Search Results

Search found 11982 results on 480 pages for 'non greedy'.

Page 176/480 | < Previous Page | 172 173 174 175 176 177 178 179 180 181 182 183  | Next Page >

  • How can I set up a keyboard shortcut so that Ctrl+Backspace = Del?

    - by Palantir
    As an old mac user, I am used to hitting Ctrl+Backspace, and the effect is the same as if I pressed Del. I have recently purchased an Asus N53SV laptop which has replaced my MacBook, but unfortunately this laptop has a very annoying keyboard layout, where the Del key is in a non standard position, and moreover it is TINY. Is it possible to get the Ctrl+Backspace combination to issue a Del and how would I do this? Using Kubuntu, but I believe this is to be done at X level, not at desktop, am I right? Thanks!

    Read the article

  • How to install again Update Manager after uninstalling it

    - by biezdar
    Ok, the thing is this I tried asking many times on few ubuntu forums how to deal with my non-responsive Update Manager, but all I was getting was the same stuff (run it from the terminal, run some lines, apt-get update blah blah). Nothing was helping. Eventually I went mad Windows style and tried to simply uninstall it and install it again. The problem is - how to install it again? Can't do it through Software Center, can't really build a package (because I'm too stupid to do that). And I seriously want to avoid reinstalling the whole system. I am running a 12.04 verison (Update Manager was unable to update to a newer one) Please help. I am furious with this thing.

    Read the article

  • Microsoft étend son projet 4Afrika à l'Afrique du Sud, pour connecter les zones rurales à Internet

    Microsoft étend son projet 4Afrika à l'Afrique du Sud, pour connecter les zones rurales à Internet Dans le domaine de la télécommunication, une zone blanche correspond à une zone du territoire non couverte par un réseau donné (le plus souvent réseau de téléphonie mobile ou internet). Dans son projet Microsoft 4Afrika, l'entreprise ambitionne d'exploiter ces zones blanches au Kenya. Des parties rurales de la province de Limpopo, au nord-est de l'Afrique du Sud, pourraient se voir connectées à Internet. Le projet pilote qui permettra à cinq écoles primaires et secondaires de surfer sur le web devrait fournir au pays la capacité de fournir à 80 % de sa population l'accès au web d'ici 2020.Paul G...

    Read the article

  • Preseed values for keyboard-configuration

    - by Nikolai
    I'd like to activate ctrl+alt+backspace on multiple pcs (Ubuntu 14.04) using dpkg-reconfigure keyboard-configuration I don't want to do the dialog every time so i tried: debconf-get-selections | grep "^keyboard-configuration" > config.dat on a host where i answered the dialog with the desired answers On the host where i want to do it non interactively i tried: debconf-set-selections config.dat dpkg-reconfigure -f noninteractive keyboard-configuration it ran without asking, but afterwards the selections where reset to the default values How can i get dpkg to use my predefined values? Or is there another possibility to enable the ctrl+alt+backspace for all users without going through dialogs?

    Read the article

  • Firefox va supporter le H.264 dans sa version mobile après avoir bataillé contre ce codec propriétaires : pragmatisme ou renoncement ?

    Firefox supporte le H.264 après avoir longtemps bataillé contre ce codec propriétaires : pragmatisme ou renoncement ? Le codec H.264 a longtemps fait débat divisant les navigateurs en deux clans. Mozilla s'était rangé dans le camp contre ce codec, refusant catégoriquement d'obtenir une licence propriétaire pour son Firefox. La fondation militait depuis le début pour un web ouvert à 100%. Mais voila que sur le groupe de discussions de ses développeurs, Andreas Gal, Directeur de la recherche de Mozilla, annonce un virage. Du moins en ce qui concerne la future plateforme mobile de la fondation à but non lucratif. [IMG]http://ftp-developpez.com/sarah-mendes/logo...

    Read the article

  • How Can I Upgrade to 11.10 from the Command Line?

    - by nmagerko
    I am trying to upgrade my 11.04 Ubuntu operating system to 11.10, as the current system is not the most recent. However, I cannot use the GUI to upgrade - as from past experience I have learned this - because my graphics hardware only works on 10.04 to 11.04 (non-inclusive) and from 11.10+. So once I can get to 11.10, I should be just fine. Because of this, I need to find a way to upgrade the OS from the command line. Can this be done? Thanks for any and all help.

    Read the article

  • how to fix error when authenticating in U1

    - by Yann
    Like other users, when authenticating in U1 I get this error: Method "CreateItem" with signature "a{sv}(oayay)b" on interface "org.freedesktop.Secret.Collection" doesn't exist. And in /var/log/auth.log: gnome-keyring-daemon[4793]: egg_symkey_generate_simple: assertion `iterations >= 1' failed gnome-keyring-daemon[4793]: couldn't prepare to write out keyring: /home/yann/.gnome2/keyrings/login_1.keyring So I tried to move "login.keyring". I typed no password for the security when logging into U1, accepted non secured way to save passwords. And a message told me the operation successfully completed (in French). But, sync did not work. And u1sdtool --status returned this: State: AUTH_FAILED connection: With User With Network description: auth failed is_connected: False is_error: True is_online: False queues: WORKING I'm sorry U1 doesn't work anymore; it was really useful to me. Can you help me ? Ubuntu 11.10

    Read the article

  • What is the most complicated data structure you have used in a practical situation?

    - by Fanatic23
    The germ for this question came up from a discussion I was having with couple of fellow developers from the industry. Turns out that in a lot of places project managers are wary about complex data structures, and generally insist on whatever exists out-of-the-box from standard library/packages. The general idea seems to be like use a combination of whats already available unless performance is seriously impeded. This helps keeping the code base simple, which to the non-diplomatic would mean "we have high attrition, and newer ones we hire may not be that good". So no bloom filter or skip-lists or splay trees for you CS junkies. So here's the question (again): Whats the most complicated data structure you did or used in office? Helps get a sense of how good/sophisticated real world software are.

    Read the article

  • HP 655 Notebook (Ubuntu 12.04) wireless internet disabled after running updates

    - by Bastian
    Today the update-manaeger suggested that I should download some updates. So I did. After the updates were installed I had to reboot the system. After the reboot my notebook doesn't see any wireless networks. I was looking for a long time on the internet for answers but non of them applies to my case. I have the idea, it has got something to do with the kernel I am currently using (Linux 3.2.0-55). Is this one new for Ubuntu 12.04? When I boot my system I can choose to use an older kernel (linux 3.2.0-32). When I use this one the notebook does see the wireless networks. This is my network card according to the command lspci: Ralink corp. RT3290 Wireless 802.11n 1T/1R PCIe Anyone an idea to fix my problems with wireless internet?

    Read the article

  • How do you describe your profession in a public place or conference?

    - by Jenko
    I've often been in situations where non-technical people ask me, "So, what do you do?" ... and I've found it somewhat hard to describe that I spend the entirely of my days pouring over colored text. Of course, its quite reasonable to say "I design software" or "I develop computer applications", but that still feels somewhat "lame" and generic. So how do you describe your profession in public situations? are there any insights for those of us less gifted in public speaking?

    Read the article

  • What's the best way to explain branching (of source code) to a client?

    - by Jon Hopkins
    The situation is that a client requested a number of changes about 9 months ago which they then put on hold with them half done. They've now requested more changes without having made up their mind to proceed with the first set of changes. The two sets of changes will require alterations to the same code modules. I've been tasked with explaining why them not making a decision about the first set of changes (either finish them or bin them) may incur additional costs (essentially because the changes would need to be made to a branch then if they proceed with the first set of changes we'd have to merge them to the trunk - which will be messy - and retest them). The question I have is this: How best to explain branching of code to a non-technical client?

    Read the article

  • Sharing a mounted Truecrypt volume via Samba

    - by user10492
    Been banging my head against the wall on this one for a while. I have an encrypted (via truecrypt) partition on a drive. In windows, I mount it locally and share it on my local network. I'm trying to do the same in Ubuntu 10.10 but am running into permission issues. The tc volume has funny permissions and I just can't seem to figure out a way to access it (unsecurely of course) over my network. Other non-tc volume shares work just fine. To recap, I mount a truecrypt volume in Ubuntu and set up a samba share as normal. The share shows up on my local network but accessing it gives 'permission denied'. Mounting as a network drive using a password does not seem to work either. Any insight would be greatly appreciated.

    Read the article

  • Why are cryptic short identifiers still so common in low-level programming?

    - by romkyns
    There used to be very good reasons for keeping instruction / register names short. Those reasons no longer apply, but short cryptic names are still very common in low-level programming. Why is this? Is it just because old habits are hard to break, or are there better reasons? For example: Atmel ATMEGA32U2 (2010?): TIFR1 (instead of TimerCounter1InterruptFlag), ICR1H (instead of InputCapture1High), DDRB (instead of DataDirectionPortB), etc. .NET CLR instruction set (2002): bge.s (instead of branch-if-greater.signed), etc. Aren't the longer, non-cryptic names easier to work with?

    Read the article

  • Cannot type '^' (caret) in native KDE apps

    - by nebukadnezzar
    I cannot type the caret character '^' in native KDE apps, such as plasmoids, editors (Kate, KWrite), etc. It worked in previous (older) versions of KDE (3.5, I think). I believe it may be related to the fact that I'm using a keyboard with a german layout, however, it would seem farfetched - I can type the caret character just fine in non-KDE apps (such as chrome, firefox, etc). I tried switching keyboard layouts, but no cigar. What's going on? What do I have to change to get the caret character back?

    Read the article

  • PPC Affiliate networks for web-applications [on hold]

    - by machete
    I want to run a browser-based social media (Twitter, Instagram,...) account management tool (justunfollow.com) which monetizes through ads. But many affiliate networks like Google AdSense or media.net require your website to have "high quality content". AdSense explicitly states: "Google ads, search boxes or search results may not be: * Integrated into a software application (does not apply to AdMob) of any kind, including toolbars. * Placed on any non-content-based page. (Does not apply to AdSense for search, mobile AdSense for search, or AdMob.)" Are there serious & trustworthy affiliate networks which allow ads to be published on a web application?

    Read the article

  • Public versus private inheritance when some of the parent's methods need to be exposed?

    - by Vorac
    Public inheritance means that all fields from the base class retain their declared visibility, while private means that they are forced to 'private' within the derived class's scope. What should be done if some of the parent's members (say, methods) need to be publicly exposed? I can think of two solution. Public inheritance somewhat breaks encapsulation. Furthermore, when you need to find out where is the method foo() defined, one needs to look at a chain of base classes. Private inheritance solves these problems, but introduces burden to write wrappers (more text). Which might be a good thing in the line of verbosity, but makes changes of interfaces incredibly cumbersome. What considerations am I missing? What constraints on the type of project are important? How to choose between the two (I am not even mentioning 'protected')? Note that I am targeting non-virtual methods. There isn't such a discussion for virtual methods (or is there).

    Read the article

  • Android 4.1 : la preview du SDK disponible, "Jelly Bean" se dévoile au Google I/O

    Android 4.1 débarque au Google I/O 2012 Jelly Bean intègre un search optimisé, la preview du SDK est disponible Une petite demi-heure avant l'ouverture du Google I/O, la grande conférence annuelle de Google dédiée aux développeurs, une des rumeurs persistantes était confirmée : il y aura bien une tablette Nexus 7, sous la marque Google, avec un écran 7'' et sous Jelly Bean. Restait à savoir ce que ce Jelly Bean allait proposer. Première information, le numéro de version. Il s'agit bien d'Android 4.1 (et non pas 5.0). Au fil des nombreux intervenants qui se succèdent sur la scène de San Francisco, la liste des améliorations s'allongent mais avec toujours en su...

    Read the article

  • Visual Studio 2012 sort avec .NET 4.5, tour d'horizon des nouveautés de l'EDI pour le support de l'ALM, du mobile, du Web, du Cloud et WinRT

    Visual Studio 2012 sort avec .NET Framework 4.5 tour d'horizon des nouveautés de l'EDI pour le support de l'ALM, du mobile, du Web et du Cloud Visual Studio 2012 et le Framework .NET 4.5 sont officiellement disponibles pour tous les utilisateurs. Visual Studio 2012 est un environnement de développement riche pour créer et gérer des applications non seulement modernes et attrayantes, mais aussi accessibles n'importe où, n'importe quand, répondant aux attentes des clients. Dévoilé pour la première fois au stade de Preview lors de la conférence Microsoft Build en septembre 2011, Visual Studio est passé par plusieurs mois de tests, ajouts de nouvelles fonctionnalités, améliorations des...

    Read the article

  • Ubuntu Variant / Linux Distros which uses least system resources (RAM, CPU)?

    - by elegantonyx
    I have a netbook (an older Asus EEEPC 1005HA) which I want to get rid of Windoze on (I like Windows, but I don't think it works well in a netbook environment). Basically, my question is which Ubuntu variant will use the least RAM and CPU running idle, and/or the same question except when running Firefox and Libreoffice Writer, say. I am also open to suggestions of non-Ubuntu Linux distros, but since this is AskUbuntu I thought the first question would be more appropriate. I have a disk drive which I can attach to the netbook, so it doesn't have to be a Ubuntu Variant / Linux Distro which solely boots from a USB drive. I have at my disposal: DVDs, DVD writer/ disk drive, 4gb flash drive, 8 gb flash drive I was thinking either Lubuntu or Archbang / Crunchbang but I would like some help from more knowledgable people Specs: Can't boot into it right now, but I think I have either Intel Atom N270 @1.60ghz OR Intel Atom N280 @1.66ghz (single core, I think) 2gb RAM 160 GB hard drive

    Read the article

  • Windows 8 : Microsoft dévoile les logos de compatibilité et les directives d'utilisation

    Windows 8 : Microsoft renforce la procédure d'activation pour les OEM les clés s'obtiendront uniquement auprès de la société La distribution de Windows 8 par Microsoft aux constructeurs a commencé depuis le 1er août. Les informations sur la nouvelle norme d'activation de l'OS par les fabricants qui est couverte par un accord de non-divulgation ont été publiées sur internet. De cette norme baptisée OEM Activation 3.0 (OA 3.0), on apprend que Microsoft a rendu plus stricts les termes permettant aux constructeurs d'obtenir des clés d'activation de Windows 8 et la certification de leurs produits. Le processus d'activation avait été introduit par Microsoft avec Windows XP. B...

    Read the article

  • Breaking in to Programming

    - by Kevin
    I've noticed that there is a gap between getting formal education in computer science as a student and entry-level/junior programming jobs. Obviously entry-level programming requires that you know some programming but how much do you need to break in? I'm in a QA non-coding role with basically a minor in CS, looking to improve my own programming skills to eventually switch industries. However I'm completely at a loss as to what I should be focusing on learning and am curious as to the steps other people have taken to get experience post-undergrad.

    Read the article

  • Intro to NoSQL with RavenDB

    - by dgreen
    I did a talk on RavenDB back on 9/19/2012. Here was my abstract: "RavenDB is a document database which is gaining popularity in the 'NoSQL' movement. This session will introduce you to some non-relational concepts and describe how they compare/contrast with the relational solutions you're already familiar with. We'll go through the basics of RavenDB and show how easy it is to use from .NET” My next goal is to figure out how to post the slidedeck here (and maybe the code samples if I'm feeling ambitious). Then, the slides can be downloaded for only three easy payments of $39.99. However  for this one time special offer they are currently being given away absolutely FREE with a signup to http://meetup.trinug.org Footnote: I probably shouldn't have to say this, but my last comment about charging for my slidedeck was a joke. I have an odd sense of humor for those who don't already know me :)

    Read the article

  • Bouncing ball isssue

    - by user
    I am currently working on the 2D Bouncing ball physics that bounces the ball up and down. The physics behaviour works fine but at the end the velocity keep +3 then 0 non-stop even the ball has stopped bouncing. How should I modify the code to fix this issue? ballPos = D3DXVECTOR2( 50, 100 ); velocity = 0; accelaration = 3.0f; isBallUp = false; void GameClass::Update() { velocity += accelaration; ballPos.y += velocity; if ( ballPos.y >= 590 ) isBallUp = true; else isBallUp = false; if ( isBallUp ) { ballPos.y = 590; velocity *= -1; } // Graphics Rendering m_Graphics.BeginFrame(); ComposeFrame(); m_Graphics.EndFrame(); }

    Read the article

  • Is this a bad time to be majoring in computer science?

    - by ATMathew
    There has been a lot of media attention paid in recent months and years to the increase in CS majors and the possibility of a second tech bubble. Some news reports have suggested that as more people enter CS, the market could be flooded with CS professionals and jobs could be increasingly difficult to find. Is this a bad time to be majoring in computer science? Edit: I'm a non-trad student who allready has a Bachelor's degree in economics and will be pursuing a CS degree starting this upcoming summer semester at the Univ of Kansas. I've been programming for about two/three years and just need a more formal education to fill the holes in my head. I have an interest in CS, it's just that I am worries about the prospects for the future.

    Read the article

  • April 24 Webcast: Procurement: How to Solve Errors with Receiving Transactions

    - by Oracle_EBS
    ADVISOR WEBCAST: How to Solve Errors with Receiving TransactionsPRODUCT FAMILY: E-Business : Procurement April 24, 2012 at 14:00 UK / 15:00 CET / 06:00 am Pacific / 7:00 am Mountain / 9:00 am Eastern/ 3:00 pm Egypt Time Session description that sets customer expectations such as This one-hour session is recommended for technical and functional users need to know about verifying the receiving transactions errors, troubleshoot it and fix it from the application forms and the back-end. TOPICS WILL INCLUDE: Setup and normal transactions The cause of (RVTTH-115B, RVTTH-115D, RVTTH-115F, RVTTH-115H, RVTTH-115J) and how to identify it The troubleshooting and solution of this issue in a non WMS org The solution of this issue in WMS org A short, live demonstration (only if applicable) and question and answer period will be included. Oracle Advisor Webcasts are dedicated to building your awareness around our products and services. This session does not replace offerings from Oracle Global Support Services.   Current Schedule can be found on Note 740966.1 Post Presentation Recordings can be found on Note 740964.1

    Read the article

< Previous Page | 172 173 174 175 176 177 178 179 180 181 182 183  | Next Page >