Daily Archives

Articles indexed Tuesday August 19 2014

Page 6/20 | < Previous Page | 2 3 4 5 6 7 8 9 10 11 12 13  | Next Page >

  • How does Windows 7 determine that a system was not shut doen correctly (Kernel-Pwer Event ID 41)

    - by Erik
    I have a strange situation that Windows 7 thinks it was not shut down correctly, and gives me a warning in the system event log like this: http://support.microsoft.com/kb/2028504/de What the KB-article does not tell is how Windows actually determines that situation. Does it parse its own system event log after reboot? Or where does it get that information from? I am currently investigating an issue where I believe the system fails to write the system event log correctly (it stops having entries, although other logs like the application event log still have entries), and after a reboot, Windows thinks it has not been shut doen correctly. Does anybody have any experience with this? ANd can you confrim that Windows determines the previous correct system shutdown by parsing its own system event log on startup?

    Read the article

  • Display issues on new OpenSUSE install

    - by user1319182
    I installed OpenSUSE 13.1 on my newly built PC, but the display is just horrible : the edges of the screen are missing. For example, I can't see all the top part, I can barely read the date and I see "ctivities" instead of "Activities". However, when I take a screenshot everything seems to be fine (the cursor doesn't appear though) the characters are sometimes too big and sometimes too small the cursor is huge and many other strange things. I took a few pictures I'm using an Intel integrated GPU (HD4400) and made all the possible updates with YaST. Any idea how I can fix this? Thanks

    Read the article

  • Macro to copy values to new sheet and prompt user where they want to save

    - by MasterJedi
    I'm looking to create a macro in Excel 2007 which will do the following: copy the formatting and values from a sheet called 'report', insert this into a new workbook, naming the file with the value in 'B9' and appending the word 'report' to this when copying the data into a new workbook, the formatting of the original should be retained, but cell contents pasted as values rather than formulas prior to saving the file with the above name, the user will be prompted to choose their folder at the end, a message will be displayed alerting the user that the file has been saved successfully Any assistance would be much appreciated. Thanks. I have attempted to do this, but my experience with VBA is limited. Here is what I have done so far... Application.DisplayAlerts = False Worksheets("Report").Copy With ActiveSheet.UsedRange .Value = .Value End With ActiveSheet.DrawingObjects.Delete Set wbNew = ActiveWorkbook wbNew.SaveAs Application.GetSaveAsFilename wbNew.Close True Application.DisplayAlerts = True

    Read the article

  • windows hosted networok on windows 8

    - by tanmaysingh
    my sister is using Acer laptop, that has an intel WLAN card and supports windows hosted network(checked in command prompt).Am using the basic way using netsh wlan command also, then am using netsh start wlan command.The hosted network gets created and it could b seen in "Network and Sharing Center" as the . I also went to Device manager, selected WLan card, made sure"allow this device to wake computer from sleep" is selected. Now I went to the newly created , clicked properties, and under sharing enabled allow this to be shared(but I am not able to select The name of the wifi my sis wants to share (in this case her college wifi name, LEts say QP4,Ethernet and Local Area connection are the only two option that are coming). Also the SSID name is not being shown in her mobile nor when I click the tower icon at the tray area,Any suggestions on what might be going wrong?She is using windows 8. Should I look for updated drivers? Her laptop is only 6 months old, i don't think the drivers are outdated. Any advice shall be appreciated.

    Read the article

  • Remove CR LF for all lines that are not followed by a specific number

    - by Kjeldsen
    I have 14000+ lines of a database, that I want to edit with Notepad++. All these lines should start with 1000 and I therefore want to delete CR LF at the end of those lines that are not followed by 1000. Eg. 1000 16 04000 CRLF sdfsdf 15 sdf de 05550 CRLF 1000 16 04000 CRLF 1000 16 04000 CRLF 5. sdkfd dksds 16 0555 CRLF 10/10/14 sdfsdf CRLF should after find and replace look like 1000 16 04000 sdfsdf 15 sdf de 05550 CRLF 1000 16 04000 CRLF 1000 16 04000 5. sdkfd dksds 16 0555 10 sdfsdf CRLF I have tried with find what: \r\n([^1000]) Replace with _\1 However, this doesn't seem to remove lines starting with a number (like 5. or 10/10/14). Is it possible to make just one RegEx to find and remove all line breaks that isn't followed by 1000? "_" indicating a "space"

    Read the article

  • How to get new screws for HP Dv7 laptop

    - by blaine
    The other day I have noticed that there are 3 screws missing from the bottom of my 3 month old HP Pavilion dv7t-7000 laptop. This is causing me various problems such as an unstable screen, and who knows what else soon. My laptop is still under the basic warranty, however, I live outside the USA where I purchased it. What is the best way to get replacement screws for my laptop besides looking around the house and trying to find one that fits? Let me know if you need pictures

    Read the article

  • What video format works both on Windows and all Apple products out-of-the-box?

    - by Seppo Silaste
    What format and encoding should I use for video that would play out-of-the-box on both Windows and all Apple products (iPad, iPhone, etc.)? I know that the correct way to render an animation, is to first render it as images, but this is overkill when rendering short animations of a work in progress for the client to comment on. I have one client that views the vids on Windows and another that views them on iPad and iPhone. I'm hoping I could render just one video instead of rendering in two different formats.

    Read the article

  • "Windows failed to start" loop with 0xc0000225. No install discs, EasyRE/USB iso hasn't worked

    - by mvidaure
    I've been suffering from this "Windows failed to start" loop with 0xc0000225 for 3 days now and I still can't fix it. The major problem is that I don't have any sort of installation disc. However, I have tried EasyRE via both CD and USB but both result in the same problem.  I try to perform an 'Automated Repair' on my computer and I get in red text "The selected partition is corrupted and could not be accessed or repaired. Please select a different drive to continue." It is also labeled as NO under Active. Since I do not have a the installation discs, I made a USB with a Windows_7_Recovery_Disc  iso (as shown here http://www.sevenforums.com/tutorials/31541-windows-7-usb-dvd-download-tool.html) but it also doesn't work. I get a blue screen that says "RECOVERY You pc needs to be repaired. The application or operating system could not be uploaded because a required file is missing or contains errors... File:\WINDOWS\system32\winload.efi Error code: 0xc0000225 You'll need to use the recovery tools on your installation media. If you don't have any installation media, contact your system administrator or PC manufacturer." Thanks in advance! Miguel

    Read the article

  • Restore Windows 8 and Linux (Debian) /boot/efi

    - by Loic
    I deleted /boot/efi (while attempting to install archlinux). There is one harddrive, 750GB, /dev/sda). The partitions are /dev/sda1 ntfs 315MB /dev/sda2 EFIboot 105MB <=== this got deleted /dev/sda3 ? 135MB /dev/sda4 ntfs 626GB <======= windows 8 /dev/sda5 ntfs /dev/sda6 biosgrub 1MB ? /dev/sda7 lvm 110GB <======== for linux /dev/sda8 swap 13GB Windows 8 still installed on /dev/sda4 How do I recreate / repair the /boot/efi (/dev/sda2) ?

    Read the article

  • Did Acronis True Image Home 2012 clone operation "lock" my BitLocker disk?

    - by Thomas Eyde
    After trying to clone my primary drive, which requires a reboot to proceed, BitLocker detected that the boot sector had changed and required the recovery keys. Not a good situation to be in on Sunday evening when it is your IT-department who hold the keys. After talking with the guys at IT, I have tree suspects on why BitLocker locked me out: The newly added, second hard drive in my machine. The changed boot-order in BIOS. The changes True Image did in order to do its things on boot. As an end-user, I should never have to end up in situations like these without any warning. I would like to know what really happened, so I can inform Acronis on how they can improve their product to avoid this situation in the future.

    Read the article

  • In Windows Command Prompt, how to get the last command that started with some letters?

    - by NikoBellic
    Let's say I entered a bunch of commands one after another: rm blah.txt pwd ls cd .. cd blah pwd If I want to get "rm blah.txt" to appear again without typing the whole thing again, I can press up 6 times. But is there a faster way? Can filter my command history based on some text? Intuitively, I would like to just type in r and then press up to search through my command history for only commands that started with "r".

    Read the article

  • Windows cant repair even with sfc /scannow

    - by GeekyDewd
    Clean install of windows 8, then installed the windows 8.1 update (after all other updates). CBS Log: CBS Log on Google Drive Important pieces of the log: Found: {l:32 b:LrOXAtJDCCTN+z+D1bKj7ogYIrX7sfCCDh+wVBfsrCQ=} Expected: {l:32 b:n520k714Uu3utHa5JGQ6HQYbZphKhlMWq5pEmfnCDuw=} 2014-05-17 21:35:38, Info CSI 00000505 [SR] Cannot repair member file [l:36{18}]"Amd64\CNBJ2530.DPB" of prncacla.inf, Version = 6.3.9600.16384, pA = PROCESSOR_ARCHITECTURE_AMD64 (9), Culture neutral, VersionScope = 1 nonSxS, PublicKeyToken = {l:8 b:31bf3856ad364e35}, Type = [l:24{12}]"driverUpdate", TypeName neutral, PublicKey neutral in the store, hash mismatch 2014-05-17 21:35:40, Info CSI 00000506 Hashes for file member \SystemRoot\WinSxS\amd64_prncacla.inf_31bf3856ad364e35_6.3.9600.16384_none_9590ba64d5b91f79\Amd64\CNBJ2530.DPB do not match actual file [l:36{18}]"Amd64\CNBJ2530.DPB" : Found: {l:32 b:LrOXAtJDCCTN+z+D1bKj7ogYIrX7sfCCDh+wVBfsrCQ=} Expected: {l:32 b:n520k714Uu3utHa5JGQ6HQYbZphKhlMWq5pEmfnCDuw=} 2014-05-17 21:35:40, Info CSI 00000507 [SR] Cannot repair member file [l:36{18}]"Amd64\CNBJ2530.DPB" of prncacla.inf, Version = 6.3.9600.16384, pA = PROCESSOR_ARCHITECTURE_AMD64 (9), Culture neutral, VersionScope = 1 nonSxS, PublicKeyToken = {l:8 b:31bf3856ad364e35}, Type = [l:24{12}]"driverUpdate", TypeName neutral, PublicKey neutral in the store, hash mismatch 2014-05-17 21:35:40, Info CSI 00000508 [SR] This component was referenced by [l:186{93}]"Microsoft-Windows-Printer-Drivers-Package~31bf3856ad364e35~amd64~~6.3.9600.16384.INF_prncacla" 2014-05-17 21:35:43, Info CSI 00000509 [DIRSD OWNER WARNING] Directory [ml:520{260},l:138{69}]"\??\C:\WINDOWS\System32\WindowsPowerShell\v1.0\Modules\NetSecurity\en" is not owned but specifies SDDL in component Networking-MPSSVC-WMI.Resources, pA = PROCESSOR_ARCHITECTURE_AMD64 (9), Culture = [l:10{5}]"en-US", VersionScope = 1 nonSxS, PublicKeyToken = {l:8 b:31bf3856ad364e35}, Type neutral, TypeName neutral, PublicKey neutral And: Found: {l:32 b:LrOXAtJDCCTN+z+D1bKj7ogYIrX7sfCCDh+wVBfsrCQ=} Expected: {l:32 b:n520k714Uu3utHa5JGQ6HQYbZphKhlMWq5pEmfnCDuw=} 2014-05-17 21:42:12, Info CSI 00000888 [SR] Cannot repair member file [l:36{18}]"Amd64\CNBJ2530.DPB" of prncacla.inf, Version = 6.3.9600.16384, pA = PROCESSOR_ARCHITECTURE_AMD64 (9), Culture neutral, VersionScope = 1 nonSxS, PublicKeyToken = {l:8 b:31bf3856ad364e35}, Type = [l:24{12}]"driverUpdate", TypeName neutral, PublicKey neutral in the store, hash mismatch 2014-05-17 21:42:13, Info CSI 00000889 Hashes for file member \SystemRoot\WinSxS\amd64_prncacla.inf_31bf3856ad364e35_6.3.9600.16384_none_9590ba64d5b91f79\Amd64\CNBJ2530.DPB do not match actual file [l:36{18}]"Amd64\CNBJ2530.DPB" : Found: {l:32 b:LrOXAtJDCCTN+z+D1bKj7ogYIrX7sfCCDh+wVBfsrCQ=} Expected: {l:32 b:n520k714Uu3utHa5JGQ6HQYbZphKhlMWq5pEmfnCDuw=} 2014-05-17 21:42:13, Info CSI 0000088a [SR] Cannot repair member file [l:36{18}]"Amd64\CNBJ2530.DPB" of prncacla.inf, Version = 6.3.9600.16384, pA = PROCESSOR_ARCHITECTURE_AMD64 (9), Culture neutral, VersionScope = 1 nonSxS, PublicKeyToken = {l:8 b:31bf3856ad364e35}, Type = [l:24{12}]"driverUpdate", TypeName neutral, PublicKey neutral in the store, hash mismatch 2014-05-17 21:42:13, Info CSI 0000088b [SR] This component was referenced by [l:186{93}]"Microsoft-Windows-Printer-Drivers-Package~31bf3856ad364e35~amd64~~6.3.9600.16384.INF_prncacla" 2014-05-17 21:42:13, Info CSI 0000088c [SR] Repair complete

    Read the article

  • How to get rid of prompts for credentials connecting to proxy Server officeimg.vo.msecnd.net in Office 2013?

    - by Firee
    I have experienced this issue mainly with Excel, Word and Powerpoint 2013, where there is constant pop-up box asking for login credentials as it tries to connect to officeimg.vo.msecnd.net I have searched and found one of the solution, to prevent Office from connecting to the internet (Options Trust Center Settings Allow Office to connect to internet). This solution worked for sometime, but am back to square one again. Solutions are sought, as this is a nagging problem, I am sure others would have experienced the same.

    Read the article

  • What's the best way to get a stored POP3 password out of Outlook 2007?

    - by Tom Morris
    If you have a password for a POP3 account in Outlook 2007 (Windows 7 Home Premium) and you then forget the password, how do you retrieve it? I tried copy-and-paste. No go. I downloaded Mail PassView, but upon installing it, AVG said it was malware, so I removed it. I eventually found the account details by opening up RegEdit, and found it in HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\ (...) but it was encoded in REG_BINARY. I Googled around and found various Visual Basic routines for decoding it but being a Unix dork I had absolutely no idea what to do with said scripts. By this point, I gave up and managed to get hold of the password by another means (it was written down on a piece of paper in the briefcase of the owner of the account - I know, it makes the inner sysadmin rage). I also attempted to write a simple POP3 server in Python and then get Outlook to log on to it, but that didn't really work out (it was about 4am at that point). For future reference, is there an easy and sensible way of doing this? Is Mail PassView actually evil spyware or was AVG just giving me a false positive? (Any chance of Windows 8 having something like OS X's Keychain?)

    Read the article

  • Save the Date: Oracle Partner Day Deutschland

    - by Alliances & Channels Redaktion
    SAVE THE DATE ORACLE PARTNER DAYS 12. November 2014 Campus Kronberg in Kronberg bei FRANKFURTDer deutsche FY15 Oracle Partner Day findet am Mittwoch, 12. November 2014, im Campus Kronberg in Kronberg bei Frankfurt statt. Bitte vermerken Sie den Termin schon heute in Ihrem Kalender!Die Oracle Partner Day Veranstaltung bringt Sie auf den aktuellen Stand, informiert Sie über die neuesten Oracle Strategien und Neuheiten rund um das Oracle Produktportfolio und dies im Anschluss an die Oracle OpenWorld Konferenz in San Francisco (28. September bis 2. Oktober 2014). Kompakte Informationen, die Sie sofort nutzen können.Der Oracle Partner Day Event halt, was er verspricht. Er ist das ideale Forum für Partner und Oracle Vertreter gleichermaßen, um sich gemeinsam zu engagieren, voneinander zu lernen, Wissen miteinander zu teilen und bietet eine Plattform für die Identifizierung neuer Geschäftsmöglichkeiten in der PartnerNetwork Community. Die Teilnahme am Partner Day Event ist für Sie als Oracle Partner kostenfrei. Weitere Informationen zur Veranstaltung sowie die vollständige Agenda wird in Kürze online verfügbar sein. Wenn Sie heute bereits Ihren Platz reservieren möchten oder Fragen haben, schicken Sie einfach eine kurze Email an [email protected] freuen uns auf Sie!Oracle Partner Day Team Germany

    Read the article

  • Native JSON-Unterstützung in der Datenbank 12.1.0.2

    - by Carsten Czarski
    Mit dem im Juli 2014 erschienenen Patchset 12.1.0.2 wird die Oracle-Datenbank erstmals mit nativer Unterstützung für JSON ausgestattet: So ist es unter anderem nun möglich ... JSON in Tabellen zu speichern und zu validieren Daten aus JSON-Dokumenten zu extrahieren "Relationale Sichten" auf JSON-Dokumente zu generieren In Tabellen gespeicherte JSON-Dokumente zu indizieren In diesem Tipp erfahren Sie, wie Sie die neuen SQL/JSON-Funktionen (nicht nur mit APEX) praktisch ausnutzen können. Mit diesen neuen SQL-Funktionen wird die erste Hälfte der JSON-Unterstützung in der Oracle-Datenbank - auf SQL-Ebene - umgesetzt. Das mit APEX 5.0 bereits angekündigte PL/SQL Paket APEX_JSON wird die zweite Hälfte, den PL/SQL-Bereich, abdecken - so dass Ihnen spätestens mit APEX 5.0 auf 12.1.0.2 eine komplett JSON-fähige Datenbank zur Verfügung stehen wird. Mehr Information auf dem Event "Development meets Customers" Am 17. September können Sie in Frankfurt noch mehr zu JSON und Oracle 12c erfahren: In der halbtägigen Veranstaltung Oracle Development meets Customers "JSON und die Oracle Database 12c" haben Sie die einmalige Chance, aktuellste Informationen zur neuen JSON-Unterstützung in Oracle12c - direkt aus dem Entwicklungsteam - zu erhalten. Darüber hinaus werden weitere, aktuelle Entwicklerthemen wie node.js, REST-Webservices und andere behandelt. Beda Hammerschmidt, einer der führenden Entwickler der JSON-Datenbank, wird die JSON-Funktionen vorstellen und Tipps & Tricks zu deren Einsatz verraten. Lassen Sie sich diese Gelegenheit nicht entgehen - melden Sie sich gleich an.

    Read the article

  • Save the Date: Oracle Partner Day Deutschland

    - by Alliances & Channels Redaktion
    SAVE THE DATE ORACLE PARTNER DAYS 12. November 2014 Campus Kronberg in Kronberg bei FRANKFURTDer deutsche FY15 Oracle Partner Day findet am Mittwoch, 12. November 2014, im Campus Kronberg in Kronberg bei Frankfurt statt. Bitte vermerken Sie den Termin schon heute in Ihrem Kalender!Die Oracle Partner Day Veranstaltung bringt Sie auf den aktuellen Stand, informiert Sie über die neuesten Oracle Strategien und Neuheiten rund um das Oracle Produktportfolio und dies im Anschluss an die Oracle OpenWorld Konferenz in San Francisco (28. September bis 2. Oktober 2014). Kompakte Informationen, die Sie sofort nutzen können.Der Oracle Partner Day Event halt, was er verspricht. Er ist das ideale Forum für Partner und Oracle Vertreter gleichermaßen, um sich gemeinsam zu engagieren, voneinander zu lernen, Wissen miteinander zu teilen und bietet eine Plattform für die Identifizierung neuer Geschäftsmöglichkeiten in der PartnerNetwork Community. Die Teilnahme am Partner Day Event ist für Sie als Oracle Partner kostenfrei. Weitere Informationen zur Veranstaltung sowie die vollständige Agenda wird in Kürze online verfügbar sein. Wenn Sie heute bereits Ihren Platz reservieren möchten oder Fragen haben, schicken Sie einfach eine kurze Email an [email protected] freuen uns auf Sie!Oracle Partner Day Team Germany

    Read the article

  • Securing a Cloud-Based Data Center

    - by Orgad Kimchi
    No doubt, with all the media reports about stolen databases and private information, a major concern when committing to a public or private cloud must be preventing unauthorized access of data and applications. In this article, we discuss the security features of Oracle Solaris 11 that provide a bullet-proof cloud environment. As an example, we show how the Oracle Solaris Remote Lab implementation utilizes these features to provide a high level of security for its users. Note: This is the second article in a series on cloud building with Oracle Solaris 11. See Part 1 here.  When we build a cloud, the following aspects related to the security of the data and applications in the cloud become a concern: • Sensitive data must be protected from unauthorized access while residing on storage devices, during transmission between servers and clients, and when it is used by applications. • When a project is completed, all copies of sensitive data must be securely deleted and the original data must be kept permanently secure. • Communications between users and the cloud must be protected to prevent exposure of sensitive information from “man in a middle attacks.” • Limiting the operating system’s exposure protects against malicious attacks and penetration by unauthorized users or automated “bots” and “rootkits” designed to gain privileged access. • Strong authentication and authorization procedures further protect the operating system from tampering. • Denial of Service attacks, whether they are started intentionally by hackers or accidentally by other cloud users, must be quickly detected and deflected, and the service must be restored. In addition to the security features in the operating system, deep auditing provides a trail of actions that can identify violations,issues, and attempts to penetrate the security of the operating system. Combined, these threats and risks reinforce the need for enterprise-grade security solutions that are specifically designed to protect cloud environments. With Oracle Solaris 11, the security of any cloud is ensured. This article explains how.

    Read the article

  • ????——???????????

    - by hamsun
    user12619775,2014?8?7? - ??:??????????? ??????????????????????????,???????????????????????????????????????? ???????? Managing Oracle Database on Oracle Solaris 11 Oracle Solaris 11 System Administration for Experienced UNIX/Linux Administrators Oracle Database 12c: RAC Administration Oracle Database 12c: Implement Partitioning Oracle WebCenter Portal 11g for Developers Oracle Hyperion PSPB 11.1.2: Create & Manage Applications (11.1.2.3) R12.x Oracle Financials Accounting Hub Fundamentals Oracle Demantra 7.3.1 Demand Management Fundamentals RPAS Administration and Configuration Fundamentals 14.0 PeopleSoft PeopleTools I Rel 8.53 (Training On Demand) ????education.oracle.com? ???Oracle??????

    Read the article

  • Spotlight on GlassFish 4.1: #6 Java API for WebSocket 1.1

    - by delabassee
    'Spotlight on GlassFish 4.1' is a series of posts that highlights specific enhancements of the upcoming GlassFish 4.1 release. It could be a new feature, a fix, a behavior change, a tip, etc. #6 Java API for WebSocket 1.1 JSR 356 (Java API for WebSocket) has recently passed the Maintenance Release ballot, this Maintenance Release fixes an important issue when Java SE 8 Lambdas are used (see here). GlassFish 4.1 will include an updated version of Tyrus (JSR 356 Reference Implementation) to bring the WebSocket API level to the latest version of the specification, i.e. WebSocket API for Java 1.1. It should be mentioned that the Tyrus version included in GlassFish 4.1 also brings additional features. Some of those will be highlighted in upcoming entries. https://blogs.oracle.com/theaquarium/resource/websocket_logo.png

    Read the article

  • Service Account Management in SharePoint 2013

    - by Sahil Malik
    SharePoint, WCF and Azure Trainings: more information My newest article detailing Service Account management in SharePoint 2013 is now online. Who thought such a simple need could have so many nuances. Hope you like it With this, I am going to do a break – not taking time off, but switching gears. My next series of Articles are going to focus on writing Mobile Apps for SharePoint and Office 365. And I intend to cover every single scenario, On Prem, Cloud, Xamarin, HTML5, Cordova, and Native. I will show Windows and iOS, I’m an android dumbass, but space/time permitting I may show cordova android – anyway, for an Android guru the articles will provide enough information get rolling anyway. Read full article ....

    Read the article

  • Combo box filter on Extjs4.1.3

    - by saravanakumar
    I have created a window with combo box. Combo configuration is xtype :'combo', fieldLabel : 'Command', labelAlign : 'right', id :'commandInputComboId', store : commandStore, displayField: 'command', valueField : 'id', width : 500, enableKeyEvents : true, allowblank : false, queryMode: 'local', typeAhead : true, triggerAction: 'all', query filter works for normal data. But I have data with escape chars like &lt; because I need to show it as '<' for ex my data is <get-all-users> Filter apply only when I type &lt; not for <. How can apply filter on this data?

    Read the article

  • how to avoid or minimise use of check/conditional statement?

    - by Muneeb Nasir
    I have scenario, where i got stream and i need to check for some value. if i got my any new value i have to store it in any of data structure. well it seems very easy, i can place conditional statement if-else or can use contain method of set/map to check either received is new or not. but the problem is checking will effect my application performance, in stream i'll receive hundreds for value in second, if i start checking each and every value i received than for sure it effect performance. Any body can suggest me any mechanism or algorithm that solve my issue. either by bypassing checks or atleast minimize them?

    Read the article

  • Generic Repositories with DI & Data Intensive Controllers

    - by James
    Usually, I consider a large number of parameters as an alarm bell that there may be a design problem somewhere. I am using a Generic Repository for an ASP.NET application and have a Controller with a growing number of parameters. public class GenericRepository<T> : IRepository<T> where T : class { protected DbContext Context { get; set; } protected DbSet<T> DbSet { get; set; } public GenericRepository(DbContext context) { Context = context; DbSet = context.Set<T>(); } ...//methods excluded to keep the question readable } I am using a DI container to pass in the DbContext to the generic repository. So far, this has met my needs and there are no other concrete implmentations of IRepository<T>. However, I had to create a dashboard which uses data from many Entities. There was also a form containing a couple of dropdown lists. Now using the generic repository this makes the parameter requirments grow quickly. The Controller will end up being something like public HomeController(IRepository<EntityOne> entityOneRepository, IRepository<EntityTwo> entityTwoRepository, IRepository<EntityThree> entityThreeRepository, IRepository<EntityFour> entityFourRepository, ILogError logError, ICurrentUser currentUser) { } It has about 6 IRepositories plus a few others to include the required data and the dropdown list options. In my mind this is too many parameters. From a performance point of view, there is only 1 DBContext per request and the DI container will serve the same DbContext to all of the Repositories. From a code standards/readability point of view it's ugly. Is there a better way to handle this situation? Its a real world project with real world time constraints so I will not dwell on it too long, but from a learning perspective it would be good to see how such situations are handled by others.

    Read the article

  • How to set position for a linear-gradient background in css3

    - by Virender Sehwag
    I am trying to set the position (that is, margin or padding from top) of body tag's linear background with image. My code is background-image: linear-gradient(to bottom, rgba(255, 255, 255, 0), rgba(255, 255, 255, 0), rgba(0, 0, 0, 0.9), rgb(0, 0, 0)), url("g2hd.jpg"); background-repeat: repeat, no-repeat; background-attachment: fixed; background-position: 0% 30px, center center; but 30px is not working but it works for normal for background-image:url("g2hd.jpg"); any idea

    Read the article

< Previous Page | 2 3 4 5 6 7 8 9 10 11 12 13  | Next Page >