Search Results

Search found 11904 results on 477 pages for 'non umemoto'.

Page 180/477 | < Previous Page | 176 177 178 179 180 181 182 183 184 185 186 187  | Next Page >

  • L'Hadopi serait "prête à entrer en fonction" selon ses membres, pourtant son organisation ne semble

    Mise à jour du 04.05.2010 par Katleen L'Hadopi serait "prête à entrer en fonction" selon ses membres, pourtant son organisation ne semble pas l'être Hier soir s'est tenue une conférence de presse sur les avancées du dispositif de l'Hadopi. Ses responsables le présentent comme "prêt à entrer en fonction". Pourtant, quelques points essentiels ne sont pas réglés. Déjà, les premiers e-mails d'avertissement seront envoyés d'ici à fin juin, et non fin avril comme il devait en être initialement. En plus, 4 décrets d'applications manquent encore à l'appel. Ils sont indispensables pour que la loi puisse entrer en vigueur, et on les attend toujours... Au...

    Read the article

  • Les personnels IT pas assez qualifiés ? Oui, pour 93% des employeurs d'après un rapport de la Computing Technology Industry Association

    Les employés en informatique pas assez qualifiés pour 93% des employeurs Selon un rapport établi par la Computing Technology Industry Association La Computing Technology Industry Association, CompTIA, est un organisme à but non lucratif fondé en 1982 par 5 professionnels de l'industrie informatique. L'association s'est intéressée dans son dernier rapport aux employés travaillant dans le domaine des technologies de l'information et de la communication. Pour ce faire, elle a interrogé 500 patrons et responsables informatiques de grandes, moyennes et petites entreprises sur les compétences de leurs employés en informatique. Des employeurs du Canada, du Japon, de l'Afrique du ...

    Read the article

  • YaCy : le moteur de recherche open source et Peer-2-Peer en version 1.0, son réseau sécurisé indexe 1.4 milliard de documents

    YaCy : le moteur de recherche open source et Peer-2-Peer en version 1.0 Son réseau sécurisé totalise 1.4 milliard de documents indexés Nombre de moteurs de recherche émergents tentent de se distinguer des courants dominants par un meilleur respect de la vie privée et le non-traçage des utilisateurs. Mais il existe des alternatives qui vont encore plus loin dans ce domaine. YaCy sort aujourd'hui en version 1.0 après cinq années de développement. Il s'agit d'un moteur de recherche libre et décentralisé, permettant à chacun d'indexer une partie du Web (ou d'un Intranet) et de lancer des recherches sur son propre index ou sur l'ensemble des données disponibles sur son réseau Peer-2-Peer grand...

    Read the article

  • Should students have the right to do exams using a computer?

    - by vemv
    In some colleges students are let to use an IDE and Internet and in mine you have to write down your solution in paper. As far as I know, it's pretty much impossible to make a correct non-trivial program on the first try. I'd be fine with no using computers if my teachers assessed my approach instead my code -literally-... that's not the case unfortunately. Which ones are more usual, 'written' or 'coded' exams? And which way is the most adequate?

    Read the article

  • Emacs-like keybindings system-wide?

    - by kermit666
    Is there a way to set Emacs-like keyboard shortcuts (at least the subset mentioned below) for the whole OS? This is possible in some apps such as the terminal, Emacs (go figure :) and additionally through special plugins in some other apps (Eclipse), but I got so used to C-f-ing through text and never having to jump to arrows that I'd like to be able to do this system-wide so that I can do it whenever I'm typing - e.g. searching for songs in Rhythmbox, typing stuff into the dash or the HUD, writing mails in Thunderbird or Gmail... The combos I'm most interested in are: C-f - forward C-b - backwards C-a - home C-e - end C-d - delete C-k - delete line (note for non-emacs users - C means Ctrl)

    Read the article

  • Authentication error when trying to upgrade from 11.10 to 12.04

    - by mahmuodmasri
    I wrote : ~$ do-release-upgrade and the system says: Checking for a new ubuntu release Get:1 Upgrade tool signature [198 B] Get:2 Upgrade tool [1551 kB] Fetched 1551 kB in 6s (167 kB/s) extracting 'precise.tar.gz' authenticate 'precise.tar.gz' against 'precise.tar.gz.gpg' exception from gpg: GnuPG exited non-zero, with code 2 Debug information: gpg: Signature made Thu 11 Oct 2012 07:47:10 AM EET using DSA key ID 437D05B5 gpg: can't open `/etc/apt/trusted.gpg' gpg: keydb_search failed: file open error gpg: Can't check signature: public key not found Authentication failed Authenticating the upgrade failed. There may be a problem with the network or with the server. Please help me!

    Read the article

  • Rejoining two partitions

    - by Alex
    I was courious about Ubuntu so I decided I would give it a chance, therefore I installed it on a parition on my harddrive. Now a couple of months later I haven't used windows once so i decided to go with ubuntu only. I deleted my windows partition with GParted and thought that it was all good. BUT the now formated diskspace that used to be home to windows is now only a formated partition. How do I connect it to the partition where my ubuntu installation lays iow go back to having a non parted hard drive?

    Read the article

  • In addition to Google's First Flick Free, should you whitelist search engine bots past a paywall?

    - by tobek
    Our site has subscription-only pages - non-subscribed visitors see a snippet preview. As per Google's FCF requirements, your first 5 hits to a subscriber-only pages with .google. as the referrer, you see the full page. In addition to this, should we whitelist search engine bots so that they can index the full content? I assume this is not required for Google, which can use FCF to index our content, but what about other search engines? Is this considered cloaking? My gut says that whitelisting bots past the paywall is bad practice., but I wanted to confirm - any evidence or references would be amazing.

    Read the article

  • Whether to use -pedantic flag in g++ or not?

    - by user803563
    I'm learning C++ and I'm using g++ on Linux for practicing. 1) I want to know if people working as programmers use g++ -pedantic flag and also it's importance in real world. 2) What about other compilers, do they also allow this? Has this become some de-facto standard? I'm interested because I'm reading C++ Primer where the author points that its illegal to use non-const expression as dimension in array definition and g++ by default allows it. And there might be other things I'm unaware of.

    Read the article

  • When to use event.initMouseEvent for simulating mouse clicks?

    - by Protector one
    I wonder if there are benign use-cases for simulating mouse clicks using event.initMouseEvent. I found that it is used for creating pop-under ads in the following way: var e = document.createEvent('MouseEvents'); e.initMouseEvent('click', true, true, window, 0, 0, 0, 0, 0, true, false, false, true, 0, null); a.dispatchEvent(e); This code simulates a click on the opening browser window, to force the newly opened window beneath it. Evil. I'm thinking of simply preventing all simulated clicks in my own browser via a browser extension, but I wonder if I might break useful websites and behavior in the process. Therefore I wonder what situations justify simulating mouse clicks, and if there are big sites that use it in non-evil ways.

    Read the article

  • iOS 4.3 est disponible en version bêta, elle apporte le tactile à cinq doigts et transforme les iPhones en spots Wi-Fi

    iOS 4.3 est disponible en version bêta, elle apporte le tactile à cinq doigts et peut transformer les iPhones en spots Wi-Fi Apple vient de rendre disponible, hier soir, la nouvelle version bêta de son système d'exploitation mobile. iOS 4.3 bêta apporte son lot de nouveautés et semble très prometteuse pour les développeurs, qui y découvrent de nombreux et variés potentiels. D'abord, l'accès à AirPlay (plateforme streaming) sera possible pour les tiers et compatible avec les applications des développeurs indépendants, et non plus seulement à quelques applications de la firme comme Safari ou YouTube. Egalement, les possibilités multitouch d'iOS 4.3 se voient renforcée, avec l'apparition de nouvelles poss...

    Read the article

  • A drop in SERP after following webmaster guidelines [on hold]

    - by digiwig
    So here's a puzzle for all you SEO gurus out there. I recently launched my own site. I had target keywords which were ranking very well for about 1 month, within the top five and even appearing in first place. In an attempt to maintain good positioning, I followed guidelines by adding robots.txt, an xml sitemap redirecting non-www to www redirecting index.php to root domain adding htaccess 301 redirect for old pages I added rich snippets created a google+ account, verified my picture to appear, I went through each of the webmaster issues with duplicate titles and meta descriptions and improved header tag document outlines i even created a few more blog posts to keep the content freshing and moving. So now my website appears on page 2 with my target keywords - and all because I followed the guidelines. What is happening? I see competitors with stagnant content superglued to position 1.

    Read the article

  • Collisions and Lists

    - by user50635
    I've run into an issue that breaks my collisions. Here's my method: Gather Input Project Rectangle Check for intersection and ispassable Update The update method is built on object_position * seconds_passed * velocity * speed. Input changes velocity and is normalized if 1. This method works well with just one object comparison, however I pass a list or a for loop to the collision detector and velocity gets changed back to a non zero when the list hits an object that passes the test and the object can pass through. Any solutions would be much appreciated. Side note is there a more proper way to simulate movement?

    Read the article

  • Where is the best place to start projects and attract developers?

    - by user49557
    I want to develop software for Linux or cross-platform. I want to work with other open-source and non-profit developers. I want a place where Ubuntu or other developers come to start open-source or commercial projects, and we can join the projects or start our own projects. I know there are social coding sites, but where can I start the project, and invite people or let people join? Then we can submit software to sourceforge.net. I know we can start projects at sourceforge.net, but is there anything more dedicated for Ubuntu developers, especially for Ubuntu and for the Ubuntu Software Center? Would you recommend Launchpad, sourceforge.net, github, gitorous or others?

    Read the article

  • Video Bug in Ubuntu 12.10 MSI CX623 laptop

    - by user104731
    http://www.youtube.com/watch?v=5xyJkS8XjgA&feature=youtu.be I managed to take a video with what happens on my Ubuntu 12.10 laptop when I play with the volume and hover with the mouse over the slider and when I press Ctrl + Alt + D (show Desktop/minimize all) The real bugs are those in which the panel becomes transparent on the down side, exactly above the volume slider (and not only when that slider appears, but also when brightness slider appears, and when blocking my touchpad applet appears) and when I have a maximized window, more maximized windows or a non maximized window that touches the panel, while I use Ctrl+Alt+D (show Desktop/hide all normal windows). Is there a way to solve this bug? PS: The other bugs are from Record My Desktop. I didn't have the mentioned bugs in ubuntu 12.04, but I like more the graphics in 12.10.

    Read the article

  • using static methods and classes

    - by vedant1811
    I know that static methods/variables are associated with the class and not the objects of the class and are useful in situations when we need to keep count of, say the number of objects of the class that were created. Non-static members on the other hand may need to work on the specific object (i.e. to use the variables initialized by the constructor) My question what should we do when we need neither of the functionalities? Say I just need a utility function that accepts value(s) and returns a value besed solely on the values passed. I want to know whether such methods should be static or not. How is programming efficiency affected and which is a better coding practice/convention and why. PS: I don't want to spark off a debate, I just want a subjective answer and/or references.

    Read the article

  • Can't open any of my drives/devices(not USB drive)

    - by Anontu
    I can't open any of my computer drives (:c/,:d/.....) Every time i tried to open the drives, the following notice appeared: (i'm new in Ask Ubuntu,so,i can't upload the snapshot,i need 10 reputations to do that) **Unable to access "__ Volume"** error mounting/dev/sda7at/media/MyPC/__Volume:Command-Line 'mount-t "ntfs"-o "uhelper=udisk2,nodev,nosuid,uid=1000,gid=1000,dmask=0077,fmask=0177""/ dev/sda7""/media/MyPC/__Volume"' exited with non-zero exit status 14:The disk contains an unclean file system (0,0).| Metadata Kept in Windows cache,refused to mount. Failed to mount '/dev/sda7':Operation not permitted The NTFS partition is in an unsafe state.Please,resume and shutdown Windows fully(no hibernation or fast restarting),or mount the volume read-only with the 'ro' mount option. I have Windows side by side Ubuntu 13.04 in my computer and i have done (like-Shutting down Windows properly...) things as these in the notice. But it's not working.

    Read the article

  • La RC de Internet Explorer 9 disponible pour la clôture des TechDays 2011, téléchargez-là et faîtes nous part de vos avis

    La RC de IE9 est disponible Avec Do Not Track, le support de WebM et met encore plus l'accent sur la sécurité Microsoft vient d'annoncer l'arrivée de la Release Candidate de IE9. Une nouvelle qui clôt en beauté les TechDays 2011, son salon dédiée cette année au Cloud Computing. Avec cette nouvelle étape, Internet Explorer 9 intègre toutes ses fonctionnalités finales. Il ne reste plus à l'équipe du projet qu'à corriger les bogues et les dernières imperfections avant la sortie officielle. Cette RC bénéficie d'un très léger toilettage de l'UI avec des onglets carrés (et non plus aux angles arrondies) qui peuvent à présent être placés en dessous d...

    Read the article

  • What kind of math should I be expecting in advanced programming?

    - by I_Question_Things_Deeply
    And I don't mean just space shooters and such, because in non-3D environments it's obvious that not much beyond elementary math is needed to implement. Most of the programming in 2D games is mostly going to involve basic arithmetic, algorithms for enemy AI and dimensional worlds, rotation, and maybe some Algebra as well depending on how you want to design. But I ask because I'm not really gifted with math at all. I get frustrated and worn out just by doing Pre-Algebra, so Algebra 2 and Calculus would likely be futile for me. I guess I'm not so "right-brained" when it comes down to pure numbers and math formulas, but the bad part is that I'm no art-expert either. What do you people here suppose I should do? Go along avoiding as much of the extremely difficult maths I can't fathom, or try to ease into more complex math as I excel at programming?

    Read the article

  • Une vulnérabilité du Marketplace de Windows Phone 7 dévoilée permet de télécharger illégalement des applications, un PoC est publié

    Une vulnérabilité du Marketplace de Windows Phone 7 permet de télécharger illégalement des applications, un PoC est publié Une vulnérabilité du Marketplace de Windows Phone 7 qui permet de télécharger et d'installer sans autorisations les applications disponibles sur la galerie vient d'être divulguée. Microsoft aurait été informé de cette faille de sécurité bien avant la divulgation d'une vidéo sous forme de proof-of-concept. Les hackers à l'origine de cette vidéo affirme que leur souci est de défendre les développeurs d'applications piratées sur le Marketplace et de non promouvoir le piratage. « Nous sommes condamnés par beaucoup de « promouvoir la piraterie », ...

    Read the article

  • Getting wireless N to work on Dell Vostro 3300?

    - by luisfpg
    I have a Dell Vostro 3300, which has a Broadcom BCM4313 wireless. The point is that I cannot make it work in N mode. NetwotkManager applet says I'm on 54 Mbit/s. Of course, my wireless router is N capable. I've double checked. Anyone knows what to do? Here is the output for lspci -v: 12:00.0 Network controller: Broadcom Corporation BCM4313 802.11b/g/n Wireless LAN Controller (rev 01) Subsystem: Dell Device 0010 Flags: bus master, fast devsel, latency 0, IRQ 17 Memory at fbb00000 (64-bit, non-prefetchable) [size=16K] Capabilities: <access denied> Kernel driver in use: wl Kernel modules: wl, brcm80211 Thanks a lot.

    Read the article

  • La Chine concurrence Apple avec l'iPed, une tablette 5 fois moins chère que l'iPad tournant sous And

    La Chine concurrence Apple avec l'iPed, une tablette 5 fois moins chère que l'iPad tournant sous Android Au salon Computex, qui a actuellement lieu à Taïwan, divers constructeurs présentent leurs nouveaux produits. Parmi les nouveaux appareils, plusieurs Tablet PC. Et, parmi ces tablettes... l'iPed. Ce gadget chinois est commercialisé par plusieurs revendeurs chinois. Non content d'emprunter le nom de la tablette d'Apple à une lettre près, il en reprend aussi le design et les icônes (et même l'emballage). Se voulant bon marché et abordable, l'iPed ne coûte que 105 dollars (86 euros, soit cinq fois moins cher que l'original). Pour ce prix, l'appareil est équipé d'un processeur Intel et de l'OS de Google : Android. Mai...

    Read the article

  • Quelles sont pour vous les plus belles applications de bureau développées en Java ? Partagez votre expérience

    Même si les applications Web prennent une part non négligeable dans le développement Java, de nombreuses applications de bureau sont encore très demandées. La plateforme Java via ses nombreuses bibliothèques graphiques (JavaFX, Swing, plateforme Eclipse, ...) permet de réaliser des applications de bureau très abouties. Nous vous invitons à partager les applications de bureau qui vous semblent les plus réussis et les plus à même de montrer la maturité de Java dans tous les domaines. Pour chaque application, merci de préciser un lien et un bref descriptif. A noter qu'un débat similaire avait été proposé il y a quelques années concernant

    Read the article

  • Really, Mobile Devices will Take Over the World?

    - by p.gielens
    My blog has been quiet for quite a while. My inspiration comes from crunching/exchanging information which I should do more often. Gartner analysis tells us that by 2013 mobile phones will overtake PC’s as the most common Web access device worldwide. A few years back I would have said non sense, but apparently most Web users are comfortable with less processing power. Just take a look at the increasing business in Netbooks. Wouldn’t it be great to have a mobile phone which can connect wirelessly to my home TV, monitor, car display, mouse, keyboard, etc? And to have the processing power of the current Netbook generation? Where can I buy it? Why are we making our PC devices (for instance the slate) smaller while we can make our mobile device’s functionality bigger? What about the single responsibility principle? Does it apply to physical devices as well as good object-oriented software?

    Read the article

  • Simple BizTalk Orchestration & Port Tutorial

    - by bosuch
    (This is a reference for a lunch & learn I'm giving at my company) This demo will create a BizTalk process that monitors a directory for an XML file, loads it into an orchestration, and drops it into a different directory. There’s no real processing going on (other than moving the file from one location to another), but this will introduce you to Messages, Orchestrations and Ports. To begin, create a new BizTalk Project names OrchestrationPortDemo: When the solution has been created, right-click the OrchestrationPortDemo solution name and select Add -> New Item. Add a BizTalk Orchestration named DemoOrchestration: Click Add and the orchestration will be created and displayed in the BizTalk Orchestration Designer. The designer allows you to visually create your business processes: Next, you will add a message (the basic unit of communication) to the orchestration. In the Orchestration View, right-click Messages and select New Message. In the message properties window, enter DemoMessage as the Identifier (the name), and select .NET Classes -> System.Xml.XmlDocument for Message Type. This indicates that we’ll be passing a standard Xml document in and out of the orchestration. Next, you will add Send and Receive shapes to the orchestration. From the toolbox, drag a Receive shape onto the orchestration (where it says “Drop a shape from the toolbox here”). Next, drag a Send shape directly below the Receive shape. For the properties of both shapes, select DemoMessage for Message – this indicates we’ll be passing around the message we created earlier. The Operation box will have a red exclamation mark next to it because no port has been specified. We will do this in a minute. On the Receive shape properties, you must be sure to select True for Activate. This indicates that the orchestration will be started upon receipt of a message, rather than being called by another orchestration. If you leave it set to false, when you try to build the application you’ll receive the error “You must specify at least one already-initialized correlation set for a non-activation receive that is on a non self-correlating port.” Now you’ll add ports to the orchestration. Ports specify how your orchestration will send and receive messages. Drag a port from the toolbox to the left-hand Port Surface, and the Port Configuration Wizard launches. For the first port (the receive port), enter the following information: Name: ReceivePort Select the port type to be used for this port: Create a new Port Type Port Type Name: ReceivePortType Port direction of communication: I’ll always be receiving <…> Port binding: Specify later By choosing “Specify later” you are choosing to bind the port (choose where and how it will send or receive its messages) at deployment time via the BizTalk Server Administration console. This allows you to change locations later without building and re-deploying the application. Next, drag a port to the right-hand Port Surface; this will be your send port. Configure it as follows: Name: SendPort Select the port type to be used for this port: Create a new Port Type Port Type Name: SendPortType Port direction of communication: I’ll always be sending <…> Port binding: Specify later Finally, drag the green arrow on the ReceivePort to the Receive_1 shape, and the green arrow on the SendPort to the Send_1 shape. Your orchestration should look like this: Now you have a couple final steps before building and deploying the application. In the Solution Explorer, right-click on OrchestrationPortDemo and select Properties. On the Signing tab, click “Sign the assembly”, and choose <New…> from the drop-down. Enter DemoKey as the Key file name, and deselect “Protect my key file with a password”. This will create the file DemoKey.snk in your solution. Signing the assembly gives it a strong name so that it can be deployed into the global assembly cache (GAC). Next, click the Deployment tab, and enter OrchestrationPortDemo as the Application Name. Save your solution. Click “Build OrchestrationPortDemo”. Your solution should (hopefully!) build with no errors. Click “Deploy OrchestrationPortDemo”. (Note – If you’re running Server 2008, Vista or Win7, you may get an error message. If so, close Visual Studio and run it as an administrator) That’s it! Your application is ready to be configured and fired up in the BizTalk Server Administration console, so stay tuned!

    Read the article

< Previous Page | 176 177 178 179 180 181 182 183 184 185 186 187  | Next Page >