Search Results

Search found 20021 results on 801 pages for 'software engeneering learner'.

Page 598/801 | < Previous Page | 594 595 596 597 598 599 600 601 602 603 604 605  | Next Page >

  • List existing file server permission groups/users

    - by Patrick
    So we have taken over a new client and their existing file server is frankly a mess. We have migrated their old file server from a 2k box to a 2k8 DFS cluster and now I'm looking at rebuilding both the folder structure and their permissions. Unfortunately its been half done with AD groups (poorly named/no description/notes) and half with individuals named in security on the folders themselves. What I'm looking to do is to dump a complete list of all the folders with their security permissions (ideally I'd like to ignore files but not essential). CACLS got me half way there but fails with an odd error message and its output isn't particularly user friendly and I'm working with roughly 2Tb/250,000 files here so I really need something that gives me a bit more functionality. Question : does anyone have any experience of something similar/know of a bit of software that might help me out?

    Read the article

  • What's the typical latency for key strokes using an ssh connection on a local wifi network?

    - by dan
    I develop software on a Macbook Air 1.6 Ghz but find running Rails test suites and generators on this computer very slow. I'm thinking about buying a Linux tower to put on my local wireless network to do my Rails development on. I would want to use my Macbook Air and ssh into the Linux box and do my development with Gnu Screen, vim, etc. Can I expect the keystroke and echo latency for a ssh session between two machines on a local wireless network to be negligible? Does anyone develop using this kind of local setup?

    Read the article

  • Anybody know how to get podcasts sorted correctly on a Zune?

    - by Will
    If I could understand the logic behind it I could actually manage to get my stuff sorted correctly on the device. It doesn't matter how things are sorted on disk, or in the software itself. As items are added to the sync list they end up sorted in some weird manner which, quite frankly, brings out an anger in me that scares me. A primitive, misshapen and unthinking anger. Kind of like the lumpy guy in Altered States. Frankly, I'm afraid one day its going to burst forth and I will track down the entire Zune team and make them pay for their failures. Help me prevent this from happening. Help me understand what I need to do to ensure my podcasts end up in the order I wish them to be in, not some obscure random order that makes no sense.

    Read the article

  • How to prevent firefox from updating

    - by Larry
    I have firefox 3.6.x in Mint Linux. For physical problems -- eyes and color, I want to keep this version and not do any updates ever to it. I don't know if it is a firefox or linux issue, but nothing seems to work. It should not be rocket scientist enabled. :P This is what I have tried: Update Manager and added to ignore package --firef0x* Fully removed all traces of firefox and reinstalled 3.6.28 In firefox, set the upgrade options (3) of them to unselected and saved. Scanned computer for firef* to insure all traces were removed, to include /usr/bin/firefox. Using Mint Linux 9, otherwise fully upgraded for packages. That's the main things I've done. My major issues is the later versions of that software are almost impossible for me to see.

    Read the article

  • Tracking down laptops Google has never heard of

    - by John
    Using MS tools to get information on PCs using our software, our customers have sent several Lenovo systems which have names we simply cannot find using Google... no search results at all. Considering these names/ids are returned by querying the system directly, not asking the customer to write it down by looking at the box, this seems odd. The ones we have so far (more than one of each) are: Lenovo 2241BL9 Lenovo 6463Y4H My guess is these are Thinkpads after Lenovo took over the brand, but can anyone help me out with this detective work? edit: the 2nd one does turn up some driver downloads and this page, but it's unclear what any of that means. Is the 6463y4h just a T61? http://smolts.org/reports/view_profile/%20ThinkPad%20T61

    Read the article

  • How can I copy files to an external drive and verify their integrity in OS X?

    - by jedavis
    I'm moving large amounts of data from one external drive to another larger one. The files are important and the smaller drives need to be cleared and reused (HD camera). Is there some utility for moving files and verifying their integrity? I've been using this command find . -type f -exec md5 '{}' \; > md5list.txt in the terminal to create a list of MD5s for each file then using diff to compare the two. However, I am moving 320GB at a time, which takes a while by itself. Computing the checksums takes another hour or so. It would be much more efficient to do this on the fly, during the copy. I'm just hoping someone has already written the software...

    Read the article

  • How do I capture the output of a tty while still allowing sent characters to reach the correct desti

    - by Zak
    I currently have some systems that multiple people have access to for administration purposes. We've modified the history log so that we capture 2k lines of history per user to help aid in who has done what on the system. However, we would additionally like to capture all keyboard input when we (the administrators) log in, and log it to a file so we can see what changes were made to files once people go into vi to edit them. It will also aid us in documenting when we are going through a compile of software and the like. How can I do this? CentOS 5.4 if it makes a difference.

    Read the article

  • Looking to create website that can have custom GUI and database per user

    - by riley3131
    I have developed an MS Access database for a company to track data in regards to production of a certain commodity. It has many many tables, forms, reports, etc. These were all done as the user requested, and resemble the users previously used system, mostly printed worksheets and excel workbooks. This has created a central location for all information and has allowed the company to compare data in a new way. I am now looking to do this for other companies, but would like to switch it to a web application. Here is my question. What is the best way to create unique solutions for individual companies that can have around 100 users each? I would love to create one site that would serve all parties, but that would ruin the customizable nature of what I am developing. I love the ability to create reports, excel sheets, pdf, graphs, etc with access, but am tired of relying on my customers software, servers, etc. I have some experience with WAMP, but I am far better at VBA. I was okay at PHP, and was getting a grasp on JavaScript a few years back. I am also trying to decide whether to go with WAMP or LAMP, if web is the best choice. Also, should I try set up one site for all users that after log-in goes to company specific pages, or individual sites for each company? Should I host or use a service?

    Read the article

  • Can't unlock locked screen, in Ubuntu 12

    - by Camille Goudeseune
    After locking the screen (with a keystroke bound to xlock -nice 8 -mode blank), I can unlock the screen as expected, but only within a few minutes. After being locked overnight, when I hit a key (even Ctrl+Alt combos), the screen stays black with just a brief white flash across the middle of both monitors. The workaround is to ssh in from another host and restart X. Some months ago, this happened every few weeks. By now it happens almost every morning. How do I even start to diagnose this? What might I look for in log files? (The intermittency is particularly troubling.) Failing that, is there an alternative to xlock aka xlockmore? Hardware: 3-year-old HP minitower, GEForce 9800 GT, two Asus LCD monitors. Software: Ubuntu 12.04.2 LTS. Window manager awesome-wm. NVidia driver 304.88. XLock version xlockmore-5.31.

    Read the article

  • Upgrading Ubuntu(32 bit) 10.10 -> 11.04 fails and causes a kernel panic on boot

    - by Ubuntu Upgrade
    On Ubuntu 10.10 machine Upgrade to Ubuntu 11.04 using the update manager. The upgrade fails and leaves the system in an unstable state. When I reboot the system I get a kernel panic on boot. The error points to /opt/abc/runtime/lib/libc.so.6. By researching on this I found that there is a third party software abc causes problem. It has it's own runtime(libc) library. In /lib/ directory there is a link file /lib/ld-abc.so.2 ---/opt/abc/runtime/lib/ld-linux.so.2. If we rename this file to /lib/abc.so.2 or remove this file the the upgrade is success. Here is the upgrade log of where it crashes(apt-term.log) ===== Services restarted successfully. Processing triggers for libc-bin ... ldconfig deferred processing now taking place /usr/bin/dpkg: /opt/abc/runtime/lib/libc.so.6: version `GLIBC_2.11' not found (required by /usr/bin/dpkg) /usr/bin/dpkg: /opt/abc/runtime/lib/libc.so.6: version `GLIBC_2.8' not found (required by /lib/libselinux.so.1) ===== Could you please let me know what would be the problem of having a run time link library file in /lib directory. Does the ubuntu upgrade check the 3rd part runtime as well?

    Read the article

  • What are the pros of switching DNS names with a database server hardware upgrade?

    - by wilbbe01
    When we upgrade to new hardware at work we usually increment a number in the DNS name. For example. We have a server called database-2, that is slated to become database-3 in the coming days. I haven't been able to find a good reason why this is good behavior. To me the work of trying to catch all end user machines, as well as all servers dependent on the database server is far riskier than simply moving the database and ip/name with it to the new hardware. A little over a year ago we spent several months of requests coming in, as infrequent users began using software that needed to be updated to point to a new DNS name. I am struggling to find answers as to why this is a good practice. So the question. Why is using DNS names as a "server hardware version identifier" a good idea? What am I overlooking? Thanks much.

    Read the article

  • why are transaction monitors on decline? or are they?

    - by mrkafk
    http://www.itjobswatch.co.uk/jobs/uk/cics.do http://www.itjobswatch.co.uk/jobs/uk/tuxedo.do Look at the demand for programmers (% of job ads that the keyword appears), first graph under the table. It seems like demand for CICS, Tuxedo has fallen from 2.5%/1% respectively to almost zero. To me, it seems bizarre: now we have more networked and internet enabled machines than ever before. And most of them are talking to some kind of database. So it would seem that use of products whose developers spent last 20-30 years working on distributing and coordinating and optimizing transactions should be on the rise. And it appears they're not. I can see a few causes but can't tell whether they are true: we forgot that concurrency and distribution are really hard, and redoing it all by ourselves, in Java, badly. Erlang killed them all. Projects nowadays have changed character, like most business software has already been built and we're all doing internet services, using stuff like Node.js, Erlang, Haskell. (I've used RabbitMQ which is written in Erlang, "but it was small specialized side project" kind of thing). BigData is the emphasis now and BigData doesn't need transactions very much (?). None of those explanations seem particularly convincing to me, which is why I'm looking for better one. Anyone?

    Read the article

  • Good podcasting solution?

    - by burnso
    I simply ask for the best, most common and simple way to set up a podcast? Please, I need an answer so I can close this question? I run a joomla-based website for a small church and now need a simple, cheap and effective solution for an audio podcast. I am looking for a solution that will do the following: User uploads audio files to service (preferably not to our own site) that is cheap, fast and simple to use. Dropbox for example? Files are easily embeddable into Joomla website articles to be played on the spot (through simple-to-use and media player). Preferably through RSS feeds (to make it easy to update every week). Files are downloadable. Files are viewable on iPhones and other smartphones. Solution can be broadcasted via iTunes. Solution doesn't need a lot of extra, new third party software. I'd rather keep it simple and familiar than have it be a complete new system but with a steep learning curve. At the moment we use vimeo to host the podcast, through video files. But we'd like to move to something simpler that doesn't involve a series of difficult steps to upload the files to the web.

    Read the article

  • Host PC can't see file-system on local VMWare VM

    - by John
    I am running VMWare Workatation 8.0 on a Windows7 host, hosting a Windows7 VM. It's working fine except that the host cannot see the files on the VM when it's running. The VM is running locally on the host, not on the network. I found a page saying I simply need to share the folders on either side and the other can see them, but this isn't working. VMWare Workstation has a handy tool to share folders from the host drive to the VM, but I need the opposite - I have software installed on the host (for licensing reasons) which I need to use to work on files within the VM.

    Read the article

  • How secure is cloud computing?

    - by Rhubarb
    By secure, I don't mean the machines itself and access to it from the network. I mean, and I suppose this could be applied to any kind of hosting service, when you put all your intellectual property onto a hosted provider, what happens to the hard disks as they cycle through them? Say I've invested million into my software, and the information and data that I have is valuable, how can I be sure it isn't read off old disks as they're recycled? Is there some kind of standard to look for that ensures a provider is going to use the strictest form of intellectual property protection? Is SAS70 applicable here?

    Read the article

  • Change default code page of Windows console to UTF-8

    - by Regent
    Currently I'm running Windows 7 x64 and usually I want all console tools to work with UTF-8 rather than with default code page 850. Running chcp 65001 in the command prompt prior to use of any tools helps but is there any way to set is as default code page? Update: Changing HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Nls\CodePage\OEMCP value to 65001 appear to make the system unable to boot in my case. Proposed change of HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor\Autorun to @chcp 65001>nul served just well for my purpose. (thanks to Ole_Brun)

    Read the article

  • Virtual bridge/switch for Windows server&client?

    - by Tiberiu-Ionu? Stan
    I can't find a very simple application, with litle to zero configuration on both client and server side which would help one computer to bring other computers on an existing private LAN. OpenVPN seems like an overkill for this type of thing, and is really hard to get running or debug by various clueless people trying to connect. Does such a software exist? It's very odd not to. THe Windows provided VPN (PPTP over TCP and GRE) is not what I'm looking for because it is often filtered by ISPs. Only TCP and UDP solutions pls. Encryption is not needed.

    Read the article

  • Force snmptrapd to log only v2c traps

    - by dare2be
    Hello, I am in the middle of writing new network management software for my University. However, I need to implement a quickie solution to handle specific traps. Right now, my snmptrapd is configured to accept any traps, i.e.: # /etc/snmp/snmptrapd.conf authCommunity log publicString logOption f /var/log/snmptrapd.log format1 "" format2 "%02.2h:%02.2j %b %N\n" What I basically want to do is to log ONLY v2c traps. I intended to do it with setting the format for v1 traps to null (format 1 "") but snmptrapd keeps sending "" to its log. Does anybody know a workaround for this?

    Read the article

  • How to hide a program that is running on a virtual machine?

    - by Femto Trader
    Some softwares contain tests to see if they are running on a virtual machine. It's very unpleasant to see alert messages such as "Sorry, this application cannot run under a Virtual Machine." and have your software stopped! There is a lot of legal reasons to override such tests. Moreover such limitations are (most of the time) not written in User License Agreement. So... how to hide a program that is running on a virtual machine? I'm using a Virtual Private Server (VPS) with Hyper-V... I'm administrator of the Operating System (Windows 2003) installed on this VPS, not administrator of Hyper-V.

    Read the article

  • Bluetooth headset turns off when Skype call ends

    - by Claude
    For about 6 months, I haven't been able to use Skype because when I end a Skype call, my Plantronics Callisto headset gets turned off. I'm paralyzed so I can't turn it on manually. I have a Sony VAIO computer running Windows 7. I have updated my Bluetooth dongle software, uninstalled and reinstalled Skype and uninstalled Skype and gone back to an earlier version; all to no avail. Neither Plantronics nor Skype technical support are interested in looking into this problem for me.

    Read the article

  • Virtualbox crashes quite often in Windows 8

    - by user1776158
    I just installed Windows 8 on my computer. I got the ISO and the product key from my university so the software itself is sound. I use alot of virtual box. And ever since I moved to Windows 8, I have noticed that virtual box crashes more often. In particular, it is very very bad at opening multiple guests. My CPU usage will be at like 20% and I only have 3 guests open and my entire computer just freezes. Cursor and all. In Windows 7, I was able to open like 6 (not that I ever needed to) and really push my CPU. I havent experience any other issues with Windows 8 yet. Has anyone encountered this? Thanks!

    Read the article

  • Running a VM off of an external HD via USB

    - by Nelson LaQuet
    Is it viable to run (i.e. reference the vmx/vhd directly from the mounted drive) a VM (vmware running Windows Seven) off of an external HD via USB? I mean, I know it's possible, but I guess I'm asking if USB provides enough bandwidth for normal usage... If so, are there any particular brands that may be better or worse? I know that ESATA would be a more viable setup, but my laptop doesn't have an ESATA port. Currently I use the VM to segregate all of my work development servers and software from my main machine; so I will be running all development servers and tools on the VM directly.

    Read the article

  • Two domains accessing same folder

    - by Liam Quinn
    I've just taken a new role in a school and am still familiarizing myself with their network, how ever I have recently been given a task and I'm having a little trouble finding out the fundementals of it. I have an admin network/domain 10.49.x.x and a classroom network/domian 192.168.1.x both connect to a Proxy server 10.49.202.231/192.168.1.51. Each domain has it's own shared folders as you'd expect, files and software installs etc, how ever there is a folder "staff" on the classroom network that all the teachers on the classroom network can access. The users on the admin network would like to access this same folder. How do I go about making this happen?

    Read the article

  • Is email forwarding to the sender's address usually blocked in Mail servers / MTA?

    - by codecowboy
    I've noticed that email forwarding to an address seems not to work if I send an email from the address to which I am forwarding email. This happens for GMail and Fasthosts mail servers. e.g I send an email to [email protected] from [email protected] , [email protected] is set to forward to [email protected] and the email never arrives. I realise this seems logical but it is a potential cause of confusion when testing email functionality in a web application (for me, anyway ;-). I would just like to know if this is standard for all MTA software so I can avoid confusing myself.

    Read the article

  • What are USB device resets?

    - by ILIV
    I have this brand-new software RAID-1 built with two WD Elements external USB drives, and I can see that Linux repeats the following message quite a bit: ... [302148.036912] usb 1-3.1: reset high-speed USB device number 19 using ehci_hcd [302153.052029] usb 1-3.3: reset high-speed USB device number 20 using ehci_hcd [302186.031481] usb 1-3.3: reset high-speed USB device number 20 using ehci_hcd [302217.050210] usb 1-3.3: reset high-speed USB device number 20 using ehci_hcd [302281.043543] usb 1-3.3: reset high-speed USB device number 20 using ehci_hcd [302312.090158] usb 1-3.3: reset high-speed USB device number 20 using ehci_hcd [302351.076851] usb 1-3.1: reset high-speed USB device number 19 using ehci_hcd ... So, what does it say? Is this normal? Is this a problem that I should try to fix?

    Read the article

< Previous Page | 594 595 596 597 598 599 600 601 602 603 604 605  | Next Page >