Search Results

Search found 37101 results on 1485 pages for 'array based'.

Page 643/1485 | < Previous Page | 639 640 641 642 643 644 645 646 647 648 649 650  | Next Page >

  • Real performance gain from faster IDE or SATA hard drive?

    - by raw_noob
    How much of a real-world performance gain would you expect from: replacing a 5400rpm IDE HD with a 7200rpm IDE HD? replacing a 5400rpm IDE HD with a SATA-150? It's assumed that the drive in question is both the system drive and the only drive. A modest AMD Sempron-based home computer with adequate DDR memory running Windows XP Home SP3. Thanks for looking.

    Read the article

  • Outlook 2007 does not have a ribbon

    - by vaccano
    I have outlook 2007 installed (12.0.6514.5000) on my work computer. I just installed Bowie to allow integration with outlook and TFS. Most of the features for that plugin are based on the Ribbon. But I don't have the ribbon. I have the old menu and toolbar structure. How do I switch to the ribbon view?

    Read the article

  • Excel 2007 How To Reference A Seperate Cell In WS1 From A Common Cell In WS2

    - by Bob Sampson
    I have a simple file with two worksheets in. In the first worksheet (a product list) are a number of columns, including Product Code and Product Description. In the second worksheet (dispatches in January), I have Product Code. I need to insert a new column with the associated Product Description field completed based on the relevant line from the first worksheet. I'm sure this is very easy, but its not something I've done before. Thank you

    Read the article

  • Allow users to ssh to specific user through ldap and stored public keys

    - by iElectric
    I recently setup gitolite, where users access git repository with "gitolite" user through ssh. Now I would like to integrate that into LDAP. Each user has pubkey in LDAP and if he has "git" objectClass, he would be able to access "gitolite" user through ssh. I know it's possible to store public keys in LDAP, I'm not sure if it possible to allow authentication in "gitosis" account based on objectClass. EDIT: To clarify, with objectClass git, user "foobar" would be able to login as "gitolite" through ssh

    Read the article

  • How to recover ~1TB data from a bricked NAS?

    - by alastairs
    I bought an IcyBox NAS a little while back, and it recently died on me. I have physical access to the disks inside (1.5TB RAID 1 array), and the box was running a version of Linux. I now have the difficulty of retrieving the data from the disks. All I have available are 2 Windows machines, one of which has sufficient free space to hold the data from the NAS. What would be the quickest and easiest way to retrieve the data from the disks?

    Read the article

  • OpenDB Alternative

    - by shaiss
    Although a good tool OpenDB hasn't been updated since 12/2008. The source code shows some recent activity, but still sparse at best. Anyone know of good web based cataloging alternatives? I'm looking to catalog the 500+ software CD's we have. Also, as a side note. OpenDB will handle software, but you have to create a custom media type, which is a PAIN!!!

    Read the article

  • Is there any DNS that supports Geo-location / Directional DNS?

    - by Devrim
    At ultradns.com or on comwired.com you can select multiple A records depending on location; x.com (United States) 174.1.1.1 x.com (Europe) 65.2.2.2 So requests are routed based on proximity/where they come from. You can do that as many times as you like, which is a great service for our distributed application needs. However, we want to manage this on our own servers. Do you know any linux package that does this ?

    Read the article

  • Is it possible to open server ports on TUN devices?

    - by JosephH
    If I make a VPN connection to a server (say myvpn.com; assume this server is not behind any router/firewall) via a TUN device and open a port (say 5555), will someone else be able to connect to me via myvpn.com:5555? If not, is there a tunneling software that does exactly this in a transparent manner? i.e. run any TCP/UDP-based server instance behind a router without NAT using another remote server.

    Read the article

  • Reverse proxy a directory through IIS 6 with HTTPS

    - by John P
    I have an asp.net based website running on IIS 6 that needs to incorporate a java application running on the same server on a different port. The requests will be coming in via https and I need to invisibly (preserving the https session) proxy domain.com/ over to domain.com:8080/. Does IIS have a built-in mechanism for doing this? If not, are there any reliable free/open source ISAPI extensions that allow it? Thanks in advance

    Read the article

  • A feed scanner that reads data

    - by kylex
    I don't know if this is the right place to ask this question, but... I need a scanner (paper feed scanner) where depending on either a barcode, or number, or some identifier on the paper being scanned, creates a PDF file with a name based on that identifier. For example: If I scanned a page with the number 12345 on the top-left of the page, a PDF file named 12345.pdf would be created. Any suggestions at all would be greatly appreciated!

    Read the article

  • How to disable or tune filesystem cache sharing for OpenVZ?

    - by gertvdijk
    For OpenVZ, an example of container-based virtualization, it seems that host and all guests are sharing the filesystem cache. This sounds paradoxical when talking about virtualization, but this is actually a feature of OpenVZ. It makes sense too. Because only one kernel is running, it's possible to benefit from sharing the same pages of filesystem cache in memory. And while it sounds beneficial, I think a set up here actually suffers in performance from it. Here's why I think why: my machines aren't actually sharing any files on disk so I can't benefit from this feature in OpenVZ. Several OpenVZ machines are running MySQL with MyISAM tables. MyISAM relies on the system's filesystem cache for caching of data files, unlike InnoDB's buffer pool. Also some virtual machines are known to do heavy and large I/O operations on the same filesystem in the host. For example, when running cat *.MYD > /dev/null on some large database in one machine, I saw the filesystem cache lowering in another, monitored by htop. This essentially flushes all the useful filesystem cache in guests (FIFO) and so it flushes the MySQL caches in the guests. Now users are complaining that MySQL is very slow. And it is. Some simple SELECT queries take several seconds on times disk I/O is heavily used by other machines. So, simply put: Is there a way to avoid filesystem cache being wiped out by other virtual machines in container-based virtualization? Some thoughts: Choosing algorithm for flushing filesystem cache in the kernel. (possible? how?) Reserving a certain amount of pages for a single VM. (seems no option for filesystem cache type of pages that reading man vzctl) Will running MySQL on another filesystem get me anywhere? If not, I think my alternatives are: Use KVM for MySQL-MyISAM running VMs. KVM actually assigns memory to the VM and does not allow swapping out caches unless using a balloon driver. Move to InnoDB and tune the buffer pools, dirty pages, etc. This is now considered to be 'nice to have' on the long-term as not everyone responsible for administration of the system understands InnoDB. more suggestions welcome. System software: Proxmox (now 1.9, could be upgraded to 2.x). One big LV assigned for the VMs.

    Read the article

  • How to pin either a Shortcut or a Batch file to the new Windows 7 Taskbar?

    - by Shaharyar
    We are having trouble adding our batch scripts to the new Windows 7 taskar. Our batchfiles take some arguments and just execute other application based on those arguments . To keep it simple, we created some shortcuts for our customers which they just need to click in order to get everything running. The question here is: How can we pin those shortcuts or batch files to the taskbar? (The customers aren't supposed to access the file system and that's why they can only see the taskbar)

    Read the article

  • Have Excel's Correlation Function Respect Filtering

    - by Dave
    I've got a cell that's using the CORREL function to return the correlation of two rows of data in my spreadsheet. The issue is that I'd like this to update based on the filter that I have applied. I'm using the SUBTOTAL function to do this for other functions such as SUM and AVERAGE. How can I get my correlation function to do the same thing and respect the filter that I have applied?

    Read the article

  • What presentation software should I use for a five minute talk.

    - by Chas. Owens
    I am giving a lightning talk shortly and need to put together some slides. It is a technical talk about Perl documentation. I will be using a OS X machine to run the presentation software. I would like something that is minimalistic easy to publish to the web simple to control (forward and back should do it, but hotkey access to individual slides would be nice) simple to create slides for (preferably purely text based and doesn't require much in the way of markup)

    Read the article

  • Is it possible to get a list of running processes with a Cloudwatch Alarm?

    - by jtalarico
    We have an EC2 instance (Ubuntu) that has a few java-based applications and lately we're getting hit with high CPU utilization spikes that trigger one of our Cloudwatch alarms. By the time we get into the server to look at the cpu utilization, things have calmed down. What we'd love to see in one of the alarm emails is a list of running processes and their cpu utilization(%) at the time of the alarm. Is this even possible?

    Read the article

  • Photo organization software

    - by Aaron
    I am looking for photo organization software for family albums that meets the following requirements: Online Gallery Synchronized Searchable Access Controls Local Copies Synchronized Searchable Multiple individuals Multiple people have local copies All can contribute to tagging It syncs additions/changes/tags to the online gallery, which in turn syncs to other local copies Powerful Tagging Entity based (support multiple people with the same name) Multiple Types of Tags (People, Pets, Things) Coordinate or Full Image Tag can focus on certain area in picture, or reference the full picture Facial Recognition Does anyone know of a piece of software like this? I will pay!!!

    Read the article

  • Utility for extracting MIME attachments

    - by tripleee
    I am looking for a command-line tool for Unix (ideally, available in a Debian / Ubuntu package) for extracting all MIME parts from a multipart email message (or the body from a singlepart with an interesting content-type, for that matter). I have been using the mimeexplode tool which ships with the Perl MIME::Tools package, but it's not really production quality (the script is included as an example only, and has issues with what it regards as "evil" character sets) and I could certainly roll my own script based on that, but if this particular wheel has already been innovated, perhaps I shouldn't.

    Read the article

  • Computer class or home teaching for kids?

    - by JMarsch
    I want to teach my son to be a strong PC user. I could try to strike out on my own for this, but I was wondering if there is a good online (or book based) course for this. Like most kids, he's proficient with Google, YouTube, and Minecraft, but he's very curious, and I would like to teach him more. Even some basic excercises, like working with the file system would be good for him (i would need some help to not make it boring).

    Read the article

  • How to implement a secure authentication over HTTP?

    - by Zagorax
    I know that we have HTTPS, but I would like to know if there's an algorithm/approach/strategy that grants a reasonable security level without using SSL. I have read many solution on the internet. Most of them are based on adding some time metadata to the hashes, but it needs that both server and client has the time set equal. Moreover, it seems to me that none of this solution could prevent a man in the middle attack.

    Read the article

  • How do you put clips from a DVD into a website?

    - by Nathan DeWitt
    I have a promotional DVD from a client, and they want to put clips from it on their website. I'm in a Windows environment, so I'm looking for a decent video editor program, free would be preferred. Then I guess I'd have some kind of flash-based player to embed in the website... What do you recommend?

    Read the article

  • Redirection and SSL

    - by Kobus Myburgh
    I hope I am asking this at the correct forum. I have a client from whom I have developed a PHP based Facebook project, who is hosting their site on IIS with ASP and no access to PHP, so they have created a sub domain to point to my server to host the site. I have an SSL on www.mydomain.com, but their sub domain does not have SSL (app.theirdomain.com). Would redirection from their side be possible to SSL on my side so that the FB app works?

    Read the article

< Previous Page | 639 640 641 642 643 644 645 646 647 648 649 650  | Next Page >