Search Results

Search found 18489 results on 740 pages for 'which key'.

Page 383/740 | < Previous Page | 379 380 381 382 383 384 385 386 387 388 389 390  | Next Page >

  • How to enable Start Button in Windows 8?

    - by Gopinath
    Microsoft taken a bold move in removing Start button in Windows 8 operating system and replacing it with Metro styled Start screen. Since the early days of Microsoft Windows, all the PC users are used to Start button and missing it all of sudden in Windows 8 may disappointed many. If you are one among the users who is disappointed with missing Windows 8 button, here is a quick way to enable it back To restore Start menu in Windows 8 all you have to do is to download and install ViStart application. This freeware application magically brings back the missing Start orbit and also when you press Windows Key, it opens up the Start menu instead of switching to Windows 8 Start Screen. Note: While installation the application may ask you to install toolbars and third party application, I suggest you to uncheck them as they may change your search settings and default browser.  They may not be harmful but effects your browsing experience.

    Read the article

  • Need to test .properties one by one in every possibility?

    - by ??? Shengyuan Lu
    For example, there are some key-value configuration in .properties file. Such like someFeatureEnable=true. It must be bool type value which will be parsed by framework, in my case it's typical Java Spring configuration. Spring will handle the configuration and throw Exception when users set someFeatureEnable=123. My question is: if there many properties in .properties file, Is it worth testing them one by one? It's quite troublesome and low priority. The .properties file is always configured by tech administrator stuff. Limited chances that they will mess up the configuration. Thanks!

    Read the article

  • Program/Wrapper (how do you call it) to automate a certain script

    - by user10324
    In this question a script is provided, that minimizes all the other windows except the active one. But the thing is, to trigger this script a (shortcut) key-combination has to be pressed. I would love it, if it would be possible to automate this behavior, i.e. no matter what I do, only the active window is not minimized. This way I cannot view more then one open window at the same tine, which is what I'm after. Is it possible to write a script, that does this ? I a question I asked a while ago (where I learned about the above script), someone said, the proper way to do this, would be through a wrapper through which every program starts. I would also be very happy with a more sloppy solution, like activating this script 100 times per second (simulating pressing the shortcut combination a 100 times per second), if it is feasible - although I was warned, that that may not be a very good idea.

    Read the article

  • Best practices for launching a new software version

    - by steve
    I rebuilt a web app to replace a version that we have been using for the last 3-4 years. We have a few thousand clients and a few hundred active users per day. The functionality is basically the same. The new version is a little bit faster with a few enhancement features and there are a lot of behind the scenes changes that the clients will never see. The UI is quite different but ultimately much easier to use and navigate. How should I go about having our clients stop using the old system and start using the new one? I am currently putting together a video that will play on the web site as well as within the app. The video will go through the pages and focus on some key changes. I was also thinking about an intro page that will display once the user logs in and explains some of the features.

    Read the article

  • BIOS Always Freezes Instantly

    - by Louis
    I'm not sure if this is necessarily a Ubuntu question, but I've only had the problem since I installed 12.10. When I turn my computer on, the BIOS screen comes up as usual and... nothing else. When I press any key, I hear a loud beep and there's no response. I've tried looking for similar problems, but in most cases people are at least able to interact with their BIOS even if their OS doesn't load. It seems as though it's just completely freezing as soon as I turn it on.

    Read the article

  • Partner Milestones

    - by Kristin Rose
    Ahhh the joys of success especially during graduation time…It’s the same joy we feel when one of our partners reaches an Oracle milestone. After all, we want to help partners gain maximum exposure for their hard work and achievements. How you ask? Through streamlined press releases and social media exposure of course! So whether you just completed a Specialization or an Oracle Exastack program achievement, we want to help you share that news  both near and far. Be sure to check out the key PR assets that are available to you, which include: Easy to follow guidelines to help you create and promote your OPN successes – as well as how to submit your press release to Oracle for review OPN press release templates to help develop your announcements OPN’s social media outlets where you can further promote and share your news Contact information for your global Oracle Partner PR representatives Take advantage of these invaluable resources and “Go Get ‘Em,”The OPN Communications Team

    Read the article

  • Data Source Security Part 2

    - by Steve Felts
    In Part 1, I introduced the default security behavior and listed the various options available to change that behavior.  One of the key topics to understand is the difference between directly using database user and password values versus mapping from WLS user and password to the associated database values.   The direct use of database credentials is relatively new to WLS, based on customer feedback.  Some of the trade-offs are covered in this article. Credential Mapping vs. Database Credentials Each WLS data source has a credential map that is a mechanism used to map a key, in this case a WLS user, to security credentials (user and password).  By default, when a user and password are specified when getting a connection, they are treated as credentials for a WLS user, validated, and are converted to a database user and password using a credential map associated with the data source.  If a matching entry is not found in the credential map for the data source, then the user and password associated with the data source definition are used.  Because of this defaulting mechanism, you should be careful what permissions are granted to the default user.  Alternatively, you can define an invalid default user to ensure that no one can accidentally get through (in this case, you would need to set the initial capacity for the pool to zero so that the pool is populated only by valid users). To create an entry in the credential map: 1) First create a WLS user.  In the administration console, go to Security realms, select your realm (e.g., myrealm), select Users, and select New.  2) Second, create the mapping.  In the administration console, go to Services, select Data sources, select your data source name, select Security, select Credentials, and select New.  See http://docs.oracle.com/cd/E24329_01/apirefs.1211/e24401/taskhelp/jdbc/jdbc_datasources/ConfigureCredentialMappingForADataSource.html for more information. The advantages of using the credential mapping are that: 1) You don’t hard-code the database user/password into a program or need to prompt for it in addition to the WLS user/password and 2) It provides a layer of abstraction between WLS security and database settings such that many WLS identities can be mapped to a smaller set of DB identities, thereby only requiring middle-tier configuration updates when WLS users are added/removed. You can cut down the number of users that have access to a data source to reduce the user maintenance overhead.  For example, suppose that a servlet has the one pre-defined, special WLS user/password for data source access, hard-wired in its code in a getConnection(user, password) call.  Every WebLogic user can reap the specific DBMS access coded into the servlet, but none has to have general access to the data source.  For instance, there may be a ‘Sales’ DBMS which needs to be protected from unauthorized eyes, but it contains some day-to-day data that everyone needs. The Sales data source is configured with restricted access and a servlet is built that hard-wires the specific data source access credentials in its connection request.  It uses that connection to deliver only the generally needed day-to-day information to any caller. The servlet cannot reveal any other data, and no WebLogic user can get any other access to the data source.  This is the approach that many large applications take and is the reasoning behind the default mapping behavior in WLS. The disadvantages of using the credential map are that: 1) It is difficult to manage (create, update, delete) with a large number of users; it is possible to use WLST scripts or a custom JMX client utility to manage credential map entries. 2) You can’t share a credential map between data sources so they must be duplicated. Some applications prefer not to use the credential map.  Instead, the credentials passed to getConnection(user, password) should be treated as database credentials and used to authenticate with the database for the connection, avoiding going through the credential map.  This is enabled by setting the “use-database-credentials” to true.  See http://docs.oracle.com/cd/E24329_01/apirefs.1211/e24401/taskhelp/jdbc/jdbc_datasources/ConfigureOracleParameters.html "Configure Oracle parameters" in Oracle WebLogic Server Administration Console Help. Use Database Credentials is not currently supported for Multi Data Source configurations.  When enabled, it turns off credential mapping on Generic and Active GridLink data sources for the following attributes: 1. identity-based-connection-pooling-enabled (this interaction is available by patch in 10.3.6.0). 2. oracle-proxy-session (this interaction is first available in 10.3.6.0). 3. set client identifier (this interaction is available by patch in 10.3.6.0).  Note that in the data source schema, the set client identifier feature is poorly named “credential-mapping-enabled”.  The documentation and the console refer to it as Set Client Identifier. To review the behavior of credential mapping and using database credentials: - If using the credential map, there needs to be a mapping for each WLS user to database user for those users that will have access to the database; otherwise the default user for the data source will be used.  If you always specify a user/password when getting a connection, you only need credential map entries for those specific users. - If using database credentials without specifying a user/password, the default user and password in the data source descriptor are always used.  If you specify a user/password when getting a connection, that user will be used for the credentials.  WLS users are not involved at all in the data source connection process.

    Read the article

  • How do you hibernate/suspend Ubuntu like Windows or both at the same time?

    - by All Star Geek
    I'm using an ASUS laptop with Windows 7, and I just installed Ubuntu alongside Windows yesterday, using the no-risk option. I noticed, though, that I can't hibernate Ubuntu the way I did with Windows to save time, and, every time I use Ubuntu, I have to shut down to go into Windows, which has a slow boot. Is there any way that I could have Windows and Ubuntu hibernated at the same time so I can access both easily (preferably without having to hit a function key within seconds). When I try to hibernate or suspend Ubuntu with Windows shut down, the screen just turns blue and doesn't shut the computer off like a Windows hibernate or sleep.

    Read the article

  • Installed Ubuntu on 12.04 on my MacBook Air now I want to expand the partition

    - by Josh
    I recently installed Ubuntu 12.04 on a 40GB partition on my Mac Book Air (5,2). I'm having so much fun with it, I'm ready to make the switch permanently and replace it as the primary OS on my machine. I realize I can wipe the machine and start from scratch, but I'm looking for alternatives since I like my current setup. Options are... Create a backup and restore the back up to a larger partition (Assuming I should keep the default OS X install for firmware updates) Create a backup and restore to the entire drive (create a restore usb stick for OSX - not sure if that's possible?) re-size my current partition and wipe the OS X partition and either, A. re-install OS X (similar to option 1) or B. create the USB key (similar to option 2). Thoughts? Any other suggestions? Would also like thoughts on the "optimal" or "best practice" for partitioning Ubuntu. Thanks!

    Read the article

  • Quantal upgrade broke my gnome-shell!

    - by hwjp
    Just updated to quantal 12.10, and Unity works fine, but and I can't get gnome-shell to work :( Some symptoms: when using gdm as the default, it decided to display everything in chinese. When attempting to log in, it accepts the password, and then seems to crash when trying to load my desktop, and seems to restart gdm and send me back to the login screen when switching to lightdm as the window manager, it gets a little further (and in english), bringing up a desktop, but a broken one -- the propeller key doesn't bring up a menu, there's no menubar or notifactions area. i can do a few things, like bring up a terminal with ctrl+alt+t, and launch eg firefox from there, but not much else. I have tried uninstalling gnome-shell, deleting /etc/gdm, and reinstalling Any other suggestions? Which log files to look at for example?

    Read the article

  • YELP does not work right

    - by DWolfman
    When I click on DashHome then click on the questionmark, It brings up the help system. However when I enter a command to search on it tells me this does not exist. From what I understand the engine is YELP and is suppose to search everything including the man pages. However, I can't get it to find anything. I tried to install the yelp package but it tells me the one that is installed is the latest version. Am I doing something wrong? Everything I read says hitting the F1 key is suppose to bring up yelp but Thanks in advance. Dave

    Read the article

  • Verifying that a user comes from a 'partner' site?

    - by matt_tm
    We're building a Drupal module that is going to be given to trusted 'corporate partners'. When a user clicks on a link, he should be redirected to our site as if he's a logged in user. How should I verify that the user is indeed coming from that site? It does not look like 'HTTP_REFERER' is enough because it appears it can be faked. We are providing these partner sites with API Keys. If I receive the API-key as a POST value, sent over https, would that be a sufficient indicator that the user is a genuine partner-site user?

    Read the article

  • Touchpad doesn't work after logging in

    - by Vamsi Emani
    The touchpad of my laptop fails to work soon after I login to Ubuntu. I;ve gone through several threads in forums regarding the same and have tried out : gconftool -set boolean ... command I;ve even tried to reboot the system in recovery mode, also I;ve unchecked the System - Preferences - enable touchpad while key type and restarted. None of the above methods which did work for few seem to work for me. Please help me. How can I fix the touchpad issue in Ubuntu 11.10 without a reinstall? I am using 64 bit Oneiric, on Dell Inspiron

    Read the article

  • Help with a formula for Google Adwords [closed]

    - by XaviEsteve
    Hi guys, This question is more about maths and algorythms in Google Adwords but guess it's the most appropriate community in SE to ask this. I am creating a spreadsheet to calculate Adword formulas and I am stuck in how to calculate the Monthly Net Income for each keyword. I have created a formula which calculates it but can't figure out how to limit the Monthly Budget. The formula I've created is this one: Monthly Net Income = ( DailyClicks x ConversionRate x SaleProfit) - ( CPC x DailyClicks ) There is an example of the formula in the file which is a Google Spreadsheet publicly available here: https://spreadsheets.google.com/ccc?key=0AnQMyM9XJ0EidDB6TUF0OTdaZ2dFb2ZGNmhQeE5lb0E&hl=en_GB#gid=2 (you can create your own copy going to File Make a copy...) I am releasing this set of tools as Public Domain so feel free to use it :) Any help is much appreciated!

    Read the article

  • Fixing a broken toolbox (In Visual Studio 2010 SP1)

    - by mbcrump
    I was recently running into a situation where every time I opened Visual Studio 2010 SP1, the following message would appear for about 60 seconds or so: "Loading toolbox content from package Microsoft.VisualStudio.IDE.Toolbox.ControlInstaller.ToolboxInstallerPackage '{2C98B35-07DA-45F1-96A3-BE55D91C8D7A}'" After finally get fed up with the issue, I started researching it and decided that I’d share the steps that I took to resolve it below: I first made a complete backup of my registry. I then removed the following key: [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\VisualStudio\10.0\Packages\{2c298b35-07da-45f1-96a3-be55d91c8d7a}] I went to the following directory: C:\Users\Your Name Here\AppData\Local\Microsoft\VisualStudio\10.0\ and created a folder called bk and moved the .tbd files to that folder (they are hidden so you will have to show all files). I then removed the .tbd files in the root directory. I then launched Visual Studio 2010 SP1 again and it recreated those files and the problem was gone. Anyways, I hope this helps someone with a similar problem. I created this blog partially for myself but it is always nice to help my fellow developer.  Thanks for reading. Subscribe to my feed

    Read the article

  • Tell the CDI 2 Expert Group What You Think!

    - by reza_rahman
    Since it's introduction in Java EE 6, CDI has become a key API for the platform. CDI 1.1 was a relatively minor release included in Java EE 7 as was CDI 1.2 (to be included in GlassFish 4.0.1). We have much higher expectations from CDI 2 (projected to be included in Java EE 8) under the new leadership of Antoine Sabot-Durand. Much like we conducted the Java EE 8 survey to solidify future direction for the platform, CDI 2 is now undergoing the same effort. Towards this goal the CDI 2 leadership is now soliciting feedback on some very specific items via an open survey. Topics include the likes of Java SE bootstrap, asynchronous processing, modularity, EJB-style @Startup and @Asynchronous in CDI, configuration and CDI Lite. You can of course also provide free-form input on anything that's not on the survey. Take the survey now on the CDI specification site and help shape the future of CDI 2 and Java EE 8!

    Read the article

  • Cocos2d iOS A* Star Path finding help

    - by user32581
    Hello I need help implementing this class https://github.com/sqlboy/tiled-games/tree/master/src into my iOS game. Im using the suggested code of: AStarPathFinder pathFinder = [[AStarPathFinder alloc] initWithTileMap:tileMap collideLayer:@"collide"]; // Optionally, you can set the name of the collide property key and the value it expects. [pathFinder setCollideKey:@"collidable"] // defaults to COLLIDE [pathFinder setCollideValue:@"True"] // defaults to 1 // highlight a path (src and dst are tile coorindates) [pathFinder highlightPathFrom:srcTile to:dstTile]; // move a sprite [pathFinder moveSprite:player from:srcTile to:dstTile atSpeed:0.1f]; I get the following error: Instance method '-initWithTileMap:collideLayer:' not found (return defaults to 'id') This is the official post for the class: http://www.cocos2d-iphone.org/forums/topic/just-pushed-a-cctmxtiledmap-a-pathfinding-class-to-github/ The only other code I added was: #import "AStarPathFinder.h" I think I am perhaps missing something! I am grateful for any help!

    Read the article

  • 12.04 cannot boot from USB

    - by GhostRider
    The HP Pavilion g6 notebook is unable to boot from bootable USB stick created with Linux Live USB Creator. I was able to boot other systems using the same pendrive. I have changed the boot priority using F10. When I restarted, it didn't ask for any message like Press any key to boot from When I press F19, and selected the pendrive from the available options to boot from, while restarting it gives me a message: error while trying to boot selected boot image Though I looked into the possible suggestions here, none of them worked. Looking for any help? EDIT: I was able to fix the first issue, i'e ubuntu could be installed as secure boot option in the bios was not allowing the pendrive or cd/dvd to be detected. Now once i have successfully installed ubuntu 12.04, after the restart i was unable to find it in the os menu for selection and windows8 loaded by default Ubuntu version: 12.04

    Read the article

  • Stairway to T-SQL DML Level 4: The Mathematics of SQL: Part 1

    A relational database contains tables that relate to each other by key values. When querying data from these related tables you may choose to select data from a single table or many tables. If you select data from many tables, you normally join those tables together using specified join criteria. The concepts of selecting data from tables and joining tables together is all about managing and manipulating sets of data. In Level 4 of this Stairway we will explore the concepts of set theory and mathematical operators to join, merge, and return data from multiple SQL Server tables. Get Smart with SQL Backup Pro Powerful centralised management, encryption and more.SQL Backup Pro was the smartest kid at school Discover why.

    Read the article

  • Dash doesn't launch Gedit at the first try

    - by GUI Junkie
    I'm curious to find out what's going on here. Push the [windows] key -- Dash pops up. Type 'ge' -- 'Text editor' appears. [Enter] -- Nothing happens. With any other program, it launches the program. Repeat the steps and gedit launches. From terminal, gedit doesn't start. In the system monitor, it's 'sleeping'. This happens in my session, in my wife's session on the same computer, gedit runs. Any idea why gedit sleeps at the first launch?

    Read the article

  • Miss Oracle Open World? View the PeopleSoft Roadmap Presentation Here

    - by John Webb
    If you were unable to attend Oracle Open World in September, you missed out on some important PeopleSoft messages.   Don't despair!  You now have a chance to receive an update on PeopleSoft's presence at Oracle OpenWorld 2013 and the key messages delivered there. You can view the “PeopleSoft Update and Roadmap” webcast found here on the Quest Users Group site.  (Note: this is available with a FREE subscriber account.  Anyone can sign up here at no cost. This webcast recording presents the significant adoption and momentum behind PeopleSoft 9.2.  Viewers will also learn about the new release model for continuously delivering new capabilities to PeopleSoft customers at a lower cost enabled by the new PeopleSoft Update Manager.  There are also compelling live demonstrations of the major investment areas for PeopleSoft including a new PeopleSoft user experience enabling mobile solutions as well as In-Memory PeopleSoft applications. You can view all presentations ns in the Oracle Open World 2013 Content Catalog.

    Read the article

  • Virtual box doesnt have files machine and help tab

    - by user54986
    this is the second time im asking this question because someone had to close my question for a reason which i still dont understand. this is the original question Why is my files,machine,help tab missing in ubuntu 11.10? Most importantly ,i cannot access the machine menu that should be there but isnt. im using ubuntu 11.10 with oracle 4.1.10 heres a picture of what ubuntu should look like,or maybe i am wrong, http://i.stack.imgur.com/JgM5S.png The reason why im asking,is because id like to run a usb key inside my virtual box,but since i cannot access machine,i cant access the devices manager either. Just for your information,ive already installed the guest additions.

    Read the article

  • ubuntu is becoming more unstable

    - by Michael Hennessey
    I find ubuntu extremely unstable with mouse freezes (that can be corrected with control key), constant Compiz crashes ( with ATI non proprietary drivers also), problems installing drivers ( why would I want a video driver that fails to play most games, with loss of function of so many games (BZ flag?? has been around for years with no problems). I get the feeling that there is so one in your dept who is intentionally making poor and unstable choices for less than altruistic reasons. Whatever happened has been worsening ever since Unity became a choice. I have tried Kubuntu, Mint, Lubuntu and several other variants with similar poor results. Be aware I have used Ubuntu for many years.

    Read the article

  • Restore the Ctrl + Alt + Num Pad windows positioning commands?

    - by holocronweaver
    Using Unity in Ubuntu 12.04, the Ctrl + Alt + Num Pad combination for positioning windows has been fragmented by Ctrl + Alt + 4 (move window to left half of screen) being changed to Super + Left Arrow. A similar change moved Ctrl + Alt + 6 to Super + Right Arrow. Thus one moves windows to corners using Ctrl + Alt combos, but Super combos are needed to move to the left or right. This is more than a convenience problem since the new windows positioning provided by the super key combos seems to give different sizes than the Ctrl + Alt combos they replaced, leading to distracting gaps between windows when you combine the two methods to position three or more windows on one screen. Is there a way to restore the previous behavior so that I can use Ctrl + Alt + Num Pad for all windows positioning?

    Read the article

  • Safest way (i.e. HTTPS, POST, PGP) to send decryption keys through the web?

    - by theGreenCabbage
    I am in the final stages of development for my Revit plugin. This plugin is programmed in C#, and distributed via a DLL. One of the DLLs is an encrypted SQLite database (with proprietary data) that is in the form of a DLL. Currently, in development stages, the decryption key for the SQLite database is hardcoded in my main DLL (the program's DLL). For distribution, since DLLs are easily decompilable, I am in need of a new method to decrypt the DLL. My solution is to send our decryption keys from our servers securely to the host's computer. I was looking in POST, thinking it was more secure than GET, but upon research, it appears it's similarly insecure, only more "obscure" than GET. I also looked into HTTPS, but Hostgator requires extra money for HTTPS use. I am in need of some advice - are there any custom solutions I can do to implement this?

    Read the article

< Previous Page | 379 380 381 382 383 384 385 386 387 388 389 390  | Next Page >