Search Results

Search found 18341 results on 734 pages for 'neural network'.

Page 442/734 | < Previous Page | 438 439 440 441 442 443 444 445 446 447 448 449  | Next Page >

  • Connectify like functionality on Ubuntu running on T61 - wifi 4965 AGN

    - by Vivek Sharma
    I would like to use my laptop as an Access point, so that i can connect my phones through Wifi. I have done this my office laptop T410. I am having T61 with wifi module 4965. Connectify on windows does not support it. I am following -- https://help.ubuntu.com/community/WifiDocs/WirelessAccessPoint to make achieve WAP capability on my T61 running ubuntu 10.10. The link says something about "master mode", how do i put my T61 wifi-inter4965 in master mode. Can i install madwifi or atheros drivers on it. I am using galaxy S froyo, and it does not support Ad-hoc network. Has anyone tired to achieve this.

    Read the article

  • Unable to install q4wine

    - by Jake
    I just came bask to ask another question. I installed Ubuntu (again), but I'm having trouble installing q4wine. When I try to install, it gives me this: q4wine: Depends: libc6 (= 2.4) but 2.13-0ubuntu13 is to be installed Depends: libgcc1 (= 1:4.1.1) but 1:4.5.2-8ubuntu4 is to be installed Depends: libqt4-dbus (= 4:4.5.3) but 4:4.7.2-0ubuntu6.3 is to be installed Depends: libqt4-network (= 4:4.5.3) but 4:4.7.2-0ubuntu6.3 is to be installed Depends: libqt4-sql (= 4:4.5.3) but 4:4.7.2-0ubuntu6.3 is to be installed Depends: libqt4-xml (= 4:4.5.3) but 4:4.7.2-0ubuntu6.3 is to be installed Depends: libqtcore4 (= 4:4.7.0~beta1) but 4:4.7.2-0ubuntu6.3 is to be installed Depends: libqtgui4 (= 4:4.5.3) but 4:4.7.2-0ubuntu6.3 is to be installed Depends: libstdc++6 (= 4.1.1) but 4.5.2-8ubuntu4 is to be installed Depends: sqlite3 (= 3.5.6) but 3.7.4-2ubuntu5 is to be installed Help highly appreciated. Thanks.

    Read the article

  • Oracle Developer Day, Warsaw, March 28th 2012

    - by Ruxandra Radulescu
    Java doesn't begin and end with the server – Java is everywhere. From servers and desktop applications to mobile devices, wireless sensors, smart cards, and TVs, Java is the world's most widely used software development language and platform - the choice of more than 9 million developers worldwide. Learn how Java technology can enrich your development experience at this one day event, on 28th of March 2012 in Warsaw. This event is designed for developers, project managers and architects interested in: Java EE 6 Java FX Java Web Services Oracle ADF and Weblogic Server Oracle SOA, BPM and BAM Network with peers, see cutting edge demonstrations from Oracle experts, and code your way through demo workshops. Here are some interesting hands-on sessions from the agenda: - Rapid Java EE 6 Application Development - What's New in NetBeans IDE 7.1? - Getting Started with Pluggable Desktop Development - Supercharge your productivity in Building Applications with Oracle ADF - Live Demo - Charting with ADF Data Visualization Components - Managing Auctions with Oracle SOA Suite -Live Demo  Register Now

    Read the article

  • OSCON: Java and a Nice Discount

    - by Tori Wieldt
    Now in its 14th year, OSCON, O'Reilly's annual open source conference, will once again be in Portland, OR on July 16-20, 2012.  Join the world’s open source pioneers, builders, and innovators at the Oregon Convention Center for five intense days to learn about open development, challenge your assumptions, and fire up your brain.With 200+ speakers, 18 tracks, hundreds of technologies, and over 3,000 hackers in attendance, it's a place to learn and network. You’ll find practical tutorials, inspirational keynotes, and a wealth of information on open source languages, platforms, and development. OSCON includes whole track devoted to Java & the JVM, and the list of speakers is impressive. OSCON is where the serious thinkers and doers—and their favorite technologies—converge. And when the day’s sessions are over, join people just like you for some serious fun. Thanks to Java Magazine (you have subscribed to Java Magazine, right? If not, get your free digital subscription now!), you can register for OSCON and save 20% with code JAVAMAG.

    Read the article

  • How to connect two ubuntu laptops using putty?

    - by VanillaTwilight
    I am trying to connect two ubuntu laptops(server and client) using putty here is the description : LAPTOP A : UBUNTU SERVER 12.04 KERNEL : 3.2.0 LAPTOP B : UBUNTU 12.04 KERNEL : 3.2.0 Initially , made following attempts: connecting ubuntu server to the internet( wireless network) using Referred link : www.ubuntuforums.org/showthread.php?t=1740726 installed openssh-server in the Laptop A. putty in Laptop B seen the different options in the /etc/ssh/sshd_config shows 'Access Denied' while trying to login in (after i have entered the correct password ) from the laptop B Referred link : http://naveenubuntu.blogspot.in/2012/08/receiving-access-denied-just-after.html Doesnt work. Please help.

    Read the article

  • TortoiseSVN and Subclipse icons not updating with SVN? [migrated]

    - by Thomas Mancini
    I have a repository on a network share with working directories on two separate machines. Upon making changes to my local working directory and committing them, the icons are not changing on the other developer's machine. If the Dev goes to Team Synchronize with Repository it shows the changes in the Synchronize view within Eclipse, however I was expecting the icon next to the project to change if it is not in sync with the repository. The same happens with TortoiseSVN in Windows Explorer. If we right click and check the repository for modifications it shows them, however the overlay icon on the directory is still the green check box. Am I just misinterpreting what I expect to happen, or is there a way to get these icons to change if the project is no longer in sync with the repository?

    Read the article

  • How can i get almost pixel perfect collision detection in a multiplayer game?

    - by Freddy
    I'm currently working on a multiplayer game for iPhone. The problem i have, as with all multiplayer games, is that the other user will always see everything at a non-constant delay. The game I'm making need to have a almost pixel perfect collision detection, but 1 or 2 pixels off is not that big of a deal. How can I possibly get this working? I guess I could just set local player to also be at X ms delay. However this will probably just be worse and feel sloppy when the user input. I know this problem is probably something network programmers deal with everyday and I would be glad if someone could give me a possible solution for this.

    Read the article

  • How ad retargeting works?

    - by Bojan Babic
    Recently, I read that Facebook ads are moving towards retargeting and got interested deeper into subject. Essentially, retargeting is technique advertisers use that tracks purchase intent by putting cookies into your browser and when you visit another website within ad network you will see ad for item you "wanted to buy". In order this to for, both publisher and advertiser need to work together. Publisher needs add couple of lines of javascript and publisher need to be able to read this info across sites. In most cases, javascript inserts iframe from adnetwork domain. Iframe script sets cookies for both host domain and remote adnetwork domain. However, Same Origin policy do not let iframes read/set content from parent domain. Is there something I'm missing here? Can someone explain how this technique actually works?

    Read the article

  • HP 655 Notebook (Ubuntu 12.04) wireless internet disabled after running updates

    - by Bastian
    Today the update-manaeger suggested that I should download some updates. So I did. After the updates were installed I had to reboot the system. After the reboot my notebook doesn't see any wireless networks. I was looking for a long time on the internet for answers but non of them applies to my case. I have the idea, it has got something to do with the kernel I am currently using (Linux 3.2.0-55). Is this one new for Ubuntu 12.04? When I boot my system I can choose to use an older kernel (linux 3.2.0-32). When I use this one the notebook does see the wireless networks. This is my network card according to the command lspci: Ralink corp. RT3290 Wireless 802.11n 1T/1R PCIe Anyone an idea to fix my problems with wireless internet?

    Read the article

  • Installing Ubuntu on virtualbox with a windows 8 host

    - by ubershmekel
    Installing ubuntu-13.10-desktop-i386.iso gets me to the graphical login screen but after I enter the password I get a black screen. Ctrl-Alt-F2 brings me to a terminal where I can restart lightdm, enter my password again to see another black screen. The screen saver can actually kick into action there and I was told to update packages, but no unity or other ui, just blackenss. The host is windows8-x64 and Virtualbox 4.3.2. I tried installing ubuntu-12.04.3-desktop-i386.iso but that hung during setup. Is there a way to debug? I'm now trying to install Debian to see if that works but wow the network installer takes its sweet time... Update: Debian does work though it gives me a notification that Gnome 3 failed to load. The visual desktop works though so I don't know if there was a substantive problem.

    Read the article

  • keep getting added to hosts.deny + iptables

    - by Sc0rian
    I am confused to why this has started to happen. On my local network, if I click 10-20 apache/http links my server will decide to add me hosts.deny file and block me on iptables. Its not just apache, it seems to happen with any kinda of traffic, that comes in on a flood method. Like I use subsonic, if I change tracks 10-20 times, it will do it. I would assume I have some sort of firewall which is sitting on the server which is doing this. However I do not have fail2ban or any denyhosts in /var/lib. I cannot work out why I keep getting added to hosts.deny/iptables. Thanks

    Read the article

  • What is the career path for a software developer/ programmer? [closed]

    - by Lo Wai Lun
    I've been working as a programmer for a few months and I often study CCNA , CISSP for future. Besides simple coding I was working on specs, designing applications, and all those around-like things. My question is, I want to be a information / system security specialist. what's the career path I should be aiming for? Is it like working on code for the rest of my life? :) Restart my career from the network engineer ? Or do programmers make a good manager-position people ? I know it's very subjective. Thing is, lately I find myself much more into the designing/working on specs part of the development project then the coding itself. How do you see it? Would you like to go from development to information security? Would you like to work on a project with a manager that used to be a coder?

    Read the article

  • How to setup an intranet in ubuntu using wifi?

    - by ved2254
    I want to set up a VPN on my laptop but I don't know what and how to set it. My requirements are : Intranet with a customizable list of shared folders. Intranet outsourced via computer wifi. Possibly assigning individual private IP addresses to all connected. Facility to share internet (if hassel free). Can I do this using Gnome Network Manager or do I need another program? I'll be happy even if I get one folder to share for the time being and no internet if I could only outsource one file/folder.

    Read the article

  • Thread problem with XNA C#

    - by Luis
    I'm development a network card game, and for now i've two players connected but there is a problem with one of them, this one can't do anything on the game. Looks that screen was blocked. I'm think that is because a code i used before. That code is: if (InvokeRequired) { this.Invoke(new MethodInvoker(delegate { ... })); return; } The code above is surrounding code to changing Button values, make connection with server and create game window. Without this code a warning is shown. InvalidOperationException was unhandled Cross-thread operation not valid: Control 'startGameButton' accessed from a thread other than the thread it was created on.

    Read the article

  • Open World Day 4

    - by Antony Reynolds
    A Day in the Life of an OpenWorld Attendee Part V Last day at OpenWorld.  The exhibits are closed, and the final few presentations are being given.  I spent much of the day meeting with customers to talk about SOA/OSB and Coherence.  Main event of the day was the farewell party which was loud and surprisingly well attended.  I was able to have lunch with Dave Felcey, Coherence PM, who has a great blog and is always ready to share his expertise with people. So that was OpenWOrld for another year.  I met a friend of a friend who attends OpenWorld every year and attends the Demo Grounds with a list of questions to ask people.  I think that illustrates the point that everyone approaches OpenWorld in a different way and looks to get different things from it.  For me OpenWorld is a great experience to feel the energy in Oracle and network with customers and partners.  Hope to see you there next year!

    Read the article

  • Tab Sweep - Devoxx questions, GlassFish Rest, APAC Java, Lift, JEPs, tools, ...

    - by alexismp
    Recent Tips and News on Java, Java EE 6, GlassFish & more : • Submit a question for Devoxx 2011 Keynotes (Moderator questions) • Devoxx for Java developers (The Java blog) • GlassFish REST Client: ComplexExample.java (Jason) • Oracle Technology Network site for Asia-Pacific developers (OTN APAC) • Notes on deploying Lift apps to GlassFish (Antonio) • Using JSR-250's @PostConstruct Annotation to Replace Spring's InitializingBean (DZone) • The future is in the JEPs (Stephen) • Comparison of Eclipse 3.6 and IntelliJ IDEA 10.5: Pros and Cons (Dzone)

    Read the article

  • What To Do If You Get a Virus on Your Computer

    - by Chris Hoffman
    Whether you saw a message saying a virus was detected or your computer seems slow and unreliable, this guide will walk you through the process of dealing with your infection and removing the malware. While many viruses and other types of malware are designed simply to cause chaos, more and more malware is used by organized crime to steal credit card numbers and other sensitive data. Why Enabling “Do Not Track” Doesn’t Stop You From Being Tracked HTG Explains: What is the Windows Page File and Should You Disable It? How To Get a Better Wireless Signal and Reduce Wireless Network Interference

    Read the article

  • Migrate from Thunderbird to Mutt

    - by deshmukh
    I am contemplating moving from Thunderbird to Mutt (provided it is feasible) to move to a faster, simpler application. My current Thunderbird set-up consists of multiple IMAP accounts (gmail and google apps). Only selected folders (read labels) in each IMAP account are stored locally. For all other folders, I glance through the headers and open a message only if I find it interesting. I also use folder bookmarks to navigate to folders quickly. I also move messages across folders with keyboard shortcuts. Is it possible to replicate the set-up in Mutt? Can someone share/ point to a sample muttrc file that does the same thing? It would be great if the muttrc file is adequately commented. On a side note, will it also be possible to import my messages from Thunderbird locally? That will save me considerable network traffic (about 2GB data stored locally).

    Read the article

  • New Solaris 11 book available

    - by user12611852
    A new Solaris 11 book is now available.  Congratulations to my colleague in the Oracle Public Sector Hardware sales organization "Dr. Cloud" Harry Foxwell and his co-writers on publishing Oracle Solaris 11 System Administration The Complete Reference Table of contents 1 The Basics of Solaris 11 2 Prepare a System for Solaris3 Installation Options4 Alternative Installations for Enterprise5 The Solaris Graphical Desktop Environment6 The Service Management Facility7 Solaris Package Management "Image Packaging System"8 Solaris at the Command Line9 File systems and ZFS10 Customize the Solaris Shells11 Users and Groups HF12 Solaris 11 Security13 Basic System Performance Tuning14 Solaris Virtualization15 Print Management16 DNS and DHCP17 Mail Services18 Mgmt of Trusted Extensions19 The Network File System 20 The FTP Server21 Solaris and Samba 22 Apache and the Web Stack Buy one today

    Read the article

  • How to safely back up the "Private" folder?

    - by ImaginaryRobots
    I have an ecryptfs "Private" folder in my home directory, and it is set up to automatically mount whenever I log in. I want to set up automatic backups to a network drive, but I don't want the contents of Private to be readable on the remote server. My understanding is that the Ubuntu "Backup" utility would run while I'm logged in, so it would see the folder contents without encryption. I'm backing up from a laptop, so it is essentially only on when I am logged in. I know that the Private folder is essentially a mounted filesystem, so it seems like I should be able to backup the encrypted image rather than the cleartext contents. What steps are needed to safely back it up, while maintaining the encryption? Note that I'm already familiar with the backup tools available, this question is about dealing with the ecryptfs folder safely.

    Read the article

  • The Truth About Wi-Fi Signal Strength

    - by Jason Fitzpatrick
    Whether it’s the structural layout of your home or just ghosts in the machine, we’re all familiar with inexplicable Wi-Fi dead spots. One extra puzzling situation, unseen in the comic here, is when the addition of another wireless node actually causes issues with your Wi-Fi connectivity. There’s nothing more frustrating than having twice the Wi-Fi node power and half the actual signal at your laptop. If you’re looking to extend your Wi-Fi network coverage headache free, check out our guides to doing so with Tomato-powered routers and DD-WRT-powered routers. Your Wireless Internet Signal Strength [via FailDesk] How to Factory Reset Your Android Phone or Tablet When It Won’t Boot Our Geek Trivia App for Windows 8 is Now Available Everywhere How To Boot Your Android Phone or Tablet Into Safe Mode

    Read the article

  • Getting SSL certificate for a sub-domain

    - by Hemant
    Our company owns a domain say www.mycompany.com. I understand that it is trivial to get an SSL certificate for above domain since we do have a website running on that address. We want a certificate for a subdomain say sub.mycompany.com. We intend to use this sub-domain in our organisation network only and have no plans to publish a public website on this subdomain. So the question is "Is it necessary to have a DNS entry for subdomain, resolving to our IP address and host some page on that address?" I hope proving that main domain is in our control, we can get an SSL certificate for sub domain also. Is it possible?

    Read the article

  • Gzip compress offline?

    - by shoosh
    I've configured my site to serve compressed content by putting this line in .htaccess AddOutputFilterByType DEFLATE text/html text/plain text/xml text/javascript text/css application/javascript application/json This works perfectly for almost all files except a few large JSON files that are above 200Kb. For some reason they are not being compressed. I see that they don't using the net tab in firebug and the Network section in chrome. So as a workaround I thought I could compress these files offline and have Apache read them compressed. What tool should I use to compress them? is the linux gzip the one? any special flags or something I should use? What should I put in .htaccess so that the server would know to serve these files with content-encoding gzip ?

    Read the article

  • What is the best language to use for building a fulfillment engine [on hold]

    - by John Stapleton
    I asked this on stack overflow and was suggested to move it here. I do understand it is a matter of opinion which is exactly what I aim to achieve here... I wanted to know what you think is the best language to write a fulfillment engine in? I cannot provide much detail but I am trying to build a control interface for servers and i wanted to build a program daemon that would process data on the authoritative server and the slave servers( the backbone of the network) with their own daemons running would check regularly(every 5 minutes or so) with the authoritative server and process the commands(securely) I am trying to build this with a minimal footprint(cpu and ram wise for the slaves, authoritative is going to be scalable) and to make it automated so that the user does not have to configure the daemon(installation is automated by the authoritative server) I am leaning away from my usual php set up for simplicity sake. Edit: I am not an expert in any particular language but flexible enough and willing to learn another.

    Read the article

  • What is Happening vs. What is Interesting

    - by Geertjan
    Devoxx 2011 was yet another confirmation that all development everywhere is either on the web or on mobile phones. Whether you looked at the conference schedule or attended sessions or talked to speakers at any point at all, it was very clear that no development whatsoever is done anymore on the desktop. In fact, that's something Tim Bray himself told me to my face at the speakers dinner. No new developments of any kind are happening on the desktop. Everyone who is currently on the desktop is working overtime to move all of their applications to the web. They're probably also creating a small subset of their application on an Android tablet, with an even smaller subset on their Android phone. Then you scratch that monolithic surface and find some interesting results. Without naming any names, I asked one of these prominent "ah, forget about the desktop" people at the Devoxx speakers dinner (and I have a witness): "Yes, the desktop is dead, but what about air traffic control, stock trading, oil analysis, risk management applications? In fact, what about any back office application that needs to be usable across all operating systems? Here there is no concern whatsoever with 100% accessibility which is, after all, the only thing that the web has over the desktop, (except when there's a network failure, of course, or when you find yourself in the 3/4 of the world where there's bandwidth problems)? There are 1000's of hidden applications out there that have processing requirements, security requirements, and the requirement that they'll be available even when the network is down or even completely unavailable. Isn't that a valid use case and aren't there 1000's of applications that fall into this so-called niche category? Are you not, in fact, confusing consumer applications, which are increasingly web-based and mobile-based, with high-end corporate applications, which typically need to do massive processing, of one kind or another, for which the web and mobile worlds are completely unsuited?" And you will not believe what the reply to the above question was. (Again, I have a witness to this discussion.) But here it is: "Yes. But those applications are not interesting. I do not want to spend any of my time or work in any way on those applications. They are boring." I'm sad to say that the leaders of the software development community, including those in the Java world, either share the above opinion or are led by it. Because they find something that is not new to be boring, they move on to what is interesting and start talking like the supposedly-boring developments don't even exist. (Kind of like a rapper pretending classical music doesn't exist.) Time and time again I find myself giving Java desktop development courses (at companies, i.e., not hobbyists, or students, but companies, i.e., the places where dollars are earned), where developers say to me: "The course you're giving about creating cross-platform, loosely coupled, and highly cohesive applications is really useful to us. Why do we never find information about this topic at conferences? Why can we never attend a session at a conference where the story about pluggable cross-platform Java is told? Why do we get the impression that we are uncool because we're not on the web and because we're not on a mobile phone, while the reason for that is because we're creating $1000,000 simulation software which has nothing to gain from being on the web or on the mobile phone?" And then I say: "Because nobody knows you exist. Because you're not submitting abstracts to conferences about your very interesting use cases. And because conferences tend to focus on what is new, which tends to be web related (especially HTML 5) or mobile related (especially Android). Because you're not taking the responsibility on yourself to tell the real stories about the real applications being developed all the time and every day. Because you yourself think your work is boring, while in fact it is fascinating. Because desktop developers are working from 9 to 5 on the desktop, in secure environments, such as banks and defense, where you can't spend time, nor have the interest in, blogging your latest tip or trick, as opposed to web developers, who tend to spend a lot of time on the web anyway and are therefore much more inclined to create buzz about the kind of work they're doing." So, next time you look at a conference program and wonder why there's no stories about large desktop development projects in the program, here's the short answer: "No one is going to put those items on the program until you start submitting those kinds of sessions. And until you start blogging. Until you start creating the buzz that the web developers have been creating around their work for the past 10 years or so. And, yes, indeed, programmers get the conference they deserve." And what about Tim Bray? Ask yourself, as Google's lead web technology evangelist, how many desktop developers do you think he talks to and, more generally, what his frame of reference is and what, clearly, he considers to be most interesting.

    Read the article

< Previous Page | 438 439 440 441 442 443 444 445 446 447 448 449  | Next Page >