Search Results

Search found 59951 results on 2399 pages for 'laptop memory question'.

Page 132/2399 | < Previous Page | 128 129 130 131 132 133 134 135 136 137 138 139  | Next Page >

  • Gnome question> Nautilus only starts as root user

    - by user7978
    Hello. I am running Ubuntu 10.04 62-bit. When I attempt to start Nautilus from the command line, it does not appear -- although a PID is generated. As root/sudo, I can start Nautilus fine. One note: I run e16 as the windows manager, so I do not use Nautilus to draw my desktop. However, even under this configuration, Nautilus used to run fine as a "regular" user. The permissions for Nautilus are the same as the other packages in /usr/bin. I believe this is a Gnome issue, but I'm fumbling at this point.

    Read the article

  • Standard F* keys need holding Fn key on Compaq CQ62

    - by Chandru
    I got a Compaq CQ62 laptop recently. I find that I have to hold down the Fn keys to use the standard F* keys while accessing the special functionalities like media keys does not. This is frustrating as the standard keys are used more often the special functions. Is there anyway to fix it so that it behaves like other sane laptops out there? I use Ubuntu Lucid, but this behavior is present on laptops running Windows 7 too.

    Read the article

  • sql server 2008 insert statement question

    - by user61752
    I am learning sql server 2008 t-sql. To insert a varchar type, I just need to insert a string 'abc', but for nvarchar type, I need to add N in front (N'abc'). I have a table employee, it has 2 fields, firstname and lastname, they are both nvarchar(20). insert into employee values('abc', 'def'); I test it, it works, seems like N is not required. Why we need to add N in front for nvarchar type, what's the pro or con if we are not using it?

    Read the article

  • laptop and it drastically reduces the performance of my machine as the Indexer is constantly running

    - by Sakthy
    I get the below error on my laptop and it drastically reduces the performance of my machine as the Indexer is constantly running. Please identify a solution except re-installation ? Faulting application name: SearchIndexer.exe, version: 7.0.7600.16385, time stamp: 0x4a5bcdd0 Faulting module name: TQUERY.DLL, version: 7.0.7600.16385, time stamp: 0x4a5bdb21 Exception code: 0xc0000006 Fault offset: 0x0002e5c2 Faulting process id: 0xbe0 Faulting application start time: 0x01cd0752bd78cce1 Faulting application path: C:\Windows\system32\SearchIndexer.exe Faulting module path: C:\Windows\system32\TQUERY.DLL Report Id: 16ce8a2f-7346-11e1-840a-a92a5ee507c3 EventID: 1000

    Read the article

  • Fail2ban memory usage

    - by ltsstar
    Since my server is under a sustain DNS amplification attack (DDOS), I configured fail2ban and initially my outgoing traffic dropped markedly. Anyway, after a few hours (mostly +10), fail2ban uses about 75% ram and seems to be crashed in some way, because the outgoing traffic raises imediatly after. When I searched the web for the memory problem, I found some people complaining about high fail2ban memory usages as well. But the recommended solution, to insert an ulimit command into a fail2ban config file, did not change that much for me.

    Read the article

  • Erase personal date from corporate laptop

    - by microspino
    Hello I need to delete my data from the company laptop. Nothing special just 2 or 3 folders (I hava a Dropbox on this pc) and I'd like to be sure they are gone. I read about free tools and bootable cd to erase the entire disk, I don't need those but just a free tool to put some zeros wehere my data were before.

    Read the article

  • Question about creating a sprite based 2-D Side Scroller with scaling/zooming

    - by Arthur
    I'm just wondering if anyone can offer any advice on how best to go about creating a 2-D game with zooming/scaling features akin to the early Samurai Showdown games. In this case it would be a side scroller a la Metal Slug, the zooming would come in as more enemy sprites entered the screen, or when facing a large sized boss. A feature that would be both cosmetic as well as functional to the game. I've done some reading and noticed a few suggestions that included drawing different sized sprites, a standard size and zoomed out size. Any thoughts? Thanks for your time.

    Read the article

  • Not your typical Permission Denied Question

    - by Todd
    I recently reinstalled Ubuntu 11.10 (64 Bit) on my computer. (My hard drive took a powder) Before, I could "mv" files around with the command. Now when I try I get the permission denied message. I also get the message about "man sudo" when I open my terminal. I am pretty sure I did not get that before. Can I add a user/administrator and change something in my orginal admin that I cannot change myself? I am getting really frustrated with this. I do not recall having the same problem before. I tried qksudo nautilus and it appears to run then it sits there with the cursor blinking but does not move.

    Read the article

  • Domain in PENDINGDELETE, question about drop

    - by kcdwayne
    A domain I want is in the pendingDelete stage according to WHOIS. I have been monitoring it since redemptionPeriod, and it entered into pendingDelete 5 days ago today. After checking a few services (SnapNames, etc), they report it is scheduled to drop on the 11th (7 days, by my calculations). I'm not quite sure what to believe. The domain isn't highly valuable. It is to me and one other company. I can see no backorders placed on the big name sites, so I'm thinking of trying to get it without a backorder service. Any insight as to when it will actually drop? I've read 11AM-2PM PST, but I'm unsure. Thanks.

    Read the article

  • Question Virtual Network and NAT set-up

    - by Jay
    Hi Guys! I need some help. I'm completely new to Linux. I'm trying to set up the following scenario: +-----+eth0 +-----+ +---+ | VM2 |-----------| VM1 |---------------| H | +-----+ eth1 +-----+eth0 (NAT) +---+ VM2 - Virtual machine from Virtual Box, using Ubuntu VM1 - Virtual machine from Virtual Box, using Ubuntu: I want this to act as a NAT. H - Host, my Windows Vista The dots were just added since after saving the spaces disappear. So if I ping H from VM2, H would receive a different IP address from VM2. Could you give me a step by step on this? All machines are of course 32 bit. Thanks. Would appreciate the help so much.

    Read the article

  • Dual-boot question involving separate HD and windows 8

    - by user286976
    I use an external HD with Ubuntu+GRUB on it. This allows me to effectively "hijack" most systems. Basically it's a permanent LiveUSB - my own system wherever I go. I use it for recovery mainly when Windows systems muck up, and for portability (as I can have my system on the go, without effecting the pc I'm borrowing, much like a LiveCD). I'm about to update to Windows 8 now [on a new, different computer]. Is there any special measure I should take to do this? I've seen a similar post here, but the OP had both harddrives plugged in simultaneously - that's not exactly my setup. Thank you :) EDIT: added for clarification that this is for a totally new computer.

    Read the article

  • WINAPI beginner guidance question

    - by gekod
    I'm learning to develop windows applications using WINAPI and plain C. Now I got a bit confused with all those handles and would like to ask if you guys could teach me some good practices to structure and handle controls and windows. Here's where I get confused: Using the IDs declared in the resources for each object, we can get their handles using GetDlgItem(). Now what if we don't know their parent, which is needed by this function. One example: We have the main window created at launch. Then we register two new window classes and create a window for each new class and we create a message function for each too. Now if inside one of the children windows I create a button and inside the other child window I create a text label. Now when we click the button inside of child window A the label in child window B shall be modified to whatever. The WM_COMMAND for the button is interpreted inside the message loop for child window A. Now what would be the best and more elegant way to access the text label inside the child window B? I am in the process of learning the WINAPI and just want to learn it right from the start instead of producing Hacked code that someday becomes unreadable and to later have to adapt to a new way of programing.

    Read the article

  • Question about modeling with MVC (the pattern, not the MS stuff / non web)

    - by paul
    I'm working on an application in which I'm looking to employ the MVC pattern, but I've come up against a design decision point I could use some help with. My application is going to deal with the design of state-machines. Currently the MVC model holds information about the machine's states, inputs, outputs, etc. The view is going to show a diagram for the machine, graphically allowing the user to add new states, establish transitions, and put the states in a pleasing arrangement, among other things. I would like to store part of the diagram's state (e.g. the x and y state positions) when the machine information is stored for later retrieval, and am wondering how best to go about structuring the model(s?) for this. It seems like this UI information is more closely related to the view than to the state-machine model, so I was thinking that a secondary model might be in order, but I am reluctant to pursue this route because of the added complexity. Adding this information to the current model doesn't seem the right way to go about it either. This is the my first time using the MVC pattern so I'm still figuring things out. Any input would be appreciated.

    Read the article

  • Basic memcached question

    - by Aadith
    I have been reading up on distributed hashing. I learnt that consistent hashing is used for distributing the keys among cache machines. I also learnt that, a key is duplicated on mutiple caches to handle failure of cache hosts. But what I have come across on memcached doesn't seem to be in alignment with all this. I read that all cache nodes are independent of each other and that if a cache goes down, requests go to DB. Theres no mention of cache miss on a host resulting in the host directing the request to another host which could either be holding the key or is nearer to the key. Can you please tell me how these two fit together? Is memcached a very preliminary form of distributed hashing which doesnt have much sophistication?

    Read the article

  • DELL Inspiron N 5050 doesn't Power On until I Plug-in the Charger

    - by hannanessay
    I bought a Dell Inspiron N 5050 last week, and recently discovered a problem with my laptop. It doesn't Power On until and unless I Plug-in the charger. After I plug-in the charger, it boots up fine, and continues to work well after disconnecting the charger. I don't know what the problem is exactly? I was planning to contact Customer Care, but I wanted to know if I could fix it myself. Please help!

    Read the article

  • Question: Why switch to Linux or a Mac?

    <b>Sure, It's Secure:</b> "I'm no friend to Windows. I know the operating system too well to trust it. But, I did think that even though Windows is defective by design, you could keep it relatively safe by installing patches quickly and using anti-virus software religiously. I was wrong."

    Read the article

  • Shared memory multiprocesses

    - by poly
    I'm building an multi processes application and I need to save session ID, the sessions ID is 32 bit, and of course it can't be used twice in its lifetime, I'm currently using DB that saves all the ID in a table, and I do the following, ID table is (int key, char used(1)) //1 is used, 0 is not 1. lock table 2. get one key for one sessions 3. update used field in it to used 4. unlock After the session is finished the process use below to free key, 1. lock table 2. update used field in it to not used 4. unlock I'm really wondering whether this is a good/fast implementation. and please note it's multi processes application.

    Read the article

  • Laptop powering off after 10 mins or so

    - by Jack
    I have no OS installed, and I am trying to use a linux boot disc. However it is not a linux problem....if I just leave the computer on at the no operating system found message, it still turns off. I thought maybe it was overheating, but I am 90% sure that is not the problem. What else could cause this? I should have mentioned, it's a laptop.

    Read the article

  • Simple mod_rewrite Question

    - by user5358
    Hello, I want to have everything that looks like this: /1/2/3/4/5/[...] to redirect to this: /index.php?u=/1/2/3/4/5/[...] unless the requested string is a specific file. So anything that doesn't have a ".", I want to redirect to "index.php?u=[...]". I'll then parse the URI segments in PHP to determine what the user is requesting. I've been looking around for how to do this, but have only a very rough understanding of regular expressions and have been unable to find an example of how to do it. Thanks!

    Read the article

  • How to enable CD/DVD drive? It is not listed in "My Computer"!

    - by Senthil
    Hi, I just got a laptop from a friend. The CD/DVD drive is not present in "My Computer"! But the tray comes out when I press the button and everything. I remember long time ago, enabling it by changing some registry value, but I forgot which one. Can someone help me enable my CD/DVD drive? Thanks. [P.S. I have administrator privileges]

    Read the article

< Previous Page | 128 129 130 131 132 133 134 135 136 137 138 139  | Next Page >