Search Results

Search found 24073 results on 963 pages for 'mount point'.

Page 343/963 | < Previous Page | 339 340 341 342 343 344 345 346 347 348 349 350  | Next Page >

  • How to make a jar file run on startup & and when you log out?

    - by RanZilber
    I have no idea where to start looking. I've been reading about daemons and didn't understand the concept. More details : I've been writing a crawler which never stops and crawlers over RSS in the internet. The crawler has been written in java - therefore its a jar right now. I'm an administrator on a machine that has Ubuntu 11.04 . There is some chances for the machine to crash , so I'd like the crawler to run every time you startup the machine. Furthermore, I'd like it to keep running even when i logged out. I'm not sure this is possible, but most of the time I'm logged out, and I still want to it crawl. Any ideas? Can someone point me in the right direction? Just looking for the simplest solution.

    Read the article

  • INACCESSIBLE_BOOT_DEVICE after installing Linux on same drive

    - by kdgregory
    History: My PC was configured with two drives: an 80G on IDE 0 Primary that was running Win2K, and a 320G on IDE 0 Secondary that was running Linux (Ubuntu). I decided to pull the 80Gb drive out of the system, so dd'd the entire 80 G drive (/dev/sda) onto the 320 (/dev/sdb) -- this included the MBR and partition table. Then I pulled the drive, plugged the 320 into IDE 0 Primary, and rebooted. The Windows partition worked at this point. Then I installed Ubuntu into the remaining space on the 320. It works. However, when I try to boot into Windows, I get a BSOD with the following message: *** STOP: 0x0000007B (0x89055030,0xC000014F,0x00000000,0x00000000) INACCESSILE_BOOT_DEVICE Before the BSOD I see the Win2K splash screen, and it claims to be "starting windows" for a couple of seconds -- so it appears that the first stage boot loader is working as expected. Ditto when I try booting in Safe Mode. After reading the Microsoft KB article, I booted into the recovery console and tried running chkdsk /r. It refused to run, claiming that the drive was corrupted (sorry, didn't write down the exact error message). However, I can mount the drive from Linux, and access all files. And for what it's worth, I can scan the drive using the Linux "Disk Utility" (this is Ubuntu, the menus don't show real program names), it claims the drive to be clean. The KB article mentioned that boot.ini could be the problem, so here it is: timeout=10 default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS [operating systems] multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows 2000 Professional" /fastdetect Any pointers on what to do next?

    Read the article

  • Windows 7 and 11.10 side by side from scratch what am I doing wrong?

    - by Bill.Caffery
    I have tried everything I can think of at this point and I'm at a total loss. I have a 2TB drive I want to install Windows 7 and 11.10 (both are 64 bit) side by side, but once I install Windows it must need gpt to work or something because no matter how many times I've removed it, it always returns. If I use gdisk and set the disk as mbr, Windows won't load. Now this last time I ran gdisk and tried to boot into Windows before I installed Ubuntu all the way and ended up at a grub rescue prompt. Any help please? Also let me say I have been searching and reading for days and have tried everything I can find to make this work so this isn't a one time event, it's continual.

    Read the article

  • How to deal with readers requesting free advice / support on my blog? [closed]

    - by russau
    I have a handful of popular articles on my blog (nothing huge), and they attract the occasional developer who wants help implementing some code grabbed from my blog. Now I'm getting people who haven't made any attempt to learn the code, email me their code, and expect me to trace it through for them. I'm sure anyone with a half-popular blog gets similar requests. What's the best way to deal with this scenario? I want to put together a boilerplate response including these points: How far have you gone with this on your own? (is it any benefit for anyone if I say they are being imposing) I'm happy to help with any problems you find in my code Point them to other forms of help such as stackoverflow, diagnostic tools relevant to the topic.

    Read the article

  • initrd problem and Kernel panics after openSUSE 11.2 upgrade.

    - by unixbhaskar
    Once I have done the upgrade form openSUSE11.1 to openSUSE11.2 by doing this: zypper dup Now I tried to boot the system and it failed sync with VFS and kernel panic, so clearly a initrd problem . if I'm not mistaken. Now a bit of explanation about the problem: while upgrading it shows me the error updating initramfs( I forgot the exact error or might be warning).Oh yeah it shows some grub warning too. I have had been doing that from a chroot environment.. with all the required file mounted in proper place in the chroot environment. Now .after bit googling and painfully looking the susegeek.com forum and opensuse.org forum I have decided to recreate the initrd ...but the fellow called "mkinitrd" is real real crap as I hev been pointed out by few forum members. I tried to make an initrd image by myself, failed to do so .as it shows error that device not found( if I boot into suse live cd and mount the partition ) then I tried from the chrooted env and it says "there is no space left on the device" A bit bemused :( yeah most of you pointed it right may lack of knowledge of mine. Kindly suggest me and show me steps to do it correctly and get opensuse11.2 up and running. TIA

    Read the article

  • Blocked Sites at work (that aren't even bad)

    - by Mercfh
    So here recently, i've been using google to look up information for basically random programming things (i was just hired on a month or so ago). So here recently I was actually looking up some information about RAW_SOCKETS (but thats beside the point) Anyways some of the tutorials sites/explaining how to use them and explaining the protocol sites are actually blocked. (and our manager sent out an email saying that if u run into a site just to email her just in case). Now obviously...w/e sys admins probably see these 'blocked' sites in their reports. But should I be worried? I mean....I literally am not trying to be devious Im just trying to learn stuff. I guess programming websites are sometimes labeled as "hacking". sometimes blogs get labeled like that, but alot of the time blogs have USEFUL information. This apparently happens alot of my other co-workers and they don't even bother emailing our manager.....but should I be worried? Or has this happened to you guys before?

    Read the article

  • How to track opens and pageviews in PDFs?

    - by Osvaldo
    I know how to track clicks in links to pdfs and pfd's downloads. But I need to track how many times a PDF is opened after being downloaded and if possible track how many times certain pages are shown to users. Tracking has to be done without warnings that personal information is being sent somewhere. I do not want readers personal informations, just to know how many opens happened, so this warnings would be inaccurate. Can anyone help by pointing to a tutorial or an example? If you are sure that this can't be done, can you please point to documentation that explains why?

    Read the article

  • What's the best web entrepeneur's conference to go on

    - by user4845
    Our dream as business partners was always to go to a conference overseas. Now that we can finally afford to, we have no clue of which one to go to. Which conference would you guys suggest from a web entrepeneur's point of view, if there were just one to go to? Perhaps something that included a bit of marketing, new thinking, innovation, inspiration. We were very keen on Google IO previously, but were concerned that it would be very Google product focused. Huge thanks!

    Read the article

  • Is there any complications or side effects for changing final field access/visibility modifier from private to protected?

    - by Software Engeneering Learner
    I have a private final field in one class and then I want to address that field in a subclass. I want to change field access/visibility modifier from private to protected, so I don't have to call getField() method from subclass and I can instead address that field directly (which is more clear and cohessive). Will there be any side effects or complications if I change private to protected for a final field? UPDATE: from logical point of view, it's obvious that descendant should be able to directly access all predecessor fields, right? But there are certain constraints that are imposed on private final fields by JVM, like 100% initialization guarantee after construction phase(useful for concurrency) and so on. So I would like to know, by changing from private to protected, won't that or any other constraints be compromised?

    Read the article

  • Internet Explorer 9 : Microsoft répond aux critiques de Mozilla avec un argumentaire sur ce qu'est un « navigateur moderne »

    IE9 : Microsoft répond aux critiques de Mozilla Avec un argumentaire en 4 points sur ce qu'est un « navigateur moderne » Mise à jour du 17/02/11 Après les critiques de Paul Rouget, développeur français chez Mozilla, qui accusait Microsoft d'avoir « deux ans de retard sur la concurrence » (lire ci-avant), Tim Sneath de Microsoft vient de publier un billet dans lequel il liste ce que, d'après lui, les développeurs et les utilisateurs attendent d'un navigateur dit « moderne ». Et chaque point ressemble fort à un pic contre Firefox. Pour lui, un navigateur moderne est « rapide ». Il permet par ailleurs une «...

    Read the article

  • Ubuntu Server 11.10 AMD64: Installation of graphical desktop changes kernel!?

    - by MindGap
    I've a Ubuntu Server 11.10 amd64 installation that needed a graphical desktop to execute some visual apps. While searching for the correct way to achive this, I noticed that there was a lot of people saying that invoquing the gnome desktop installation (apt-get install ubuntu-desktop) would switch from server to desktop kernel. Is this true!? I've checked and the kernel seems to remain unchanged after the install. I need to be sure of this because the desktop flavoured kernel doesn't seem to support the ServeRaid 8K controller sitting on my IBM server and I have no ideia on how to enable support for it. (I'll be grateful if someone could point me a good guide on how to install ubuntu when the storage controller is not detected) Any comment on this matter will be greatly appreciated! Good linuxing!

    Read the article

  • One man software developer product success stories? [on hold]

    - by EugeneKr
    I've got a bad feeling that this question is not appropriate here.. Hopefully you can point me to the right place to ask such a thing (not google though, been there). I want to create my own product, but for some reason have no ideas, so decided to see what people have already done. I would like to start by myself too. I don't mind expanding, but at later stages when it is absolutely necessary. Anyway, to give you an example. There is a guy who created bingo card generation software, then somebody made a wedding planner software and they seem to be doing pretty fine. I would like to know more such cases to draw inspiration from. Do you know such people or maybe you are one of them? Also, if there are places on the net where they dwell, don't hesitate to tell me :) Thanks!

    Read the article

  • AdventureWorks2014 installation script

    - by John Paul Cook
    The AdventureWorks2014 sample database is downloadable from here . If you choose to run the script and are unfamiliar with sqlcmd, this post shows you what to do. Be sure to extract the zip file’s contents to a new folder because the instawdb.sql comes with 72 csv files that contain the actual data. If you specify a folder other than the default, you’ll have to change a path in the instawdb.sql script to point to your directory. Figure 1. instawdb.sql script file in SSMS. Notice the 3 lines that...(read more)

    Read the article

  • How can one get involved in the Ubuntu Brainstorm team?

    - by Jay
    I've heard it thrown around on a lot of blogs that Ubuntu Brainstorm is the "graveyard of good ideas". I have a bit of a passion for average end-users suggesting the kinds of software they want and they way they think their applications and computers could work. I'm interested in joining the Ubuntu Brainstorm team, maybe to facilitate ideas not getting buried and making it not seem like a dead platform. Unfortunately I'm not very plugged into the "community" so I'm not sure how to go about it. I was hoping someone might be able to point me in the right direction. Thanks.

    Read the article

  • Does an inventory limit in an MMORPG make sense?

    - by Philipp
    I am currently developing a simple 2d MMORPG. My current focus is the inventory system. I am currently wondering if I should implement a limit on what a player character can carry. Either in form of a maximum weight, a limited number of inventory slots, or a combination of both. Almost every MMORPG I ever played limits inventory space. But plausibility aside, is this really necessary from a gameplay point of view? Maybe it would in fact improve the game experience when I just let the players carry as much stuff as they want. tl;dr: What is the game development rationale behind limiting carrying capacity of player characters?

    Read the article

  • Quel est le bug le plus récalcitrant que vous ayez rencontré ? Improbable ou impossible à reproduire, racontez-nous tout

    Quel est le bug le plus récalcitrant que vous ayez rencontré ? Improbable ou impossible à reproduire, racontez-nous votre meilleure histoire de débogage Si le débogage est l'art d'enlever les bogues, la programmation doit être l'art de les créer. Une expression chère à beaucoup de développeurs qui souligne à quel point le débogage d'une application peut être important et... problématique. C'est ce que relate Patrick Thomson, un développeur blogueur qui raconte ce qu'il qualifie de "meilleure histoire de débogage qu'il ait jamais entendue". Il s'agit d'une mésaventure vécue dans les année 80 par le père de l'auteur, avec un ordinateur ancestrale ut...

    Read the article

  • Why isn't my touchpad behaving like said in synclient?

    - by pirad
    I use a small skript to get my touchpad doing what it should: synclient LockedDrags=1 PalmDetect=1 PalmMinWidth=200 RightEdge=5340 VertTwoFingerScroll=1 HorizTwoFingerScroll=0 VertEdgeScroll=0 CoastingSpeed=0 LeftEdge=1800 TopEdge=1900 CircularScrolling=1 CircScrollDelta=0.2 CircScrollTrigger=3 TapButton1=1 TapButton3=3 TapButton2=2 & syndaemon -i 1.3 -d -t -R -k And when running synclient everything looks fine. But when I try to scoll, or tap nothing happens. Even after running killall syndaemon nothing happens. Has anybody an idea? I also have a trackpoint. edit: One problem is: It worked at some point on my system (wich I installed just yesterday= but then something changed and I don't know what and since then it doesn't work any more. edit2: Here's the xorg-log part about touchpads: http://paste.ubuntu.com/1042995/

    Read the article

  • Will the MacBook Pro Early 2011 work better with Ubuntu than the Air Late 2010?

    - by AllanCaeg
    I got this late 2010 11" MacBook Air. I'm having issues with NVIDIA graphics, especially with GNOME Shell. I'm thinking about selling this to switch to the new MacBook Pro, particularly the entry level 13" (see specs here), because of the Intel HD Graphics 3000. I assume that it will be more FOSS-friendly. I just want to point out that there are non-negotiable reasons why I'm keeping an Apple hardware at the moment, so let's keep this on topic. Will the MacBook Pro Early 2011 work better with Ubuntu than the Air Late 2010? Any other factors than the graphics hardware? Should we expect better NVIDIA graphics anytime soon?

    Read the article

  • Truecrypt and hidden volumes

    - by user51166
    I would like to know the opinion of some users using (or not) the hidden volume encryption feature of Truecrypt. Personally until now I never used this feature: on Windows I encrypt the system drive as a standard volume, on GNU/Linux I encrypt using LUKS which is Truecrypt's equivalent to standard volume. As for data I use the standard volume approach as well. I read that this feature is nice and all, but it isn't really used by most people. Do you use it or not? Why? Do you only store inside it VERY sensible data or what else? Because technically speaking doing a hidden volume which has (almost) the same size as the outer one doesn't make sense: the outer volume will be encrypted but no data will be on it, which will appear very strange. So not only one has to plan which data store where, but has even to remember each time to mount the outer volume with hidden volume protection (otherwise there'll be a data loss when writing to it). It's a bit messy: hidden OS + outer OS + outer volume + hidden volume = 4 partitions :( Similar question about the hidden operating system (which I don't use [yet]).

    Read the article

  • Easiest Way to Get Started With 3D?

    - by ryebread761
    I'm looking at getting into 3D game development and am wondering what would be the best, quickest engine to get started with. I need to be able to develop on a Macintosh with it. I know Java, and PHP mainly but have worked in many others. At this point, I feel I can adapt to most languages quite easy. So the programming language doesn't really matter to me. I've sorta kinda tried unity in the past and wasn't all too fond of it, so it's kind of a "I can't find anything better" resort. I'm hoping with how open I am I will find something I like more. Thanks in advance.

    Read the article

  • Deleting old system folders from a drive that is no longer the windows installation drive

    - by grenade
    I dropped my laptop and was no longer able to boot. There were error messages about a corrupt boot record. Replacing the hard drive and reinstalling Win 7 was how I dealt with it. The old drive still appears to be good and I can read and write to it when I connect it as a second drive and mount as D:. However, if I try to recover the space being used by the windows, programdata, program files & program files(x86) folders, by deleting them I get error messages about needing permission from trustedinstaller. If I set myself as the owner of the folders and retry the delete I get error messages about needing permission from myself! Since I'm pretty sure that I have permission from myself to delete the folders, I can only assume that the OS or file system has gotten its panties twisted. I have tried shift, right click, delete from explorer and also if I run "del /f /s /q D:\Windows" from an admin command prompt, I get a succession of Access is denied messages as well. How do I delete D:\Windows, D:\ProgramData, D:\Program Files & D:\Program Files(x86) from a drive that is not the Windows installation drive?

    Read the article

  • Best practice, or generally best way to set up web-hosting server, permissions, etc. [closed]

    - by Jagot
    Hi, I'm about to set up a server upon which a friend and I will be hosting web sites, and I'll be using Debian. I've set up a LAMP solution many times just to using for local testing purposes, but never for actual production use. I was wondering what are the best practices are in terms of setting the server up, in reference specifically to accessing the web root directory. A couple of the options I have seen: Set up a single user account on the server for us both to use and use a virtual host to point to the somewhere in the home directory, e.g. /home/webdev/www. Set each of us up a user account, and grant permissions in some way to /var/www (What would be the best way? Set up a new group?) I want to get this right when I first set this up as there won't be any going back for a while once our first site is up and running. Appreciate any guidance in advance.

    Read the article

  • Top Down bounds of vision

    - by Rorrik
    Obviously in a first person view point the player sees only what's in front of them (with the exception of radars and rearview mirrors, etc). My game has a top down perspective, but I still want to limit what the character sees based on their facing. I've already worked out having objects obstruct vision, but there are two other factors that I worry would be disorienting and want to do right. I want the player to have reduced peripheral vision and very little view behind them. The assumption is he can turn his head and so see fairly well out to the sides, but hardly at all behind without turning the whole body. How do I make it clear you are not seeing behind you? I want the map to turn so the player is always facing up. Part of the game is to experience kind of a maze and the player should be able to lose track of North. How can I turn the map rather than the player avatar without causing confusion?

    Read the article

  • Expression Engine vs Drupal for Theming

    - by user793011
    Ive been using Drupal for years and now with work need to learn Expression Engine. Im interested in the comparison of Drupal and Expression Engine, but purely from a theming point of view (Ive no doubt Drupal is more powerful for development). Does anyone have any insights? It seems EE does give you more control over the exact html outputted, but is this necessary? I design my graphics first and Ive always been able to make exactly what I wanted in Drupal (some theme overrides could be easier, but ive got there in the end). Thanks

    Read the article

  • Révisions : Microsoft met en ligne ses cahiers de pré-rentrée sur Visual Studio 2012, Windows Phone, Windows 8, Azure et Windows Server 2012

    Révision de pré-rentrée : Microsoft a mis en ligne ses cahiers de vacances Sur Visual Studio 2012, Windows Phone, Windows 8, Azure et Windows Server Mea Culpa. Nous aurions pu en parler avant. Mais mieux vaut tard que jamais. D'autant plus que les révisions, c'est bien aussi quand ça ne dure pas toutes les vacances. Quoiqu'il en soit, Microsoft a mis en ligne deux « Cahiers de vacances » pour faire le point, se tester et/ou apprendre à maitrise toutes les nouveautés (et Dieu sait qu'elles sont nombreuses) autour de ses produits. Le premier, « J'en ai rien à déployer », revient sur la RC de Windows Server 2012, et sur la virtualisation av...

    Read the article

< Previous Page | 339 340 341 342 343 344 345 346 347 348 349 350  | Next Page >