Search Results

Search found 16871 results on 675 pages for 'computer vision'.

Page 126/675 | < Previous Page | 122 123 124 125 126 127 128 129 130 131 132 133  | Next Page >

  • Ubuntu 14.04 hangs at purple screen after it asks for my password

    - by user286030
    I have installed Ubuntu 14.04LTS onto a Toshiba Tecra M5. The install appears to have been successful but when it says "install complete restart your computer" the computer does not restart. It just sits there, then after a forced shut down Ubuntu appears to start, icons appear in the top right hand corner of the screen but after it asks for my password it just hangs up on the purple screen. Can anyone help ?

    Read the article

  • How to save terminal history manually?

    - by wim
    It's my understanding that the history file is updated when the terminal exits. But sometimes my computer crashes out, and the terminal doesn't exit cleanly, and then I lose those commands from my history which is annoying. How can I make it flush immediately, so that the entries still go there even if my computer has a meltdown? At the moment I'm using this workaround, but I feel there should be a better way. I'm using gnome-terminal on Ubuntu 12.10.

    Read the article

  • How should I structure my turn based engine to allow flexibility for players/AI and observation?

    - by Reefpirate
    I've just started making a Turn Based Strategy engine in GameMaker's GML language... And I was cruising along nicely until it came time to handle the turn cycle, and determining who is controlling what player, and also how to handle the camera and what is displayed on screen. Here's an outline of the main switch happening in my main game loop at the moment: switch (GameState) { case BEGIN_TURN: // Start of turn operations/routines break; case MID_TURN: switch (PControlledBy[Turn]) { case HUMAN: switch (MidTurnState) { case MT_SELECT: // No units selected, 'idle' UI state break; case MT_MOVE: // Unit selected and attempting to move break; case MT_ATTACK: break; } break; case COMPUTER: // AI ROUTINES GO HERE break; case OBSERVER: // OBSERVER ROUTINES GO HERE break; } break; case END_TURN: // End of turn routines/operations, and move Turn to next player break; } Now, I can see a couple of problems with this set-up already... But I don't have any idea how to go about making it 'right'. Turn is a global variable that stores which player's turn it is, and the BEGIN_TURN and END_TURN states make perfect sense to me... But the MID_TURN state is baffling me because of the things I want to happen here: If there are players controlled by humans, I want the AI to do it's thing on its turn here, but I want to be able to have the camera follow the AI as it makes moves in the human player's vision. If there are no human controlled player's, I'd like to be able to watch two or more AI's battle it out on the map with god-like 'observer' vision. So basically I'm wondering if there are any resources for how to structure a Turn Based Strategy engine? I've found lots of writing about pathfinding and AI, and those are all great... But when it comes to handling the turn structure and the game states I am having trouble finding any resources at all. How should the states be divided to allow flexibility between the players and the controllers (HUMAN, COMPUTER, OBSERVER)? Also, maybe if I'm on the right track I just need some reassurance before I lay down another few hundred lines of code...

    Read the article

  • How do i Setup Different Users to Folders

    - by Erin
    I am trying to setup a Ubuntu Server for an office. Its going to be a file share server that 4-5 desktops connect to and access the files. Im planning on having different access for certain computers so computer 1 has full access but say computer 2 can only see a certain folder. My question is, is this possible and how would i go about setting it up? All workstations are using Windows XP - Vista.

    Read the article

  • Interview Romain Linsolas, un Devoxxien passionné et membre de Developpez.com, par Thierry Leriche-Dessirier

    Bonjour à tous,Voici une interview de Romain Linsolas : http://thierry-leriche-dessirier.dev...per-devoxxien/On croise régulièrement Romain Linsolas dans les conférences françaises et européennes en tant que simple spectateur, mais également comme orateur. Avec quatre interventions sur les précédentes éditions de Devoxx et de nombreuses apparitions dans des Users Groups, Romain est devenu une figure dans le petit monde du développement.Dans cette interview, Romain nous décrit sa vision des conférences...

    Read the article

  • Impatient Customers Make Flawless Service Mission Critical for Midsize Companies

    - by Richard Lefebvre
    At times, I can be an impatient customer. But I’m not alone. Research by The Social Habit shows that among customers who contact a brand, product, or company through social media for support, 32% expect a response within 30 minutes and 42% expect a response within 60 minutes! 70% of respondents to another study expected their complaints to be addressed within 24 hours, irrespective of how they contacted the company. I was intrigued when I read a recent blog post by David Vap, Group Vice President of Product Development for Oracle Service Cloud. It’s about “Three Secrets to Innovation” in customer service. In David’s words: 1) Focus on making what’s hard simple 2) Solve real problems for real people 3) Don’t just spin a good vision. Do something about it  I believe midsize companies have a leg up in delivering on these three points, mainly because they have no other choice. How can you grow a business without listening to your customers and providing flawless service? Big companies are often weighed down by customer service practices that have been churning in bureaucracy for years or even decades. When the all-in-one printer/fax/scanner I bought my wife for Christmas (call me a romantic) failed after sixty days, I wasted hours of my time navigating the big brand manufacturer’s complex support and contact policies only to be offered a refurbished replacement after I shipped mine back to them. There was not a happy ending. Let's just say my wife still doesn't have a printer.  Young midsize companies need to innovate to grow. Established midsize company brands need to innovate to survive and reach the next level. Midsize Customer Case Study: The Boston Globe The Boston Globe, established in 1872 and the winner of 22 Pulitzer Prizes, is fighting the prevailing decline in the newspaper industry. Businessman John Henry invested in the Globe in 2013 because he, “…believes deeply in the future of this great community, and the Globe should play a vital role in determining that future”. How well the paper executes on its bold new strategy is truly mission critical—a matter of life or death for an industry icon. This customer case study tells how Oracle’s Service Cloud is helping The Boston Globe “do something about” and not just “spin” it’s strategy and vision via improved customer service. For example, Oracle RightNow Chat Cloud Service is now the preferred support channel for its online environments. The average e-mail or phone call can take three to four minutes to complete while the average chat is only 30 to 40 seconds. It’s a great example of one company leveraging technology to make things simpler to solve real problems for real people. Related: Oracle Cloud Service a leader in The Forrester Wave™: Customer Service Solutions For Small And Midsize Teams, Q2 2014

    Read the article

  • Stuxnet - how it infects

    - by Kit Ong
    Except from the CNET article.http://news.cnet.com/8301-13772_3-57413329-52/stuxnet-delivered-to-iranian-nuclear-plant-on-thumb-drive/?part=propeller&subj=news&tag=linkvThe Stuxnet worm propagates by exploiting a hole in all versions of Windows in the code that processes shortcut files, ending in ".lnk," according to...[the] Microsoft Malware Protection Center....Merely browsing to the removable media drive using an application that displays shortcut icons, such as Windows Explorer, will run the malware without the user clicking on the icons. The worm infects USB drives or other removable storage devices that are subsequently connected to the infected machine. Those USB drives then infect other machines much like the common cold is spread by infected people sneezing into their hands and then touching door knobs that others are handling.The malware includes a rootkit, which is software designed to hide the fact that a computer has been compromised, and other software that sneaks onto computers by using a digital certificates signed two Taiwanese chip manufacturers that are based in the same industrial complex in Taiwan--RealTek and JMicron, according to Chester Wisniewski, senior security advisor at Sophos.... It is unclear how the digital signatures were acquired by the attacker, but experts believe they were stolen and that the companies were not involved.Once the machine is infected, a Trojan looks to see if the computer it lands on is running Siemens' Simatic WinCC software. The malware then automatically uses a default password that is hard-coded into the software to access the control system's Microsoft SQL database. The Stuxnet worm propagates by exploiting a hole in all versions of Windows in the code that processes shortcut files, ending in ".lnk," according to...[the] Microsoft Malware Protection Center....Merely browsing to the removable media drive using an application that displays shortcut icons, such as Windows Explorer, will run the malware without the user clicking on the icons. The worm infects USB drives or other removable storage devices that are subsequently connected to the infected machine. Those USB drives then infect other machines much like the common cold is spread by infected people sneezing into their hands and then touching door knobs that others are handling.The malware includes a rootkit, which is software designed to hide the fact that a computer has been compromised, and other software that sneaks onto computers by using a digital certificates signed two Taiwanese chip manufacturers that are based in the same industrial complex in Taiwan--RealTek and JMicron, according to Chester Wisniewski, senior security advisor at Sophos.... It is unclear how the digital signatures were acquired by the attacker, but experts believe they were stolen and that the companies were not involved.Once the machine is infected, a Trojan looks to see if the computer it lands on is running Siemens' Simatic WinCC software. The malware then automatically uses a default password that is hard-coded into the software to access the control system's Microsoft SQL database.

    Read the article

  • How do I alter/customize the GRUB boot menu for Ubuntu 12.10?

    - by Kyle Payne
    I use a shared computer, so I need to make it user friendly for my-less-than-computer-knowledgable friend currently have Ubuntu 12.10 installed I would like to change the GRUB menu so that Windows 7 is at the top of the list (thus allowing the automatic timeout to automatically select it on startup) and Ubuntu down below I've already used the information used at { How do I change the grub boot order? } and that didn't work.

    Read the article

  • Are there any jobs for software developers with a BA and no previous employment? [closed]

    - by IDWMaster
    Are there any careers available for developers who have never been employed before in the industry, and who have a BA, rather than a BS in computer science? I'm currently pursuing a BS in computer science but realized that the math is too difficult for me. Someone suggested switching to a BA instead but I have not been able to find any jobs in my state (Minnesota) which take a BA. I was wondering if a BA is worth pursuing if I cannot get a BS.

    Read the article

  • How to Send and Receive Faxes Online Without a Fax Machine or Phone Line

    - by Chris Hoffman
    Some slow-moving businesses and government agencies may not accept documents over email, forcing you to fax them in. If you are forced to send a fax, you can do it from your computer for free. We’ve previously covered ways to electronically sign documents without printing and scanning them. With this process, you can digitally sign a document and fax it to a business — all on your computer and without any printing required.    

    Read the article

  • Oracle OpenLux Seminar on December 8, 2011 at Espace Namur in Hamm

    - by Yves Moriceau
    You are kindly invited to experience the Oracle vision on the future at the Oracle OpenLux Seminar on December 8th 2011, from 9:00 to 14:00 at the Artisan Confiseur Namur in Hamm. If you want to have more details on this seminar and you wish to register please folow the link: http://www.artdcom.com/oracle/general/2011-openlux-seminar-details.html We look forward to meeting you on December 8th. Oracle Luxembourg

    Read the article

  • Must Keep the Power Flowing No Matter What! [Humorous Image]

    - by Asian Angel
    Who cares what it looks like as long as it works, right? Have you seen or created similar “quick fixes” to keep a computer running? Make sure to share your story in the comments! Barely Working Laptop Cord [Cheeseburger Network] 6 Ways Windows 8 Is More Secure Than Windows 7 HTG Explains: Why It’s Good That Your Computer’s RAM Is Full 10 Awesome Improvements For Desktop Users in Windows 8

    Read the article

  • Ubuntu 12.04 forgetting XModmap settings often

    - by PKKid
    I have the following contents in my ~/.Xmodmap file. It seems a couple times a day (without rebooting or logging out) I need to rerun the command "xmodmap ~/.Xmodmap" to reset my settings. The only thing I can think is that it seems to happen when I walk away from my computer for a bit. Maybe it forgets the settings when the computer locks itself? remove control = Control_L remove mod1 = Alt_L keycode 64 = Control_L keycode 37 = Alt_L add control = Control_L add mod1 = Alt_L Anyone else seeing similar issues?

    Read the article

  • Friday Fun: Demon Destroyer

    - by Asian Angel
    In this week’s game you are on a mission to destroy all the demons you encounter, but your only weapon is an army of enhanced tadpoles. Wait a moment…tadpoles?!! Can you succeed using this most unlikely of weapons or will the demons have the last laugh? Can Dust Actually Damage My Computer? What To Do If You Get a Virus on Your Computer Why Enabling “Do Not Track” Doesn’t Stop You From Being Tracked

    Read the article

  • Rules of Holes #4 -Do You Have the BIG Picture?

    - by ArnieRowland
    Some folks decry the concept of being in a 'Hole'. For them, there is no such thing as 'Technical Debt', no such thing as maintaining weak and wobbly legacy code, no such thing as bad designs, no such thing as under-skilled or poorly performing co-workers, no such thing as 'fighting fires', or no such thing as management that doesn't share the corporate vision. They just go to work and do their job, keep their head down, and do whatever is required. Mostly. Until the day they are swallowed by the...(read more)

    Read the article

  • Simple 2 player server

    - by Sourabh Lal
    I have recently started learning javascript and html and have developed simple 2 player games such as tick-tack-toe, battleship, and dots&boxes. However these 2 player games can only be played on one computer (i.e. the 2 players must sit together) However, I want to modify this so that one can play with a friend on a different computer. Any suggestions on how this is possible? Also since I am a beginner please do not assume that I know all the jargon.

    Read the article

  • La fondation Mozilla annonce quatre versions majeures de Firefox en 2011, d'après la mise à jour de sa feuille de route

    La fondation Mozilla annonce quatre versions majeures de Firefox en 2011 D'après la récente mise à jour de sa feuille de route La fondation Mozilla vient de mettre à jour sa feuille de route pour Firefox destinée à raccourcir considérablement les cycles de développement des prochaines versions du navigateur. Par la même occasion, la fondation a publié ses objectifs et priorités pour Firefox en 2011, concentrés sur les fonctionnalités que devrait posséder le navigateur pour séduire les utilisateurs tout en représentant la vision pour les technologies Web de la fondation. Les nouvelles versions seront désormais proposées plus fréquemment sous forme de petites mises à ...

    Read the article

  • Le "In-Memory" débarque dans SQL Server, Microsoft muscle Excel pour la BI et annonce le SP1 de SQL Server 2012 au Pass Summit 2012

    Pass Summit 2012 : Microsoft dote SQL Server d'une base de données In-Memory et annonce la disponibilité du SP 1 de SQL Server 2012 et SQL Server 2012 PDW Microsoft a profité de son salon Pass Summit 2012 dédié à SQL Server pour dévoiler sa vision d'une plateforme de gestion de données moderne. L'éditeur à travers plusieurs annonces a renouvelé son engagement d'aider ses clients à mieux exploiter leurs données, qu'elles soient structurées ou non structurées, où qu'elles se trouvent et quelle que soit leur taille. L'annonce phare qui a marqué l'ouverture du Pass Summit 2012 a été la présentation d'une nouvelle technologie de base de données transactionnelles in-Memory

    Read the article

  • Different domain for dirrenet thing or just one?

    - by Mahdi
    Suppose I'm starting my business my major is computer services like: graphic , programming, computer repair , networking and.... now the question is, what do you recommend for a better ranking? should i have a separate domain for each of these field or i can have them all in different pages/categories in one website? my preferred CMS system is Wordpress. and...do you recommend me using keywords in domain name even if it becomes hard to remember, meaningless and long? Thanks

    Read the article

  • How do I format my entire HDD?

    - by Hjke123
    Ok I have recently made some mistakes with installing some operating systems that I should have just kept on a live cd not ubuntu but another os and with my ocd when I saw my lot's of different partitions I just wanted to reset my computer so it boot's up and doesn't load any os and I have to put in my ubuntu live cd and install that and that would be my only os on this computer so I want to know how I can just wipe my entire hard drive so when it boot's I get to put my live cd in and start anew?

    Read the article

  • Suddenly the native app is cool again

    <b>The Open Road:</b> "If the future is cloud-based applications, we still have a long way to go to realize that vision. Ironically, we may actually be getting ever further away from it even as the cloud assumes central importance in the computing landscape."

    Read the article

  • Screen cuts off part of GRUB on boot

    - by Matthew
    I've recently installed Ubuntu 11.10 on my Windows 7 desktop computer (on a seperate partition) Everything has gone smoothly except when I restart the computer and GRUB's loader screen shows, part of the screen gets cut off.. but once ive selected a boot option and hit enter, the screen readjusts to fill the entire monitor properly. So my question is, is there a way I can correct this ? Kind of annoying not being able to see the full boot option

    Read the article

< Previous Page | 122 123 124 125 126 127 128 129 130 131 132 133  | Next Page >