Search Results

Search found 21349 results on 854 pages for 'thought space designs'.

Page 178/854 | < Previous Page | 174 175 176 177 178 179 180 181 182 183 184 185  | Next Page >

  • Keyboard similar to laptop keyboards for a desktop

    - by Yktula
    I want to use a keyboard that requires minimal effort pushing down with minimal (if any at all) space between keys. I like the new Apple keyboards, but I want something closer to the feel of a laptop keyboard (the keys on the Apple keyboards are still raised up a bit). Are there any that fit this description?

    Read the article

  • No mysql password under linux?

    - by ripper234
    I was told that mysql user, similar to root user, by default "has no password". Not an empty password, but rather "no password". I wasn't aware this situation was possible - I thought every user on a linux had to have a password. Am I wrong? Can you point me to a link that explain this?

    Read the article

  • Limit share size at LaCie d2 Network

    - by zote
    I share an LaCie d2 Network with my brother. We an planning to have 3 shares: 1000gb public and 250 for each of us. The shares are created, but how can I set limit (quota) of some share, to prevent I get all NAS space?

    Read the article

  • Why is Flash power-hungry?

    - by Doug
    Apple historically argued that Flash was power-hungry, which made it inappropriate for use on mobile devices. I always thought that was just bluster excusing Apple's exclusion of Flash support from their mobile devices. But now I see that Adobe acknowledges that Flash is a pig. Why is it a pig? Are there bad programming approaches (that can be explained in layman's terms) that make it so power-hungry?

    Read the article

  • Any Y2K10 bugs?

    - by petertonoli
    There seem to have been few year 2010 bugs cropping up in real life (EFTPOS machines belonging to BoQ in Australia thought it was 2016) as well as the SpamAssassin hiccup - have there been any other serverfault-like issues occurring as a result ?

    Read the article

  • UID/username lookup on IBM z/os USS

    - by jgrump2012
    How can I associate a UID to a specific username on IBM z/OS Unix System Services? Within USS, I see content created in my user space which I do not own. File ownership lists a three digit numerical value, rather than a userid, which I presume to be a UID. I've unsuccessfully attempted to make a username association using commands: tsocmd "search class(USER) uid(###)" tsocmd "rlist unixmap u### all"

    Read the article

  • Web Host Recommendations

    - by Jon B
    I'm presently using web.com for website hosting. I've had some so-so experiences, and think they are a little overpriced. We have a fairly simple website - no e-commerce. We do need plenty of storage space, though. What web hosts are people happy with?

    Read the article

  • which collaborative tools do you use to communicate between team members

    - by john
    I work for a small company and would like to set up some sort of a collaborative tool so that team members can share thoughts, upload documents...something like sharepoint maybe, but not that suffisticated. Only good option I've seen so far is joomla CMS. Just want to get an opinion of the community on which tools they have used for these purposes. I know this is not programming related but I thought stackoverflow community would be good to get an opinion on this.

    Read the article

  • Connecting via Ethernet on second AirPort Extreme

    - by b-b
    Would It be possible to connec my xbox 360 to a second AirPort Extreme, wherein this AirPort Extreme is wirelessly linked to the first? I assume it is and is straight forward, but I thought I'd ask first. Also, would an Ethernet to a second AirPort Extreme be any faster than, say, a dual band wifi connection from a MacBook? Obviously environmental factors play in, but I'm mostly curious about the relative receiving strength of the airport vs laptop.

    Read the article

  • Refer to the same footnote multiple times in Pages '09

    - by Zsub
    I would like to refer to the same footnote multiple times in Pages '09. What it does now, is create a new (identical except for the little number) footnote. So I have three or four identical footnotes which is a waste of space. it looks like this: These are the first1, second2 and third3 references, all numbers referring to their own (further identical) footnotes. I would like to have it like this: These are the first1, second1 and third1 references, all numbers referring to the same footnote.

    Read the article

  • Focus issues in OS X Spaces

    - by AK
    Spaces rarely returns focus to my last used window. Haven't been able to peg universally reproducible steps, but spend any time switching among spaces and windows and you'll come across this. It often happens with Finder windows. I'm thinking this is because Mac OS X treats Finder as a single app, so bringing Finder forward in one space brings it forward in all spaces. Extremely annoying! Anyone have a fix for this?

    Read the article

  • SQL Server Log File Size Management

    - by Rob
    I have all my databases in full recovery and have the log backups happening every 15 minutes so my log files are usually pretty small. question is if there is a nightly operation that causes lots of transactions to happen and causes my log files to grow, should i shrink them back down afterward? Does having a gigantic log file negatively affect the database performance? Disk space isn't an issue at this time.

    Read the article

  • How can I force a merge of all WAL files in pg_xlog back into my base "data" directory?

    - by Zac B
    Question: Is there a way to tell Postgres (9.2) to "merge all WAL files in pg_xlog back into the non-WAL data files, and then delete all WAL files successfully merged?" I would like to be able to "force" this operation; i.e. checkpoint_segments or archiving settings should be ignored. The filesystem WAL buffer (pg_xlog) directory should be emptied, or nearly emptied. It's fine if some or all of the space consumed by the pg_xlog directory is then consumed by the data directory; our DBA has asked for WAL database backups without any backlogged WALs, but space consumption is not a concern. Having near-zero WAL activity during this operation is a fine constraint. I can ensure that the database server is either shut down or not connectible (zero user-generated transaction load) during this process. Essentially, I'd like Postgres to ignore archiving/checkpoint retention policies temporarily, and flush all WAL activity to the core database files, leaving pg_xlog in the same state as if the database were recently created--with very few WAL files. What I've Tried: I know that the pg_basebackup utility performs something like this (it generates an almost-all-WALs-merged copy of a Postgres instance's data directory), but we aren't ready to use it on all our systems yet, as we are still testing replication settings; I'm hoping for a more short-term solution. I've tried issuing CHECKPOINT commands, but they just recycle one WAL file and replace it with another (that is, if they do anything at all; if I issue them during database idle time, they do nothing). pg_switch_xlog() similarly just forces a switch to the next log segment; it doesn't flush all queued/buffered segments. I've also played with the pg_resetxlog utility. That utility sort of does what I want, but all of its usage docs seem to indicate that it destroys (rather than flushing out of the transaction log and into the main data files) some or all of the WAL data. Is that impression accurate? If not, can I use pg_resetxlog during a zero-WAL-activity period to force a flush of all queued WAL data to non-WAL data? If the answer to that is negative, how can I achieve this goal? Thanks!

    Read the article

  • How do I kill CruiseControl?

    - by Adam Fraser
    I just went to run cruisecontrol only to find that it's already running when I thought it shut itself down. For some reason I can't find the pid for cruisecontrol with ps -e in order to use kill. How can I kill this?

    Read the article

  • "Hostile" network in the company - please comment on a security setup

    - by TomTom
    I have a little specific problem here that I want (need) to solve in a satisfactory way. My company has multiple (IPv4) networks that are controlled by our router sitting in the middle. Typical smaller shop setup. There is now one additional network that has an IP Range OUTSIDE of our control, connected to the internet with another router OUTSIDE of our control. Call it a project network that is part of another companies network and combined via VPN they set up. This means: They control the router that is used for this network and They can reconfigure things so that they can access the machines in this network. The network is physically split on our end through some VLAN capable switches as it covers three locations. At one end there is the router the other company controls. I Need / want to give the machines used in this network access to my company network. In fact, it may be good to make them part of my active directory domain. The people working on those machines are part of my company. BUT - I need to do so without compromising the security of my company network from outside influence. Any sort of router integration using the externally controlled router is out by this idea So, my idea is this: We accept the IPv4 address space and network topology in this network is not under our control. We seek alternatives to integrate those machines into our company network. The 2 concepts I came up with are: Use some sort of VPN - have the machines log into VPN. Thanks to them using modern windows, this could be transparent DirectAccess. This essentially treats the other IP space not different than any restaurant network a laptop of the company goes in. Alternatively - establish IPv6 routing to this ethernet segment. But - and this is a trick - block all IPv6 packets in the switch before they hit the third party controlled router, so that even IF they turn on IPv6 on that thing (not used now, but they could do it) they would get not a single packet. The switch can nicely do that by pulling all IPv6 traffic coming to that port into a separate VLAN (based on ethernet protocol type). Anyone sees a problem with using he switch to isolate the outer from IPv6? Any security hole? It is sad we have to treat this network as hostile - would be a lot easier - but the support personnel there is of "known dubious quality" and the legal side is clear - we can not fulfill our obligations when we integrate them into our company while they are under a jurisdiction we don't have a say in.

    Read the article

  • Good Linux disaster-ready filesystem?

    - by Felipe Solís
    I'm working on this emergency open wi-fi network project and it includes a local website (nginx + MySQL). In order to eliminate SPOFs, we're going to setup at least two of everything (server, switch, router, etc.). This network is thought to work when an earthquake strikes and it's very likely to a server to go to down, if so, we need to be able to boot them up and be operating as soon as possible. Do any of you know if any linux filesystem would work better than others in this scenario?

    Read the article

  • Adding Windows XP on a macbook pro running MacOS and Ubuntu

    - by Matthieu
    My Macbook Pro already dual boots MacOSX or Ubuntu with ReFit. I would like to add Windows 7 in the mix. I can make enough space in the Mac partition to accomodate that, but just want to be sure the Windows installation is not going to wipe out anything and I will still be able to access both OS. Anything else to watch out for is welcome. (Sorry for not posting a question about an actual problem, but I figured that when I have a problem, it will just be too late).

    Read the article

  • Not able to Defrag my drive for shrink even using PerfectDisk on Windows 7

    - by Mithun Sasidharan
    I want to partition my c drive which has over 450gb capacity of which hardly 30gb is being used. I deleted the pagefile.sys and also disabled hibernate and cache memory. I then defragmented and consolidated free space using PerfectDisk 12 and also run a boot time defragmented. Now what remains is Metadata files that preventing me from shrinking the volume beyond half the size if disk. Please tell me what to do?????

    Read the article

< Previous Page | 174 175 176 177 178 179 180 181 182 183 184 185  | Next Page >