Search Results

Search found 37607 results on 1505 pages for 'ms access 97'.

Page 825/1505 | < Previous Page | 821 822 823 824 825 826 827 828 829 830 831 832  | Next Page >

  • Should I include everything in the sitemap or only new content?

    - by Mee
    For a website with dynamic content (new content is constantly being added), should I only include the newest content in the sitemap or should I include everything (with a sitemap index)? What are the best practices for sitemaps esp. for large sites? Also, is there anyway to make google (and other search engines) only crawl the pages in the sitemap? Thanks Update: Also, any idea how stackoverflow handle this? I'd like to know but unfortunately (also understandingly) they have blocked access to their sitemap.

    Read the article

  • Help with Meshes, and Shading

    - by Brian Diehr
    In a game I'm making in LibGdx, I wish to incorporate a ripple effect. I'm confused as to how I get access to the individual pixels on the screen, or any way to influence them (apart from what I can do with sprite batch). I have my suspicions that I have to do it through openGL, and it has something to do with apply a mesh? This brings me to my question, what exactly is a mesh? I've been working on my game for about half a year, and am doing great with the other aspects of the game, but I find this more advance stuff isn't as well documented. Thanks!

    Read the article

  • Really, Mobile Devices will Take Over the World?

    - by p.gielens
    My blog has been quiet for quite a while. My inspiration comes from crunching/exchanging information which I should do more often. Gartner analysis tells us that by 2013 mobile phones will overtake PC’s as the most common Web access device worldwide. A few years back I would have said non sense, but apparently most Web users are comfortable with less processing power. Just take a look at the increasing business in Netbooks. Wouldn’t it be great to have a mobile phone which can connect wirelessly to my home TV, monitor, car display, mouse, keyboard, etc? And to have the processing power of the current Netbook generation? Where can I buy it? Why are we making our PC devices (for instance the slate) smaller while we can make our mobile device’s functionality bigger? What about the single responsibility principle? Does it apply to physical devices as well as good object-oriented software?

    Read the article

  • Connecting with a BSNL Broadband Internet

    - by user10026
    I am not able to connect my broadband connection with ubuntu and it doesnt work. The connection works fine when I use Windows7 but when i use ubuntu I am not able to access the internet. I followed various steps mentioned in various sites and still could not find a solution. I have installed ubuntu 8.04 in my system. The interface eth0 is not at all detected and when i use the menu system-administrator-network I am not getting an option for wired connection. Just the Wireless connection and Point to Point connection tabs are available.. It's really urgent.. I'll be very happy if u guys can propose to me a working solution to deal with this problem..

    Read the article

  • Frameworks for targetting multiple environments

    - by Werlang
    What should drive the decision behind doing development upon one or more than one framework? For instance, an ERP is (mostly) run on a Windows station. It leverages full access to device's resources, like printers, barcode readers, fingerprint readers and the like. It's usually more responsive and easier do develop with. That being said, some parts of it must be accessed exclusively in self-service mode, by enterprise's customers, suppliers and partners. This could be accomplished with smartphones, tablets, or even desktops running a web browser. What are the economics behind that? Should two team be kept, each one doing work upon its own framework? Or the most permissive framework should be chosen? Should I care something other than HTML technologies? Should I consider native technology for each device?

    Read the article

  • C# and SQL data layer code generator

    I've created a simple yet efficient tool to help generate stored procedures and a C# data access layer from a table.  Instead of using an ORM, this uses standard ADO .NET (SqlConnection, SqlDataReader, etc).  Check it out at www.asteio.com.  It's saved me a ton of time and I'm hoping it does the same for you....Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • How do I disable the upgrade to new version warning? [duplicate]

    - by Anatoliy
    This question already has an answer here: Disable Ubuntu Update Manager's new version warning 2 answers After I allowed Ubuntu on my notebook to upgrade to 13.4, it lost Wi-Fi connection. Network menu does not show wireless access points, but according to syslog it establishes connection. Also, the wireless router provides IP address to the host. I don't want to spend time on debugging and solving the problem that most probably will reappear with new update, so I decided to reinstall 12.10 version. It recognized Broadcom Wi-Fi modem right after the boot, and everything went great, until today I powered it on and suddenly found that it is running 13.4 and all my problems are back! Is it possible to instruct it to stay with 12.10 until I decide to upgrade?

    Read the article

  • Gone in 60 Seconds: An Insecure Database is an Easy Target

    - by Troy Kitch
    According to the recent Verizon Data Breach Investigations Report, 98% of breached data originates from database servers and nearly half are compromised in less than a minute! Almost all victims are not even aware of a breach until a third party notifies them and nearly all breaches could have been avoided through the use of basic controls. Join us for this November 28th webcast to learn more about the evolving threats to databases that have resulted in over 1 billion stolen records. Also, hear how organizations can mitigate risks by adopting a defense-in-depth strategy that focuses on basic controls to secure data at the source - the database. There's no turning back the clock on stolen data, but you can put in place controls to ensure your organization won't be the next headline. Note, this webcast will be recorded for on-demand access after November 28th. 

    Read the article

  • Ubuntu installed accidently on windows

    - by Maz
    I'm new here and would very much appreciate your help I was making a bootable USB to rescue a crashed Ubuntu notebook. I was doing this on my Sony VIo laptop, now I can't access my Sony files, when I boot the Sony up it boots in Ubuntu I think I have overwritten the windows boot sector with Ubuntu I need to either undo the process or if this is not possible then at least recover my kids childhood memory photos Any help to resolve this issue would be very much appreciated P.s I have since removed the hardrive from the Sony and tried to read it on a windows machine as an external drive, windows can see the drive but with no data!

    Read the article

  • Why doesn't this ContentLoader project (VS2010 e) recognize Microsoft.Build.dll?

    - by IAbstract
    I am working with an XNA content loader sample. In the references for the project (VS 2010 Express) there are: Microsoft.Build Microsoft.Build.Framework //as well as the standard XNA framework and graphics references To emulate this project, I am trying to first add a reference to Microsoft.Build.dll. But Visual Studio warns me that it cannot load the .dll. I looked at MSDN and the document referenced Microsoft.Build.Evaluation. This is suppose to be available in the Microsoft.Build.dll and then I'll have access to the Project class. Has anyone had any experience with this?

    Read the article

  • Another website is mirroring and ranks above my site in search results

    - by Marlboro Goodluck
    There is a site of ill-repute known as thedirty which has completely mirrored my site and now has links appearing on Google at the #1 spot using my content. I checked my log files and noticed that this site has been crawling mine for sometime, and also has 10,000 links from their site to mine. I have blocked user access which is referred from this site and reported them as web spam to Google already. I also disavowed the domain. How are they getting top links in Google (even overtaking mine) for such nefarious tactics? What are the steps to completely eliminating an issue such as this?

    Read the article

  • Connect to a VPN from a Virtual Machine

    - by kaharas
    I am running an Ubuntu ditro inside a VMWare virtual machine with a bridged connection on a windows 7 host. What I am trying to do is to have the virtual machine connect to a VPN, but I'm not having much success. At first, the system was using wicd, but I replaced it with network-manager who's supposed to have OpenVPN support. The problem is, even tho i've purged the wicd installation, there're connections shown in the network manager, and still, I'm able to access the net. I've also added the openvpn data in the network manager tab, but it's shown as never used. PS: when I try to stop and start the NetworkManager service, an error message pops up telling me that there's not such a service, but apt-get tells me i've already installed it...

    Read the article

  • AutoVue 20.2.1 is Now Available!

    - by Pam Petropoulos
    Oracle’s AutoVue Enterprise Visualization 20.2.1, a minor release within the 20.2 product family, has just been made available on the Oracle Software Delivery Cloud. AutoVue release 20.2.1 includes the following new capabilities and improvements: Enhancements to the Augmented Business Visualization framework to connect documents and business data in enterprise applications and create rich, actionable visual-decision making environment. AutoVue now allows hotspots in 2D drawings and images to be defined as polygons, rather than only by text strings or boxes. Improved Documentation on Augmented Business Visualization and Hotspotting Optimize business process efficiency by integrating AutoVue and Oracle BPM to: Initiate interactive document reviews by the appropriate reviewer in a workflow Automate printing and conversion operations at the appropriate stage of a workflow Timely support for new MCAD and  ECAD formats Fidelity and performance improvements for a wide range of formats Click here to read about the latest features and their corresponding benefits. Click here to access the latest AutoVue Format Support Sheet.

    Read the article

  • Reading the memory of a N64

    - by toazron1
    I'm looking for a way to read the memory of a N64, while the game is running, in real time. I have a c# program which hooks into the memory of a running emulator and tracks SSB64 stats. I want to do the same thing with the physical N64. Currently it is possible to read the memory with a gameshark pro, however it's extremely slow, buggy, and not practical for what I am trying to accomplish. Would it be possible to tap into the gameshark, or the N64 directly, to access the memory in real time? Thanks!

    Read the article

  • Apache FilesMatch regexp: Can it match by the cache buster 10 digit (rails generated) following the filename?

    - by ynkr
    According to the apache FilesMatch docs: The FilesMatch directive provides for access control by filename Basically, I only want to set an expires header for resources that have a 10 digit "cache buster" id appended to the name. So, here is my attempt at such a thing in my httpd.conf <FilesMatch "(jpg|jpeg|png|gif|js|css)\?\d{10}$"> ExpiresActive On ExpiresDefault "now plus 5 minutes" </FilesMatch> And here is an example of a resource I want to match: http://localhost:3000/images/of/elvis/eating-a-bacon-sandwich.png?1306277384 Now obviously my FilesMatch regexp is not matching so I am guessing 1 of 2 things is happening. Either my regexp is wonky or the '?1231231231' cache busting part of the file is not part of what apache considers part of the filename. Can anybody confirm and/or give me a way to cache only those resources that will not persist beyond the next deploy?

    Read the article

  • Mouse running amok

    - by Norene Bult
    While using my mouse, it will all of a sudden take off and might run to calendar or/and trash. It opened calendar, then went down and opened trash up several times. It started out just doing it once in awhile with opening something and I didn't move it there. It did on it's own. Is someone controlling my computer? That's how it acts. I would like to get this straighted out. If it is my mouse just going berserk then I will install a new one. If it is something else, I'd like to know what could be causing it. I have my security set so no one can access my computer. Please can anyone help?

    Read the article

  • How to teach your users/customers to send better error descriptions

    - by ckeller
    I often have to deal with customers or users which are reporting errors in applications. Most of the time their content is something useless as ERROR!!! x does not work without much more information. For resolving the issue I have to request every single detail of them, which often is more time consuming than fixing the issue itself. Other send information in formats which are not ideal, like screenshots (of data records, not of errors) although they could send a link (we have access to the systems) and so on. How do you tell your users/customers to describe the problems with more details so that the whole process could be easier for both sides? edit This question is more about the social skills, than how to achieve programmatic collection of logs and error information. I'm aware of the fact that this should be part of good software design.

    Read the article

  • Empathy sametime client id

    - by user91860
    I have been using Pidgin as an all-in-one IM client, but now as Empathy is the default app in Ubuntu I wanted to try it out. I have a sametime account at an external company that is keen to restrict access to their service from certain sametime client versions only. I was able to trick it with pidgin by specifying the following settings in accounts.xml: <setting name='client_minor' type='int'>8510</setting> <setting name='client_major' type='int'>30</setting> <setting name='client_id_val' type='int'>4876</setting> I tried to do the same in Empathy but I failed. As far as I know, Pidgin and Empathy use the same connector Plugin for sametime, so basically the functions should be there somewhere but there is little information about the configuration files and that doesn't discuss any sametime specific options.

    Read the article

  • How to set up dual wired and wireless connections?

    - by Col
    My laptop has both wireless and a wired connection capabilities. Can I connect to a router A using wireless and a separate router B using wired ethernet at the same time without having to switch back and forth? Thanks for replying so quickly. I wish to connect to two separate networks. The wireless connection is to router A which is connected to broadband internet. The wired connection is to router B which I wish to share files and a printer on 1 or 2 other desktops also using wired connections on B and maybe using synergy to have only one keyboard and mouse for 2 desktops. The wireless laptop is the only one required to have internet access.

    Read the article

  • no windows 7 option after recent 12.10 install and boot repair

    - by user95240
    Earlier today i installed ubuntu 12.10 beta. Grub wasn't booting, but just going directly to my primary OS Windows 7. I assumed i had partitioned incorrectly, because partitioning isnt my strong suit. I used boot repair because it was well recomanded off a live usb. Afterwards, grub appeared, but i only had options for Ubuntu, Advanced Ubuntu Option, and my hidden windows 7 recovery partition. Please help me recover my access to windows partiton. See this link for Boot-Repair report: http://paste.ubuntu.com/1266467/ ps. ran Boot-Repair a second time - no change

    Read the article

  • How to completely remove Ubuntu?

    - by les02jen17
    I installed Ubuntu using Wubi installer, but I couldnt boot to it. So I uninstalled it on the Control Panel. Then I tried the full installation wherein it boots to the Ubuntu environment. After installing Ubuntu there, I couldnt boot to my Windows 7 anymore! So in an attempt to salvage the whole thing, I inserted the Ubuntu CD again and chose Erase Ubuntu and Reinstall. (I was wondering, why wasn't there an option to just "Erase Ubuntu"?) I did that though, and I got my Windows 7 back. But upon checking my drives via the "Create your own partition scheme" (not sure if it's the exact words) I saw that one of my partitions still has Ubuntu on it, and there's no way I can delete it if I don't overwrite another Ubuntu! I can't access that partition on windows 7 either! Need help!

    Read the article

  • Where can I get a definition of how the code is laid out in VB.NET 2010?

    - by ByteWorker
    I am just starting out learning Visual Basic 2010. I have books and videos. The books all seem to be written for people who have some programming experience, even the books that say they are for beginners. The videos were great until they started talking about variables. I got the basics of them but they started into complicated variables and I don’t see the need for them right away. Where can I go to see code for fairly intricate applications written out, with an over lay of definitions of which part of the code is a method as opposed to a class and so on? Also, I am working at a company that does not use SQL. So I need to use Access 2007 for all of my tables. Is there much of a difference to the coding?

    Read the article

  • How do I reset the password for Ubuntu 12.04 LTS

    - by user169930
    I installed Ubuntu 12.04 LTS using Wubi in the D: drive of my PC. I have Vista installed in the C: drive. I have forgotten my password for my Ubuntu Admin Account. I only have only access to the Guest login. Please note, I don't see any GRUB menu and get only Vista & Ubuntu as options while booting. I can't get into Recovery Mode of Ubuntu using Shift, ESC or any other way. Please let me know how to reset the password.

    Read the article

  • Dev Connections / VS Launch April 2010 &ndash; Code!

    Just returned from the VS Launch last week, and as promised here is the code for my sessions. I will post a separate entry with all the code for my Azure Tutorial which was on Thursday. And, as always, if you are looking for something in particular and cant find it here, just drop me an email! AppFabric Access Control http://www.dasblonde.net/downloads/AccessControlSamples.zip Samples for both WCF/REST samples and web resources such as Web Form and ASHX Samples include a complete object model...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Hardware question; booting ubuntu off of USB flash drive?

    - by Kon
    I'm currently running ubuntu off of a USB 3.0 flash drive on my laptop, and I have another USB 3.0 flash drive I use for storing larger files that I need to access and whatnot. But the issue is that both of the usb 3.0 flash drives don't fit next to each other at all, so I'm forced to use another usb 2.0 port located in a different spot on my laptop. Now my question is that if I use a USB 3.0 hub will that slow my connections down at all? or cause some sort of interference? Another question I had which I was unable to find anywhere on the internet is if there was a USB 3.0 hub with more than one upstream connection? Thanks for your time!

    Read the article

< Previous Page | 821 822 823 824 825 826 827 828 829 830 831 832  | Next Page >