Search Results

Search found 25946 results on 1038 pages for 'cost based optimizer'.

Page 388/1038 | < Previous Page | 384 385 386 387 388 389 390 391 392 393 394 395  | Next Page >

  • MS Excel - splitting a formula into individual cells?

    - by Nick
    I'm not sure if this is possible, or if I'll have to do it manually, but I have lots of cells in the following format: =87.12+56.52-16.50+98.21-9.51 If possible, I'd like to break it up into columns, like so: I have a data in excel in the format: 87.12 | 56.52 | -16.50 | 98.21 | -9.51 I've tried text to columns based on the '+' symbol, but it falls short when I then try to break it down by the '-' symbol, it moves into columns as appropriate, it removes the minus from the start of the figure Any suggestions would be very welcome! Thank you

    Read the article

  • Migration from Distributed File System 2003 to 2008

    - by miro23
    I have two Windows Server 2003 and both have DFS and it does replication between them. I would like to migrate the primary win2k3 DFS server to win2k8. what is the best way to do that? I found this article: Migrate a Domain-based Namespace to Windows Server 2008 Mode http://technet.microsoft.com/en-us/library/cc753875.aspx But I am interested only on migrating the DFS replication and not the namespace. Thanks.

    Read the article

  • Securing debain with fail2ban or iptables

    - by Jimmy
    I'm looking to secure my server. Initially my first thought was to use iptables but then I also learnt about Fail2ban. I understand that Fail2ban is based on iptables, but it has the advantages of being able to ban IP's after a number of attempts. Let's say I want to block FTP completely: Should I write a separate IPtable rule to block FTP, and use Fail2ban just for SSH Or instead simply put all rules, even the FTP blocking rule within the Fail2Ban config Any help on this would be appreciated. James

    Read the article

  • Gizmo5 mobile with wifi and callin number

    - by Mark
    I want to buy a Nokia 5530 and run Gizmo5 on it in order to receive and make calls. I want to get a call in number based in England and was wondering if receiving calls via the call in number on my mobile via wifi would use any of my callout credit? I ask because the Skype lite version uses your callout credit if you receive a call on it using your online number (it doesn't if you use the desktop version). Thanks!

    Read the article

  • Setting http auth type in phpMyAdmin on Debian

    - by Daniel Hollands
    I'm trying to set-up the fresh phpMyAdmin install on my Debian 6 server to use http authentication rather than the cookie based auth that is default when it is installed. To do this, I edited the $cfg['Servers'][$i]['auth_type'] line to use 'http' as its setting in /etc/phpmyadmin/config.inc.php, and restarted the server, but the setting seems to be being ignored, as when I goto phpmyadmin, it is still offering up the regular login box. I've done this twice before (once on debian and once on ubuntu), so I'm not sure why it isn't working this time. Thank you

    Read the article

  • How to set up server side message filters on sendmail/Imap server?

    - by Steve Prior
    I currently have message filters set up in Thunderbird to put incoming email messages from various sources in appropriate server side folders. Since I envision starting to use a smartphone (Android) based IMAP client which doesn't support folders or message filters I'd like to move these filters server side and take them off the clients. The Linux server email system is sendmail and UW IMAP. Can someone steer me in the direction of setting up such filters on the server side?

    Read the article

  • Untar with date filter

    - by Don
    Is there any way to untar and only extract those files that are above a certain date including directory structure?? I restored a backup on a play server but it was a few days old. However I have a tar archive of the entire structure that is more up to date and healthy so now I want to extract all files (including directory structure) based on a date filter on the files if possible?

    Read the article

  • Bookmarking service search

    - by CChriss
    I use Diigo, but I'm looking for alternatives to it. The main feature I need (that most don't have) is the ability to search on the full page text. Diigo does this, but I was hoping there might be others out there to choose from too. If you know of one, I'd even consider locally installed programs that have this ability, but I do prefer web-based tools for this.

    Read the article

  • Benefits of In-house server management vs outsourcing [closed]

    - by Eric Di Bari
    I've just created a small web-based company. We're planning on using a cloud hosting solution, but don't have the current resources to properly setup and manage the server. As a new company, are there more benefits to bringing someone on-board as part of the organization to manage the server, versus going with a third-party management company? Such as a greater degree of 'ownership' and involvement?

    Read the article

  • WSS audiences dont show all AD Groups

    - by Mike
    Not all of my AD Groups are showing in the Audience list. I want to create a new audience based on if the user is in a group. Some AD groups show up, and others don't. Many the newer ones do not show up. My connection is pulling (im pretty sure) the whole AD via primary domain controller. MOS2007 win2003 Any ideas?

    Read the article

  • How can I retrieve statistics from my ghost cast server?

    - by Foxtrot
    I have a GhostCast server running for deploying images. I would like to have each ghost cast session to write to a file ( can be multiple text files or append to one file already there ) statistics. I know this is possible based on the options GhostCast software provides for writing to a log file, but I would like this automated for every image being backed up and restored. I don't want to have my employees click write to a new file every time. Is this possible?

    Read the article

  • Is there an online identicon creator?

    - by wonsungi
    I thought the pictures associated with our profiles were automatically generated until they were manually changed. A lot of people have these cool identicons based on their IP address. How can I get my own identicon? I am looking for an online generator. Gravator does not seem to have any options to generate identicons. Edit: I will probably accept your answer if you just tell me how you made your identicon (and it did not involve downloading/installing stuff)

    Read the article

  • Color drop down in Excel cell (with no text)? e.g. bgcolor = Red-Green-Amber-unknown

    - by adolf garlic
    I have an Excel sheet that I'm using to keep track of the status of certain things. I want to have a column which consists of cells containing a repeated drop down that allows you to select (as background) red amber green unknown I don't want any text in this cell, I just want a coloured block. Is this possible? I've tried playing around with data-validation-list (based on range containing all of said colours but to no avail)

    Read the article

  • What is the official Microsoft name for Windows 8 versions: Intel compatible vs. ARM?

    - by Clay Nichols
    Windows 8 will, AFAIK, be available in two very different flavors: One that supports old Windows programs (intel processor, I think) and the other will be an ARM processor which does NOT support x86 programs. I need to know how to refer to these to let customers clearly know which version of Windows we (currently) support. It looks like the terminology is: Windows 8 : This will be backward compatible with Win 32 apps. Windows RT: Runs on ARM-based processor devices (probably mainly tablets) and does not support

    Read the article

  • Apache mod_proxy dynamic filter

    - by jrhicks
    How can I configure Apache to ProxyBlock content based on something dynamic such as time-of-day or max-use. Basicly I'm curious about the scriptability of Apache. My web-stumbling leads me to believe I can combine mod-proxy and mod-perl in interesting ways to do dynamic filtering. But I'm pretty lost. What are some general instructions, tutorials, books, technologies to begin scripting Apache (or any suitable proxy).

    Read the article

  • External WiFi Adapter for Eee PC 1000?

    - by Peter M
    I have an original Eee PC 1000 running the stock Xandros. I have run into problems where the internal WiFi card does not seem to have enough sensitivity to connect to a lot of access points. Although the computer will report APs in the area, unless the signal strength is over 80% (as reported by the Wireless networks application) I cannot seem get a connection. So is there a recommended USB WiFi adapter that is known to work with the Eee PC/Xandros system or in general with a Debian based system?

    Read the article

  • Find daily backup sizes in DPM 2007

    - by Paul D'Ambra
    I'm considering setting up a DPM server offsite and synchronising it with my onsite DPM server. How can I determine the size of the changes that would be replicated (based on my historical data) so that I can determine if we have the bandwidth to support this?

    Read the article

  • Why is Cuteflow slow on XAMPP 1.7.1?

    - by gsk
    I have recently installed cuteflow (a PHP based document circulation application) on my machine as I need to customize this software. I have XAMPP 1.7.1 running on a windows xp machine on which this application is deployed. While all my other applications that are running on XAMPP are loading fast, only this application is taking exorbitant amount of time. The same cuteflow application is running very well on my colleagues machines.

    Read the article

  • Can Gitosis enforce correct user name/email?

    - by koumes21
    Gitosis is able to authenticate users based on public/private key pair. It is able to find out which user is currently committing. However, the user name and email is taken from the client's Git configuration ('git config user.name' etc.), which can be set to arbitrary values. Is there any way to associate user names and emails with their public keys and then make Gitosis uses these names and emails as the name and email of the committer?

    Read the article

  • What is a good laptop for .NET and Java programmer?

    - by achinth
    I am planning to buy a new laptop and would like to know if I should go for an i3, i5 or an i7 based laptop? I do most of my development in Visual Studio 2010 and also use Eclipse and Weblogic 10. Also planning to use WPF/Silverlight in the future. Will going for a i7 really benefit me or an i3 or an i5 will suffice for my needs?

    Read the article

  • Can I access mac iTunes library from an iPad?

    - by Ken
    Can I access my iMac based iTunes library from my iPad over my home wifi? I know I can sync them up but the library is too big. Edit; just to clear(er), the movies, podcasts etc which are stored on the iMac, I want to watch them on my iPad without syncing. I know I can create playlist to sync a subset of my library, but that is not what I want. What I'm thinking about is using my iPad as a kind of portable apple TV.

    Read the article

  • Luns not taken by the windows server admin

    - by wildchild
    I have a scenario based question...Something , I haven't faced till now ,but i would be interested to know the answer. If i have assigned a luns (say, of 50 GB) and put them in storage group.However, the windows server team did not grab that lun but sent an acknowledgment saying the Luns are alingned. I would like to know what will happen to the Luns that belong to the SG ..in my opinion they will remain in the SG as unassigned Luns ..or is there a possibility that the lUns will move back to the storage.

    Read the article

< Previous Page | 384 385 386 387 388 389 390 391 392 393 394 395  | Next Page >