Search Results

Search found 10963 results on 439 pages for 'documentation generation'.

Page 141/439 | < Previous Page | 137 138 139 140 141 142 143 144 145 146 147 148  | Next Page >

  • DoubleCommand Non-Functional on 10.6.3.

    - by Tim Visher
    I have a 1st or 2nd generation MacBook running 10.6.3. I want to remap my enter key to Ctrl and my right option key to enter (Emacs… yeah) and DoubleCommand seems to be precisely what the doctor ordered. Unfortunately, after having installed the latest version, it seems to be doing absolutely nothing. The correct settings are saved and active, but none of the remapping is taking effect. Are there any known issues with other OS X plug-ins (I run pretty heavily modified) or extensions that I should be aware of? What could the issue be? I initially tried to set only the User settings and then logged out and logged back in but nothing happened. I then tried saving them to System as well and logged out and in and nothing. Then I restarted the machine… twice… and nothing happened. Thanks in advance!

    Read the article

  • NetApp and Hyper-V 2012 best practice/whitepapers?

    - by grimstoner
    We've recently acquired a NetApp/Cisco UCS solution, and I'd like to gather some background knowledge as to the best practices when setting up Hyper-V 2012 on such a solution. There is an upcoming seminar (in the Netherlands, http://www.realdolmen.com/nl/MSHyper-v-2012_NetApp), but it's in Dutch, and a couple of weeks away... Does anyone have some whitepapers/documentation about such a setup, or hasn't it been done before?

    Read the article

  • How to make a JBoss service to handle Protocol Buffers directly?

    - by mlaverd
    Hello everyone, I'm interested in building a JBoss service. Because I'm reusing some existing code, the service must be able to talk SSL/TLS and Protocol Buffers. The documentation I see on the JBoss wiki makes it look like services have their transport and data interpretation handled by JBoss itself. Is it really the case? How could I implement this requirement?

    Read the article

  • SSH rsa key works with external IP not internal IP

    - by Ian
    I am using rackspace cloud hosting. I have 2 servers behind a load balancer. Each server has an external IP and an internal IP. I want to setup a sync job that uses SSH to transfer files. I made an rsa key, and I can successfully SSH from server A into server B, using the external IP of server B, without being prompted for a password. If I try to do the same but use the internal IP, it prompts me for a password. I want to be able to use the key instead of the password. Why is this? Is there something special I have to do during key generation so it works for both IPs? Any help is appreciated.

    Read the article

  • Can I chain authentication methods in Apache?

    - by jldugger
    I've got an existing SVN system that we're migrating away from SVN AuthUserFile (a flat file format) to LDAP authentication. In so doing, we'd like to establish a transitional phase where both LDAP and AuthUserFile work. Does Apache support fall through authentication mechanisms? I'm reading the documentation and it's still not clear either way.

    Read the article

  • Apache2 and logrotate: delaycompress needed?

    - by j0nes
    Hello, I am currently looking at the file size of my Apache logs as they became huge. In my logrotate conf, I have delaycompress enabled. Does Apache really need this (as the logrotate documentation says that some programs still write in the old file) or is it safe to disable delaycompress? Best regards, Jonas

    Read the article

  • s3fs changing s3 permissions?

    - by magd1
    My developer believes that s3fs is changing my bucket's permissions. Is this possible? I want my bucket to be public, but it keeps reverting back to private. Here's my fstab. s3fs#production /mnt/production fuse use_cache=/tmp,use_rrs=1,allow_other,uid=1000,gid=1000 0 0 My developer mentioned the "-o default_acl (default="private")" option. The documentation refers to "canned acl", but I don't understand what these are.

    Read the article

  • What presentation software should I use for a five minute talk.

    - by Chas. Owens
    I am giving a lightning talk shortly and need to put together some slides. It is a technical talk about Perl documentation. I will be using a OS X machine to run the presentation software. I would like something that is minimalistic easy to publish to the web simple to control (forward and back should do it, but hotkey access to individual slides would be nice) simple to create slides for (preferably purely text based and doesn't require much in the way of markup)

    Read the article

  • snmpd.conf network range not accepted

    - by Stefan
    I am using snmpd on CentOS 6.3 and was giving a network range to the source for mapping community to security group. com2sec mynetwork 192.168.0.0/23 centreon Anyhow it is not working and I always get a timeout from the polling server. When I enter the exact ip of the polling server it works (192.168.3.180) It even works if I enter the whole netmask (255.255.252.0) Anyhow it should work according to documentation. Did I do anything wrong?

    Read the article

  • Google Docs revision/access control

    - by brainjam
    I've worked on shared Google Docs with family members, but don't really know how or whether Google prevents two users from modifying the same document at the same time .. and clobbering one another's work. How does Google Docs handle this .. is a document 'locked' whenever somebody opens it for revisions? I haven't been able to see an answer for this in their documentation/help.

    Read the article

  • Recommended Practices for Managing httpd.conf for different environments

    - by James Kingsbery
    We have several different environments (developer dekstop, integration, QA, prod) which should have slightly different variants of the same httpd.conf file. As an example, the httpd.conf file configures that httpd should act as a reverse proxy and proxy certain URLs to Jetty, but the hostname of the Jetty instance is different in each environment. Is there a recommended practice for mangaging these kinds of differences? I looked around the apache documentation for the httpd.conf file and I didn't see anything that does what I need.

    Read the article

  • Can WD3200AZRX SATA-3 hard drive work on SATA-2?

    - by Roberts
    I know this question is already been asked a lot of times. I am buying new hard drive today, but I am worrying that it wont work on my motherboard Gigabyte GA-945PL-S3. I want to buy this hard drive. It's pretty expensive and I don't want to get dissapointed. I can't find any documentation about jumper settings and that's why I am asking this question in this site, I hope somebody helps me. Have a nice day!

    Read the article

  • Windows Advanced Firewall (Command Line Interface)

    - by Bradford Fisher
    I'm wondering where to find detailed information regarding the Microsoft Advanced Windows Firewall command line settings. For instance, from reading a couple technet articles I've learned that I can run the following: netsh advfirewall firewall set rule group=”File and Printer Sharing” new enable=Yes The bit about 'group="File and Printer Sharing"' is the part I'm having trouble finding documentation for. Any help would be greatly appreciated. And, if possible, I'd rather a pointer to the docs than a simple listing of group names.

    Read the article

  • How to protect custom shapes from being reused? Visio 2010

    - by Chris
    We are building a set of documentation for our business with Visio 2010. We need to make the Visio files accessible to external consultants for review, but we want to ensure that they cannot copy any of our custom shapes or formulas. How can we protect custom shapes/stencils so that they cannot be used outside of our documents? Or, if that's not possible, how can we mark our shapes in such a way that we could prove that they were created by us?

    Read the article

  • web spidering/crawling, can i do it or just search engines?

    - by bboyreason
    i already had a question answered about web-scraping with wget. but as i read a little more, i realize i may be looking for a web-crawling program. particularly the part about web-crawlers being able to get specific data like links or, in my case, products. all of the products on my site have the following naming convention, website.com/uniqueAlphaNumericID.html as far as i know, no dynamic content generation is being used and only one page per one item in the above format. should i just be thinking about: wget website.com | grep *.html or should i be looking into spiders/crawlers?

    Read the article

  • Is it possible to copy recordings off of a DVR box hard drive?

    - by bdr9
    My cable TV company gives me a Cisco Explorer 8640HDC DVR box that can record shows from TV. I know that it contains a hard drive to save the shows on. What format and file system are used to store the videos on the hard drive? I have looked at the documentation for this DVR box and there is no technical information about the manner in which recordings are stored. Is it possible to connect the hard drive to a computer and extract the recordings from it?

    Read the article

  • How to ignore moved lines in a diff

    - by klickverbot
    I am currently working on a source code generation tool. To make sure that my changes do no introduce any new bugs, a diff between the output of the program before and after my changes would theoretically be a valuable tool. However, this turns out to be harder than one might think, because the tool outputs lines where the order does not matter (like import statements, function declarations, …) in a semi-randomly ordered way. Because of this, the output of diff is cluttered with many changes that are in fact only lines moved to another position in the same file. Is there a way to make diff ignore these moves and only output the lines that have really been added or removed?

    Read the article

  • <VirtualHost fqdn.mydomain.com:80> not recommended?

    - by Alois Mahdal
    In Apache2 documentation thay say that in <VirtualHost *:80>, the * can be replaced by IP or FQDN, but the FQDN is not recommended. Addr can be: The IP address of the virtual host; A fully qualified domain name for the IP address of the virtual host (not recommended); But why is it not recommended? If I have www.mydomain.com and webmail.mydomain.com pointing to the same IP address, why shouldn't I use the names here?

    Read the article

  • Why is the output of ls is like this?

    - by dorelal
    I am using Mac OS X Snow Leopard and when I type ls c * this is what I get in my terminal: clock: PSD demo.html jquery.tzineClock script.js styles.css clock2: clojure-presentations: Clojure-1up.pdf ClojureInTheField-1up.pdf license.html Clojure-4up.pdf README ClojureForRubyists-1up.pdf keynote coffee-script: Cakefile README bin examples index.html package.json test LICENSE Rakefile documentation extras lib src vendor By default I am using Bash.

    Read the article

  • Where the heck is mod_login? (Joomla)

    - by Joey Adams
    I'm a Joomla newbie, and I'm trying to set up a site to require login access to certain articles. Simply setting the article's Access Level to Restricted makes it disappear rather than prompting for a login. I can't figure out how to make a login page because I can't find any menu items or documentation pertaining to mod_login. I want to set at least one page to require login access. Where do I start?

    Read the article

  • How to open the file under cursor in vim when its listing directory contents(Netrw Directory Listing)

    - by balki
    I can press o but it creates a new window and opens the file there. I want it to open in the same window. At least it should display on the same window each time open some file but it creates new windows for each file I open. Also is there a way to make it open as a vertical split and not horizontal split? Where can I find the complete documentation/cheatsheet of all possible commands in 'Netrw Directory Listing' mode?

    Read the article

  • Enable TRIM on FreeBSD 9 Install

    - by javanix
    I recently upgraded all of the parts in my FreeBSD 9 server. I purchased an SSD to run as a the root drive - I'd like to enable TRIM on it but the only documentation I can find on it is that it can be enabled using newfs or tunefs. Is there a way to specify flags to newfs during the installation process, and if not, am I going to run into TRIM-related issues if I run tunefs after installation is complete?

    Read the article

  • Plesk SiteBuilder Install (UNIX)

    - by Clear.Cache
    Trying to install site builder from Plesk, for Unix. I have Centos 4x I installed fine using tarball files on their site. Ran: * rpm -Uhv updates/*.rpm * rpm -Uhv sitebuilder/*.rpm Documentation: http://download1.parallels.com/SiteBuilder/4.5.0/doc/install/en_US/html/index.htm Now, http://64.64.96.138/login Doesn't work. http://download1.parallels.com/SiteBuilder/4.5.0/doc/install/en_US/html/index.htm?fileName=performing_first_login_to_sitebuilder.htm What am I doing wrong here?

    Read the article

  • How to get SharePoint 2010 controls in toolbox

    - by Suja Shyam
    My application uses Visual Studio 2010 to develop an application in SharePoint 2010. I created a visual webpart and added a <SharePoint:SPCalendarView ID="EventsCalendar1" width="100%" runat="server"></SharePoint:SPCalendarView> I also found that there are many other controls which appears in intellisense. How can I add these controls to the toolbox? Is there any documentation available on how to use these controls?

    Read the article

< Previous Page | 137 138 139 140 141 142 143 144 145 146 147 148  | Next Page >