Search Results

Search found 9332 results on 374 pages for 'an original alias'.

Page 84/374 | < Previous Page | 80 81 82 83 84 85 86 87 88 89 90 91  | Next Page >

  • Vlc Player not opening

    - by vivek
    For the last few days, my vlc player is not responding at all, when i try to double click any file or even run vlc without any file, it just doesn't open up. I tried to open it through terminal and it was working fine but there were no option coming on vlc screen and also if i close the terminal, vlc closes automatically. I can't figure how to make vlc back to its original way so that i can access any file through vlc. Any help will be appreciated..

    Read the article

  • Can I use wikipedia/commons images to create a logo for my program?

    - by bitmask
    I'm not perfectly clear on the implications of the GFDL for reusing pictures in this manner. Would adding a reference in the git's root folder's README suffice, or would that clutter every use of the logo, as you would have to attribute all original contributors on every single usage (like, e.g. presentations, flyers, websites, ...)? The software itself qualifies as FOSS, although it doesn't have a GNU* license.

    Read the article

  • Can a website become popular in a "category" (ie, not just a single page)

    - by Earlz
    I have a few keywords where my website is high ranking(2nd and 3rd result). For instance, I have 3 blog posts covering a certain kind of modem. Is it common for search engines to consider a website popular in a "category"? For instance, if I was the first result for "foobar" with one page, and then added another separate page which mentioned "foobar"(and maybe a link from the original page), would a search engine prioritize this separate page when compared to a completely separate website with a page with the same content?

    Read the article

  • How can I maximum compress video files?

    - by EmmyS
    I received 4 .mov files from a client that they want on their mobile website via SlideShowPro. Each original file was between 200 and 400 mb. I've gotten each one down to about 30 mb using transmageddon as described here, but that's still really big for a mobile connection. Is there any way to shrink them even further? Maybe it's the settings; I used Output Format = MPEG4, Audio = AAC, Video = H264 (which is what is suggested by SlideShowPro.)

    Read the article

  • Map caps-lock key to middle mouse click

    - by Stefano Palazzo
    Since I rarely use caps-lock, I'd like to map the key to a middle mouse click instead. I would also like to map Alt+Caps Lock to the original function of the caps lock key, should I ever need it. I can map any keyboard shortcut to xdotool click 2, but the Gnome Keyboard Shortcuts dialog won't let me assign a command to the caps-lock key, even with modifiers. I know this is a bit of a strange undertaking; How would I go about doing it?

    Read the article

  • restore window sizes, drag and drop functionalty in Unity (a simple use case)

    - by Avetik Topchyan
    Once application is maximized (say "Cheese") how can I restore its size back to the original? Is it possible to drag-and-drop from one application to another application in Unity? If so, how can I do that? Suppose I have a Rhythmbox open and I would like to drag a picture from a Desktop location (actually where is it?) to Rhythmbox album art section in the lower left corner? Unity was poorly designed, IMHO.

    Read the article

  • How can I add a new user as sudoer using the command line?

    - by David B
    After I add a user using adduser, I can't see it via System->Administration->Users and Groups unless I logout then login again. Is that normal? Also, can I set a newly added user as a sudoer or do I have to change that only after adding it? How can I do that via the shell? Finally, can I delete the original user that was created upon initial installation of ubuntu, or is this user somehow 'special'?

    Read the article

  • install ubuntu on dell xps 13

    - by gokcehan
    I didn't wanna wait for ubuntu pre-installed dell xps 13 laptops and bought one with windows 7 on it. Also I have decided to keep windows and create a dual boot machine, currently considering following alternative ubuntu install images for the machine: project sputnik image from here original ubuntu 12.04 from ubuntu website wubi I was wondering if it's possible to install project sputnik image with wubi installer? If not, will I have any driver problems with regular ubuntu install image or regular wubi? (if those two are different at all)

    Read the article

  • Chapter 7–Enforced Data Protection

    - by drsql
    As the book progresses, I find myself veering from the original stated outline quite a bit, because as I teach about this more (and I am teaching a daylong db design class in August at http://www.sqlsolstice.com/ … shameless plug, but it is on topic :) I start to find that a given order works better. Originally I had slated myself to talk more about modeling here for three chapters, then get back to the more implementation topics to finish out the book, but now I am going to keep plugging through...(read more)

    Read the article

  • Converting lib from other language to python and Rights issue

    - by Arruda
    If I take a program, and basically translate its source from some language to python, with some small changes, can I do a entirely my new lib or I have to make a "version" of the old one? would this be a copy of the first or a new lib based in the ideas of the first? OBS: Consider the original lib is using Apache License v2 Not sure if well explained, but I can't see for now how to make it more clear.

    Read the article

  • How can you tell whether to use Composite Pattern or a Tree Structure, or a third implementation?

    - by Aske B.
    I have two client types, an "Observer"-type and a "Subject"-type. They're both associated with a hierarchy of groups. The Observer will receive (calendar) data from the groups it is associated with throughout the different hierarchies. This data is calculated by combining data from 'parent' groups of the group trying to collect data (each group can have only one parent). The Subject will be able to create the data (that the Observers will receive) in the groups they're associated with. When data is created in a group, all 'children' of the group will have the data as well, and they will be able to make their own version of a specific area of the data, but still linked to the original data created (in my specific implementation, the original data will contain time-period(s) and headline, while the subgroups specify the rest of the data for the receivers directly linked to their respective groups). However, when the Subject creates data, it has to check if all affected Observers have any data that conflicts with this, which means a huge recursive function, as far as I can understand. So I think this can be summed up to the fact that I need to be able to have a hierarchy that you can go up and down in, and some places be able to treat them as a whole (recursion, basically). Also, I'm not just aiming at a solution that works. I'm hoping to find a solution that is relatively easy to understand (architecture-wise at least) and also flexible enough to be able to easily receive additional functionality in the future. Is there a design pattern, or a good practice to go by, to solve this problem or similar hierarchy problems? EDIT: Here's the design I have: The "Phoenix"-class is named that way because I didn't think of an appropriate name yet. But besides this I need to be able to hide specific activities for specific observers, even though they are attached to them through the groups. A little Off-topic: Personally, I feel that I should be able to chop this problem down to smaller problems, but it escapes me how. I think it's because it involves multiple recursive functionalities that aren't associated with each other and different client types that needs to get information in different ways. I can't really wrap my head around it. If anyone can guide me in a direction of how to become better at encapsulating hierarchy problems, I'd be very glad to receive that as well.

    Read the article

  • while(true) and loop-breaking - anti-pattern?

    - by KeithS
    Consider the following code: public void doSomething(int input) { while(true) { TransformInSomeWay(input); if(ProcessingComplete(input)) break; DoSomethingElseTo(input); } } Assume that this process involves a finite but input-dependent number of steps; the loop is designed to terminate on its own as a result of the algorithm, and is not designed to run indefinitely (until cancelled by an outside event). Because the test to see if the loop should end is in the middle of a logical set of steps, the while loop itself currently doesn't check anything meaningful; the check is instead performed at the "proper" place within the conceptual algorithm. I was told that this is bad code, because it is more bug-prone due to the ending condition not being checked by the loop structure. It's more difficult to figure out how you'd exit the loop, and could invite bugs as the breaking condition might be bypassed or omitted accidentally given future changes. Now, the code could be structured as follows: public void doSomething(int input) { TransformInSomeWay(input); while(!ProcessingComplete(input)) { DoSomethingElseTo(input); TransformInSomeWay(input); } } However, this duplicates a call to a method in code, violating DRY; if TransformInSomeWay were later replaced with some other method, both calls would have to be found and changed (and the fact that there are two may be less obvious in a more complex piece of code). You could also write it like: public void doSomething(int input) { var complete = false; while(!complete) { TransformInSomeWay(input); complete = ProcessingComplete(input); if(!complete) { DoSomethingElseTo(input); } } } ... but you now have a variable whose only purpose is to shift the condition-checking to the loop structure, and also has to be checked multiple times to provide the same behavior as the original logic. For my part, I say that given the algorithm this code implements in the real world, the original code is the most readable. If you were going through it yourself, this is the way you'd think about it, and so it would be intuitive to people familiar with the algorithm. So, which is "better"? is it better to give the responsibility of condition checking to the while loop by structuring the logic around the loop? Or is it better to structure the logic in a "natural" way as indicated by requirements or a conceptual description of the algorithm, even though that may mean bypassing the loop's built-in capabilities?

    Read the article

  • Search Engine Optimization - Article Authors Area

    When you think of starting a new online business make the authors area a frequent place to visit. Writing your own original content will brand your business. Submit your one of a kind article to only one directory and then write a new one to submit to another directory. Branding your business products and or services will create a structure of trust, when others see that you understand what you are doing.

    Read the article

  • Core debugger enhancements in VS2010

    Since my team offers "parallel debugging", we refer to the team delivering all the other debugging features as the "core debugger" team. They have published a video of new VS2010 debugger features that I encourage you to watch to find out about enhancements with DataTips, breakpoints, dump debugging (inc. IL interpreter) and Threads window.The raw list of features with short description is also here. Comments about this post welcome at the original blog.

    Read the article

  • Liquid XML 2012 Service Pack 1 available

    - by bconlon
    Liquid XML Editor is one of my favourite tools, but I was slightly concerned with the original 2012 release as the new XML Data Mapper tool was a bit buggy. So I was pleased to see SP1 is now available for download.Sure enough the issues have been fixed and it's once more a great tool!The data mapper can also now be run from the command line (this was a little limiting before as you had to open the IDE to run the mapping) and the Help now contains full documentation.#

    Read the article

  • The repository pattern explained and implemented

    The pattern documented and named Repository is one of the most misunderstood and misused. In this post well implement the pattern in C# to achieve this simple line of code: var customers = customers.Matching(new PremiumCustomersFilter()) as well as discuss the origins of the pattern and the original definitions to clear out some of the misrepresentations. [...]...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Chapters Two, Three, and Four

    - by drsql
    I am trying to blog all of the chapters of the book, but due to deadlines and a lot of shuffling about, I never got around it for these three chapters, two of which I have added since I wrote the original table of contents. All of these contain mostly material from previous editions of the book, updated a good amount, but nothing tremendously different if you had memorized the material from the previous edition. As such, the pre-writing blog ritual wasn’t as necessary (for me at least) as it is going...(read more)

    Read the article

  • Extend gnome-control-center’s list of keyboard layouts

    - by MPi
    While looking for my problem of Keyboad layout: In 13.10, modified symbols do not apply, I noticed that gnome-control-center region layouts has a list of keyboard layouts that is not directly related to the ones found in /usr/share/X11/xkb/symbols. For example, on my German machine it lists ‘Englisch (Colemak)’ and ‘English (Britisch, Colemak)’ as keyboard layouts, both are not found in the original files, but obviously translations. So, my question is: Where does gnome-control-center get its list of keyboard layouts from? Can it be extended?

    Read the article

  • Nautilus does not connect via FTP after upgrade to Oneric

    - by user15533
    Since I have upgraded to Oneric Nautilus is not able any more to connect to FTP-Servers. Trying to connect it tells me, I should use a different client. Original message in German: Fehler: Fehler beim Verbinden: Verbindungsaufbau abgelehnt Bitte wählen Sie einen anderen Betrachter und versuchen Sie es erneut. Does anybody know, what the hell that mean? Thanks for helping! I worked for year using nautilus for some simple FTP transactions...

    Read the article

  • Why do password strength requirements exist? [migrated]

    - by Bozho
    Password strength is now everything, and they force you to come up with passwords with digits, special characters, upper-case letters and whatnot. Apart from being a usability nightmare (even I as a developer hate it when a website requires a complex password), what are the actual benefits of having strong passwords (for website authentication)? Here are the prerequisites of a system that handles authentication properly: store passwords using bcrypt (or at least use salt+hash) - hard-to-impossible to find the original password when an attacker gets the database lock subsequent password attempts with a growing cooldown - no brute-force via the site

    Read the article

  • An SEO Service Provider is a Must For Content Creation

    Anyone who plans on making any search engine optimizing (SEO) changes to their website should consider hiring an Internet marketing company who will know precisely how to create keywords that will attract a lot of traffic to your website. This will, in turn, increase your sales. Of course, you will need to be happy with these keywords before the person whom you hire will create highly effective, original, and unique content for your website.

    Read the article

< Previous Page | 80 81 82 83 84 85 86 87 88 89 90 91  | Next Page >