Search Results

Search found 21853 results on 875 pages for 'point'.

Page 147/875 | < Previous Page | 143 144 145 146 147 148 149 150 151 152 153 154  | Next Page >

  • Getting Inbound Links From a Professional Search Engine Optimization Company

    Getting a professional search engine optimization company to help with link building is something that everyone should do at some point if they have a website. There are many types of links used in link building strategies. Among the commonly used ones are inbound links and reciprocal links. Of the two, emphasis is often placed on inbound links by webmasters and website owners who use strategies without spending a penny.

    Read the article

  • Webcast - June 27th: Announcing Oracle SuperCluster T5-8: Our Fastest Engineered System

    - by Javier Puerta
    Join us for a live webcast with Oracle Executive Vice President, John Fowler, as he announces the new Oracle SuperCluster T5-8: Our Fastest Engineered System. Learn how the new Oracle SuperCluster T5-8 delivers: Extreme performance through Oracle Exadata, Oracle Exalogic, Oracle’s virtualization solutions, and the world’s fastest servers Highest availability with no single point of failure and 99.999% uptime Highest efficiency with unmatched price/performance and the lowest operating costs A complete engineered system ideal for database and application consolidation and private cloud Register here

    Read the article

  • How do I "alt-tab" between windows using Gnome 3?

    - by josmh
    All of the references I've found for Gnome 3 keyboard shortcuts list that alt+tab switches between applications and alt+` switches between windows (some actually say alt+~, but I think they're mistaken, and I've tried both anyway). Maybe that functionality works for Gnome 3 on Fedora or something, because no matter the key combo I try, nothing will switch between windows except for opening the alt+tab dialog and using arrow keys to navigate it (and at that point it's faster to just use a mouse..). How do I quickly switch between windows in Gnome 3?

    Read the article

  • Telstra's Linux-based T-Box to launch mid-June

    <b>Delimiter:</b> "Telstra today revealed it would launch its Linux-based T-Box integrated media centre set-top box from mid-June at a stand-alone price point of $299, with a sledload of free and pay-per-view content available and an associated revamp of its broadband plans in the works."

    Read the article

  • ecommerce item deleted by user, 301 rediret to HOME PAGE or 404 not found?

    - by Marco Demaio
    I know this question is someway similar to this one where they reccomend using 404, but after reading this other one where they suggest to use 301 when changing site urls (in the specific case was due to redesign/refactoring) I get a bit of confused and I hope someone could clarify for this specific example: Let's say I have an ecommerce site, let's also say the final user inserted some interesting items in the site and the ecommerce webapp created the item pages at the urls: http://...?id=20, http://...?id=30 etc. Now let's say some of these interesting items got many external links toward them from many other sites because some people found those items very interesting and linked to them. After some years the final user deletes those items, so obviously the pages/urls http://...?id=20, http://...?id=30, etc. now do not exist anymore, but still many pages on the web are linking toward them. What should the ecommerce site do now, just show a 404 page for those items? But, I'm confused, wouldn't this loose all the Google PR passed by the external links to the items pages? So isn't it better to use 301 redirect to HOME PAGE that at least passes the PR to the HOME PAGE? Thanks, EDIT: Well, according to answeres the best thing to do so far is to do a 404/410. In order to make this question more complete, I would like to talk about a special case, just to make sure I understood. properly. Let's say the user creates those items again (the ones he previously deleted at point 4), maybe he changes a bit their names and description, but they are basically the same items. The webapp has no way to know these new added items were the old items so it obviously create them as new items with new urls http://...?id=100, http://...?id=101, does it makes sense at this point to redirect 301 the old urls to the new ones? MORE EDIT (It would be VERY IMPORTANT TO UNDERSTAND): Well according to the clever answers received so far it seems for the special case, explained in my last EDIT, I could use 301, since it's something of not deceptive cause basically the new pages is a replacement for the old page in term of contents. This is basically done to keep the PR passed from external link and also for better user experience. But beside the user experince, that is discussible (*1), in order to preserve PR from external broken linlks why not just always use 301, In my understanding Google dislikes duplicated contents, but are we sure that 301 redirect to HOME PAGE is seen as duplicated contents for Google?! Google itself suggests to redircet 301 index.html to document root so if they consider 301 as duplicated contents wouldn't that be considered duplicated contents too?! Why do they suggest it? Let me provoke you: “why not just add a 301 to HOME PAGE for every not found page?” (*1) as a user, when I follo a broken url from some external link to some website's page I would stick more on this website if I get redirected to HOME PAGE rather than seeing a 404 page where I would think the webiste does not even exist anymore and maybe I don't even try to go to HOME PAGE of the website.

    Read the article

  • Development of a Card Game Website [on hold]

    - by Correna Hurley
    Yahoo did away with all of their "parlor-type" games on 3/31/14. There is a great demand to get these games back, but Yahoo has no plan to do so. I'd like to find someone who has the knowledge necessary to create such an "animal" and would be willing to give it a try. If someone from this forum would be so kind as to point me in the right direction to find such an individual, I'd be grateful. Thank you.

    Read the article

  • Where do I put my start up script for mysql?

    - by Neo
    I have created a second instance of MySQL on the server for replication, if I start the process manually it works but need it to start at bootup. I used to just do a bash script in the init.d folder but apparently that no longer works on 11.10 Can anyone point me in the right direction? I even copied the mysql service, changed it and tried that but it refused to work. P.S It is the server edition so only Shell access.

    Read the article

  • Windows 8 : le comparatif des quatre éditions. Quelles différences entre Windows RT, Windows 8, et les versions Pro et Entreprise ?

    Windows 8 : le comparatif des fonctionnalités des quatre éditions Quelles sont les différences entre Windows RT, Windows 8, et les versions Pro et Entreprise Windows 8 est arrivé. Après nous être penchés sur les prix et les conditions matérielles requises, voici un tableau comparatif (le plus exhaustif possible, mais qui ne l'est évidemment pas totalement) pour faire le point sur les différences et les points communs entre les 4 éditions du nouvel OS de Microsoft. [IMG]http://ftp-developpez.co...

    Read the article

  • Allow a web designer to modify DNS without letting them transfer the domain?

    - by PhilCK
    We are in the process of having a web designer create a new website for us, but I don't want to give access to the control panel for the domain names (and have no way to limit it, it seems), while at the same time I don't want to be the go between guy for editing the settings. Is there a way or a service for me to point the domains at a 3rd party DNS system, that I can then give access for the web designer, without worrying that he can find my personal info or try and transfer my domain out?

    Read the article

  • Slow wireless on Dell XPS 14 ultrabook

    - by GaryBishop
    I've got Ubuntu 12.04 running on this Dell XPS 14 Ultrabook (L421X). Everything is working but my wireless transfer rates are low. I'm getting about 1MB/s download speed on the ultrabook vs 15MB/s on the E6500. If I move into the room with the access point the speed climbs to 15MB/s so I'm guessing it is a signal strength issue but wavemon shows comparable signals to those seen by the E6500. Are there any settings I can tweak in hopes of making it faster?

    Read the article

  • Creating an Underwater Scene in Blender- Part 3

    <b>Packt:</b> "From the point we started our scene, we haven't tried any test renders yet to see how our underwater environment looks and I know you're all so eager to try and press that RENDER button (so am I), but let's make sure that we don't waste a second of our time by rendering something that's not worth the button press at all."

    Read the article

  • Can I invoke a graphical program to run with a hidden window?

    - by Willi Ballenthin
    I have a program that interprets the input from my mouse and provides multitouch gestures. I wrote it using a game engine, which always creates a window when it runs. I'd like to run this program without seeing the window, so this is the point of the questions: Can invoke a graphical program but have the window hidden? By hidden I mean anything that keeps me from encountering the window on my desktop. So I would accept something like, "open on a different, previously non-existant screen."

    Read the article

  • Is there a mirror for the daily Natty ISO (/daily-live/current) in Asia?

    - by Jon
    I've been trying to download Natty for days now, but either the internet here in Vietnam is totally shot or the Ubuntu CD server has a lot of traffic, because I can't get it to download faster than about 15Kbps. Does anyone know of a mirror, preferably close to Vietnam, where I could download (zsync) this image faster? Googling hasn't helped me, nor has Ubuntu's list of mirrors (I get stuck in a rabbithole of FTP folders, and nothing seems to point to the daily image).

    Read the article

  • Eliminating Magic Numbers: When is it time to say "No"?

    - by oosterwal
    We're all aware that magic numbers (hard-coded values) can wreak havoc in your program, especially when it's time to modify a section of code that has no comments, but where do you draw the line? For instance, if you have a function that calculates the number of seconds between two days, do you replace seconds = num_days * 24 * 60 * 60 with seconds = num_days * HOURS_PER_DAY * MINUTES_PER_HOUR * SECONDS_PER_MINUTE At what point do you decide that it is completely obvious what the hard-coded value means and leave it alone?

    Read the article

  • Reasons to Use a VM For Development

    - by George Stocker
    Background: I work at a start-up company, where one team uses Virtual Machines to connect to a remote server to do their development, and another team (the team I'm on) uses local IIS/SQL Server 2005/Visual Studio installations to conduct work. Team VM is located about 1000 miles from Team Non-VM, and the servers the VMs run off of are located near Team VM (Latency, for those that are wondering, is about 50ms). A person high in the company is pushing for Team Non-VM to use virtual machines for programming, development, and testing. The latter point we agree on -- we want Virtual Machines to test configurations and various aspects of the web application in a 'clean' state. The Problem: What we don't agree on is having developers using RDP to connect to a desktop remotely that contains Visual Studio, SQL Server, and IIS to do the same development we could do locally on our laptops. I've tried the VM set-up, and besides the color issue, there is a latency issue that is rather noticeable, not to mention that since we're a start-up, a good number of employees work from home on occasion with our work laptops, and this move would cut off the laptops. They'd be turned in. Reasons to Use Remote VMs for Development (Not Testing!): Here are the stated reasons that this person wants us to use VMs: They work for TeamVM. They keep the source code "safe". If we want to work from home, we could just use our home PCs. Licenses (I don't know what the argument is, only that it's been used). Reasons not to use Remote VMs for Development: Here are the stated reasons why we don't want to use VMs: We like working from home. We get a lot done on our own time. We're not going to use our Home PCs to do work related stuff. The Latency is noticeable. Support for the VMs (if they go down, or if we need a new VM) takes a while. We don't have administrative privileges on the VM, and are unable to change settings as needed. What I'm looking for from the community is this: What reasons would you give for not using VMs for development? Keep in mind these are remote VMs -- this isn't a VM running on a local desktop. It's using the laptop (or a desktop) as a thin client for a remote VM. Also, on the other side of the coin: Is there something we're missing that makes VMs more palatable for development? Edit: I think 'safe' is used in term of corporate espionage, or more correctly if the Laptop gets stolen, the person who stole would have access to our source code. The former (as we've pointed out, is always going to be a possibility -- companies stop that with litigation, there isn't a technical solution (so far as I can see)). The latter point is ( though I don't know its usefulness in a corporate scenario) mitigated by Truecrypt'ing the entire volume.

    Read the article

  • I think "/lib/modules/$(uname -r)/build" points to incorrect folder

    - by Simón
    I compile/create my own deb packages of kernel with: make-kpkg --rootcmd fakeroot --initrd --append-to-version=$version --revision=1 kernel_image kernel_headers But when I install both packages, in /lib/modules/(*name_kernel_compiled*) it creates two links, sources and build, pointing to folder with sources, from I've compiled. sources link is correct but build should point to /usr/src/linux-(version kernel), don't you think?

    Read the article

  • Is my JavaScript/jQuery methodology good? [migrated]

    - by absentx
    I am seeking critique on what has become my normal methodology of writing JavaScript code. I have become heavily reliant on the jQuery library, but I think this has helped me learn the native language better also. Anyway, please critique the following style of JavaScript coding... Buried are a lot of questions of scope; if you could point out the strengths and weaknesses of this style I would appreciate it. var critique ={ start: function(){ globalness = 'GLOBAL-GLOBAL'; //Available to all critique's methods var notglobalness = 'LOCAL-LOCAL'; // Only available to critiques start method //Am I using the "method" teminology properly here?? $('#stuff').on('click','a.closer-target',function(){ $target = $(this); if($target.hasClass('active')){ $target.removeClass('active'); } else{ $target.addClass('active'); critique.madness($target); } }) console.log(notglobalness+': at least I am useful at home'); console.log('note here that: '+notglobalness+' is no longer available after this point, lets continue on:'); critique.madness(notglobalness); }, madness: function($e){ //Do a bunch of awesomeness with $e, //but continue to keep it seperate because you think its best to keep things isolated. //Send to the next function when complete here console.log('Here is globalness, which is still available from the start method of critique!! ' + globalness); console.log('Let us see if the globalness carries on to a new var object!!'); console.log('The locally isolated variable of NOTGLOBALNESS is available here, because it was passed to this method. Let us show it:'+$e); carryOn.start(); } } //end critique var carryOn={ start: function(){ console.log('any chance critique.globalness will work here??? lets see: ' +globalness); console.log('it absolutely does'); } } $(document).ready(critique.start); (I always struggle with which of the Stack Exchange sites is best to post "questions of theory" like this, but I think Programmers is the best, if not, as usual a mod will move it, etc...)

    Read the article

  • Fixing USB drive auto-notify

    - by steevc
    Yesterday I was copying files from SD cards, but at some point they stopped auto-mounting. Didn't notice any errors. I can still mount by right-clicking the appropriate file in /dev in Konqueror. UPDATE: Slight correction. The drives never automounted, but I've stopped getting the notification that a drive is plugged in. What processes should I be checking? Something in Device Actions? I'm using Kubuntu 10.04

    Read the article

  • How can I force SSH to give an RSA key instead of ECDSA?

    - by broiyan
    Upon the first time accessing a server, how can I force SSH to give me the RSA key and automatically store it if the user approves? Presently it is offering me the ECDSA key. Because I already know the RSA key, I would prefer to see the RSA key presented at this point. I have tried: ssh -o RSAAuthentication=yes user@server Unfortunately this gives me an ECDSA key and the Are you sure you want to continue connecting (yes/no)? message.

    Read the article

  • Semantic algorithms

    - by Mythago
    I have a more theoretical than practical question. I'll start with an example - when I get an email and open it on my iPad, there is a feature, which recognizes the timestamp from the text and offers me to create an event in the calendar. Simply told, I want to know theoretically how it's done - I believe it's some kind of semantic parsing, and I would like if someone could point me to some resources, where I can read more about this.

    Read the article

  • A Tale of Identifiers

    Identifiers aren't locators, and they aren't pointers or links either. They are a logical concept in a relational database, and, unlike the more traditional methods of accessing data, don't derive from the way that data gets stored. Identifiers uniquely identify members of the set, and it should be possible to validate and verify them. Celko somehow involves watches and taxi cabs to illustrate the point.

    Read the article

  • A Tale of Identifiers

    Identifiers aren't locators, and they aren't pointers or links either. They are a logical concept in a relational database, and, unlike the more traditional methods of accessing data, don't derive from the way that data gets stored. Identifiers uniquely identify members of the set, and it should be possible to validate and verify them. Celko somehow involves watches and taxi cabs to illustrate the point.

    Read the article

< Previous Page | 143 144 145 146 147 148 149 150 151 152 153 154  | Next Page >