Search Results

Search found 33029 results on 1322 pages for 'access vba'.

Page 659/1322 | < Previous Page | 655 656 657 658 659 660 661 662 663 664 665 666  | Next Page >

  • Network doesn't work after upgrading to 13.10

    - by Inkbug
    I upgraded from 13.04 to 13.10, and a number of things stopped working. Most importantly, I don't have internet access anymore. When I go to the network settings, I receive the following error: The system network services are not compatible with this version. The only settings that show up in the network settings are the proxy settings. I tried sudo service network-manager start and sudo service network-manager restart, but it told me the service was already running. In addition, the menu bar is missing all of the indicators (such as keyboard layout, sound, network, clock, and the gear icon). Is this related or a separate issue?

    Read the article

  • Data structure for file search

    - by poly
    I've asked this question before and I got a few answers/idea, but I'm not sure how to implement them. I'm building a telecom messaging solution. Currently, I'm using a database to save my transaction/messages for the network stack I've built, and as you know it's slower than using a data structure (hash, linkedlist, etc...). My problem is that the data can be really huge, and it won't fit in the memory. I was thinking of saving the records in a file and the a key and line number in a hash, then if I want to access some record then I can get the line number from the hash, and get it from the file. I don't know how efficient is this; I think the database is doing a way better job than this on my behalf. Please share whatever you have in mind.

    Read the article

  • Deleting a game object

    - by Balls
    I tried doing this but it cause an access violation. void GameObjectFactory::Update() { for( std::list<GameObject*>::iterator it=gameObjectList.begin() ..... (*it)->Update(); } void Bomb::Update() { if( time == 2.0f ) { gameObjectFactory->Remove( this ); } } void GameObjectFactory::Remove( ... ) { gameObjectList.remove( ... ); } My thoughts would be to mark the object to be dead then let the factory handle it the on next frame for deletion. Is it the best and fastest way? What do you think?

    Read the article

  • How do I make a Java gave without a JFrame?

    - by kullalok
    I am working on an arcade-like game, and so far, I have been using JFrame. All the action occurs in the JFrame basically. However, I've noticed that a lot of games that you install on a computer don't have a frame. When you play them on Windows, the game covers the entire screen (the start bar disappears and you can't access any other application on your computer). I'd like to do that for my game. Is it possible to do so with Java? If so, how would I do this?

    Read the article

  • Screen with no usable configuration - Ubuntu 12.04

    - by teetoofoo
    I am running Ubuntu 12.04 on my Dell XPS13 L322X (installed onto a flash drive). However, at boot time, the screen just turns off. I was able to access the Terminal through recovery mode though. I have tried several of the most common solutions that I've seen on forums/AskUbuntu, in vain. Please help me figure this out. Thanks! Here is the content of my xorg.conf: http://paste.ubuntu.com/6261683/ and here the contents of my Xorg.0.log: http://paste.ubuntu.com/6261689/

    Read the article

  • How do you make a bootable usb stick on OSX with a corrupted harddrive`?

    - by Nick
    I cant access the desktop because my harddrive is corrupted. Therefore I want to make a bootable USB stick so i can transfer all of my important files to my External HD. Problem is that Im stuck on Step 3 --- http://www.ubuntu.com/download/help/create-a-usb-stick-on-mac-osx . Im not sure of what i should change this to: hdiutil convert -format UDRW -o ~/path/to/target.img ~/path/to/ubuntu.iso It says convert failed - No such file or directory. Obviously the problem is that i dont know the path to the USB, maybe you know how to find out? Please help me. Thanks. ps. Ive downloaded the ubuntu desktop amd64+mac.

    Read the article

  • Database Context and Singleton injection with IoC

    - by zaitsman
    All of the below relates to a ASP.NET c# app. I have a Singleton Settings MemoryCache that reads values from database on first access and caches these, then invalidates them using SQL Service Broker message and re-reads as required. For the purposes of standard controllers, i create my Db Context in a request scope. However, this obviously means that i can't use the same context in the Settings Cache class, since that is a singleton and we have a scope collision. At the moment, i ended up with two db contexts - the Controllers get it via IoC container, whereas a Singleton just creates it's own. However, i am not satisfied with this approach (mostly due to the way i feel about two contexts, the cache doesn't set anything on the db hence concurrency is not an issue as much). What is a better way to do it?

    Read the article

  • How to minimize the data loss when laying off a programmer?

    - by thursdaysgeek
    I was just laid off and it was the standard process that is used in the US: call the person to talk to personnel, and remove access to the network while that is going on, then have someone help pack, always have someone with the person until they are escorted from the property. That is supposed to keep an unhappy developer from deleting or damaging software or data: to mimimize data loss. However, it still results in a lot of data loss, as all of the work the programmer was working on is dropped: software not checked in is possibly lost, documents not finished are lost, releases in process are slowed down or stopped, and a huge amount of knowledge could be lost. It seems the potential data loss is more than offset by the actual data loss. How can all losses, both potential and actual, be mimimized?

    Read the article

  • Really, Mobile Devices will Take Over the World?

    - by p.gielens
    My blog has been quiet for quite a while. My inspiration comes from crunching/exchanging information which I should do more often. Gartner analysis tells us that by 2013 mobile phones will overtake PC’s as the most common Web access device worldwide. A few years back I would have said non sense, but apparently most Web users are comfortable with less processing power. Just take a look at the increasing business in Netbooks. Wouldn’t it be great to have a mobile phone which can connect wirelessly to my home TV, monitor, car display, mouse, keyboard, etc? And to have the processing power of the current Netbook generation? Where can I buy it? Why are we making our PC devices (for instance the slate) smaller while we can make our mobile device’s functionality bigger? What about the single responsibility principle? Does it apply to physical devices as well as good object-oriented software?

    Read the article

  • What about the performance enhancement when using an SSD as the main disk?

    - by motumboe
    I'm planning to buy a new PC and I am thinking about using an SSD as the main disk. I'd also use a standard spinning disk and I'd mount it to /home. To the people already using such a setup: does this induce a practical, noticeable enhancement in performance? I think that access times, rather than transfer rates, are the more useful feature of SSD's. I would like to know if they have a noticeable effect on a desktop installation of Ubuntu. Thanks in advance!

    Read the article

  • Another website is mirroring my site

    - by Marlboro Goodluck
    Question for you all. There is a site of ill repute known as thedirty which has completely mirrored my site and now has links appearing on Google at the #1 spot using my content. I checked my log file and noticed that this site has been crawling mine from sometime, and also has 10k links from their site to mine. I have blocked user access which is referred from this site and reported them as web spam to Google already. I also disavowed the domain. How are they getting top links in Google (even overtaking mine) for such nefarious tactics? What are the steps to completely eliminating an issue such as this?

    Read the article

  • The underlying provider failed on Open

    - by aghausman12
    The underlying provider failed on Open is an entity framework error and with a simple fix it is little difficult to sort out what is going wrong. 1) if you are using IIS 7 with Integrated Security in connection string. Make sure your IIS user have appropriate permissions to access database. 2) If you are using Visual Studio built in Web Server and facing this issue. Simple fix is to either re-start Visual Studio or Kill the process of Web Server which is (WebDev.WebServer*.exe). I was in the second...(read more)

    Read the article

  • What should be stored in UserContext?

    - by HonorGod
    From my general understanding I believe UserContext for a web application is supposed to hold user authentication and authorization (user roles) information. As part of user roles, there are definitions on who can access what data and accordingly the corresponding reference data is loaded into the UserContext as well. Is this a good practice to load and use reference data from UserContext? Does this have any impact with the number of sessions vs size of data it is holding inside JVM? I am thinking we use UserContext only for authentication and authorization but load the reference data from cache on demand and use it if required.

    Read the article

  • Testability &amp; Entity Framework 4.0

    This white paper describes and demonstrates how to write testable code with the ADO.NET Entity Framework 4.0 and Visual Studio 2010. This paper does not try to focus on a specific testing methodology, like test-driven design (TDD) or behavior-driven design (BDD). Instead this paper will focus on how to write code that uses the ADO.NET Entity Framework yet remains easy to isolate and test in an automated fashion. Well look at common design patterns that facilitate testing in data access scenarios...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • And just like that, there went February

    - by Enrique Lima
    The best intentions were having me at perhaps posting more than twice a month, and here we are and … well it has been busy. There has been a lot of SharePoint 2010 already in this first number of weeks of the year, a good amount of TFS 2010, but even better working quite actively on two topics that I enjoy quite a bit … Windows Azure and Application Lifecycle Management.  And there is more to come around those two. Through the influencers program with Geekswithblogs and Discountasp.net I got access to a hosted TFS solution that I am currently testing and will be posting my findings and documenting a good amount of information on that process. Another great resource has been fpweb.net, and there will be more details on this too.  Pretty exciting stuff! That is what is going on and what will be coming on here shortly.

    Read the article

  • optirun fails in Ubuntu 12.10

    - by chiloxsan
    I am trying to use Nvidia Optimus on my laptop by using Bumblebee, I have an Intel Core i5 with an Nvidia Geforce GT 630M. I have followed the instructions on the wiki page at https://wiki.ubuntu.com/Bumblebee, but when trying to run optirun with Firefox (or any other program, like glxspheres), I get the following error: [ 1921.452820] [ERROR]Cannot access secondary GPU - error: Could not load GPU driver [ 1921.452905] [ERROR]Aborting because fallback start is disabled. I have tried googling the issue but I couldn't find any solution that didn't cause more problems. Thank you for your time. Here is my bumblebee.conf: http://paste.ubuntu.com/1333324/

    Read the article

  • What is the most secure environment for multiple CMS sites? [closed]

    - by Brian Gulino
    I wish to run about 50 Joomla or WordPress low-traffic websites on 1 server, or part of a server. Each website will be managed by its own, naive owner who will have be able to access the Joomla or Wordpress backend of the website. I am concerned about security and isolation as my users will periodically get into trouble by not protecting their sites properly. Two alternatives I know of exist: Run one Linux system with multiple websites under Apache. Follow current Joomla and WordPress security tips. Increase the isolation of the individual sites by using mpm-itk, which will allow each website to run as its own user. The alternative to this is to run virtualization software such as the Xen hypervisor. Each site would have its own, virtual Linux system. I lack the experience needed to make this decision and I am asking which path to take. Obviously, there may be other alternatives that I haven't considered.

    Read the article

  • I cannot login to my ubuntu admin!!!! HELP!

    - by Spinz01
    I used lightdm to hide the users at the login prompt of ubuntu and it hid my account. The only one visible is "other" and it doesn't even have a known password. So, I have accessed the terminal and created a guest account and another account without passwords and they are not visible. I am new to using the terminal so I don't know how to write the commands for either: making all users/accounts visible to the login and/or making the guest accounts visible, and then once in the GUI change the login settings to see my admin account. I have no idea of what else I could do, or even how to do it. I would appreciate any help, I'm in a desperate situation because I really need to access my desktop! THANK YOU!!! Any ideas are appreciated!!!

    Read the article

  • Banshee can't see my 2G iPod Touch

    - by TheBlackParrot
    I have a jailbroken 8GB 2nd gen iPod Touch running iOS 4.2.1, and Banshee can't see it, I think. It spits out errors when I plug it in, but it never shows up. http://pastebin.com/HuFDXCmQ is what it's doing according to the terminal. Ubuntu can see it and I can access files fine with Nautilus and pantheon-files. Rhythmbox can see it, but is asking to initialize it. However it doesn't let me select a "Model" and it remains greyed out and blank. It never does seem to initialize it either. Running Ubuntu 12.04 and Banshee 2.6.0. EDIT: Discovered the library was actually corrupted, it's working fine now after a restore.

    Read the article

  • Migrating RISC to x86 - endianess 'issue'

    - by llaszews
    Endianess always comes up when migrating applications and databases from RISC to x86. The issue is often time overblown as if you are running on a relational database the database vendor will provide tools or automated methods to convert the data properly. Oracle RMAN is often the first choice. Oracle imp/exp, data pump, and GoldenGate can also be used. Migrating to Linux on Dell A bigger issue would be applications that access OS files. These OS files will need to be converted from big endian (RISC) to little endian (CISC) and then the application may be impacted because of the endianess differences.

    Read the article

  • Wireless connectivity Wifi 7260 on Ubuntu 10.04

    - by user292332
    I am trying to install Wireless networking on Dell Latitude E5440 Wifi 7260- Ubuntu 10.04.(Yes I know it is old- see the complication below) I did get the wired connection working but our classrooms are wireless. I have tried to upgrade to version 12 last year but to my horror during the first week of class the nfs mounts did not work for multiple users. I never thought to test for more then one person at at time!! I have not been able to find a fix for the upgrade so I must remain at 10.04. NFS mounts are a must for student home directory access on the servers. All desktops are 10.04 as are the servers. Does anyone have a solution to the wireless problem in version 10.04/ or the nfs mounts solution in version 12. Thank you so much. Val

    Read the article

  • If I have true i/o false or vice versa, is it an OBOE?

    - by Protector one
    I often make the mistake of inverting my truth values in my code (e.g. in my if clauses). It gives me the same feeling as when making an OBOE (Off By One Error), even though it's technically not. Would you call it an OBOE, or better yet, is there a specific term for "off by truth value"-errors? My reasoning is that all possible values of a boolean are true and false. In other words, the possible values are contained in the array: [true, false]. If you access this array by index, you'll always be off by one… when selecting the wrong one. This becomes especially obvious when you calculate your index as: index = someInt % 2. Now I understand that this usually not the case, but in my mind, it always feels like this. Almost got it, just off by one…

    Read the article

  • Dual boot w/ windows 7

    - by Aduff
    So my PC had windows XP and Win 7 on it and I went into the XP partition and installed Ubuntu 12.10 over it being sure to use 90% of the XP partition for the / mount and 10% for the swap. It installed but when I boot the computer it doesn't give me the option of choosing between 7 or Ubuntu, just booting right to the Linux distro. Should I have installed it in 7 over the XP partition? I can see the drive in Ubuntu that contains all the 7 files. How can I recover my 7 access?

    Read the article

  • eSTEP TechCast - December 2012 Material available

    - by uwes
    Dear Partners,We would like to extend our sincere thanks to those of you who attended our TechCast on "Innovations with Oracle Solaris Cluster 4". The materials (presentation, replay) from the TechCast are now available for all of you via our eSTEP portal.  You will need to provide your email address and the pin below to access the downloads. Link to the portal is shown below.URL: http://launch.oracle.com/PIN: eSTEP_2011The downloads can be found under tab Events --> TechCast.Feel free to explore also the other delivered TechCasts and more useful information under the Download and Links tab. Any feedback is appreciated to help us improve the service and information we deliver.Thanks and best regards,Partner HW Enablement EMEA

    Read the article

  • How should dependencies be managed across a modular application?

    - by bear
    Let's say that we have a structure like this: Application -- Modules --Module1 -- Controller -- PublicHelper --Module2 -- Controller -- PublicHelper Whereby a module's Public Helper can provide helper functions. In nearly every module helper, the helper needs to access another module's public helper methods. Let's say for instance, in a PHP application: Module1 provides functionality to create a sale, and as part of the class Module1PublicHelper extends AbstractModuleHelper { public function createSale($customerId, $param, $param) { $userPublicHelper = // grab an instance of the user public helper $currentUser = $userPublicHelper->getCurrentUser(); } } class Module2PublicHelper extends AbstractModuleHelper { public function getCurrentUser() { //do something return $user; } } In this situation, the method needs to obtain an instance, either new or whatever of the user public helper. Given that all of Module Public Helper classes are instantiated with a minimum set of constructor params, e.g. EntityManager, what would be the best way to get a copy of it? Obviously, we can't really inject the user public helper class into the class containing createSale One solution would be to use a service locator or registry, however, testing the application isn't exactly easy.

    Read the article

< Previous Page | 655 656 657 658 659 660 661 662 663 664 665 666  | Next Page >