Search Results

Search found 32459 results on 1299 pages for 'no internet connection'.

Page 507/1299 | < Previous Page | 503 504 505 506 507 508 509 510 511 512 513 514  | Next Page >

  • Is the TCP protocol good enough for real-time multiplayer games?

    - by kevin42
    Back in the day, TCP connections over dialup/ISDN/slow broadband resulted in choppy, laggy games because a single dropped packet resulted in a resync. That meant a lot of game developers had to implement their own reliability layer on top of UDP, or they used UDP for messages that could be dropped or received out of order, and used a parallel TCP connection for information that must be reliable. Given the average user has faster network connections now, can a real time game such as an FPS give good performance over a TCP connection?

    Read the article

  • Réseau social : Affichez votre badge Developpez associé à votre profil sur vos sites, Blogs, réseaux

    Chers membres du club, Aujourd'hui nous vous proposons de créer un badge associé à votre profil d'utilisateur du forum. Vous pourrez simplement diffuser votre profil sur votre site internet, votre blog ou sur tout autre site. Voilà de quoi créer votre propre identité Developpez et de la faire connaître Ce badge existe en 2 versions : * une version "web", utilisable en copier-collant un petit bout de code html à l'endroit souhaité * une version "image", utilisable partout sur internet Voici le rendu de la version image pour mon propre profil : [IMG]http://www.developpez.com/ws/badgeimg?user=29897[/IMG] Notr...

    Read the article

  • The Know How Series - Understanding Search Engine Crawlers

    While most internet users use a lot of search engines, hardly a handful really know how a search engine works. If you are an online marketer or your business relies heavily on the internet it becomes a prerogative that you understand search engines and web crawlers. Search engines provide data at the flick of a button or at a single click.

    Read the article

  • Les FAI britanniques bloquent l'accès à 21 sites de partages, suite à une décision de justice prise par la Haute cour

    Les FAI britanniques bloquent l'accès à 21 sites de partages, suite à une décision de justice prise par la Haute cour Suite à une requête déposée par la British Phonographic Industry, le lobby britannique des majors de la musique les six principaux fournisseurs d'accès à Internet du pays (BSkyB, BT, Everything Everywhere, TalkTalk, Virgin Media et O2) ont reçu l'ordre de bloquer l'accès a une vingtaine de sites soupçonnés d'être liés à un partage illicite de musique sur internet.La British...

    Read the article

  • Strategy for avoiding duplicate object ids for data shared across devices using iCloud

    - by rmaddy
    I have a data intensive iOS app that is not using CoreData nor does it support iCloud synching (yet). All of my objects are created with unique keys. I use a simple long long initialized with the current time. Then as I need a new key I increment the value by 1. This has all worked well for a few years with the app running isolated on a single device. Now I want to add support for automatic data sync across devices using iCloud. As my app is written, there is the possibility that two objects created on two different devices could end up with the same key. I need to avoid this possibility. I'm looking for ideas for solving this issue. I have a few requirements that the solution must meet: 1) The key needs to remain a single integral data type. Converting all existing keys to a compound key or to a string or other type would affect the entire code base and likely result in more bugs than it's worth. 2) The solution can't depend on an Internet connection. A user must be able to run the app and add data even with no Internet connection. The data should still resolve properly later when the data syncs through iCloud once a connection is available. I'll accept one exception to this rule. If no other option is available, I may be open to requiring an Internet connection the first time the app's data is initialized. One idea I have been toying around with in my head is logically splitting the integer key into two parts. The high 4 or 5 bits could be used as some sort of device id while the rest represents the actual key. The fuzzy part is figuring out how to come up with non-conflicting device ids that fit in a few bits. This should be viable since I don't need to deal will millions of devices. I just need to deal with the few devices that would be shared by a given iCloud account. I'm open to suggestions. Thanks.

    Read the article

  • How to Stream Videos and Music Over the Network Using VLC

    - by Chris Hoffman
    VLC includes a fairly easy-to-use streaming feature that can stream music and videos over a local network or the Internet. You can tune into the stream using VLC or other media players. Use VLC’s web interface as a remote control to control the stream from elsewhere. Bear in mind that you may not have the bandwidth to stream high-definition videos over the Internet, though. How to Use an Xbox 360 Controller On Your Windows PC Download the Official How-To Geek Trivia App for Windows 8 How to Banish Duplicate Photos with VisiPic

    Read the article

  • can unbuntu 13.03 be loaded with flash drive? USB

    - by Steve Shaw
    I am wanting to do a split pc, half win xp, half unbuntu 13.04, want to use the linux for internet surfing, youtube, crackle, hulu videos viewing. My pc is a older DELL C521, 1.87ghz, 1.5 gb ram, 32bit, 80gb hd...will this be better than present slow slow slow win xp? need it for internet mostly. Would consider dumping win xp later on if I get the hang of the linux distro...any help appreciated. thanks

    Read the article

  • Keyword Research Basics

    While doing business, you promote the products and services you are providing. Internet is very useful platform for this purpose. You market your product or service on internet.

    Read the article

  • Microsoft Refuses to Follow Others` Lead on China Censorship

    Despite receiving sharp criticism from U.S. officials Microsoft has remained stout in their stance on continuing to do business with China. At the heart of the entire issue is Internet censorship. Chinese law dictates that search engines that wish to do business in the powerful nation must abide by their laws concerning censorship of Internet search results.... Business Productivity Online Suite From $10 per user per month. Includes a 12-month subscription. Min 5 seats.

    Read the article

  • Capture a Query Executed By An Application Or User Against a SQL Server Database in Less Than a Minute

    - by Compudicted
    At times a Database Administrator, or even a developer is required to wear a spy’s hat. This necessity oftentimes is dictated by a need to take a glimpse into a black-box application for reasons varying from a performance issue to an unauthorized access to data or resources, or as in my most recent case, a closed source custom application that was abandoned by a deserted contractor without source code. It may not be news or unknown to most IT people that SQL Server has always provided means of back-door access to everything connecting to its database. This indispensible tool is SQL Server Profiler. This “gem” is always quietly sitting in the Start – Programs – SQL Server <product version> – Performance Tools folder (yes, it is for performance analysis mostly, but not limited to) ready to help you! So, to the action, let’s start it up. Once ready click on the File – New Trace button, or using Ctrl-N with your keyboard. The standard connection dialog you have seen in SSMS comes up where you connect the standard way: One side note here, you will be able to connect only if your account belongs to the sysadmin or alter trace fixed server role. Upon a successful connection you must be able to see this initial dialog: At this stage I will give a hint: you will have a wide variety of predefined templates: But to shorten your time to results you would need to opt for using the TSQL_Grouped template. Now you need to set it up. In some cases, you will know the principal’s login name (account) that needs to be monitored in advance, and in some (like in mine), you will not. But it is VERY helpful to monitor just a particular account to minimize the amount of results returned. So if you know it you can already go to the Event Section tab, then click the Column Filters button which would bring a dialog below where you key in the account being monitored without any mask (or whildcard):  If you do not know the principal name then you will need to poke around and look around for things like a config file where (typically!) the connection string is fully exposed. That was the case in my situation, an application had an app.config (XML) file with the connection string in it not encrypted: This made my endeavor very easy. So after I entered the account to monitor I clicked on Run button and also started my black-box application. Voilà, in a under a minute of time I had the SQL statement captured:

    Read the article

  • SEO Marketing

    SEO marketing has become a hot new emerging sector on the internet today. With the many new websites being uploaded to the internet almost every minute, search engine optimization is on everyone's minds. There are a lot of available options when it comes to choosing a form of marketing SEO to meet your needs.

    Read the article

  • IE 10 dépasse IE 9 sur le marché des navigateurs, Firefox stabilisé, Chrome gagne timidement du terrain

    IE 10 dépasse IE 9 sur le marché des navigateurs, Firefox stabilisé, Chrome gagne timidement du terrainDans son rapport, l'entreprise analytique web Net Applications révèle qu'Internet Explorer continue de dominer largement le marché des navigateurs. Désormais Internet Explorer représente 56,15 % des navigateurs utilisés, loin devant Firefox et ses 19,15 %, Chrome (17,17 %), Safari (5,5 %) ou Opera (1,6 %). Une bonne nouvelle pour Microsoft dont le navigateur détenait 54 % des parts de marché en juin 2012. Dans le détail, on observe une percée significative d'IE 10 qui a gagné 4,26 % et représente...

    Read the article

  • 3G Huawei E220 cannot connect to the Net Ubuntu 12.04

    - by user60786
    I've upgraded from 10.10 to 12.04. The situation: I plug the dongle in and enter the password. If I click 'Enable Mobile Broadband' and I get a notice on the top right saying 'GSM network. You are now registered on the home network'. At this stage I have not actually connected and when I click my broadband connection i see that 'Enable Mobile Boardband' is unticked AGAIN and I cannot connect to my broadbnad connection when I click it.

    Read the article

  • How to Improve Your Search Engine Ranking by Making "How To" Articles

    Every day, multitudes of people are connecting to the internet and searching for information. The Internet is well known for holding tons of knowledge and information from all over the world. One major way that people are getting their information is by searching for "How To" articles. When someone needs to know how to build a birdhouse for instance, it is quick and easy to go to their favorite search engine and simply type "how to build a birdhouse".

    Read the article

  • Why Webmasters Should Master SEO

    If you want to be a competitor in the internet marketing and business world, you need to arm yourself with the knowledge and tools that are proven to make people successful as internet entrepreneurs. One of the biggest factors to online business success, one that you can benefit from learning, is search engine optimization.

    Read the article

  • Upgrade from 13.04 to 13.10 broke remote SSH access?

    - by stackoverflowuser95
    I can no longer connect via SSH to my Ubuntu instance after upgrading from 13.04 to 13.10 with: # do-release-upgrade Connecting with $ ssh -vvv [ip here] gives me: OpenSSH_6.3, OpenSSL 1.0.1e 11 Feb 2013 debug2: ssh_connect: needpriv 0 debug1: Connecting to [ip here] [[ip here]] port 22. debug1: connect to address [ip here] port 22: Connection timed out ssh: connect to host [ip here] port 22: Connection timed out So I tried uncommenting #PasswordAuthentication yes in /etc/ssh/sshd_config, and restarting with /etc/init.d/ssh restart; but there was no difference.

    Read the article

  • cannot execute iexplore.exe when I create a symbolic link to it

    - by deostroll
    I do something like: $ ln -s '/home/deostroll/.wine/dosdevices/c:/Program Files/Internet Explorer/iexplore.exe' /usr/bin/iexplore I am expecting that at the shell I can just type the following and expect the internet explorer browser window to show up: $ pwd <where ever> $ iexplore But instead I get the following error message: wine: cannot find L"Z:\\usr\\bin\\iexplore." What am I doing wrong?

    Read the article

  • orange screen with vertical stripes

    - by Skapeven
    After having installed Ubuntu without Internet conecction, I restart the PC, go to BIOS, change boot priority to internal harddrive, save and exit. Then the PC starts again but the screen gets orange with vertical stripes and stays like that. I tried both versions 64 bit and 32 bit 12.04. I can't use internet before having Ubuntu, because y have to make a network configuration(this is not allowed in the trial version before the installed version).

    Read the article

  • SEO For Ecommerce Sites

    Ecommerce is a fancy name for just about any business that can be conducted via the internet or other computer systems. The global internet explosion has changed the face of the ecommerce industry for good, increasing both potential profits and the ferocity of competition across virtually every consumer market.

    Read the article

  • Removing pulseaudio, about ALSAMixer

    - by allenskd
    I removed pulseaudio today because rosetta stone had conflicts identifying the microphone which kinda makes it useless to me to learn a new language. Thing is, Alsamixer seems to have screwed up so I'm not really familiar on which configuration file I have to tweak to make the whole system use alsamixer (actually it does... but the problem is this error) $ alsamixer ALSA lib pulse.c:229:(pulse_connect) PulseAudio: Unable to connect: Connection refused cannot open mixer: Connection refused Could anyone enlighten me on which configuration file I have to change?

    Read the article

  • Why Use SEO on Your Website?

    SEO can be a time consuming, difficult and frustrating experience. Many webmasters abandon the process altogether, but there are many good reasons why you should pursue SEO for your internet website. A large amount of consumers use the internet first when attempting to find local businesses.

    Read the article

< Previous Page | 503 504 505 506 507 508 509 510 511 512 513 514  | Next Page >