Search Results

Search found 3564 results on 143 pages for 'weblogic channel'.

Page 83/143 | < Previous Page | 79 80 81 82 83 84 85 86 87 88 89 90  | Next Page >

  • Chrome 18 : la 3D pour tous et amélioration de l'accélération de Canvas2D

    Chrome 18 : la 3D pour tous Et amélioration de la prise en charge de Canvas2D Chrome 18 vient de passer en version stable. Au menu, une amélioration de la prise en charge de Canvas2D qui tire parti de l'accélération matérielle (et du GPU donc). Elle devrait permettre à des applications web, comme les jeux, de tourner plus rapidement. Pour Google, avec cette prise en charge, les versions 100% Web des applicatifs pourraient même être aussi performantes que les versions traditionnelles. L'accélération matérielle appliquée à Canvas2D était jusqu'ici réservée au « beta channel » de Chrome. La fonctionnalité peut donc avoir encore quelques petits ratés. [IMG]http:/...

    Read the article

  • Social Media's and Customer Service

    - by Richard Lefebvre
    Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 How do you know when it’s time to change customer interaction to another channel? Find out from this interesting blog post and then watch this interesting 1'26 YouTube video /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman","serif";}

    Read the article

  • How to get KeePass to properly work with Chromium?

    - by Tom
    The two-channel auto-type obfuscation feature of KeePass doesn't work for me with Chromium (on Ubuntu 12.04 64 bits). However, it works just fine with Firefox. Dows anyone know how to fix this? Textboxes in web forms in Chromium seems to have something special that causes this feature to fail. Only some of the username/password characters are being auto-typed. This might be related to this: if I select an entry in KeePass and click "Copy User Name", I can paste it fine with Ctrl+V in any textbox in Firefox, but I can't on Chromium. However, text copied using Ctrl+C from a regular text file (say, from gedit), can be pasted fine on both browsers. What may be wrong? I wouldn't like to deactive this feature for all the entries in my keepass files as I use them on Windows too and they work just fine there (even on Google Chrome for Windows). This feature gives an appreciated extra security measure against spyware/keyloggers.

    Read the article

  • Jazoon, JAX California, and Brazilian week - it's conference season again

    - by alexismp
    Sparky is on the road again with GlassFish presence around the world in multiple conferences. This past week Jazoon in Zurich had Java EE, GlassFish, JAX-RS, Servlet, JSF all covered while JAX in California also had a good number of Java EE-related talks (see this Java EE 7 article). FISL, the largest Open Source conference in Brazil (7500 participants last year) is coming up this week with OpenJDK, GlassFish, JavaFX, NetBeans, Java EE 7, and of course JDK 7 all covered by subject matter experts. Expect most of these talks and possibly demos to show up here on TheAquarium, on slideshare or on our YouTube channel.

    Read the article

  • Apple accusé de laisser divulguer des données privés d'utilisateurs d'iOS à des tiers, 4 éditeurs également visés par la plainte

    Apple accusé de laisser divulguer des données privés d'utilisateurs d'iOS A des tiers, quatre éditeurs également visés par la plainte Apple fait l'objet d'une procédure judiciaire qui l'accuse de fermer l'oeil sur les pratiques de certains éditeurs d'applications pour l'iOS qui transmettent, sans le consentement de l'utilisateur, des données personnelles aux annonceurs. Cette plainte a été déposée devant la Cour Fédérale de San Jose, en Californie, près du siège d'Apple, par un citoyen du comté de Los Angeles. Le plaignant cite également comme co-défendant les éditeurs d'applications Backflip, Dictionary.Com, Pandora, et The Weather Channel. Selon le peign...

    Read the article

  • Now Every Thursday Morning - Silverlight TV

    It has been 7 weeks since Silverlight TV kicked off its first episode with Keith Smith. Since then we have posted a total of 12 shows on a variety of topics. Here are some interesting numbers from the show: 12 The number of episodes we have aired in since the debut. 145 The number of comments our viewers have left on Channel 9 703 How many followers @SilverlightTv has on Twitter 333,000 + The number of views Silverlight TV has had in 7 weeks! Thank you so much for watching! ...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Ubuntu hanging problem

    - by JMearsXS
    I have a problem with ubuntu 12.04 LTS on my custom tower pc in which the OS hangs at specific points:- - live usb with persistence: hangs when mouse appears. - installed to hard disk: hangs after login, logon sound never plays. i am a relative newbie with linux so any terminal output would not make sense to me :) the pc specs are as follows: - MSI MS-7301 Cuba motherboard - 3GB DDR2 RAM (NOT dual channel) - ATI Radeon HD 5450 gfx card the live usb works fine on all other PC's i tried it on. could any one help me ?

    Read the article

  • Microsoft Office 2010 General Availability

    So, I was at TechEd 2010 talking a lot about Office 2010 solutions development last week and love was in the airmostly because I gave out hundreds of t-shirts with our www.iheartmacros.com URL on them. I would say to people coming to our kiosk, This shirt loves you and hand them a shirt. But, I digress. I did an interview for Channel 9 thats getting lots of view. In it I discuss whats new for solution building with Office 2010 and SharePoint 2010. I really like the way this video was produced. Check...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • What IRC client(s) would allow me to filter out log messages?

    - by Aras
    I have been using Empathy and more recently Pidgin as my IRC client. But there is one feature missing from both of these clients that keeps bothering me. I want to be able to see only what people are actually talking about in each channel. I often like to leave IRC channels open and go back to them and read the messages for the last few hours or days. I saw that IRC clients have been discussed in this post and a few others, but I have not found what I am looking for yet. Here is what I want to see in my IRC client: what actual people say Here is what I do not want to see message about people entering the room people leaving room people changing their status messages or what they are known as people sneezing people's cats sneezing Anyway, you get the picture. What IRC clients are available for Ubuntu that would allow me to configure what I see so that I can see what people are talking about -- and nothing else?

    Read the article

  • Can't control connection bit rate using iwconfig with Atheros TL-WN821N (AR7010)

    - by Paul H
    I'm trying to reduce the connection bit rate on my Atheros TP-Link TL-WN821N v3 usb wifi adapter due to frequent instability issues (reported connection speed goes down to 1Mb/s and I have to physically reconnect the adapter to regain a connection). I know this is a common problem with this device, and I have tried everything I can think of to fix it, including using drivers from linux-backports; compiling and installing a custom firmware (following instructions on https://wiki.debian.org/ath9k_htc#fw-free) and (as a last resort) using ndiswrapper. When using ndiswrapper, the wifi adapter is stable and operates in g mode at 54Mb/s (whilst when using the default ath9k_htc module, the adapter connects in n mode and the bit rate fluctuates constantly). Unfortunately, with this setup I have to run my processor using only one core, since using SMP with ndiswrapper causes a kernel oops on my system. So I want to lock my bit rate to 54Mb/s (or less, if need be) for connection stability, using the ath9k_htc module. I've tried 'sudo iwconfig wlan0 rate 54M'; the command runs with no error but when I check the bit rate with 'sudo iwlist wlan0 bitrate' the command returns: wlan0 unknown bit-rate information. Current Bit Rate:78 Mb/s Any ideas? Here's some info (hopefully relevant) on my setup: Xubuntu (12.04.3) 64bit (kernel 3.2.0-55.85-generic) using Network Manager. My Router is from Virgin Media, the VMDG480. lshw -C network : *-network description: Wireless interface physical id: 1 bus info: usb@1:4 logical name: wlan0 serial: 74:ea:3a:8f:16:b6 capabilities: ethernet physical wireless configuration: broadcast=yes driver=ath9k_htc driverversion=3.2.0-55 firmware=1.3 ip=192.168.0.9 link=yes multicast=yes wireless=IEEE 802.11bgn lsusb -v: Bus 001 Device 003: ID 0cf3:7015 Atheros Communications, Inc. TP-Link TL-WN821N v3 802.11n [Atheros AR7010+AR9287] Device Descriptor: bLength 18 bDescriptorType 1 bcdUSB 2.00 bDeviceClass 255 Vendor Specific Class bDeviceSubClass 255 Vendor Specific Subclass bDeviceProtocol 255 Vendor Specific Protocol bMaxPacketSize0 64 idVendor 0x0cf3 Atheros Communications, Inc. idProduct 0x7015 TP-Link TL-WN821N v3 802.11n [Atheros AR7010+AR9287] bcdDevice 2.02 iManufacturer 16 ATHEROS iProduct 32 UB95 iSerial 48 12345 bNumConfigurations 1 Configuration Descriptor: bLength 9 bDescriptorType 2 wTotalLength 60 bNumInterfaces 1 bConfigurationValue 1 iConfiguration 0 bmAttributes 0x80 (Bus Powered) MaxPower 500mA Interface Descriptor: bLength 9 bDescriptorType 4 bInterfaceNumber 0 bAlternateSetting 0 bNumEndpoints 6 bInterfaceClass 255 Vendor Specific Class bInterfaceSubClass 0 bInterfaceProtocol 0 iInterface 0 Endpoint Descriptor: bLength 7 bDescriptorType 5 bEndpointAddress 0x01 EP 1 OUT bmAttributes 2 Transfer Type Bulk Synch Type None Usage Type Data wMaxPacketSize 0x0200 1x 512 bytes bInterval 0 Endpoint Descriptor: bLength 7 bDescriptorType 5 bEndpointAddress 0x82 EP 2 IN bmAttributes 2 Transfer Type Bulk Synch Type None Usage Type Data wMaxPacketSize 0x0200 1x 512 bytes bInterval 0 Endpoint Descriptor: bLength 7 bDescriptorType 5 bEndpointAddress 0x83 EP 3 IN bmAttributes 3 Transfer Type Interrupt Synch Type None Usage Type Data wMaxPacketSize 0x0040 1x 64 bytes bInterval 1 Endpoint Descriptor: bLength 7 bDescriptorType 5 bEndpointAddress 0x04 EP 4 OUT bmAttributes 3 Transfer Type Interrupt Synch Type None Usage Type Data wMaxPacketSize 0x0040 1x 64 bytes bInterval 1 Endpoint Descriptor: bLength 7 bDescriptorType 5 bEndpointAddress 0x05 EP 5 OUT bmAttributes 2 Transfer Type Bulk Synch Type None Usage Type Data wMaxPacketSize 0x0200 1x 512 bytes bInterval 0 Endpoint Descriptor: bLength 7 bDescriptorType 5 bEndpointAddress 0x06 EP 6 OUT bmAttributes 2 Transfer Type Bulk Synch Type None Usage Type Data wMaxPacketSize 0x0200 1x 512 bytes bInterval 0 Device Qualifier (for other device speed): bLength 10 bDescriptorType 6 bcdUSB 2.00 bDeviceClass 255 Vendor Specific Class bDeviceSubClass 255 Vendor Specific Subclass bDeviceProtocol 255 Vendor Specific Protocol bMaxPacketSize0 64 bNumConfigurations 1 Device Status: 0x0000 (Bus Powered) iwlist wlan0 scanning: wlan0 Scan completed : Cell 01 - Address: C4:3D:C7:3A:1F:5D Channel:1 Frequency:2.412 GHz (Channel 1) Quality=37/70 Signal level=-73 dBm Encryption key:on ESSID:"my essid" Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 18 Mb/s 24 Mb/s; 36 Mb/s; 54 Mb/s Bit Rates:6 Mb/s; 9 Mb/s; 12 Mb/s; 48 Mb/s Mode:Master Extra:tsf=00000070cca77186 Extra: Last beacon: 5588ms ago IE: Unknown: 0007756E69636F726E IE: Unknown: 010882848B962430486C IE: Unknown: 030101 IE: Unknown: 2A0100 IE: Unknown: 2F0100 IE: IEEE 802.11i/WPA2 Version 1 Group Cipher : TKIP Pairwise Ciphers (2) : CCMP TKIP Authentication Suites (1) : PSK IE: Unknown: 32040C121860 IE: Unknown: 2D1AFC181BFFFF000000000000000000000000000000000000000000 IE: Unknown: 3D1601080400000000000000000000000000000000000000 IE: Unknown: DD7E0050F204104A0001101044000102103B00010310470010F99C335D7BAC57FB00137DFA79600220102100074E657467656172102300074E6574676561721024000631323334353610420007303030303030311054000800060050F20400011011000743473331303144100800022008103C0001011049000600372A000120 IE: Unknown: DD090010180203F02C0000 IE: WPA Version 1 Group Cipher : TKIP Pairwise Ciphers (2) : CCMP TKIP Authentication Suites (1) : PSK IE: Unknown: DD180050F2020101800003A4000027A4000042435E0062322F00 iwconfig: lo no wireless extensions. wlan0 IEEE 802.11bgn ESSID:"my essid" Mode:Managed Frequency:2.412 GHz Access Point: C4:3D:C7:3A:1F:5D Bit Rate=78 Mb/s Tx-Power=20 dBm Retry long limit:7 RTS thr:off Fragment thr:off Power Management:off Link Quality=36/70 Signal level=-74 dBm Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0 Tx excessive retries:0 Invalid misc:0 Missed beacon:0,

    Read the article

  • Windows Telephone Scam Continues to Circulate

    Microsoft addressed the scam via a blog post during the middle of last year. Cyberthieves call homes in English-speaking countries after finding their phone numbers in telephone directories. The callers usually identify themselves as engineers from Windows Support or other legitimate-sounding organizations. They claim that your computer has been sending error messages and may have been compromised. To fix the problem, they offer a free security check. Despite being detected last year, this particular scam is still making the rounds. A recent article by news channel ABC 15 out of Arizona r...

    Read the article

  • Announcement: Video Demos Now Available

    - by Richard Bingham
    The YouTube Channel will complement our blog posts, showing you many customization and development tasks using the Fusion Applications platform. This includes: Using Page Composer and Application Composer for run-time customization Using JDeveloper for ADF design-time customization Using BI Composer tools for reports and analytics customization Using SOA development tools for BPEL and BPM customization These videos are bite-sized, only a few minutes each, and show a process from start to finish with no slides or static screenshots. We have an initial library of 14 videos covering many popular areas and a plan to release many more, roughly on a weekly basis. We hope you find these useful, and if you have comments or have things you would like to see then please leave a comment below and we'll do our best. Enjoy the show!

    Read the article

  • ADF training material now on the iPad

    - by Grant Ronald
    My team has developed about a weeks worth of ADF training material under the title ADF Insider and ADF Insider Essentials.  This has been available from our page on OTN.  But we are now loading all our content on YouTube as well so the content can now be accessed on iPads.  Over the next couple of weeks we'll also add these YouTube links to the OTN page but in the meantime, if you have an interest in ADF I strongly urge you to subscribe to our ADFInsiderEssentials YouTube Channel so you can be alerted when new content comes on line. Please also leave comments, thumbs up/down, and let us know what content/topics you want...

    Read the article

  • Global Adopt a JSR Program Update

    - by heathervc
    The Global Adopt a JSR program, combining efforts of SouJava and London Java Community,  is an excellent place to get some Java User Group (JUG) resources for JSRs.  It also has the potential to act as an extra set of eyes, ears and volunteers for JSRs. The Global project to go to is at: http://adoptajsr.java.net.  The wiki page explaining the whole program and benefits to Spec Leads and EG's can be found there, including: The mailing list: [email protected] . Portugese speakers-mainly Brazlian JUG members-have their own mailing list and more language lists may be added as required. The IRC channel is at adoptajsr on irc.freenode.net Also check out this InfoQ article with Martijn Verburg about the London Java user group, the Adopt a JSR program, the JCP and Oracle’s handling of the Java community.

    Read the article

  • Need suggestions on what you regard as &ldquo;security&rdquo;

    - by John Breakwell
    I’m currently writing a large piece on MSMQ security and wanted to check I was covering the right areas. I have some doubts as I’ve seen the occasional MSMQ forum question where a poster has used the word “security” in different contexts to what I was expecting. So here are the areas I plan to cover: Message security encryption on the wire (SSL and IPSEC) encryption of the message (MSMQ encryption) encryption of the payload (data encryption) signing and authentication Queue security SIDs and ACLs Discoverability Cross-forest issues Storage security NTFS permissions unencrypted data Service security Ports and Firewalls DOS attacks Hardened mode (HTTP only) RPC secure channel requirement authenticated RPC requirement Active Directory object permissions Setup Administrator requirements What else would you want to see?

    Read the article

  • Digitally Signing a XAP Silverlight

    Ive been referring a lot of people lately to the steps to sign a XAP. So I decided to post an excerpt I wrote about signing Silverlight XAP files in the Silverlight 4 Whitepaper on Channel 9 here to help spread the word. The signing process is important if you are creating an elevated trust out of browser application because it helps: Reassure your users that the application is authentic Allow updates to elevated trust applications Elevated trust out-of-browser applications enable developers...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • So funktioniert Marketing!

    - by A&C Redaktion
    Ein Großteil des Oracle Business wird von Partnern getragen. Damit das erfolgreich funktioniert, unterstützt Alliances & Channel die Partner mit gezielten Marketing-Aktionen. Wie zum Beispiel der Oracle Exadata Kampagne. Mit ausgewählten, spezialisierten Exadata-Partnern wurde die europaweit durchgeführten Demand Generation-Kampagne umgesetzt: Neben einem Emailing, das die jeweilige Exadata-Lösung des Partners im Fokus hatte, wurde für jeden Partner eine adaptierte Microsite erstellt und im Anschluss von der Marketingagentur nachtelefoniert. Die daraus entstandenen Leads potenzieller Kunden wurden dann an die Partner zurückgegeben, um den Vertriebsprozess zu starten. Die beiden deutschen Teilnehmer der Kampagne, inforsacom und ISE, berichten in der aktuellen Ausgabe von Partner Insight ausführlich über Ihre Erfahrungen und Erfolge der Exadata Kampagne.

    Read the article

  • So funktioniert Marketing!

    - by A&C Redaktion
    Ein Großteil des Oracle Business wird von Partnern getragen. Damit das erfolgreich funktioniert, unterstützt Alliances & Channel die Partner mit gezielten Marketing-Aktionen. Wie zum Beispiel der Oracle Exadata Kampagne. Mit ausgewählten, spezialisierten Exadata-Partnern wurde die europaweit durchgeführten Demand Generation-Kampagne umgesetzt: Neben einem Emailing, das die jeweilige Exadata-Lösung des Partners im Fokus hatte, wurde für jeden Partner eine adaptierte Microsite erstellt und im Anschluss von der Marketingagentur nachtelefoniert. Die daraus entstandenen Leads potenzieller Kunden wurden dann an die Partner zurückgegeben, um den Vertriebsprozess zu starten. Die beiden deutschen Teilnehmer der Kampagne, inforsacom und ISE, berichten in der aktuellen Ausgabe von Partner Insight ausführlich über Ihre Erfahrungen und Erfolge der Exadata Kampagne.

    Read the article

  • How do I debug a cluster running Microsoft server 2003?

    - by alcor
    I'm sole developer of a complex critical software system, written in Visual C++ 2005. It's deployed on a classical Microsoft cluster scenario (active/passive), that has Windows Server 2003 R2. If a server A goes down, the other one (B) starts and take the ownership of its duties. You have to know that: Both servers have the same Microsoft patches/fixes, same hardware, same everything. Both servers use the same memory storage (a RAID-6 through fiber channel). This software has a main module that launches the peripheral modules. if a peripheral module crashes, the main module restarts it. When I switch the application in one of the two servers (let's say the B server) two of the peripheral modules of the main applications just started to crash apparently without reason about 2 seconds after the start of the peripheral module. What could I do to analyze/inspect/resolve this weird situation?

    Read the article

  • Premières démonstrations de MeeGo, le concurrent de Chrome et d'Android issu de la fusion de Maemo d

    Mise à jour du 15/04/10 Première démonstration de MeeGo Le concurrent de Chrome et d'Android issu de la fusion de Maemo de Nokia et de Moblin d'Intel Intel et Nokia avait récemment mis en ligne la première mouture de leur nouvel issu de leur collaboration (lire ci-avant) mais cette version était encore très incomplète. Sur son "channel" dédié sur Youtube, Intel vient de d'en dévoiler un peu plus. Une première démo montre un netbook tandis que la deuxième illustre bien la volonté des deux constructeurs de faire un système qui puisse s'adapter à une grande variété de terminaux (TV, mobiles... et même aux voitures si l'o...

    Read the article

  • Halloween: Season for Java Embedded Internet of Spooky Things (IoST) (Part 2)

    - by hinkmond
    To start out our ghost hunting here at the Oracle Santa Clara campus office, we first need a ghost sensor. It's pretty easy to build one, since all we need to do is to create a circuit that can detect small fluctuations in the electromagnetic field, just like the fluctuations that ghosts cause when they pass by... Naturally, right? So, we build a static charge sensor and will use a Java Embedded app to monitor for changes in the sensor value, running analytics using Java technology on a Raspberry Pi. Bob's your uncle, and there you have it: a ghost sensor. See: Ghost Detector So, go out to Radio Shack and buy up these items: shopping list: 1 - NTE312 JFET N-channel transistor (this is in place of the MPF-102) 1 - Set of Jumper Wires 1 - LED 1 - 300 ohm resistor 1 - set of header pins Then, grab a flashlight, your Raspberry Pi, and come back here for more instructions... Don't be afraid... Yet. Hinkmond

    Read the article

  • How to render a texture partly transparent?

    - by megamoustache
    Good Morning StackOverflow, I'm having a bit of a problem right now as I can't seem to find a way to render part of a texture transparently with openGL. Here is my setting : I have a quad, representing a wall, covered with this texture (converted to PNG for uploading purposes). Obviously, I want the wall to be opaque, except for the panes of glass. There is another plane behind the wall which is supposed to show a landscape. I want to see the landscape from behind the window. Each texture is a TGA with alpha channel. The "landscape" is rendered first, then the wall. I thought it would be sufficient to achieve this effect but apparently it's not the case. The part of the window supposed to be transparent is black and the landscape only appears when I move past the wall. I tried to fiddle with GLBlendFunc() after having enabled it but it doesn't seem to do the trick. Am i forgetting an important step ? Thank you :)

    Read the article

  • How to implement custom texture formats in Android?

    - by random1337
    What I know: Android can load PNG, BMP, WEBP,... via BitmapFactory. What I want to achive: Load my own 2D file format (e.g. 1-bit texture with a 1-bit alpha channel) and output a RGBA8888 texture. Question: Is there any interface to achieve this?(or any other way) The resulting image is used as a texture for a 3D model. Why would you do that? Saving phone memory and download bandwidth while expanding the texture at runtime to RAM seems reasonable for very simple textures.

    Read the article

  • I need advice on how to debug a cluster

    - by alcor
    I'm the only developer of a complex critical software system, written in Visual C++ 2005. It's deployed on a classical Microsoft cluster scenario (active/passive), that has Windows Server 2003 R2. If a server A goes down, the other one (B) starts and take the ownership of its duties. You have to know that: both servers have the same Microsoft patches/fixes, same hardware, same everything. both servers use the same memory storage (a RAID-6 through fiber channel). this software has a main module who launch the peripheral modules. if a peripheral module crashes, the main module restarts it. When I switch the application in one of the two servers (let's say the B server) two of the peripheral modules of the main applications just started to crash apparently without reason about 2 seconds after the start of the peripheral module. What could I do to analyze/inspect/resolve this weird situation?

    Read the article

  • Ubuntu 12.04 wireless detected, but can't connect to 128-bit WEP enabled microsoft MS-700 base station

    - by ubuntufan
    I installed Ubuntu 12.04 on a Presario R 3000. The Wireless card was not detected (firmware missing). Based on several related posts, I downloaded and installed the b43 driver and wireless was finally enabled. However, I am unable to connect to my base station successfully. The base station is configured for WEP 128-bit. I tried both infrastructure mode and ad-hoc mode (with the channel, band, etc. configured). Appreciate any help in trying to get past this.

    Read the article

< Previous Page | 79 80 81 82 83 84 85 86 87 88 89 90  | Next Page >