Search Results

Search found 13296 results on 532 pages for 'desktop icons'.

Page 242/532 | < Previous Page | 238 239 240 241 242 243 244 245 246 247 248 249  | Next Page >

  • Dual boot problem - Ubuntu windows 7

    - by Benoit Roberge
    I've been using Ubuntu for a while on my laptop. Recently, I decided to install Ubuntu on my main desktop PC (dual boot with windows 7). I downloaded the Ubuntu installer for windows and installed it (it's now showing Ubuntu in the installed software in my W7 control panel). However, when I tried to boot Ubuntu, after the boot loader and the login screen, my screen splitted in half. I was not able to see the icons and the launcher. I was also not able to do anything. I uninstalled Ubuntu and tried again twice. Same thing/results. Then, I created a partition in W7 and installed Ubuntu on it. Unfortunately, it's doing the same thing. I never saw something like this. Any idea??? Thanks for your help and support.

    Read the article

  • How to auto-unlock Keyring Manager in 12.10?

    - by Torben Gundtofte-Bruun
    How can I auto-unlock the Keyring Manager in 12.10? This answer for 11.10 doesn't seem to apply because the Keyring Manager looks different in 12.10 so I can't follow the instructions. I have set up my machine to automatically log in to my account. I don't mind the lesser security of having the keyring automatically unlocked. (This is still a home desktop computer of a simple user, not a missile launch system.)

    Read the article

  • What is the situation about OpenGL under Ubuntu Unity and Gnome3?

    - by user827992
    In a GNU/linux distribution is usually installed Xorg as main graphical server, it operates with a client-server logic, a special windows is designate as desktop environment and this special windows can handle all the eyecandy stuff like decorations, icons and effects. The problem is that the latest UI heavily relies on hardware acceleration, Unity is an overlay on Compiz and the Gnome-shell also require an active driver for the GPU to work well: the problem is: on the same OS I can find multiple implementations of OpenGL who is handling my OpenGL buffer? how the OpenGL buffer is managed compared to the other windows? how can I be sure that my OpenGL implementation is glued to the hardware and is not related to the client-server logic of Xorg? For example I have tried the clutter library and I have only experienced problems under both Unity and GTK/Gnome, no problem under other OS.

    Read the article

  • Week in Geek: Microsoft Warns of First Critical Security Flaws in Windows 8 & RT

    - by Asian Angel
    This week’s edition of WIG is filled with news link coverage on topics such as Mozilla Firefox turns 8 and Android turns 5, Windows (File) Explorer is the app that crashes most on Windows 8, Classic Mode (Session) will be dropped from GNOME 3.8, and more. 6 Ways Windows 8 Is More Secure Than Windows 7 HTG Explains: Why It’s Good That Your Computer’s RAM Is Full 10 Awesome Improvements For Desktop Users in Windows 8

    Read the article

  • shutdown bar is not appearing anywhere

    - by lokesh
    i am using ubuntu 11.10 in GNOME interface and there is no shutdown bar/option appearing on desktop . I have also used some solutions just like: sudo add-apt-repository ppa:webupd8team/gnome3 sudo apt-get update sudo apt-get install gnome-shell-extensions-alternative-status-menu but this is showing some error message in the terminal while typing last command. Please provided me with best solutions

    Read the article

  • I upgraded my ubuntu server from 13.04 to 13.10 Bugs I faced

    - by kirankumar kotari
    On upgrade from 13.04 to 13.10 my system is hanged. So after waiting for 30 min. I tried to restart. Some file are corrupted. I inserted my 13.04 disk and started in rescue mode. Finally My system started Then, I upgraded some apps again. Now my system upgraded to 13.10. Finally Done. But, Now the bugs raised. On my start key I got only my online services. No other applications, recently used, music, video icons are not showing. I am facing huge problem. I am unable to see my application what i installed. I checked in unity tweak tool all are fine. So, I ask any one to solve this issue.

    Read the article

  • Fedora 13 "Goddard" beta emphasizes automation

    <b>Desktop Linux.com:</b> "The Fedora project released a beta version of Fedora 13 (codenamed "Goddard"). The updated community Linux distribution is touted for features including automatic print-driver installation, the Btrfs filesystem, enhanced 3D driver support, revamped Python bindings, and the Zarafa groupware package, says the project."

    Read the article

  • Numbers on the launcher

    - by pete of ebor
    Using 12.04 LTS - few days ago, I left my machine on while I went out. On my return, the launcher was showing (it is set to be hidden) and there were small numbers 1-9 on the icons and letters s on the bottom-most icon and t on the rubbish bin. System still worked fine, although the launcher remained visible, and would not hide. After about 20 mins work, they suddenly vanished and the launcher hid itself.. is this a normal action ? It hasn't happened since..

    Read the article

  • Installing KDE in Ubuntu 12.04

    - by Rizwan Rifan
    Is it good to use kubuntu or Ubuntu with KDE? Well if I install KDE in Ubuntu will there be any instability or conflict? Will these two get mixed up with themes and icons? I had a bad experience with Gnome shell in Ubuntu 12.04.When I logged in with Gnome, the Gnome theme was mixed up with unity,the same happened with Unity,so I had to uninstall Gnome. Is there any way to make Ubuntu look exactly like Kubuntu(same UI,menus and theme),the KDE apps does not matter to me.(I don't wanna download Kubuntu). I want to keep both Unity and KDE.

    Read the article

  • Addressing threats introduced by the BYOD trend

    - by kyap
    With the growth of the mobile technology segment, enterprises are facing a new type of threats introduced by the BYOD (Bring Your Own Device) trend, where employees use their own devices (laptops, tablets or smartphones) not necessarily secured to access corporate network and information.In the past - actually even right now, enterprises used to provide laptops to their employees for their daily work, with specific operating systems including anti-virus and desktop management tools, in order to make sure that the pools of laptop allocated are spyware or trojan-horse free to access the internal network and sensitive information. But the BYOD reality is breaking this paradigm and open new security breaches for enterprises as most of the username/password based systems, especially the internal web applications, can be accessed by less or none protected device.To address this reality we can adopt 3 approaches:1. Coué's approach: Close your eyes and assume that your employees are mature enough to know what he/she should or should not do.2. Consensus approach: Provide a list of restricted and 'certified' devices to the internal network. 3. Military approach: Access internal systems with certified laptop ONLYIf you choose option 1: Thanks for visiting my blog and I hope you find the others entries more useful :)If you choose option 2: The proliferation of new hardware and software updates every quarter makes this approach very costly and difficult to maintain.If you choose option 3: You need to find a way to allow the access into your sensitive application from the corporate authorized machines only, managed by the IT administrators... but how? The challenge with option 3 is to find out how end-users can restrict access to certain sensitive applications only from authorized machines, or from another angle end-users can not access the sensitive applications if they are not using the authorized machine... So what if we find a way to store the applications credential secretly from the end-users, and then automatically submit them when the end-users access the application? With this model, end-users do not know the username/password to access the applications so even if the end-users use their own devices they will not able to login. Also, there's no need to reconfigure existing applications to adapt to the new authenticate scheme given that we are still leverage the same username/password authenticate model at the application level. To adopt this model, you can leverage Oracle Enterprise Single Sign On. In short, Oracle ESSO is a desktop based solution, capable to store credentials of Web and Native based applications. At the application startup and if it is configured as an esso-enabled application - check out my previous post on how to make Skype essso-enabled, Oracle ESSO takes over automatically the sign-in sequence with the store credential on behalf of the end-users. Combined with Oracle ESSO Provisioning Gateway, the credentials can be 'pushed' in advance from an actual provisioning server, like Oracle Identity Manager or Tivoli Identity Manager, so the end-users can login into sensitive application without even knowing the actual username and password, so they can not login with other machines rather than those secured by Oracle ESSO.Below is a graphical illustration of this approach:With this model, not only you can protect the access to sensitive applications only from authorized machine, you can also implement much stronger Password Policies in terms of Password Complexity as well as Password Reset Frequency but end-users will not need to remember the passwords anymore.If you are interested, do not hesitate to check out the Oracle Enterprise Single Sign-on products from OTN !

    Read the article

  • Distribution upgrade made Ubuntu unusable

    - by Lassi
    I installed today a distribution update from 11.10 to 12.04. This however basically ruined the whole OS. After update I lost all the window borders, icons and even access to the internet. I'm also unable to use the default window manager and I had to use the old gnome. The computer is Acer Aspire 5738G laptop, Intel Pentium T4500, Ati Mobility Radeon HD 560v, 4Gb DDR 3. I am using the open source drivers, not proprietary. Does anyone have any idea what could've happened, and how could I fix this. Help is highly appreciated

    Read the article

  • How to distribute applications?

    - by Dr Deo
    I am new to Ubuntu development. As a learning experience, I have written a custom chat application using qt4 and I want to deploy it in some sort of setup file. Whats the easiest way of deploying an application viz a viz setting desktop icons. automatically requesting for administrator privileges to execute. inserting an entry into the startup menu. automatically compress my application and reduce download size. automatic startup for my application without user intervention I am familiar with using NSIS scripts on Windows, but I don't know where to begin on Ubuntu. I would preffer a solution similar to NSIS scripts.

    Read the article

  • How to remove outlines around windows when switching with Alt+Tab?

    - by Oxwivi
    When I switch windows on current Unity using Alt+Tab, I get an ugly outline of size of the selected window occasionally showing on random places. Is there a way to change this outline to something better looking or eliminate it altogether? NB These outlines appear on Ubuntu Desktop without any effects enabled. Outlined Firefox Outlined Nautilus Outlined Terminal Click on the images to better view the outlines in question.

    Read the article

  • Microsoft and Application Architectures

    Microsoft has dealt with several kinds of application architectures to include but not limited to desktop applications, web applications, operating systems, relational database systems, windows services, and web services. Because of the size and market share of Microsoft, virtually every modern language works with or around a Microsoft product. Some of the languages include: Visual Basic, VB.Net, C#, C++, C, ASP.net, ASP, HTML, CSS, JavaScript, Java and XML. From my experience, Microsoft strives to maintain an n-tier application standard where an application is comprised of multiple layers that perform specific functions, for example: presentation layer, business layer, data access layer are three general layers that just about every formally structured application contains. The presentation layer contains anything to do with displaying information to the screen and how it appears on the screen. The business layer is the middle man between the presentation layer and data access layer and transforms data from the data access layer in to useable information to be stored later or sent to an output device through the presentation layer. The data access layer does as its name implies, it allows the business layer to access data from a data source like MS SQL Server, XML, or another data source. One of my favorite technologies that Microsoft has come out with recently is the .Net Framework. This framework allows developers to code an application in multiple languages and compiles them in to one intermediate language called the Common Language Runtime (CLR). This allows VB and C# developers to work seamlessly together as if they were working in the same project. The only real disadvantage to using the .Net Framework is that it only natively runs on Microsoft operating systems. However, Microsoft does control a majority of the operating systems currently installed on modern computers and servers, especially with personal home computers. Given that the Microsoft .Net Framework is so flexible it is an ideal for business to develop applications around it as long as they wanted to commit to using Microsoft technologies and operating systems in the future. I have been a professional developer for about 9+ years now and have seen the .net framework work flawlessly in just about every instance I have used it. In addition, I have used it to develop web applications, mobile phone applications, desktop applications, web service applications, and windows service applications to name a few.

    Read the article

  • Week in Geek: Malware for Android has Increased 472% since July

    - by Asian Angel
    This week we learned how to safely eject your USB devices from the desktop context menu, make the Kindle Fire Silk Browser *actually* fast, “disable Windows startup programs, use DNS names on your home network, & restore a vintage keyboard”, print or save a directory listing to a file, make your computer press a key every X seconds, and more. How to Make the Kindle Fire Silk Browser *Actually* Fast! Amazon’s New Kindle Fire Tablet: the How-To Geek Review HTG Explains: How Hackers Take Over Web Sites with SQL Injection / DDoS

    Read the article

  • Fallback Mode on Intel HD 4000 on Ubuntu 12.04.1?

    - by caragh
    Just built a system w/ a ivy bridge CPU (Xeon E3-1245 v2) with Intel HD 4000 onboard graphics, board is an Asrock H77 ProM. I had loaded Ubuntu server 12.04.1 onto it, but wanted to fool around w/ gnome 3. I installed gnome-shell, which didn't work, then gnome, which did, but only loads on fallback mode - the video is recognized as "VESA: sandy/ivy bridge graphics" I tried installing the whole ubuntu-desktop shebang but it's still in fallback graphics. Any way to get the full eye candy?

    Read the article

  • Aciqra

    - by csharp-source.net
    Aciqra is a simple and easy to use desktop planetarium tracks the objects of the sky from anywhere on Earth to an accuracy of 1/5 of a degree for the next 1000 years.

    Read the article

  • How to make Guake start by starup?

    - by Karim
    I'm looking for help, because i had to install Ubuntu one more time and I was always using Guake Terminal. In fact I don't know how, but it was always starting when the desktop appeared and I only clicked F12 and did everything I had to. But now it doesn't start automatically. I was looking for an answer but nothing worked. Has anybody ideas how to solve it ? It would be really nice to use it as earlier ;)

    Read the article

  • OT: Improbable use for an iPad?

    - by merrillaldrich
    Here's an interesting tidbit: I have noticed an even more pronounced trend toward centralized or virtual workstations lately. Both my wife and I can sit at home, as we are now, at the dining room table and work on our laptops (exciting life, I know!) but both of us are not actually working locally on these machines. We are both remoting into machines at our respective workplaces. Hers is a desktop machine physically located at her desk, while mine is a virtual workstation in my company's data center...(read more)

    Read the article

  • Ubuntu 12.04 is slow and unresponsive

    - by Bharat
    My laptop works perfectly fast with Windows 7 but is very slow in Ubuntu 12.04.When I try to open the dash it takes 1-2 sec.even the normal right click on the desktop for the dropdown options is taking time.I installed preload but it made a very slight change. Everything is up to date. My laptop is : Lenovo ideapad Z560 500 GB hard drive (dual booting win7 and Ubuntu 12.04) 3 GB RAM Intel® Core™ i3 CPU M 370 @ 2.40GHz × 4 processor Nvidia GeForce 310M/PCIe/SSE2 Ubuntu 32 bit any help?

    Read the article

  • EPM 11.1.2.1 - Smartview client and HFM office provider

    - by user809526
    If your connection to the smartview provider is very slow, because the login part takes a long time (user directory slowness, ...), consider adding on the desktop side a Windows parameter: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\InternetSettings\ ReceiveTimeout 300000 to avoid being prompted over and over again for username/password This is an addition to the support doc id: "Smart View 11.1.2.1 Keeps Prompting For Username And Password For Financial Management Provider [ID 1353294.1]"

    Read the article

  • How to enable and connect to RDP on a Windows Azure Web Role Instance?

    - by Enrique Lima
    We all know there have been some updates to Windows Azure, and one of the biggest I would say is the capability of being able to remote into the “OS level” of the image running a role.  And I am not talking about VM Role, I am talking about a Web Role for example. As developers we use Visual Studio, and when we are getting ready to deploy a project, we have the option of enabling this. Here is how: 1.  We publish our Project 2. On the Deployment dialog, provide all the details for your account, and before clicking OK, click on Configure Remote Desktop connections. 3.  Enable connections and the rest of the configuration.  Now, here is where there is an extra set of steps.  The first thing to know: The certificate used here is different from the other certs you have in place.  I created a new one, the went into certmgr.msc, then to Personal, then I selected the cert I just created.  Did a right-click, then All Tasks > Export.  Because what is needed is a pfx package, make sure when exporting you select to export the private key. 4. Click OK, on the Remote Desktop Configuration screen, now before you click OK on the Deployment, you will need to visit the Azure Portal. And perform the following: Go to your hosted services. Then with the service available, select the Certificates folder location. Then, select Add Certificate from the toolbar (more like Azure Portal Ribbon) Provide the details to upload the recently create pfx file. That will create the Certificate. Click OK on the deployment dialog, this kick off the deployment process. 5. Now, we need to go to the Windows Azure Portal.  Here we will select the Web Role deployed and Configure RDP. 6. Time to test.  Click on the Instance (not the role), this will make the Remote Access Connect Button available.  A file will start the process to be downloaded too 7. You will then be prompted for the credentials you configured. 8.  Validate connectivity … 9. Open IIS Manager … From here on, this is a way to manage and work with your Instance.

    Read the article

  • SSRS 2008 R2 KPIs with bullet graphs

    Key Performance Indicators are typically displayed in a scorecard with stop light indicators, which are either red, amber or green light icons. The limitation for these kind of indicators is that you can see the actual and target values in two different fields as well as see the status of the KPI in red, amber or green color. If the user wants to figure out the thresholds associated with the KPI, these values are generally not visible. Further, representing the threshold values in the scorecard itself defeats the purpose of the scorecard. The scorecard should display the KPI's status in the most summarized form and use a minimal amount of space on the dashboard. In this tip we would look at how to address this issue.

    Read the article

< Previous Page | 238 239 240 241 242 243 244 245 246 247 248 249  | Next Page >