Search Results

Search found 29284 results on 1172 pages for 'weblogic 10 x'.

Page 564/1172 | < Previous Page | 560 561 562 563 564 565 566 567 568 569 570 571  | Next Page >

  • Unable to install cedarview-graphics-drivers

    - by antnchv
    $ sudo apt-get install cedarview-graphics-drivers Reading package lists... Done Building dependency tree Reading state information... Done Some packages could not be installed. This may mean that you have requested an impossible situation or if you are using the unstable distribution that some required packages have not yet been created or been moved out of Incoming. The following information may help to resolve the situation: The following packages have unmet dependencies: cedarview-graphics-drivers : Depends: xserver-xorg-core (= 2:1.10.99.901) Depends: xorg-video-abi-11 E: Unable to correct problems, you have held broken packages. Please advice.

    Read the article

  • Chessin's principles of RAS design

    - by user12608173
    In late 2001 I developed an internal talk on designing hardware for easier error injection, prevention, diagnosis, and correction. (This talk became the basis for my paper on injecting errors for fun and profit.) In that talk (but not in the paper), I articulated 10 principles of RAS design, which I list for you here: Protect everything Correct where you can Detect where you can't Where protection not feasible (e.g., ALUs), duplicate and compare Report everything; never throw away RAS information Allow non-destructive inspection (logging/scrubbing) Allow non-destructive alteration (injection) (that is, only change the bits you want changed, and leave everything else as is) Allow observation of all the bits as they are (logging) Allow alteration of any particular bit or combination of bits (injection) Document everything Of course, it isn't always feasible to follow these rules completely all the time, but I put them out there as a starting point.

    Read the article

  • Nokia promet une tablette sous Windows 8 et un smartphone "révolutionnaire" qui n'aura plus besoin d'être touché ou regardé

    Nokia promet une tablette sous Windows 8 et un smartphone "révolutionnaire" "Que les utilisateurs n'auront plus besoin de regarder ou de toucher" Le magazine spécialisé DigiTimes rapportait dans l'un de ses articles paru le 12 mars dernier que Nokia sous-traiterait actuellement la production d'une tablette de 10 pouces à une société chinoise, Compal Electronics. Selon ce même article, 200 000 unités seraient conçues dans un premier temps pour une commercialisation prévue au quatrième trimestre de cette année. Une nouvelle que Marko Ahtisaari, vice-président senior de la section Design de Nokia, a confirmé dans un entretien accordé au magazine finlandais Kavppalehti O...

    Read the article

  • Why does my FPS drop gradually over time?

    - by mmankt
    I'm working on this game: yt alpha preview I came into a huge game-breaking problem - after 10-15 min of gameplay the FPS drops from 60 to 30 and is very unstable. I'm using tons of physics and particles, I'm deleting and nulling everything I can after it's supposed to be removed, I remove objects from vectors etc. The memory usage is stable at around 150mb so a leak is unlikely (or invisible?)- after a round ends and I delete everything, play a new round and performance is still terrible. I spent two days trying to figure this out and I just can't fix it. Maybe I'm missing something? I know it's hard to help with no code but I would just have to post my whole source.

    Read the article

  • Exadata, Exalogic and Exalytics Partner Demo Equipment Purchase Initiative

    - by Cinzia Mascanzoni
    Oracle is pleased to announce that as part of the Demo Equipment Purchase Program, until December 31, 2012, Oracle VADs may purchase Exadata, Exalogic and Exalytics configurations, for their own demonstration purposes or to distribute to a partner for the partner's demonstration use, at 25% off the list price. In addition, purchasing partners will be eligible to receive 10% of list price (excluding support) in MDF funds to support the partner's Exadata/Exalogic/Exalytics demand generation activities. New units must be used for demo purposes for a minimum of 6 months before they may be resold to an end user. For more info, visit the VAD Resource center here.

    Read the article

  • Windows Phone 7.5 : Microsoft organise un WebCast pour découvrir le développement d'applications pour l'OS, le 8 décembre

    Windows Phone 7.5 : Microsoft organise un WebCast gratuit pour découvrir le développement d'applications pour la plateforme, le 8 décembre à 10h Windows Phone 7.5 « Mango », la nouvelle version de l'OS mobile Microsoft apporte son lot de nouveautés et s'accompagne bien sûr d'un nouveau SDK. Microsoft organise un Live Metting gratuit baptisé « Windows Phone 7.5 : on ouvre Visual Studio et on regarde sous le capot ! » le 8 décembre 2011 à 10 h. Les architectes, gestionnaire informatiques et programmeurs et développeurs professionnels .NET (ou pas) qui souhaitent découvrir (ou redécouvrir !) le développement d'applications pour cette nouvelle plateforme, à l'aide de Visual St...

    Read the article

  • Is it legal to charge extra fees for copyrighted content on mobile platforms?

    - by Macrow Willson
    this question just came up as we recently bought content from image stock portals. Many of those altered their license agreement in favor of charging more for using in mobile apps. So instead of using their standard licenses, you need to pay an "extended" licenses which multiplies the fee easily by 5-10. That doesn't make sense as the mobile device is just a smaller browser and protects the content even better than a desktop computer. Are those stock agencies allowed to do that, and is it legal at all ? I am not a lawyer but I would even risk to go on with the standard license and wait to be sued in that matter.

    Read the article

  • 14.04_x64 / Nvidia GT 240 , HUGE font notificaton at greeter and in naulitus after log-in

    - by mrlamud
    I've been using 12.04 for a long time - excellent version indeed, I decided to try 14.04 today. Installing without any problems. My VGA is Nvidia GT240 (legacy one), Nouveau display driver is fine, font display is normal. Then, I decided to install Nvidia legacy binary driver 304.117 updates (proprietary) instead of default Nouveau display driver. Problems come after rebooting At Greeter a notification "Wired connection 1 -Connected" pop up but with a HUGE font. After log-in HUGE FONT symptom still remains at some parts - for example, Calendar, Desktop shortcut and Files explorer. within few seconds, 10 to 15 may be, there is a screen blink but HUGE font still remains. I have to log out then log in again to have normal font in all parts of system. Changing driver, even an update one form ppa:xorg-edgersnot doesn't solve the problem. Any advices or solutions will be appreciated.

    Read the article

  • Delete trigger does not catch table truncation

    - by Tomaz.tsql
    Sample shows table truncation will not fire delete trigger. USE AdventureWorks; GO -- STAGING IF EXISTS (SELECT * FROM sys.objects WHERE name = 'est_del_trigger_log' AND type = 'U') DROP TABLE test_del_trigger_log; GO IF EXISTS (SELECT * FROM sys.objects WHERE name = 'est_del_trigger' AND type = 'U') DROP TABLE test_del_trigger; GO CREATE TABLE test_del_trigger (id INT IDENTITY(1,1) ,tkt VARCHAR(10) CONSTRAINT pk_test_del_trigger PRIMARY KEY (id) ); GO INSERT INTO...(read more)

    Read the article

  • Is there a phrase or word to describe an algorithim or program is complete in that given any value for its arguments there is a defined outcome?

    - by Mrk Mnl
    Is there a phrase or word to describe an algorithim or programme is complete in that given any value for its arguments there is a defined outcome? i.e. all the ramifications have been considered whatever the context? A simple example would be the below function: function returns string get_item_type(int type_no) { if(type_no < 10) return "hockey stick" else if (type_no < 20) return "bulldozer" else return "unknown" } (excuse the dismal pseudo code) No matter what number is supplied all possibiblites are catered for. My question is: is there a word to fill the blank here: "get_item_type() is ______ complete" ? (The answer is not Turing Complete - that is something quite different - but I annoyingly always think of something as "Turing Complete" when I am thinking of the above).

    Read the article

  • Is it correct to add booleans in order to count the number of true values in a vector?

    - by gerrit
    Is it conceptually correct to sum a vector of booleans? From a mathematical point of view, I would argue it's not: True + True != 2. But it's quite practical to do so still! Example using the vectorised Python library numpy: In [1]: X = rand(10) In [2]: large = X>0.6 In [3]: large.dtype Out[3]: dtype('bool') In [4]: large.sum() Out[4]: 7 I don't like it, but it's very practical. Is this a good practice? Update: the aim is to count the number of true values in a vector.

    Read the article

  • Why would i need extra IP adresses from my web host?

    - by user4524
    I am moving to a new and cheaper host. My old one raised the prices suddenly by a factor 10. Now what I did not like about the old one, was that each time I set up a new website, I had to set up a new account, with the result that I have to pay for a lot of webspace and a lot of bandwith i don't use. Now I am moving over to a new host, who cheaply offers virtual servers. Now I am a n00b when it comes to server tech. I have two questions about this: 1. Could I install all my webistes on this virtual server, provided it is big enough? 2. They offer the possibility of getting more than one IP address, but it costs more. What would be the advantage of this? Would I be able to suffice with one IP address?

    Read the article

  • why my site cache 2 time par day?

    - by clarawood
    I have read the FAQs and checked for similar issues: YES My site's URL (web address) is: www.adultxdating.com Description (including timeline of any changes made): I have lost my top search listings from last 4 months. I am still working on this but not getting proper guidance. This site is caching 2 times in 24Hrs. Some times sites will back in to top 10 search listing on 100s keywords, some time its gone out 1000+. anybody can help me why its happening. I have more than 200K+ incoming links and updating the site regularly. Please help. Thanks clara wood

    Read the article

  • How to Automatically run two commands after login?

    - by Covi
    I have these two commands that I need to manually run every time after login: autossh -M 2000 -N -f -q -D 127.0.0.1:7070 [email protected] and sudo mkdir /media/C sudo mount /dev/sda2 /media/C I'd like to make them automatically run every time I boot and login to my computer. I'm currently using 10.04LTS. BTW, I only vaguely know what init.d or runlevel mean. But I still prefer to know a command-line based way to achieve this, not a fancy GUI way. Also, the autossh will only succeed after Ubuntu automatically detect and connect to my network, so should we let it retry infinitely until successfully executed? Thank you!

    Read the article

  • How do I build a matrix to translate one set of points to another?

    - by dotminic
    I've got 3 points in space that define a triangle. I've also got a vertex buffer made up of three vertices, that also represent a triangle that I will refer to as a "model". How can I can I find the matrix M that will transform vertex in my buffer to those 3 points in space ? For example, let's say my three points A, B, C are at locations: A.x = 10, A.y = 16, A.z = 8 B.x = 12, B.y = 11, B.z = 1 C.x = 19, C.y = 12, C.z = 3 given these coordinates how can I build a matrix that will translate and rotate my model such that both triangles have the exact same world space ? That is, I want the first vertex in my triangle model to have the same coordinates as A, the second to have the same coordinates as B, and same goes for C. nb: I'm using instanced rendering so I can't just give each vertex the same position as my 3 points. I have a set of three points defining a triangle, and only three vertices in my vertex buffer.

    Read the article

  • HTTPS : Google anticipe les attaques par décryptage rétrospectif sur ses services, et promeut la confidentialité persistante

    HTTPS : Google anticipe les attaques par décryptage rétrospectif Sur ses services et promeut la confidentialité persistante Google anticipe un risque lointain et néanmoins palpable qui pèse sur les connexions sécurisées. Il annonce l'activation sur ses services de la technique dite de Confidentialité persistante. La majorité des implémentations actuelles du HTTPS reposent sur une clé privée connue uniquement par le serveur. Ce dernier l'utilise pour générer des clés de sessions et chiffrer ses échanges avec les clients. Que se passera-t-il dans 10 ans, quand les ordinateurs seront tellement plus puissants que casser une clé privée sera plus facile ? Des attaques de décrypta...

    Read the article

  • How can I design multi-threaded application for larger user base

    - by rokonoid
    Here's my scenario, I need to develop a scalable application. My user base may be over 100K, every user has 10 or more small tasks. Tasks check every minute with a third party application through web services, retrieving data which is written in the database, then the data is forwarded to it's original destination. So here's the processing of a small task: while(true){ Boolean isNewInformationAvailable = checkWhetherInformationIsAvailableOrNot(); If(isNewInformationAvailable ==true){ fetchTheData(); writeToDatabase(); findTheDestination(); deliverTheData(); isAvailable =false; } } As the application is large, how should I approach designing this? I'm going to use Java to write it. Should I use concurrency, and how would you manage the concurrency?

    Read the article

  • Google présente son smartphone le Moto X et vante ses multiples options de personnalisation, ainsi que son autonomie record

    Avec le rachat de Motorola, on se doutait que Google allait sortir sa propre version de smartphone, mais avec la récente gamme de Nexus partagée entre Samsung (Nexus 10), LG (Nexus 4) et Asus (Nexus 7) on pouvait se demander s'il allait vraiment le faire.Après plusieurs rumeurs, le smartphone Moto X est enfin dévoilé et promet plein de surprises.Le dispositif bien évidemment repose sur Android 4.2.2 et est fièrement propulsé par une puce Snapdragon S4 Pro de 1.7 GHz, soutenue par une mémoire vive de 2 Go. Les utilisateurs auront le choix entre le modèle de 16 Go ou 32 Go, extensible par un espace de stockage gratuit de 50 Go sur Google Drive.Le smartphone est doté d'un écran de 4,7 pouces AMOLED haute définition de 720p et est accompagné d'un appareil photo a...

    Read the article

  • Is this CPU usage normal for Xorg?

    - by Samuaz
    I checked System Monitor to see if the frequency of my CPU increases without doing anything and saw that xorg is always using 10-40% of the CPU even if it's not doing much of anything on the desktop or simply surfing the Internet. Is this normal? If not, how can I fix it? I have: a Macbook white 4,1 Core2 Duo running at 2.10 GHz GPU Intel GMA X3100 4GB of RAM Ubuntu 11.04 I am running Unity and I do not have many effects enabled. I have only activated Compiz animations, scale, desktop, some shadows...

    Read the article

  • Are these hacking attempts or something less sinister?

    - by Darkcat Studios
    I just had a look through our web server error logs, and Terminal services is reporting: "Remote session from client name a exceeded the maximum allowed failed logon attempts. The session was forcibly terminated." Hundreds of times, every 10.5 seconds or so for a period of about 5-10 minutes, once at 2pm yesterday and once again at about 1am this morning. We CURRENTLY have RDP open to the outside, as I am just completing the setup and now and then I/Others need to jump on from an outside office/location (VPN isn't an option) As these are so regular, am I right in assuming that they may be the result of some sort of dictionary attack? or could something like an internal admin's hung session cause such a mass of events? (Win Server 2008 R2)

    Read the article

  • Number of iterations to real time

    - by Ivansek
    I have an animation of traffic. I have 20 cars in road network, each car have a starting node and end node. Each car know how much distance does it need to travel in order to reach the end node. I move cars each 20 ms for 10 px. To move all cars from their start node to end node I need 60 iterations. That is 60*20ms = 1200ms. Now I want to convert this time, or use data that I have, to a real time where car move 50km/h. How can I do that? Any idea?

    Read the article

  • Get Your Google Back : Google ne veut pas perdre ses utilisateurs sur Windows 8 et explique comment retrouver son univers sous l'OS

    Get Your Google Back : Google ne veut pas perdre ses utilisateurs sur Windows 8 et explique comment retrouver son univers sous l'OS Windows 8 est disponible depuis quelques jours avec de nouveaux PC et tablettes sous le nouveau système d'exploitation de Microsoft. Les possesseurs d'une version de l'OS ont certainement remarqué la mise en avant de Bing et Internet Explorer 10 qui sont respectivement utilisés comme moteur de recherche et navigateur par défaut. Un geste qui ne doit certainement pas être vu d'un bon oeil par les éditeurs des solutions concurrentes. Google, pour sa part, a déjà réagi en mettant au point un moyen de faire retourner ses solutions sur Windows 8.

    Read the article

  • MAC filtering after DHCP

    - by user1655161
    How to manage filtering by MAC in Ubuntu? Scenario: Ubuntu DHCP is configured and working (network 192.168.1.0) a) Laptop 1 is set in configuration on Ubuntu as static IP Laptop 1 is configured for automatic IP and when is connected to server everything works. I'm taking laptop 2 which is configured as static IP 192.168.1.10 and his configuration is not set in Ubuntu dhcpd.conf After laptop 2 is connected internet working. It is possible to do MAC filtering which disallow to connect PCs with address IP set as static but MAC address is not configured in Ubuntu (something like: intruder in network)?

    Read the article

  • Today's The 4:30 movie: Java vs. C++

    - by hinkmond
    Here's a slide show that's paraphrasing Cameron Purdy's presentation on how Java technology has and hasn't supplanted C++. See: Why Java Has/Hasn't Won vs. C++ Here's a quote: This eWEEK slide show borrows from Purdy’s arguments and looks at 10 reasons Java was able to supplant C++, as well as five reasons or areas it was not. It's like Godzilla vs. Mechagodzilla. Can there really be a clear winner? Well, stick around and watch Godzilla vs. Mechagodzilla II on tomorrow's The 4:30 movie as Monster Week continues on WABC, and find out... Hinkmond

    Read the article

  • De plus en plus d'employeurs exigent les identifiants Facebook des candidats d'après Reuters, une pratique légale aux USA

    De plus en plus d'employeurs exigent les identifiants Facebook des candidats D'après Reuters, une violation de la vie privée qui serait tout à fait légale aux Etats-Unis [IMG]http://blog.developpez.com/media/facebook_128.png[/IMG] Aux Etats-Unis, les personnes à la recherche d'un emploi se retrouvent confrontées à un tout nouveau problème selon l'agence de presse Reuters. Certains employeurs exigeraient durant les entretiens d'embauche que les candidats dévoilent leurs identifiants Facebook. Plusieurs études ont démontré que Facebook pouvait être un outil de recrutement utile. Passer 5 à 10 minutes sur le profil d'un candidat permet à l'employeur d'en apprendre beaucou...

    Read the article

< Previous Page | 560 561 562 563 564 565 566 567 568 569 570 571  | Next Page >