually?

    - by grokus
    With the advent of smart pointers, is it a sign of poor design if I see objects are deleted? I'm seeing some software components in our product that people are still doing this. This practice strikes me as un-idiomatic, but I need to be sure this is the industry consensus. I'm not starting a crusade but it'd be nice to be prepared theory wise. Edit: legit uses of delete, Klaim mentioned the object pool use case. I agree. Bad examples of using delete, I am seeing many new's in constructor or start() and corresponding delete's in the destructor or stop(), why not use scoped_ptr? It makes the code cleaner.

    Read the article

  • Diving into the RichTextBox (Silverlight TV #31)

    Mark Rideout, Program Manager on the Silverlight product team, joins John to dive deep into many of the RichTextBox control's features. Mark has worked on the text aspects of Silverlight since the first version. Here are just a few of the areas that Mark covers: Overview of RichTextBox vs. TextBlock and TextBox for rich content Wire-up logic for applying formatting Inline UI elements Using text position to point for simple and complex operations   Basic "position...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • What are options for 3rd Party Centralized Software Settings Management?

    - by Jeff Martin
    I am an architect in an enterprise looking to build a SaaS solution. Our products are distributed over many different deployable containers, Web Services, Web UI's, etc. I am looking for some open-source or 3rd party software solution to manage the settings of our application. These would be similar to the settings you might find in Word or Eclipse or Visual Studio. The settings would control various behaviors and features of the product. (Probably not settings like which database to connect to but more like, should I show line numbers on the page or not by default..). Ideally, we would be able to store values for different dimensions (by tenant, by user, by application environment... ) Because we have so many different deployables, I am looking for a centralized solution that can provide a web service that each of the deployables can get their individual settings from. Does anyone know of a centralized service providing this sort of features or give me some help in searching for an alternative to rolling our own?

    Read the article

  • How do I change my PYTHONPATH to make 3,2 my default Python instead of 2.7.2?

    - by max
    I have python3.2 located in /usr/lib/python3.2. I am not sure if that means it's installed but I assume it is for now. Some facts about my system: $ which python /usr/local/bin/python When I type python in terminal I get the following $ python Python 2.7.2 (default, Dec 19 2011, 11:12:13) [GCC 4.4.3] on linux2 Type "help", "copyright", "credits" or "license" for more information. Then to find the path I do >>> sys.info >>> sys.path ['', '/usr/local/lib/python2.7/site-packages/setuptools-0.6c11-py2.7.egg', '/usr/local/lib/python2.7/site-packages/pip-1.0.2-py2.7.egg', '/usr/local/lib/python2.7/site-packages/PIL-1.1.7-py2.7-linux-x86_64.egg', '/usr/local/lib/python27.zip', '/usr/local/lib/python2.7', '/usr/local/lib/python2.7/plat-linux2', '/usr/local/lib/python2.7/lib-tk', '/usr/local/lib/python2.7/lib-old', '/usr/local/lib/python2.7/lib-dynload', '/usr/local/lib/python2.7/site-packages'] So knowing all of this, how do I change my default system python from 2.7.2 to 3.2?

    Read the article

  • How to implement the setup rules like Clash of Clan?

    - by user25959
    Now I'm already implement the setup build rules which the building could move by unit grid width and height. But the validation detection is poor efficiency. The algorithm cost me 10~12(ms) in average when I move the building. Here is my approach to that: 1.Basic Grid, it is a two dimensional array. Grid[row][column], so that I can save info for each grid. Like whether is it in occupied or excluded. 2.Exclude Space, this is a space which limit same building numbers in space.

    Read the article

  • How to sell Agile development to (waterfall) clients

    - by Sander Marechal
    Our development shop would really like to do more agile projects but we have a problem getting clients on board. Many clients want a budget and a deadline. It's hard to sell a client on an agile project when our competitors do come up with waterfall-based fixed deadlines and fixed prices. We know their fixed numbers are bad, but the client doesn't know that. So, we end up looking bad to the client because we can't fix the price or a deadline but our competitors can. So, how can you get your sales force to successfully sell a project that uses agile development methods, or a product that is developed using such methods? All the information I found seems to focus on project management and developers.

    Read the article

  • Acer Aspire microphone issue

    - by Dr_Bunsen
    I have got an Acer Aspire 7750G: More info It has been running Ubuntu since I bought the laptop (12.10 as of now), but a few updates ago, I lost my microphone. It doesn't recognise the internal mic or the mic jack (although alsa seems to recognise it). I have been looking around, and I fixed it, but this was only temporary, after a reboot my mic was gone again. I haven't been able to find the fix, so I wanted to know whatever you guys know what I have to do to fix this. Thanks in advance.

    Read the article

  • Unable to install Ekundli-2002 with wine1.6

    - by Pandya
    I am running Ubuntu 14.04 and installed wine1.6 (stable). I am trying to install Ekun2002.exe (Astrology software) by wine. But at the end of installation, it is getting following error: Foreign application won't perform DDE method or operation How to solve this ? Further Information: I searched following info from: http://msdn.microsoft.com/en-us/library/aa266013%28v=vs.60%29.aspx An application refused to perform the DDE method or operation you attempted. This error has the following causes and solutions: You supplied data or commands that the other application did not recognize.Check the application's documentation to see what data or commands it recognizes. The LinkItem property isn't set to an item that the other application recognizes as valid for the topic of the conversation. Check the application's documentation to see what items it recognizes.

    Read the article

  • What algorithms would suit image colour summarization? [on hold]

    - by codecowboy
    I would like to analyse a set of hundreds of thousands of product images (clothing, electronic goods etc) and retrieve the dominant colours in each. I'm only interested in the top 3 or 4 colours. The aim is to achieve a degree of certainty that x image is mostly red or image y is mostly orange and blue. The images are likely to be colour jpegs of reasonable quality and approximately 100kb in size. I would like to use C# and the solution should run on a Linux server, preferably using open source libraries. What image processing algorithms or techniques might help me achieve this?

    Read the article

  • What to do when Ubuntu 13.10 64-bit does not boot?

    - by Anonymous John
    Ubuntu 13.10 will not boot, it won't even show the grub menu or Ubuntu booting. There is just a purple screen for 20 seconds then a black screen, then the screen says entering power save mode. here are my system specs:Intel DQ965GF Motherboard (OS independant), Intel core 2 64-bit, 12GB HHD (SATA), 200GB HHD (SATA, installed here), 250GB HHD (SATA, Encrypted with LUKS), 3GB DDR2 RAM (DIMM 0 A 1024MB,DIMM 1 A 524MB, DIMM 0 B 1024MB, DIMM 1 B 524MB),2 Rewritable DVD drives (one SATA and one IDE), small floppy drive and car reader, and AMD gallium 0.4. That's all I know from the top of my head, I have no OS to give me more info on the graphics card, but all Ubuntu OSs worked on my PC from 12.04-13.04 just fine. Does this mean will never be able to use Ubuntu 13.10? I think I am screwed.

    Read the article

  • Cannot get Atheros AR9285 to work on 12.10

    - by user100449
    I've already went through all possible advices and still cannot start my Atheros AR9285 wireless card. I have a laptop Toshiba Portege Z830 where the WiFi already worked under Windows 7. But after migration on Ubuntu 12.10. I'm not able get it work. This is what I see on command lshw *-network UNCLAIMED description: Network controller product: AR9285 Wireless Network Adapter (PCI-Express) vendor: Atheros Communications Inc. physical id: 0 bus info: pci@0000:02:00.0 version: 01 width: 64 bits clock: 33MHz capabilities: pm msi pciexpress bus_master cap_list configuration: latency=0 resources: memory:c0500000-c050ffff This is what I see on command rfkill list 0: Toshiba Bluetooth: Bluetooth Soft blocked: yes Hard blocked: no 1: hci0: Bluetooth Soft blocked: yes Hard blocked: no Any idea?

    Read the article

< Previous Page | 818 819 820 821 822 823 824 825 826 827 828 829  | Next Page >