Search Results

Search found 24719 results on 989 pages for 'ajax form'.

Page 579/989 | < Previous Page | 575 576 577 578 579 580 581 582 583 584 585 586  | Next Page >

  • Kubuntu 11.10 disable tapclick not working from gui

    - by Star
    Trying to find the script that disables tap-to-click, but can't locate the right settings. here is 50-synaptic.conf: # Example xorg.conf.d snippet that assigns the touchpad driver # to all touchpads. See xorg.conf.d(5) for more information on # InputClass. # DO NOT EDIT THIS FILE, your distribution will likely overwrite # it when updating. Copy (and rename) this file into # /etc/X11/xorg.conf.d first. # Additional options may be added in the form of # Option "OptionName" "value" # Section "InputClass" Identifier "touchpad catchall" Driver "synaptics" MatchIsTouchpad "on" # This option is recommend on all Linux systems using evdev, but cannot be # enabled by default. See the following link for details: # http://who-t.blogspot.com/2010/11/how-to-ignore-configuration-errors.html MatchDevicePath "/dev/input/event*" EndSection Any ideas would be gratefully received, it's driving me mad!

    Read the article

  • Identical spam coming from many different (but similar) IP addresses

    - by DisgruntledGoat
    A forum I run has been the victim of spam user accounts recently - several accounts that have been registered and the profile fill with advertising/links. All of this is for the same company, or group of companies. I deleted several accounts weeks ago and blocked some IP addresses, but today they have come back with the same spam. Every account has a different IP address, but they are all of the form 122.179.*.* or 122.169.*.*. I am considering blocking those two IP ranges, but there are potentially thousands of IPs in that range. They appear to be assigned to India (although the spam is for an American company) so given the site is for a western, English-speaking audience maybe it doesn't matter. My questions: How are they posting on so many IPs? Is there likely to be a limit to the number of IPs they have access to? Is there anything else I can do at the IP-level to block them? (I am looking into other measures like blocking usernames/links.)

    Read the article

  • What is an "integration script" and why would I want one?

    - by ændrük
    When I navigate to Launchpad in Firefox, a pop-up appears: I think, despite its failure to form a coherent question, it's trying to ask me if I want to install an "integration script" called "unity-webapps-launchpad". Sadly, it does not provide me with enough information to make an informed decision, nor does it refer me to a source where I can learn more about it. The top result in my web searches on the topic is my own bug report. While this cyclical phenomenon provides a brief source of amusement, it is ultimately unhelpful. So, once again, I've come to Ask Ubuntu for a nudge in the right direction. What is this thing?

    Read the article

  • Upgrade to 13.04 was not successful. Gstreamer not working. What do?

    - by user172214
    I finally decided to upgrade to 13.04. In the middle of the installation my computer froze completely, and so I decided to force quit. I log back on, and notice that the login says 13.04, but not everything was updated. So I run the software updater. Some of the stuff gets updated, but not everything, I suppose. I try to run Rhythmbox, but it says that it's not able to form playback, and that the Gstreamer was messed up, and to please check installation. I don't know what other bugs maybe running. That's just the first I've encountered. The software updater won't let me update anymore because it says the updates need authentication.

    Read the article

  • Help! Requesting a change of URL on Yahoo Directory!

    - by Sei
    I submitted a couple websites on yahoo directory a month ago. For some reason, the url they listed was not the url I asked for, they listed the Japanese version instead of the submitted English version (this is a English directory so obviously it is a mistake). I requested changes and was accepted. But the reality is they promised a change but it was never really done. I contacted them again and again through the 'request a change in URL' form, but there is no answer. Is there any effective way that I can get to them? preferably a phone number or email? Thanks a lot!

    Read the article

  • Should I try to write simple key-value storage by myself?

    - by shabunc
    I need a key-value storage in a simplest form we can think of. Keys should be some fixed-length strings, values should be some texts. This key-value storage should have an HTTP-backed API. That's basically it. As you can see, there is no big difference between such storage and some web application with some upload functionality. The thing is - it'll take few hours (including tests and coffee drinking) to write something like this. "Something like this" will be fully under my control and can be tuned on demand. Should I, in this specific case, not try to reinvent bicycles? Is it better to use some of existing NoSQL solutions. If yes, which one exactly? If, say, I'd needed something SQL-like, I won't ask and won't try to write something by myself. But with NoSQL I just don't know what is adequate and what is not.

    Read the article

  • Cant find one particular wireless network. Worked before, but sudenly stopt working.

    - by Haakon
    My first question here. My problem is: I cant find my wireless network at home. Situation: It worked fine 7 days ago. It works with a cable(wierd). I find the network on my ipad/phone. I can connect to wireless hotspot network form my phone and wireless at my university, and it works fine. I can connect to the network in windows What I have tried: Tried this Strange network issue; works on windows, but not on ubuntu, works on campus wireless, but not at home (removing resolve.conf). Hardware and software: I have a Broadcom card Use dual boot ubuntu 12.04 - windows 7 Things I did to make wireless work: blacklist brcmsmac blacklist bcma blacklist b43 blacklist ssb Can anyone help me? I'm about to kill myself(not literary)!! I'm not that good in linux so go gentle on me:)

    Read the article

  • How to Create a Skin Object from an OWS Configuration - 2 Videos

    In this video tutorial we walk you through how to create and place Open Web Studio skin objects directly into your DotNetNuke skin.We cover how to create an OWS menu and feedback form and how to convert those modules into DNN Skin Objects.The videos contain:Video 1 - Building the New OWS Configuration and Creating the Menu SystemVideo 2 - Placing the OWS Skin Object within the Skin File and Creating a Feedback Skin ObjectHow to Create a Skin Object from an OWS Configuration - 2 Videos Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Personalized URL with pre-populated data

    - by AttackingHobo
    I think I am going to use Google spreadsheets and an embedded form. I see that it is possible to pre-populate the fields with URL parameters. So I think I just need a way to redirect with the correct data from a database when a user goes to their Personalized URL. I have no idea how to do the second part. Or if it is even the best way to do it. How do I set up Personalized URLS? How do I redirect from those URLS to the spreadsheets? Is this even the best method for pre-filled forms?

    Read the article

  • Bug severity classification issues

    - by KyleMinn
    In a book I have, there is a following classification of defect: Critical : A defect receives a “critical” severity level if one or more critical system functionalities are impaired by a defect with is impaired and there is no workaround. High: A defect receives a “high” severity level if some fundamental system functionalities are impaired but a workaround exists. Medium: A defect receives a “medium” severity level if no critical functionality is impaired and a workaround exists for the defect. Low: A defect receives a “low” severity level if the problem involves a cosmetic feature of the system. To be honest, I do not get it.. For example point 2. What if fundamental but not critical feature is impaired and there is NOT a workaround. The same for point 3: what if no critical functionality is affected but there is no workaround? E.g. optional field in the registration form does not work. No workaround but barely an issue.

    Read the article

  • Does anyone know of a simple (free?) feature request tracking system we could use internally for sales people?

    - by Ryan
    I sometimes hear about pain points of customers using our app from sales people, but there really isn't a good way for us to currently keep track of these. I was going to write one myself but figured I would ask first. I was thinking something so simple it would literally just be a small form for adding a new feature, and then it would appear in the list, like stackexchange questions. Then users can upvote them, or even record each time a user complains about something related to the request so we can order them in priority based on real data. Then I can easily go look every few days and see what's going on. That's really it, nothing more complicated than that. Know of anything?

    Read the article

  • How to pass information across domains to ask for newsletter only once?

    - by Michal Stefanow
    Lets assume following scenario, I have two sites: example1.com example2.com When user visits 1 there is a prompt "please signup to a newsletter". Same thing happens when user visits 2. However when navigating from 1 to 2 I don't want signup form to be shown. My first thought were 3rd-party cookies, but it seems that they are blocked / not working: http://stackoverflow.com/questions/4701922/how-does-facebook-set-cross-domain-cookies-for-iframes-on-canvas-pages?rq=1 http://stackoverflow.com/questions/172223/how-do-i-set-cookies-from-outside-domains-inside-iframes-in-safari?rq=1 Another thought is to append #noshow for each URL but that would require some work - for instance a script that would intercept click / tap events and modify URL structure depending on the address. (but that seems hacky) I wonder if you know a robust well-established solution to this issue? Thanks

    Read the article

  • Steps to manage a large project [closed]

    - by l46kok
    Software development is an area where parallel development to its fullest form is very difficult to achieve, although you could get reasonably close with the right design. This is especially true for game development. That being said, if you are designing a game from scratch from engine to front end, what steps should be taken in order? How would you efficiently manage your project and your team? I'm asking because several people and I are interested in working on a relatively large project for learning purposes. Initially, we were going to use a proprietary engine like Unity, but since we wanted to learn how the engine works, we're going to start from bottom. I'd appreciate any suggestions that you guys can provide me.

    Read the article

  • How to Detect and Fix an Infected PC

    You may have noticed that your PC is not acting the way it used to when you first purchased it. If so, malware may be the culprit. Here are some ways to detect if your PC has been infected, as well as methods to correct any such problems to get things back to normal, as suggested by researcher Tim Armstrong of Kaspersky Lab. Malware Detection Irritating Popups Irritating popup windows are one of the telltale signs that your PC is infected with malware. One of the most common classes of malware driven popup windows comes in the form of scareware, or fake antivirus warnings. These popups tel...

    Read the article

  • 2012 JCP Awards

    - by Tori Wieldt
    Nominations are now open for the 2012 JCP Awards. Submit nominations to PMO at JCP dot ORG or use this form.  The Java Community Process (JCP) program celebrates success. Members of the community nominate worthy participants, Spec Leads, and Java Specification Requests (JSRs) in order to cheer on the hard work and creativity that produces ground-breaking results for the community and industry in the Java Standard Edition (SE), Java Enterprise Edition (EE), or Java Micro Edition (ME) platforms. The community gets together every year at the JavaOne conference to applaud in person the winners of three awards: JCP Member/Participant of the Year, Outstanding Spec Lead, and Most Significant JSR. This year’s unveiling will occur Tuesday evening, 2 October, at the Annual JCP Community Party held in San Francisco during JavaOne. Nominations close on 16 July 2012. More details are on the JCP blog.

    Read the article

  • How to deal with meta data with drop downs?

    - by Mangesh Jogade
    Please advise how to handle following scenario in web application. I have a drop-down which is populated using meta-data from table A. When form is submitted this drop down data is stored in table B. While displaying existing data, it is populated using data stored in table B. While copying existing data, it is copied using data stored in table B. I want to achieve following goals: While displaying existing data I must display data irrespective of current meta data (to explain, even if some options are removed from metadata I still display them). When I copy existing data only current data should be copied(that is if some options are removed from metadata I should not copy them). I understand that I can do this by scanning metadata every time I copy existing data, however if there are thousands of such drop down exist, it is definitely not desirable to scan complete metadata for every drop down. How can I handle such situation in web application?

    Read the article

  • How to Create a DotNetNuke Skin Object from an OWS Configuration - 2 Videos

    In this tutorial we walk you through how to create and place Open Web Studio skin objects directly into your DotNetNuke skin. We cover how to create an OWS menu and feedback form and how to convert those modules into DNN Skin Objects. The videos contain: Video 1 - Building the New OWS Configuration and Creating the Menu System Video 2 - Placing the OWS Skin Object within the Skin File and Creating a Feedback Skin Object Total Time Length: 18minsDid you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Login and redirect to user home page [migrated]

    - by Rich
    The problem I can't currently solve is when a user logs in. They arrive at the site (index.php) and enter username and password, which gets submitted via a Post form back to index.php - if there are incorrect details then they get an error message. But if successful then I would like them to be taken to their user home page - but I can't do this! I am left presenting them with a link to the home page, which is more than a little clunky. Seems there must be an obviously solution - never seen a site before that didn't redirect! Not sure is the answer is PHp, HTML, or Javascript.

    Read the article

  • inserting or updating values into null textboxes [closed]

    - by tanya
    this is my sql table structure create table cottonpurchase ( slipNo int null, purchasedate datetime, farmercode int , farmername varchar (100), villagename varchar (100), basicprice int null, premium int null, totalamountpaid int null, weight int null, totalamountbasic int null, totalamountpremium int null, Yeildestimates int null ) I want to fill in the null values in my sql with actual values and not leave them null but I want to do that from my winforms app form! But if I do that it just adds a new record when what I want is for it to update the record which has, for example, farmercode = 2, farmername = blaah, and so on. I also want to enter this in the same records as in farmercode = 2 and the corresponding corresponding basic price = ... , everytime i do it it ends up making a new record and not in the existing one.

    Read the article

  • Need in obtaining a specific local telephone number [closed]

    - by Brett
    I am wanting a local phone number that I like. I have found one that I like. When I call the number that I want it says "this number has not been allocated" I have looked up and found the company that owns that number. How do I go about acquiring that number from the company. I spoke with someone who sells major phone packages and he said that if I signed up with them he could get the number for me. He said that there is a change of ownership form that the send to get the number. So I know it can be done. I am hoping that someone with industry specific knowledge in this area can guide me in getting this number.

    Read the article

  • Why do spammers use CELESTRON NEXTAR 6SE?

    - by fmz
    I am running a website for a volunteer organization that hosts an annual event. There is a form where people can volunteer to bring items for the event. All too frequently I get spam from users across the globe that enter things like this: Country - 1: Australia Material - 1: CELESTRON NEXTAR 6SE Country - 2: Australia Material - 2: C8 Newton Country - 3: Australia Material - 3: ETX 125EC Country - 4: Australia Material - 4: ETX 125EC Country - 5: Australia Material - 5: CELESTRON NEXTAR 6SE I don't really care about the country, but what is it with the telescope stuff? Is there some hidden meaning behind all this or is it some astronomy group that moonlights as spammers?

    Read the article

  • HTTP resource bundling/streaming practice

    - by icelava
    Our SPA (plain HTML and Javascript) makes use of huge volume of javascript and other resources that are downloaded via XHR. Given the sheer number of components and browser simultaneous request limits, we're thinking for ways to deliver our resources in a more efficient manner. A method we're considering is bundling several resources that logically form a coherent group into a single file; thus reducing down to only one XHR (per group). Furthermore to make it more responsive, we'd like to constantly inspect the partial responseText during the LOADING state, determining if a usable chunk (atomic resource) has already been downloaded, and make it available for deserialization/processing even before the XHR is DONE. (a stream-like experience) We're thinking surely somebody else would've considered roughly the same approach before, but haven't really come across any library/framework or container file format that is suitable for our scenario. Anybody else know of something similar?

    Read the article

  • Why not write all tests at once when doing TDD?

    - by RichK
    The Red - Green - Refactor cycle for TDD is well established and accepted. We write one failing unit test and make it pass as simply as possible. What are the benefits to this approach over writing many failing unit tests for a class and make them all pass in one go. The test suite still protects you against writing incorrect code or making mistakes in the refactoring stage, so what's the harm? Sometimes it's easier to write all the tests first as a form of 'brain dump' to quickly write down all the expected behavior in one go.

    Read the article

  • Website with over 1 million posts with not much textual content

    - by Far Se
    I've made a website which crawls files from all over the Internet and I feel like Google will ban me if I sent it sitemaps which contain all of these pages (1m+), because they contain only the file name/size/no of downloads and the download link(s). I'm considering this thought because I've made another website like this in the past and Google banned me after one week with the reason: "spam", even it was not (maybe somebody falsely reported me?!). Does someone have an idea about how to keep Google form banning my website? I've seen several other sites like mine and they don't get banned or... anything. And also, should I sent the sitemap or wait until Google indexes every page as it finds them? Thanks in advance :)

    Read the article

  • BizTalk 2009 - Size Functoid Fun

    - by StuartBrierley
    Recently when mapping a flat file from a third party source, I needed to check whether some elements had been sent with any content or not. In the source message these elements were being supplied in the form: <comment /> I though I would try using the size functoid, assuming that it would return a size of 0 for these empty elements.  What actully happens is that the Size funtoid returned a size of 1 rather than the 0 I was expecting. To get what I considered to be the correct output I needed to add a String Right Trim functoid before the Size functoid.  This then returned the "required" size of 0.

    Read the article

< Previous Page | 575 576 577 578 579 580 581 582 583 584 585 586  | Next Page >