Search Results

Search found 14131 results on 566 pages for 'note'.

Page 117/566 | < Previous Page | 113 114 115 116 117 118 119 120 121 122 123 124  | Next Page >

  • Openjdk-7-jdk some commands not recognized?

    - by function
    I installed openjdk-7-jdk using apt-get install. However, when I type 'javac', the terminal says, 'bash: /usr/bin/javac: No such file or directory'. I think the link is broken, but how can I fix it? Note: I installed openjdk-7-jdk before, but then I removed openjdk and installed sun-java. Now I deleted sun-jdk and want to go back to openjdk, but javac is not recognized. I'm using Ubuntu 11.10. Edit: Recognized: java; Not Recognized: javac, javadoc, appletviewer, ...

    Read the article

  • Hotmail financé par la publicité ciblée ? L'idée ferait son chemin, mais sur un modèle différent de

    Hotmail financé par la publicité ciblée ? L'idée ferait son chemin mais sur un modèle différent de celui de G-mail Tim O'Brien, un cadre de Microsoft, vient de participer à une conférence sur les sujets du Cloud et des SaaS (Software as a service), la bien nommée SaaSCon 2010 de Santa Clara, en Californie. A cette occasion, O'Brien a tenu à rappeler que garder et protéger les données de tous les utilisateurs de Hotmail, une des messageries les plus populaires au monde, sur les serveurs de Microsoft était un défi quotidien et sans cesse renouvelé. Il note par ailleurs que le degré de confiance entre les utilisateurs de services hébergés de type Cloud (et donc de Hotmail) et ...

    Read the article

  • VirtualBox Port Forward

    - by john.graves(at)oracle.com
    A great new feature in VirtualBox 4.0 is the ability to use NAT networking and forward ports without needing to use ssh -L/-R tricks.  This is great for booting multiple VM domains simultaneously.  It is possible to have several instances which map back to the host machine and different ports on localhost:* automatically forward to the correct VM.  This avoids the hassle of setting up dns entries or static IP addresses.In this example, I'm mapping the host ports 3xxxx to the VM's well known server ports.Note: It is important to setup the Frontend HTTP host/port to avoid incorrect URL rewriting.You may also need to setup an http channel to deal with local traffic which uses the network address 10.0.2.15Happy VMing.

    Read the article

  • Ubuntu 12.10 Laptop temperature

    - by romi
    I'm using a laptop having dedicated graphics card with Ubuntu and Windows 7 dual boot. The windows 7 idle temperature for cpu is 51C average and gpu is 46-48.5C, and when in load Cpu temp varies between 55-61C, and GPU 49-51 MAX. But in ubuntu idle temp CPU: 54c Gpu(ati radeon,proprietary driver installed): 50C and on load cpu: 58-69C gpu:53C max. Is it normal? If not is there any solution? Note that i'm using jupiter,latest graphics driver, grub tweaks etc.

    Read the article

  • Gnome question> Nautilus only starts as root user

    - by user7978
    Hello. I am running Ubuntu 10.04 62-bit. When I attempt to start Nautilus from the command line, it does not appear -- although a PID is generated. As root/sudo, I can start Nautilus fine. One note: I run e16 as the windows manager, so I do not use Nautilus to draw my desktop. However, even under this configuration, Nautilus used to run fine as a "regular" user. The permissions for Nautilus are the same as the other packages in /usr/bin. I believe this is a Gnome issue, but I'm fumbling at this point.

    Read the article

  • Running projects from NTFS partition on Ubuntu

    - by the_hamster
    I'm dual booting Windows 7/Ubuntu 12.04. I want to run C++/Java projects from a NTFS partition, where I keep generally all my files and projects. I fiddled with the fstab. One time I removed 'noexec', the other I changed it to 'exec'. After that,each time, I remounted the partition and it still didn't work. I tried using sudo mount -o remount,exec /media/mypartition It didn't work either. There was a somewhat similar question already, but it didn't have the proper answer for me or I didn't know how to make it work(note: I am a total newbie with Ubuntu and Linux in general).

    Read the article

  • How do I get to the maintenace shell?

    - by Narida
    I'm asking this because initially, my problem was this (power failure during installation, so I typed the following instructions in the maintenance shell: sudo mount -o remount,rw / sudo dpkg --configure a sudo mount -o remount,ro / sudo sync sudo reboot The first three lines worked, afterwards, my computer (a Dell Inspiron 530) got stalled for several hours, so I unplugged it. When I turned it on, the log in screen appeared, and after I try to write my password, it leads me back to the log screen. I must note that when I typed the first three lines during the maintenance shell mode, it said that the errors which were encountered during processing were: initscripts bluez gnome-bluetooth So, what do I have to do in order to get back to the maintenance shell so I can type code again? And, what code do I have to write in order to restore my computer? Thank you for your attention.

    Read the article

  • Oracle Fusion Applications Partner Update Webcasts

    - by Richard Lefebvre
    Every Thursday from November 29th - December 20th! In order to keep you up to date with partner-specific news and information regarding Oracle Fusion Applications, we are expanding our Fusion Applications Webcast Series to include these additional Thursday sessions. All sessions will be recorded and replays will be posted to this Oracle PartnerNetwork page. Please mark your calendar for these NEW Fusion Partner Update specific sessions: Click Here for logistics and dial-in details for each webcast. 11/29/12 Win Cloud SFA with Fusion CRM: Sales Positioning 12/6/12 Win Cloud SFA with Fusion CRM: Fusion CRM against SFDC 12/13/12 Implementing Fusion Applications: ERP Cloud Services, Back Office Solutions that Keep You in Front 12/20/12 Understanding Fusion Supply Chain Management (SCM) Opportunities PLEASE NOTE: This webcast series is for Oracle Partners and Oracle Employees ONLY.

    Read the article

  • Data Source Security Part 1

    - by Steve Felts
    I’ve written a couple of articles on how to store data source security credentials using the Oracle wallet.  I plan to write a few articles on the various types of security available to WebLogic Server (WLS) data sources.  There are more options than you might think! There have been several enhancements in this area in WLS 10.3.6.  There are a couple of more enhancements planned for release WLS 12.1.2 that I will include here for completeness.  This isn’t intended as a teaser.  If you call your Oracle support person, you can get them now as minor patches to WLS 10.3.6.   The current security documentation is scattered in a few places, has a few incorrect statements, and is missing a few topics.  It also seems that the knowledge of how to apply some of these features isn’t written down.  The goal of these articles is to talk about WLS data source security in a unified way and to introduce some approaches to using the available features.  Introduction to WebLogic Data Source Security Options By default, you define a single database user and password for a data source.  You can store it in the data source descriptor or make use of the Oracle wallet.  This is a very simple and efficient approach to security.  All of the connections in the connection pool are owned by this user and there is no special processing when a connection is given out.  That is, it’s a homogeneous connection pool and any request can get any connection from a security perspective (there are other aspects like affinity).  Regardless of the end user of the application, all connections in the pool use the same security credentials to access the DBMS.   No additional information is needed when you get a connection because it’s all available from the data source descriptor (or wallet). java.sql.Connection conn =  mydatasource.getConnection(); Note: You can enter the password as a name-value pair in the Properties field (this not permitted for production environments) or you can enter it in the Password field of the data source descriptor. The value in the Password field overrides any password value defined in the Properties passed to the JDBC Driver when creating physical database connections. It is recommended that you use the Password attribute in place of the password property in the properties string because the Password value is encrypted in the configuration file (stored as the password-encrypted attribute in the jdbc-driver-params tag in the module file) and is hidden in the administration console.  The Properties and Password fields are located on the administration console Data Source creation wizard or Data Source Configuration tab. The JDBC API can also be used to programmatically specify a database user name and password as in the following.  java.sql.Connection conn = mydatasource.getConnection(“user”, “password”); According to the JDBC specification, it’s supposed to take a database user and associated password but different vendors implement this differently.  WLS, by default, treats this as an application server user and password.  The pair is authenticated to see if it’s a valid user and that user is used for WLS security permission checks.  By default, the user is then mapped to a database user and password using the data source credential mapper, so this API sort of follows the specification but database credentials are one-step removed from the application code.  More details and the rationale are described later. While the default approach is simple, it does mean that only one database user is doing all of the work.  You can’t figure out who actually did the update and you can’t restrict SQL operations by who is running the operation, at least at the database level.   Any type of per-user logic will need to be in the application code instead of having the database do it.  There are various WLS data source features that can be configured to provide some per-user information about the operations to the database. WebLogic Data Source Security Options This table describes the features available for WebLogic data sources to configure database security credentials and a brief description.  It also captures information about the compatibility of these features with one another. Feature Description Can be used with Can’t be used with User authentication (default) Default getConnection(user, password) behavior – validate the input and use the user/password in the descriptor. Set client identifier Proxy Session, Identity pooling, Use database credentials Use database credentials Instead of using the credential mapper, use the supplied user and password directly. Set client identifier, Proxy session, Identity pooling User authentication, Multi Data Source Set Client Identifier Set a client identifier property associated with the connection (Oracle and DB2 only). Everything Proxy Session Set a light-weight proxy user associated with the connection (Oracle-only). Set client identifier, Use database credentials Identity pooling, User authentication Identity pooling Heterogeneous pool of connections owned by specified users. Set client identifier, Use database credentials Proxy session, User authentication, Labeling, Multi-datasource, Active GridLink Note that all of these features are available with both XA and non-XA drivers. Currently, the Proxy Session and Use Database Credentials options are on the Oracle tab of the Data Source Configuration tab of the administration console (even though the Use Database Credentials feature is not just for Oracle databases – oops).  The rest of the features are on the Identity tab of the Data Source Configuration tab in the administration console (plan on seeing them all in one place in the future). The subsequent articles will describe these features in more detail.  Keep referring back to this table to see the big picture.

    Read the article

  • Is C++11 Uniform Initialization a replacement for the old style syntax?

    - by Robert Dailey
    I understand that C++11's uniform initialization solves some syntactical ambiguity in the language, but in a lot of Bjarne Stroustrup's presentations (particularly those during the GoingNative 2012 talks), his examples primarily use this syntax now whenever he is constructing objects. Is it recommended now to use uniform initialization in all cases? What should the general approach be for this new feature as far as coding style goes and general usage? What are some reasons to not use it? Note that in my mind I'm thinking primarily of object construction as my use case, but if there are other scenarios to consider please let me know.

    Read the article

  • How does URL Rewriting affect SEO?

    - by Costa
    The following paragraph is from SEO Google Guide Google is good at crawling all types of URL structures, even if they're quite complex, but spending the time to make your URLs as simple as possible for both users and search engines can help. Some webmasters try to achieve this by rewriting their dynamic URLs to static ones; while Google is fine with this, we'd like to note that this is an advanced procedure and if done incorrectly, could cause crawling issues with your site. What makes URL re-writing implementation incorrect for GoogleBot? I am using Asp.net 3.5 framework.

    Read the article

  • Problems with the colors on my screen. How can I check if it's a hardware problem?

    - by Ingo Gerth
    On my EEE PC netbook some colors are not displayed properly. Specifically, dark gradients such as in the window title do not look very smooth, but rather look like a sequence of a couple of different colors. This is especially visible when opening a menu, for example the "File" menu in Firefox. As you know this one is black, and it looks terrible on my screen. It is not just black, but the colors look really graded and far from a smooth gradient or anything. Now I am wondering: Is this a hardware or software issue? And how can I check this? If it should be a fixable problem I think it would be worth another question. Note that I am using Natty. If my problem description is not good enough I can try to take a photo.

    Read the article

  • To use Dart, the Java programmer has to work with 2 languages? [closed]

    - by Sridhar-Sarnobat
    When deciding on a technology to use for web apps, it's become a difficult choice between GWT and Dart and I am looking for guidance in deciding. GWT is a java programmer's dream because they don't have to learn a new language or have to worry about a separate IDE or extra plugin etc. GWT was sold using this value proposition - one didn't need to program in Javascript. But are Google making a U-turn and saying "go through the hassle of learning a new language" afterall? Or is it intended for there to be a Java to Dart compiler so that Java developers do not have to learn a new language? (this is not a rant, so I don't know why you are down-voting the question) Note: "the syntax is very similar" is not a justification. You could say why bother with GWT and just work with Java + Javascript directly.

    Read the article

  • Moving OVD from Test to Production

    - by mark.wilcox
    Customer asked support "How to move a test OVD server to production". There is a couple of ways to do this. One way is to clone the environment: http://download.oracle.com/docs/cd/E15523_01/core.1111/e10105/testprod.htm#CH... Another way - which is particularly useful if you want to push configuration from a parent OVD server to children in a cluster: http://download.oracle.com/docs/cd/E14571_01/oid.1111/e10046/basic_server_set... Note if you use the second option and you have any data in a Local Store Adapter - you may also need to use the oidcmprec tool to synchronize that data: http://download.oracle.com/docs/cd/E14571_01/oid.1111/e10029/replic_mng_mon.h... Posted via email from Virtual Identity Dialogue

    Read the article

  • Assembly as a First Programming Language?

    - by Anto
    How good of an idea do you think it would be to teach people Assembly (some variant) as a first programming language? It would take a lot more effort than learning for instance Java or Python, but one would have good understanding of the machine more or less from "programming day one" (compared to many higher level languages, at least). What do you think? Is it a realistic idea, at least to those who are ready to make the extra effort? Advantages and disadvantages? Note: I'm no teacher, just curious

    Read the article

  • How do I set the root password so I can use su instead of sudo?

    - by Zignd
    Warning: Directly logging in as root is like playing with fire, because one little typo is enough to lose critical data or make your system unbootable. Note that desktop environments will also function incorrectly if you login to them as root. See these questions for the reasons behind why sudo is preferred and why root-login is disabled by default: What are the benefits of sudo over su? Why is there no option to login as root? Instead of letting you set a password for root during install Ubuntu set it to * for no password and disables the actual account login, however even with this being said you can still use root in ubuntu by sudo. So how to set a root password on Ubuntu?

    Read the article

  • Application to organize / manage installed networks

    - by vicmp3
    I was wondering if there is a Application where you can organize networks. I mean if you have installed some networks you have to note every pc's name, his ip-address and so on. Is there a Application where you can manage it? I saw the monitoring tools but that is not exactly what I'm looking for. Maybe I didnt explain me well, after all my englis his not so good :) For example if I install many different networks I write in a book how I configured them. I write pc-name ip-address ip-gateway ip-broadcast and so on for each network. It will be great if I can do it in a program to organize it well, and for example it gives me a node view of the network.

    Read the article

  • How do global cancel/exit commands work in bash?

    - by SecurityGate
    As I have done multiple times before, I've written bash scripts, and just general commands that go nowhere. They just blink the little command line cursor at me for infinity until I control+C the command. When I do cancel the command, what exactly is going on when I do this? Am I somehow stopping and killing the current PID I'm working on? Does it jump to a different run-level and execute something to terminate the command? On a slightly different note, I've never been able to figure out how to set up something like this in a script or program I've worked on. Since I mostly program in Ruby, can I setup something like a certain key press stops the program? Every time I've looked into doing something similar, I always end up getting hung up when it comes to user input, whether that is a loop waiting for a condition, or something like this: def Break() user_break = gets.strip end def Main() Function1() Break() Function2() Break() [...] end It seems and is incredibly bulky, and definitely isn't easily scaled up or down.

    Read the article

  • HP Probook touchpad

    - by ScienceSE
    I wrote about this problem some weeks ago, but now the question is: "Why is touchpad works not so good as in windows". I tried some "experiments": When I use windows and if I accidentally touched touchpad - cursor isn't moving, also no clicks occurring. So in windows working with touchpad is quite normal, but in Ubuntu ?f I accidentally touch the touchpad even with my wrist - cursor is moving etc. In Windows, the cursor moves only when I touch it with finger. And... If, for example, I hold one finger on touchpad and simultaneously move the second finger on the touchpad - the cursor doesn't move, however in ubuntu he does. He's "super sensetive" in ubuntu or what? Also I tried to apply the option in "Mouse and touchpad", which called "Disable touchpad when typing", but nevertheless he isn't disabling when i'm typing... Note: this option is circled in red frame, i dont know is it a good "sign" ) What can I do to fix the problem?

    Read the article

  • New and Noteworthy Fixed Assets Notes

    - by Oracle_EBS
    A new white paper for Integrating Oracle Inventory Transactions Into Oracle Projects To Generate Asset Lines & Interface Assets To Fixed Assets (Doc ID 1392743.1) A listing of available Oracle E-Business Fixed Assets Diagnostics (Doc ID 1362875.1) Information on the knowledge management enhancements made in My Oracle Support Knowledge Management Version 6.0 Release (Doc ID 1393516.1) The new Period Close Advisor for the Release 12 E-Business Suite (Doc ID 335.1).  What is the Period Close Advisor?  The Period Close Advisor provides guidance on recommended period end procedures for E-Business Release 12.x.  It is intended to be generic and does not relate to a specific organization or industry.  Step by step best practices with tips and troubleshooting references are provided to assist you through each phase.  The EBS R12 Period Close Advisor for Assets data can also be found in a standalone note (Doc ID 1359475.1)

    Read the article

  • What is an effective way to organize tasks for a new project?

    - by Dulan
    Is there a practical solution to organizing the initial tasks for a new project? To elaborate, imagine the features/stories/goals are laid out for a project. How might one go about organizing those into sane tasks for the first few versions? The scenario I typically have in mind has the features listed as a high-level reference for what the end user-experience should involve. The tasks for constructing such features are then broken down into chunks (such as "create interface for X component"). Such a task is not necessarily "tied" to only that feature and may be useful when building subsequent features. Is breaking features down into small, code-able solutions valid? Or should they be slightly removed from any specific implementation? I do not expect that there is one "right" answer to this question, but I am looking for a fairly pragmatic and unobtrusive approach. As a note, I'm looking for solutions that are independent of any tools or "systems" used for managing the tasks themselves.

    Read the article

  • How do I find fun companies?

    - by the_great_monkey
    When looking for jobs, I'm not sure how to determine whether the company is fun to work for or not. I want to work in companies that are open, innovative, and make a good contribution to the world of computer science. For example, Dropbox looks like a very fun company and its existence is very important. How do I spot this in job advertisements? EDIT: I should note that I live in Australia, so many of the fun companies that I know does not have any office here. I know only a handful of fun companies in Australia – including Google in Sydney. But I don't know that many.

    Read the article

  • Is it relevant to warn about truncating real constants to 32 bits?

    - by zneak
    I'm toying around with LLVM and looking at what it would take to make yet another strongly-typed language, and now that I'm around the syntax, I've noticed that it seems to be a pet peeve of strongly typed language to warn people that their constants won't fit inside a float: // both in Java and C# float foo = 3.2; // error: implicitly truncating a double into a float // or something along these lines Why doesn't this work in Java and C#? I know it's easy to add the f after the 3.2, but is it really doing anything useful? Must I really be that aware that I'm using single-precision reals instead of double-precision reals? Maybe I'm just missing something (which, basically, is why I'm asking). Note that float foo = [const] is not the same thing as float foo = [double variable], where requiring the cast seems normal to me.

    Read the article

  • Point me to info about constructing filters (of lists)

    - by jah
    I would like some pointers to information which would help me understand how to go about providing the ability to filter a list of entities by their attributes as well as by attributes of related entities. As an example, imagine a web app which provides order management of some kind. Orders and related entities are stored in a relational database. And imagine that the app has an interface which lists the orders. The problem is: how does one allow the list to be filtered by, for example:- order number (an attribute) line item name (an attribute of a n-n related entity) some text in an administrative note related to the order (text found in an attribute of a 1-1 related entity) I'm trying to discover whether there is something like a standard, efficient way to construct the queries and the filtering form; or some possible strategies; or any theory on the topic; or some example code. My google foo fails me.

    Read the article

  • How do I comperes and split files with terminal

    - by Levan
    So what I wanted to do. comperes(7zip) and split 600MB folder into 199MB parts but sadly when I tried to do this task with archive manager it gave me an error, but I know that if I use terminal it will work. I looked this up in askubuntu and found out about this commend 7z a -v5m -mx0 ubuntu.7z I understand that v5m will split it to 5 mb parts and -mx0 means that it will not comperes it but I want it to comperes so what should I write instead of this -mx0 pleas note: I am using .7zip because I most probably will use this file on windows pc thank you in advanced

    Read the article

< Previous Page | 113 114 115 116 117 118 119 120 121 122 123 124  | Next Page >