Monthly Archives

Articles indexed in March 2011

Page 149/223 | < Previous Page | 145 146 147 148 149 150 151 152 153 154 155 156  | Next Page >

  • BSOD on windows 7 with SSD during boot after improper shutdown

    - by Bob
    I have a BSOD on windows 7 with SSD during boot after improper shutdown (while windows animation logo is moving). The computer restart imediatly after BSOD, and windows proposes to launch startup repair (if i do it, it takes +-5min and fixes the problem : computer starts normally). However, after any new improper shutdown, i got the same problem. Remarks: If i unplug, re-plug the SSD whyle system is shutdown, i have the same problem. If i reproduce the situation with old HDD, i havn't the problem Previously, i had a different problem: BSOD when waking up after sleep, which was fixed by installing drivers (ethernet, usb, graphic card) I have made ram chech and ssd check and found no problems Starting with safe mode after improper shutdown causes a BSOD at loading of classpnp.sys Configuration: System: HP compaq 8510p SSD: OCZ vertex-2 2.5 Boot options: SATA native mode - Enable, HDD transalation mode - LBA-assisted

    Read the article

  • Best SQL Server Configuration with this hardware.

    - by DavidStein
    I just received my new SQL Server from Dell. The server will be serve approximately 15 OLTP databases which average 10GB in size. Here are the basic specs: Dell PowerEdge R510 with up to 12 Hot Swap HDDs,LED Intel Xeon E5649 2.53GHz, 12M Cache, 5.86 GT/s QPI, 6 core (Quantity of 2) 48GB Memory (6x8GB), 1333MHz Dual Ranked RDIMMs for 2 Processors, Optimized PERC H700 Integrated RAID Controller, 1GB NV Cache 300GB 15K RPM SA SCSI 6Gbps 3.5in Hotplug Hard Drive (Quantity of 4) 600GB 15K RPM SA SCSI 6Gbps 3.5in Hotplug Hard Drive (Quantity of 6) My first thought was to use 3 arrays. OS - Raid 1 - (2)300GB T-Log - Raid 1 (2)300GB DB - Raid 5 (5) 600GB Backup - (1) 600GB - non-raided. However, I could also do the following after purchasing one more drive for backup. OS and T-Log - Raid 10 - (4)300GB DB - Raid 10 (6)600GB The hard drive space is not an issue as the databases are not that large. I'm just trying to optimize the speed of the applications using these databases. So, what would you guys recommend?

    Read the article

  • How force text-only pasting in emacs?

    - by eaubin
    On my mac I always have an emacs buffer open and occasionally I have to copy content from PowerPoint or Word. Unfortunately, copying to the clipboard and yanking into emacs saves all the ugly formatting (and graphics) from the original document. I only want to paste in the text (and never the formatting). My current solution is to paste into TextWrangler and then repaste into emacs. What's a better way to do this?

    Read the article

  • Is there an application I can run that will tell me how fast my computer is running?

    - by Robert Hume
    At work I log into a virtual Windows machine. I'm told it runs as fast as a PC, but I'm skeptical. Is there an application I can run on the machine that will tell me how faster the machine is actually running? It would be nice if it ran on Windows and on Mac. Updating with more details -- I was asked "why does it matter" -- here's why: It matters because I'm a programmer and I need as much speed (CPU and memory) as possible to do my work. IMO, the virtual machine is noticeably slower than a basic $800 PC would be, but I need a way a proving it. Websites like Bandwidthtest.com can show me my internet speed, so I'm wondering if there's an app that can test my computer's speed.

    Read the article

  • How to split registration and media?

    - by Stackfan
    I have a SIP project. Where i will have SIP server running. Server will do following: will only do routing and receive incoming calls But the audio/video will be peer 2 peer Can this be done with Asterisk? Only the media i have to split but the registration will be with Server. Tools: A) server with SIP B) One PC with SIP client C) Anoher PC with SIP client My goal is: B and C gets connected via A and audio/video packets are not via A

    Read the article

  • Recover open but deleted file on Linux using ln instead of cp

    - by Yang
    Say I have a file that's downloading (from a source that's hard to re-download from), but accidentally deleted from the filesystem namespace (/tmp/blah), and I'd like to recover this file. Normally I could just cp /proc/$PID/fd/$FD /tmp/blah, but in this case that would only get me a partial snapshot, since the file is still downloading. Furthermore, once the download completes, the downloading process (e.g. Chrome) will close the FD. Any way to recover by inode/create a hard link? Any other solutions? If it makes any difference, I'm mainly concerned with ext4. Thanks in advance.

    Read the article

  • Does the same lame settings (--alt-preset standard) have differrent names?

    - by erikric
    I've always used windows, and therefore EAC to rip my CDs, but since I've started using Ubuntu more often, I decided to try to rip some albums there. I ended up using k3b (since I found it in the Ubuntu Software center. Tried to install RubyRipper first, but when 'sudo apt-get install ' or UDC fails, a Windows user like me is lost) The real question here is about the settings for the lame encoder. I'm used to just writing --alt-preset standard, and everything works like a charm, but the default in k3b look like this: lame -r --bitwidth 16 --little-endian -s 44.1 -h --tt %t --ta %a --tl %m --ty %y --tc %c --tn %n - %f I assume these are some sensible lame settings, and not a malicious perl script (although it looks like it). It seems to me like some of these ought to be there, and that I can not overwrite the whole thing with my good ol' --alt-preset. So, the question is do I need to replace anything, or is -h the same as old --alt-preset? Is it a difference between '--preset standard' and '--alt-preset standard'? And are those the same as -V 2?

    Read the article

  • Can't pin modified shortcuts to the Windows 7 task bar

    - by Coder
    I have a shortcut to a .bat file which I pin to the task bar using a workaround by using another icon and this seems to work. Now I make a copy of that shortcut, point it to a different .bat file, rename it, and I can't pin this one to the task bar. I have to find some other new unused icon to pin, pin it, then modify it manually. The other problem this causes is that windows seems to track which icons were pinned even if they are modified after the fact. As such, if I use media player as my dummy icon, pin it, then alter it's name and shortcut to point to a .bat file, I can't re-pin windows media player and if I select unpin from the windows media player, it unpins my shortcut to my .bat file. I can't believe how ridiculous this is. Is there a way to pin anything I want to the taskbar (ie. .bat file in my case) that does not cause problems like this? Is there an easy way I can copy an existing shortcut and modify it and re-pin it to the taskbar? The reason I want to copy it is because I start a .bat file (in particular git bash) and I set properties on the window like quick edit, increase the screen buffer and set it's position and size manually. I don't want to have to do this to every single icon I want to pin since they will be identical aside from the shortcut url.

    Read the article

  • Why is rsync.exe [cwRsync] trying to open a port when in client mode?

    - by hemancuso
    I'm trying to use a cygwin compiled version of rsync [the cwrsync package] on Windows and in seemingly whatever configuration I test in there is a request to the user presented by Windows Firewall to allow inbound traffic. If you deny this request, everything works fine - as expected. I'm doing a vanilla push rsync.exe localpath user@remotepath:/absolutepath and it works just fine. I've also attempted this command having deleted ssh from the path and using rsync on local paths - still a firewall prompt. Why is this listen() happening and is there a way I can force the client to not attempt to listen without recompiling and maintaing a patch?

    Read the article

  • Run a BitLocker protected Windows 7 installation on VirtualBox from physical drive

    - by djechelon
    I have a broken laptop with its hard drive intact. I'll be getting it repaired in a few days but I must continue my work possibly uninterrupted, so I chose to run the OS in another working laptop (I can't just transfer documents). My question is really simple: Can I create a virtual machine in VirtualBox (under Linux) that uses the physical hard drive mentioned above which is encrypted with BitLocker? I have the restore key at hand, of course. I wouldn't like to mount the hard disk as primary hard disk for laptop (and run 7 as primary OS), but that could be the final choice if virtualizing is not an option. Thank you.

    Read the article

  • How to setup RAID 1 with Intel RST on an existing Windows 7 system?

    - by instcode
    I'd like to setup RAID-1 using Intel Rapid Storage Technology on my Windows 7 64-bit system. I have an 1TB SATA HDD with Windows 7 system installed on the first primary partition (leftmost, ~200GB). The rest of this HDD is unallocated (~800GB). I bought another 2TB SATA, then created a primary partition (leftmost, ~500GB) and filled my data in. The rest of this HDD is unallocated (~1.5TB). A quick disk layout (XXX is the unallocated region): HDD1 (1TB): [ 200GB C:\ SYSTEM | XXXXXXXXXXXX ] HDD2 (2TB): [ 500GB Z:\ PROGRAM | XXXXXXXXXXXXXXXXXXXXXX ] Now, I want to create a 500GB RAID-1 partition (I'm not sure if using "partition" is correct here) on the rightmost of the 2 HDDs above without losing any existing data from both disks. Here is the expected layout: HDD1 (1TB): [ 200GB C:\ SYSTEM | XXXXXX | 500GB D:\ DATA - RAID-1 ] HDD2 (2TB): [ 500GB Z:\ PROGRAM | XXXXXXXXXXXXXXXX | 500GB D:\ DATA RAID-1] Let's not concern about data lost, is it possible to have that final layout using Intel RST? Previously, I tried this layout using dynamic disk & software RAID from Windows and it worked as expected, however, it's quite ugly in resynching after an OS failure that I don't want. If yes, is there a way to keep the data on existing partitions untouched or, at least, it should keep the SYSTEM partition safe (I'm okay if the PROGRAM partition has to be gone.)? Well, are there any strict/special steps I should follow when using the Intel RST manager in order to achieve that? If none of those questions above are "Yes", could you please suggest some other possible layouts that leave the C:SYSTEM partition untouched?

    Read the article

  • Windows cannot open directory with too long name created by Linux

    - by Tim
    Hello! My laptop has two OSes: Windows 7 and Ubuntu 10.10. A partition of Windows 7 of format NTFS is mounted in Ubuntu. In Ubuntu, I created a directory under somehow deep path and with a long name for itself, specifically, the name for that directory is "a set of size-measurable subsets ie sigma algebra". Now in Windows, I cannot open the directory, which I guess is because of the name is too long, nor can I rename it. I was wondering if there is some way to access that directory under Windows? Better without changing the directory if possible, but will have to if necessary. Thanks and regards! Update: This is the output using "DIR /X" in cmd.exe, which does not shorten the directory name: F:\science\math\Foundations of mathematics\set theory\whether element of a set i s also a set\when element is set\when element sets are subsets of a universal se t\closed under some set operations\sigma algebra of sets>DIR /X Volume in drive F is Data Volume Serial Number is 0492-DD90 Directory of F:\science\math\Foundations of mathematics\set theory\whether elem ent of a set is also a set\when element is set\when element sets are subsets of a universal set\closed under some set operations\sigma algebra of sets 03/14/2011 10:43 AM <DIR> . 03/14/2011 10:43 AM <DIR> .. 03/08/2011 10:09 AM <DIR> a set of size-measurable sub sets ie sigma algebra 02/12/2011 04:08 AM <DIR> example 02/17/2011 12:30 PM <DIR> general 03/13/2011 02:28 PM <DIR> mapping from sigma algebra t o R or C i.e. measure 02/12/2011 04:10 AM <DIR> msbl mapping from general ms bl space to Borel msbl R or C 02/12/2011 04:10 AM 4,928 new file~ 03/14/2011 10:42 AM <DIR> temp 03/02/2011 10:58 AM <DIR> with Cartesian product of se ts 1 File(s) 4,928 bytes 9 Dir(s) 39,509,340,160 bytes free

    Read the article

  • Disabling the command enter shortcut on Mac Entourage.

    - by Bruce
    It seems like disabling a shortcut should not be such a big deal, but I cannot seem to be able to do it for any shortcuts and specifically not for the combination that I keep hitting by mistake, every single day. The smaller space bar makes it very easy to hit the command key by mistake, and the return is a commonly used key when typing. I keep sending important e-mails before I am done typing, or worse, before I am done editing. I do not necessarily want to disable all the shortcuts, but that one for sure. The choices for changing anything in Entourage seem very limited. [Entourage for Mac 2008. Version 12.2.8. (101117) ESD] It is easy enough just to hit "send." This short cut causes a lot more trouble than it saves. Help.

    Read the article

  • Please recommend a free stealth remote access solution for internal network

    - by Nathaniel_613
    Hi, I need to have ability to stealthfully access, view, and control a few dozen PC's on my company's network. I would need a control panel window, so I can instantly connect to any of the users. Please recommend a secure solution, that will not make us vulnerable to viruses and hackers. All of the PC's have dynamic IP addresses, so I may have to use the DNS name or have a solution that uses web. Thank you very much, Nathaniel.

    Read the article

  • Don’t Panic! Hides Applications, Erases Browser History, and More

    - by Jason Fitzpatrick
    Don’t Panic! is a free and portable Windows application that makes it easy to quickly hide windows, clear document and browser history, and otherwise mask your goofing off. It includes options for hiding and closing applications, clearing browser history as well as recent clearing the Recent Documents menu and the Recycle Bin. Application closure/hiding is governed by as simple blacklist; populate the blacklist and hit the panic button (or the user-customizable panic button shortcut, CTRL+P by default). Don’t Panic! is free portable application, Windows only. Hit up the link below to read more and grab a copy. Don’t Panic! [Portable Apps] How To Make a Youtube Video Into an Animated GIFHTG Explains: What Are Character Encodings and How Do They Differ?How To Make Disposable Sleeves for Your In-Ear Monitors

    Read the article

  • Xoom Giveaway Courtesy of the Complete Android Guide [Giveaway]

    - by Jason Fitzpatrick
    If you’re an Android fan and looking to score an Android 3.0 tablet, you can enter to win a Xoom tablet courtesy of the Complete Android Guide. What do you need to do? Per their official rules: Contribute content to the site. To do so: Sign up (via the Register link in the top-right corner). Email android ‘at’ completeguides ‘dot’ net and request contributor access to this site. Write a killer tutorial, reference or chapter for the book.  Buy the book, in paperback or ebook form.  The deadline is March 31, the winner will be drawn in in April. Note: The link to the officials rules appears defunct, we’ll update shortly when the URL is fixed. Xoom Drawing @ Complete Android Guide [Complete Guides] How To Make a Youtube Video Into an Animated GIFHTG Explains: What Are Character Encodings and How Do They Differ?How To Make Disposable Sleeves for Your In-Ear Monitors

    Read the article

  • Repurpose a Wire Basket as a Game Controller Organizer

    - by Jason Fitzpatrick
    If you’re looking for an easy way to organize your console controllers, this simple repurposing hack turns an IKEA wire basket intended for managing cable clutter into a game controller stand. You won’t need a Dremel tool to install this hack; all you need to do to follow in the foot steps of IKEAHackers reader Leslie is to install a SIGNUM cable basket (or similar cable organizer) upside down so loom curves up instead of down. Instant wire cradle for your controllers (or possibly an open air charging station for your small electronics). Check out the link below for more details. Game Controller Management System [IKEAHackers] How To Make a Youtube Video Into an Animated GIFHTG Explains: What Are Character Encodings and How Do They Differ?How To Make Disposable Sleeves for Your In-Ear Monitors

    Read the article

  • How To Make a Youtube Video Into an Animated GIF

    - by Eric Z Goodnight
    You’ve likely seen webpages and picdumps everywhere, with goofy, ridiculous, and funny animated GIFs. Here’s how you can have some fun by making your own in a matter of minutes, using your favorite Youtube videos and Photoshop. While animated GIFs may be pretty useless, they can be funny and fun to make. See what you can do with your favorite Youtube videos and Photoshop, and a surprisingly little time.How To Make a Youtube Video Into an Animated GIFHTG Explains: What Are Character Encodings and How Do They Differ?How To Make Disposable Sleeves for Your In-Ear Monitors

    Read the article

  • How to Disable Pidgin Notifications in Ubuntu

    - by Justin Garrison
    Ubuntu notifications are great, but some applications can get annoying by popping up things you don’t care about. Here is how you can disable, or enable, specific notifications for Pidgin. Whether you only want notifications when buddies sign on and off, or you only want new message notifications the libnotify plugin allows you to tweak the settings to your liking.How To Make a Youtube Video Into an Animated GIFHTG Explains: What Are Character Encodings and How Do They Differ?How To Make Disposable Sleeves for Your In-Ear Monitors

    Read the article

  • Windows 7 Task Manager Tips for Performance

    In Part 1 of this tutorial we looked at how the Task Manager in Windows 7 could be used to view the processes running on your computer and the memory usage associated with each. Let s continue by discussing some more tips on using the Task Manager to help identify any issues and improve your PC s performance.... Comcast? Business Class - Official Site Learn About Comcast Small Business Services. Best in Phone, TV & Internet.

    Read the article

  • Android 3.0 : Flash Player 10.2 en bêta sur les tablettes à partir de vendredi prochain, Adobe publie la liste des appareils mobiles concernés

    Android 3.0 : Flash Player 10.2 en bêta sur les tablettes à partir de vendredi prochain Adobe publie la liste des appareils mobiles concernés Mise à jour du 14/03/2011 La sortie de la deuxième version du lecteur Adobe Flash Player pour les mobiles est prévue pour le vendredi 18 mars prochain, mais il ne sera disponible ce jour-là qu'en version bêta pour les tablettes sous Android 3.0 alias Honeycomb. En revanche, Flash Player 10.2 sortira vendredi en version définitive sur l'Android Market pour Android 2.2 (Frayo) et 2.3 (Gingerbread) Cette disponibilité ne concerne toutefois qu'un nombre limité d'appareils mobil...

    Read the article

  • Plongée dans les entrailles de l'outil Person Finder de Google, une API open-source codée en Python

    Plongée dans les entrailles de l'outil Person Finder de Google, une API open-source codée en Python Mise à jour du 14.03.2011 par Katleen Comme indiqué dans la news précédente, Google a lancé son outil Person Finder à destination des personnes concernées par le drame survenu le 11.03.2011 au Japon (victimes et entourage de victimes). Ce service a déjà servi auparavant, lors des sinistres de Haiti ou de Christchurch par exemple. En fait, il est né à l'initiative de la firme comme projet sur Google.org, dans le cadre du secteur Google Crisis Response qui y a été lancé en janvier 2010 (séisme d'Haïti), en réponse ...

    Read the article

  • Oracle PeopleSoft Mobile Inventory Management, une solution mobile pour améliorer précision des stocks et productivité des utilisateurs

    Oracle PeopleSoft Mobile Inventory Management Une application mobile pour améliorer la précision des stocks et la productivité des utilisateurs Oracle possède déjà un portefeuille très complet de solutions de gestion des stocks et de solutions mobiles. Ce portefeuille s'enrichit encore plus aujourd'hui avec une nouvelle solution : Oracle PeopleSoft Mobile Inventory Management. Il s'agit en fait d'une nouvelle application de la suite Oracle PeopleSoft Enterprise Supply Chain Management qui permet d'améliorer la précision des stocks et la productivité des opérateurs en automatisant les transactions mobiles de gestion pour les utilisateurs de terminaux mobiles équipés de Microsoft W...

    Read the article

  • Windows 7 : mise à jour du Microsoft Desktop Optimization Pack, le pack de virtualisation et de déploiement

    Windows 7 : mise à jour de Microsoft Desktop Optimization Pack Le pack de virtualisation et de déploiement Microsoft vient de procéder à une mise à jour de son pack de solutions de déploiement et de virtualisation Microsoft Destop Optimization Pack (MDOP) La mise à jour de MDOP porte principalement sur MED-V (Microsoft Enterprise Desktop Virtualisation) qui est désormais disponible en version 2.0 et sur APP-V 4 dont le Service Pack 1 est désormais disponible. Le SP1 de Microsoft APP-V 4 rend le processus de virtualisation des applications plus facile et plus rapide grâce à l'intégration du « package ...

    Read the article

  • Citrix dévoile Xen Cloud Platform 1.0, la première version de son environnement de développement Cloud open-source

    Citrix dévoile la première version de Xen Cloud Platform Son environnement de développement Cloud open-source Xen.org (à l'origine de l'hyperviseur open source Xen) annonce le lancement de Xen Cloud Platform (XCP) 1.0. Développé dans le cadre du Xen Cloud Project lancé en 2009, XCP 1.0 est une solution de Citrix pour les PME désireuses de mettre en place des clouds privés, ainsi qu'aux passionnés de l'open source, aux universités et aux chercheurs souhaitant expérimenter le cloud computing. Il s'agit d'un tournant dans l'utilisation en entreprise pour Xen.org. Jusqu'ici, celui-ci ne proposait traditionnellement que des logiciels sous forme de code source. XC...

    Read the article

< Previous Page | 145 146 147 148 149 150 151 152 153 154 155 156  | Next Page >