Search Results

Search found 20847 results on 834 pages for 'advanced computer science'.

Page 274/834 | < Previous Page | 270 271 272 273 274 275 276 277 278 279 280 281  | Next Page >

  • Cannot delete movie on iTunes for iPhone 4?

    - by Jian Lin
    I was on vacation and took some videos, and now the iPhone 4 memory is near full. So I tried to delete other experimental movies I made using Handbrake, so that I can take more video or photos, but if I plug the iPhone 4 into my Notebook computer, I can seem to delete it on iTunes? Maybe because the computer I sync with the iPhone 4 is at home (a desktop), but not with me on vacation. I can't delete it on iTunes, can't delete it on iPhone itself. I am stuck during the vacation, or is there a way to handle it?

    Read the article

  • Shader compile log depending on hardware

    - by dreta
    I'm done with the core of my graphics engine and I'm testing it on every platform I can get my hands on. Now, what I noticed is that different drivers return different shader and program compile log content. For example, on my friend's laptop if you successfuly compile a shader then the log is simply empty. However on my PC I get some useful information along with it. So if I compile a vertex shader, I'll get: Vertex shader was successfully compiled to run on hardware. Which isn't that impressive, but is what happens when I compile a program. On my friend's computer the log is empty, since the program compiles. However on my own computer I get: Vertex shader(s) linked, fragment shader(s) linked. Which is awesome, because I'm attaching a geometry shader with 0 (I have a geometry shader file with trash, so it doesn't compile and the pointer is set to 0), and the compiler just tells me which shaders linked. Now it got me thinking, if I was going to buy a graphics card, is there a way for me to get the information about whether or not I'll get this "extended" compile information? Maybe it's vendor specific? Now I don't expect an answer TBH, this seems a bit obscure, but maybe somebody has any experience with this and could post it.

    Read the article

  • virtual hosts on lighttpd can't load

    - by Jake
    Thats what I did: Added following code to lighttpd.conf $HTTP["host"] =~ "(^|\.)test\.com$" { server.document-root = "/home/test" } created /home/test Restarted Lighttpd but it doesn't load anything Google chrome Error: No data received Unable to load the webpage because the server sent no data. Here are some suggestions: Reload this webpage later. Error 324 (net::ERR_EMPTY_RESPONSE): The server closed the connection without sending any data. Firefox: The connection was reset The connection to the server was reset while the page was loading. The site could be temporarily unavailable or too busy. Try again in a few moments. If you are unable to load any pages, check your computer's network connection. If your computer or network is protected by a firewall or proxy, make sure that Firefox is permitted to access the Web. can you please explain How can I fix this? Really Thanks

    Read the article

  • PC shuts down when installing ubuntu?

    - by Robin002
    I'm now using ubuntu from USB, and I'd like to install ubuntu on my hard disk. I tried the option of removing Vista while installing ubuntu. However, near the end of the installation process (presumably the end because I can see some slideshows on how to start using ubuntu), the screen suddenly goes to black with white words running around on it. Soon the computer shuts down. After that, restarting leads to a black screen with only a small white cursor on the top left corner. The cursor keeps blinking and nothing happens. I found that I can alternatively choose to boot with USB by hitting F12 just when the computer starts. So I tried to reinstall ubuntu by running ubuntu on USB. One of the options of installation is to update ubuntu 11.04 to ubuntu 11.04, so it seems the ubuntu is already installed somehow. Anyways, I tried both update and delete and install option but the same thing happens as the 1st time (sometimes before reaching the end), while I still cannot start my PC as ubuntu (without USB). How may I install ubuntu properly?

    Read the article

  • Hostname confusion (Ubuntu Server 10.04)

    - by letseatfood
    I have just setup Ubuntu 10.04 Server Edition. I have been following this tutorial. The DNS information seems to be setup correctly now, but I am confused about the hostname. Currently it is laughingbuddha.home. That is a name I created. Now, I am mainly not sure how to connect from another computer on my network. I basically want to be able to put PHP files on the server box and then test them via a web browser on my other computer. So, I think I digressed from my first question, but would somebody please help me figure out if the hostname is okay for doing what I need to do? Thank-you!

    Read the article

  • Dell Inspiron 1501 battery no longer "recognized"

    - by mwalling
    My parents were on vacation last weekend and franticly called me saying that they couldn't get their Inspiron 1501 to boot anymore without the BIOS whining about the battery. Before this happened, they said the "battery went dead with negligible pre-warning". On bootup, the computer says: WARNING: The battery cannot be identified. This system will be unable to charge this battery. With options to enter the BIOS or continue booting. I got to look at the machine last night. The battery still holds a charge, and will recharge. Windows detects it as a DellPY9617 battery manufactured by "DynaPack". I didn't get the BIOS revision, but the machine's ship date was 7/21/2007. The recommendations I could find on the internet varied from "discharge the battery completely" to "your computer is too old" to "update the BIOS", and wanted a more specific answer before doing something drastic.

    Read the article

  • Error 1603 when installing Microsoft Intellipoint 8.2 on Windows 7 x64

    - by HeB
    Installing MS Intellipoint 8.2 (for my MS touch mouse) on my Dell Inspiron 580 always gives the following error: "Setup must close because an error occurred. Verify that your computer meets the system requirements on the product packaging. Restart your computer and try running Setup again. If this error happens again, see Help for customer support options. (Error Code 1603)" I'm running Windows 7 x64 with all latest updates. MS solutions don't work. How to fix?

    Read the article

  • Extremely poor WiFi reception on new desktop

    - by guy
    I just received a new desktop with a built-in WiFi card (Windows 7 Home Premium x64). However, I am only able to receive any WiFi signal when the computer is within 1-2 meters of a router. Even then, the signal is very weak (Windows 7 says it is "poor"). I have tried this with 2 different routers and see similar results. I have somewhere around a dozen other devices that can connect to both routers with greater signal strength (usually full strength) from much, much further away. When I tried calling support I was instructed to reinstall my drivers and attempt to change the WiFi channel of the router. Neither worked. I was then told that the problem was with my routers and that the computer was functioning normally and that it was certainly not a hardware problem. What would be the cause of this and is there anything I can do to fix it?

    Read the article

  • How to merge several detached signatures from different people into one?

    - by Petr Pudlák
    A group of people wants to publish a file and they all want to digitally sign the file as different recipients of the file will have different chains of trust. For simplicity, it's desired that there is only one detached signature file with all the signatures, so that the recipients don't need to check them one by one: foo.tar.gz foo.tar.gz.sig However, for security reasons, every person needs to perform the signing on their computer, it's not possible to create the combined signature by having multiple private keys on one computer and performing the operation with one command. Is it possible with GPG to somehow merge detached signatures of a file from multiple participants?

    Read the article

  • Programming a trading strategy

    - by Rob
    Excuse me if I'm not descriptive enough, as I do not have much of a background when it comes to these things: How would I go about coding a primitive trading strategy and link it to some sort of artificial trading environment? Where do I start, and what are some other essential questions I should be asking? I am interested more in doing this because it interests me than making returns. Ideally it utilizes random/historical market data and doesn't actually execute any real trades. My background: I'm almost done my undergrad degree in computer science, and have had intro finance and economic courses. Familiar mostly with C and Java.

    Read the article

  • Problem Updating/Installing Java

    - by Click Upvote
    I've had Java installed on my computer for a while. However lately, whenever I go to a website which has got a java applet in it, i only see a white box where the applet previously used to run (this is happening on multiple sites, not just one). I figured I might have to download java again, so I went to this page and downloaded the installer. However, each time the installer finishes downloading whatever it needs to, I get the error: 'Unable to uncompress java installer' (or perhaps its 'Unable to uncompress downloaded files'. What shall I do? I'm using Windows XP, and I'm still able to run Netbeans on the computer, the problem seems to only be with applets, and occurs in all browsers.

    Read the article

  • Apps Script Office Hours - November 29, 2012

    Apps Script Office Hours - November 29, 2012 In this episode Arun and Ikai ... - Talk about the recent Apps Script hackathon they held in Los Angeles. - Cover the items in the release notes for recent releases. - Discuss recent Apps Script blog posts, including reminders, open source libraries, and more. - Answer a question about where best to store your data in Apps Script. Visit developers.google.com to find out when we'll be hosting our next Office Hours. From: GoogleDevelopers Views: 363 11 ratings Time: 28:55 More in Science & Technology

    Read the article

  • Why is an Ext4 disk check so much faster than NTFS?

    - by Brendan Long
    I had a situation today where I restarted my computer and it said I needed to check the disk for consistancy. About 10 minutes later (at "1%" complete), I gave up and decided to let it run when I go home. For comparison, my home computer uses Ext4 for all of the partitions, and the disk checks (which run around once week) only take a couple seconds. I remember reading that having fast disk checks was a priority, but I don't know how they could do that. So, how does Ext4 do disk checks so fast? Is there some huge breakthrough in doing this after NTFS came out (~10 years ago)? Note: The NTFS disk is ~300 GB and the Ext4 disk is ~500 GB. Both are about half full.

    Read the article

  • OS X: How to create a user account with access to the applications that she has installed only.

    - by pmurillo
    Till now, I've been the sole and proud owner of an iMac. I've always logged in as an administrator and I've also installed a bunch of software following the standard procedure of dragging and dropping it into the Applications folder. This is about to change, as sharing it with a friend makes a lot of sense now that I only have time to use the computer in the mornings, and she can only use it at nights. I thought this was going to be really easy: Just create a user account for her and that's all, I thought. Unfortunately, this is not the case. When she logins into the computer using her username and password, she has access to the same applications I've installed. Even the same applications that I setup to automatically start when I login start for her when she does. How can I setup a user that has only access to the applications that she has installed, but none of the ones installed by other users? Many thanks

    Read the article

  • Setting up a LAMP VM server for Development and Testing?

    - by TdotThomas
    Info: I would like to set up a VM server on my local computer which will serve pages in the exact same way as my current hosting (but only to me on my local computer). I currently pay a big web hosting company to host my website & web store and they are doing a great job, but I would like to be able to work on my Web site and its corresponding MySQL DB, HTML, and PHP code without being at risk of messing something completely up on the live servers. My current plan of action: Set up a VM webserver with Debian, MySQL, PHP, Apache. Copy web store (PHP/HTML) code to VM server. Copy my current MySQL databases from my hosting provider and install on VM server. Modify and test new features on VM server. Upload MySQL DB and HTML/PHP code back to web host's server where it should work as before but with new modifications. Questions: Now I'm pretty sure I have steps one and two down correctly but I can't for the life of me figure out how to proceed next, so here are my questions. I have my /etc/host file set up so www.MySite.test redirects to the IP address of the local VM webserver. Once I import my PHP/HTML files and MySQL file whats the best way to navigate around the fact that all of my files and DBs will reference www.MySite.com. I can export my MySQL dbs but do I also have to export my MySQL users and passwords to access those db or are those coded into my html/php code?

    Read the article

  • Unable to remove/hide icons from desktop folder

    - by Kyomu
    I wish to hide some windows icons from my desktop folder1, but cannot. When I click delete, it says they will be deleted from my desktop (which they already are), but they remain visible in the desktop folder, which is where I wish them removed. Is there any way I can remove these? (I always use Win+E which really lets me get to all of these easy enough). Offending icons: Libraries, Homegroup, User folder, Computer, Network, Control Panel, and Recycle Bin. For those who might be wondering why, I find myself in this folder a bit to often (including when uploading a file), and find these nothing but clutter, especially as these always default to the top. Thanks for your help! 1 By desktop folder, I mean the folder you would see by going to "My Computer" and clicking "Desktop" on the top left under Favorites. Note: Changing my "Desktop Icon Settings" under "Personalize" does not affect the desktop folder, but rather just the desktop view.

    Read the article

  • Having internet on a VirtualBox

    - by S4M
    I am running a linux laptop and I set up a VirtualBox under windows XP. My only problem is the VirtualBox doesn't seem to be connected to internet - When I do the connection diagnosis it tells me there is no connection. I am using an NAT adapter, and I bind the port 80 from my computer to the port 80 of the VirtualBox, and same for the ports 8080, but still no result. I would be grateful is someone could help me to sort this out. EDIT: thinking of it, what is making the problem hard - and painful - is the absence of error message. If I try to use a given adapter to share my computer's connection with the VirtualBox, and it doesn't work, I have no way to know why. So, it would be really helpful if someone could share a way to access this king of information (is there a log file somewhere or a way to run VirtualBox from command line in a verbose mode?).

    Read the article

  • Is there a well grounded theory on backward and forward compatibility of formats, languages, grammars and vocabularies?

    - by Breton
    I have a friend who has the specific problem of building a case against the use of a custom HTML <wrapper> tag in some site's markup. Now, intuitively we can answer that use of such a tag is risky, as future HTML specs may define a wrapper tag with semantics that conflict with its use on the site. We can also appeal to a particular section of the HTML5 spec which also recommends against the use of custom tags for this reason. And while I agree with the conclusion, I find these arguments a little on the weak side, on their own. Is there some well grounded and proven theory in computer science from which we can derive this conclusion? Have programming language theorists created proofs about the properties of vocabulary versioning, or some such thing?

    Read the article

  • Server IP must be a LAN IP (Port Forwarding Netgear)

    - by rphello101
    I'm trying to set up a server (Apache) on my computer (fairly new to it). As I understand it, for it to be accessible to other computers, I need to forward port 80. When I try to forward the port though, I get the error: Server IP must be a LAN IP. I noticed in ipconfig that my default gateway is different than my wireless router. My computer is not hardwired, not on WiFi. Furthermore, I do not, at this point, have a static IP. I read that it should still work with a dynamic IP until it changes. Any ideas on what I can do?

    Read the article

  • Need Directions to become a programmer [closed]

    - by Omin
    Before youguys go on about how there are many types of programmers, please read through the post. Long term goal: Develop my own software (company) Short term goal: Get a job that involves coding/programming Current status: Support Analyst (at a software company but does not involve any programming) with 40k salary, 3rd year computer engineering student I had everything figured out. I'm going to develop a 2D scrolling game for iphone or android, publish the app, sell a bunch, and then apply at a studios as a software developer. And then something hit me. I think I need to get a job that involes programming to learn as much as I can in the shortest time possible. So I got a phone interview at a fast growing start up software company, passed that no problem, but then had to take an online technical assessment. That failed miserably. I thought that if I could just present myself, show that I am hard working, positive attitude, eager to make self improvements, type of a guy, I could get the job. I was wrong. And now, I am lost. Im thinking of staying with my job until I find a new one as a programmer. I will be working, self studying, and trying to make this happen without finishing university. I forgot to mention that the online technical assessment was based on data structures/algorithms, OO design, runtime complexity. I was hoping that I could get some guidence. Should I be focusing on app development or study computer science fundamentals? I have a list of books I can be going through: Learning C# O'Reilly (I got interested in C# because of Unity3D and Mono), C# 5.0 in a Nutshell, Head First Design Patterns, Code Complete, Introduction to Algorithms, Programming Interviews Exposed, Cracking the Coding Interview, The Google Resume.

    Read the article

  • Downclock CPU reaching critical temperature

    - by Draga
    I have an HP tx1250 laptop. It always had serious overheating problems and although usually it runs fine I'm now running a continuous test for my dissertation, this brings the CPU temp close to the critical and from time to time the computer shutdown for reaching it (checked the log). I use to have the same problem on Win XP but I noticed Win Vista and 7 downclock the CPU when is necessary to cool it down so I was thinking if the same is possible on Ubuntu 12. The only program I've found that may do the job is computer temp ( http://computertemp.berlios.de/ ) but it doesn't seems to work under Ubuntu 12. The inside of the laptop is fairly clean, the thermal paste is quite recent, I'm keeping it lifted from the desk and judjung by the sound of the fan that's running fine as well. The pc in now running between 78 and 91 degrees C but about once a day it shut down for reaching 95. I need the results of the test it's running pretty soon so it's important that it runs non-stop. I've though to set the maximum clock of the CPU to slightly less the maximum but then these tests I'm running would take much more time. Thanks! PS: first and last HP laptop for me.

    Read the article

  • Updating, etc., automatically

    - by Steve D
    Is there a way to set up Ubuntu 12.04 (or earlier versions) so that all recommended updates are done automatically, say once a week? When I say automatically, I mean no password entry or user intervention required. This sounds like a stupid request, so let me tell why I'm asking. My grandfather knows nothing about computers; he uses his solely to read Yahoo! mail. I want to get rid of his clunky, spyware-ridden Windows XP and install Ubuntu. I want to set it up so when he turns the computer on, after a couple minutes, voila!, Yahoo! mail, already signed in, ready to go. The problem is I don't want to have to go over there every week or so and make sure everything is up-to-date, he hasn't accidentally installed any spyware, etc. So can this be done? Is this the best way to set things up for my grandfather? Are there other things I should be worried about when it comes to keeping things hassle-free for him? Please don't post anything like "why not teach him how to... blah blah blah". My grandfather is 80 years old and has made it clear email is the only thing he will ever use a computer for! Thanks!

    Read the article

  • Windows 8.1 will not go back to sleep after waking up

    - by per
    I have problems putting Windows to sleep and starting the screen saver on my new Windows 8.1 machine. Sleep mode and screen savers work only when the computer is first powered up (or restarted). But once it goes to sleep (manually or automatically) and I wake it up later, it wont go back to sleep again and I can't use screen savers either. I updated the chipset and graphics card drivers. My computer isn't part of a homegroup either. Does anyone else have similar issues? Thanks for your advice, per

    Read the article

  • Can I use the same machine as a client and server for SSH?

    - by achraf
    For development tests, I need to setup an SFTP server. So I want to know if it's possible to use the same machine as the client and the server. I tried and I keep getting this error: > Permission denied (publickey). > Connection closed and by running ssh -v agharroud@localhost i get : > OpenSSH_3.8.1p1,OpenSSL 0.9.7d 17 Mar > debug1: Reading configuration data /etc/ssh_config > debug1: Connecting to localhost [127.0.0.1] port 22. > debug1: Connection established. > debug1: identity file /home/agharroud/.ssh/identity type -1 > debug1: identity file /home/agharroud/.ssh/id_rsa type 1 > debug1: identity file /home/agharroud/.ssh/id_dsa type -1 > debug1: Remote protocol version 2.0, remote software version OpenSSH_3.8.1p1 > debug1: match: OpenSSH_3.8.1p1 pat OpenSSH* > debug1: Enabling compatibility mode for protocol 2.0 > debug1: Local version string SSH-2.0-OpenSSH_3.8.1p1 > debug1: SSH2_MSG_KEXINIT sent > debug1: SSH2_MSG_KEXINIT received > debug1: kex:server->client aes128-cbc hmac-md5 none > debug1: kex: client->server aes128-cbc hmac-md5 none > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY > debug1: Host 'localhost' is known and matches the RSA host key. > debug1: Found key in /home/agharroud/.ssh/known_hosts:1 > debug1: ssh_rsa_verify: signature correct > debug1: SSH2_MSG_NEWKEYS sent > debug1: expecting SSH2_MSG_NEWKEYS > debug1: SSH2_MSG_NEWKEYS received > debug1: SSH2_MSG_SERVICE_REQUEST sent > debug1: SSH2_MSG_SERVICE_ACCEPT > received > > ****USAGE WARNING**** > > This is a private computer system. This computer system, including all > related equipment, networks, and network devices (specifically > including Internet access) are provided only for authorized use. This > computer system may be monitored for all lawful purposes, including to > ensure that its use is authorized, for management of the system, to > facilitate protection against unauthorized access, and to verify > security procedures, survivability, and operational security. Monitoring > includes active attacks by authorized entities to test or verify the > security of this system. During monitoring, information may be > examined, recorded, copied and used for authorized purposes. All > information, including personal information, placed or sent over this > system may be monitored. > > Use of this computer system, authorized or unauthorized, > constitutes consent to monitoring of this system. Unauthorized use may > subject you to criminal prosecution. Evidence of unauthorized use collected > during monitoring may be used for administrative, criminal, or other > adverse action. Use of this system constitutes consent to monitoring for > these purposes. > > debug1: Authentications that can continue: publickey > debug1: Next authentication method: publickey > debug1: Trying private key:/home/agharroud/.ssh/identity > debug1: Offering public key:/home/agharroud/.ssh/id_rsa > debug1:Authentications that can continue:publickey > debug1: Trying private key:/home/agharroud/.ssh/id_dsa > debug1: No more authentication methods to try. > Permission denied (publickey). Any ideas about the problem ? thanks !

    Read the article

< Previous Page | 270 271 272 273 274 275 276 277 278 279 280 281  | Next Page >