Search Results

Search found 19186 results on 768 pages for 'sharepoint search'.

Page 595/768 | < Previous Page | 591 592 593 594 595 596 597 598 599 600 601 602  | Next Page >

  • Thunderbird 3 not displaying email in local folder

    - by ron grubman
    I installed TB3 on a new computer set up to use imap to get my gmail -- works fine I copied all of my existing emails from old computer into the appdata directiry fir thunderbird local folders. All files are of the right size that I know the data is present When I run tb on the new computer all of the FOLDERS show up under LocalFolders. 5, BUT BUT BUT, when I click on any folder, all I get is a blank -- no emails are shown. additional info: Bitdefender DOES see the missing emails because one or two are tagged as suspicious But Windows 7 search is NOT seeing the missing emails. Can anyone instruct me on how I can get tbird to show the old emails ??? thanks

    Read the article

  • Why can't I access the WebUI of my DNS-323 NAS after a firmware upgrade?

    - by anonymous2
    Hi Everyone, I just bought a D-Link DNS-323 NAS Enclosure, and have run into a problem. I read that the firmware that had shipped with (1.07) did not support 2TB drives, so I downloaded firmware 1.08. Turned on the device for thwe first time and went straight to the WebUI (everything looked/worked fine) Proceeded with the firmware update, completed successfully. Rebooted and I cannot access the WebUI. I can see the NAS connected via my router interface I can also ping the ip adress assigned, but I cannot access the WebUI or find it via D-Link easy search software. I have tried the factory reset button, but that does not seem to be doing anything, the square blue light just keeps flashing from the moment the unit is powered on, whether I press the reset button or not, and the symptoms remain the same... PS. I did/do not have any drives installed yet. Please help?

    Read the article

  • I do not understand -printf script

    - by jerzdevs
    I have taken over the responsibility of RHLE5 scripting and I've not had any training in this platform or BASH scripting. There's a script that has multiple pieces to it and I will ask only about the second piece but also show you the first, I think it will help with my question below. The first part of the script shows the output of users on a particular server: cut -d : -f 1 /etc/passwd The output will look something like: root bin joe rob other... The second script requires me to fill in each of the accounts listed from the above script and run. From what I can gather, and from my search on the man pages and other web searches, it goes out and finds the group owner of a file or directory and obviously sorts and picks out just unique records but not really sure - so that's my question, what does the below script really do? (The funny thing is, is that if I plug in each name from the output above, I'll sometimes receive a "cannot find username blah, blah, blah" message.) find username -printf %G | sort | uniq

    Read the article

  • How can I see when the txt file was embedded to a word document?

    - by nono
    Is there a possibility to search when the embedded txt file was created in the word document? I'm working in Word 2010 and the extension of the document is simple: .doc It was inserted using the Word options: Insert -> Object -> Create from file -> Insert as icon Thank you, I already tried the right click and properties option, but the problem with it, that it shows only the current date for all of the 3 options (created/modified/accessed). I also tried to get the timestamp but it is inactive when I'm on the txt object. Sorry not to mention it before: Thank you all of you here for the help and support it is really appreciated.

    Read the article

  • The Freemium-Premium Puzzle

    The more time I spend thinking about the value of information, the more I found that digitalizing information significantly changed the 'information markets', potentially in an irreversible manner. The graph at the bottom outlines my current view. The existing business models tend to be the same in the digital and analogue information world, i.e. revenue is derived from a combination of consumers' payments and advertisement. Even monetizing 'meta-information' such as search engines isn't new. Just think of the once popular 'Who'sWho'. What really changed is the price-value ratio. The curve is pushed down, closer to the axis. You pay less for the same, or often even get more for less. If you recall the capabilities I described in relevance of information you will see that there are many additional features available for digital content compared to analogue content. I think this is a good 'blue ocean strategy' by combining existing capabilities in a new way. (Kim W.C. & Mauborgne, R. (2005) Blue Ocean Strategies. Boston: Harvard Business School Publishing.). In addition the different channels of digital information distribution significantly change the value of information. I will touch on this in one of my next blogs. Right now, many information providers started to offer 'freemium' content through digital channels, hoping to get a premium for the 'full' content. No freemium seems to take them out of business, because they are apparently no longer visible in today's most relevant channels of information consumption. But, the more freemium is provided, the lower the premium gets; a truly puzzling situation. To make it worse, channel providers increasingly regard information as a value adding and differentiating activity. Maybe new types of exclusive, strategic alliances will solve the puzzle, introducing new types of 'gate-keepers', which - to me - somehow does not match the spirit of the WWW and the generation Y's perception of information consumption and exchange.

    Read the article

  • Ways to improve completeness of files for data recovery and scanning?

    - by SteveO
    I am using R-studio for data recovery on one of my ntfs partition. There is a pdf file about 16MB, but the software can only recover 15MB of it. So I am thinking about what ways can be used to improve the quality of scanning and recovery by the software? I am looking around its preferences. I am not quite sure whether there are some adjustable parameters for scanning and recovery which can be fine-tuned to improve the quality? R-studio has a free demo version, for which scanning is free,but recovery isn't. It is downloadable from http://www.data-recovery-software.net/Data_Recovery_Download.shtml Its manual is here http://www.r-tt.com/downloads/Recovery_Manual.pdf. I have tried my best to search for answers in the manual, but failed to find one. Their technical support is not as good as their software, and helpless usually in my opinion. Thanks!

    Read the article

  • How to Activate wifi in Toshiba Satellite C655?

    - by user4106
    I've recently bought a Toshiba Satellite C655. It came with Windows 7 preinstalled. I've never had a notebook before, but as a desktop user, I was a Ubuntu user since 2 years, and I've never had a problem with drivers, wifi, etc. When I tried to install the Ubuntu 10.04, and also the new and fresh 10.10, in my new laptop, I experienced some troubles with some of the componentes of my computer. For example, I was not able to activate my wi-fi card, although I know the kernel recognizes it correctly, because when doing "lspci" at the terminal, it was listed. Anyhow, I'm not able to "activate" the wifi, or whatever it's necessary to do in order to be able to search for public networks available, and to connect with them. The wifi-card the laptops brings is the (the lspci output): 03:00.0 Network Controller: Atheros Communications Inc. AR9285 Wireless Network Adapter (PCI-Express) [168c:002b] (rev 01). It's anything in you can help me? Thanks a lot in advance! Edit Neither solution seems to work. In first place, i've tried installig what hhlp told me. After the installation, nothing seems to change: on right-clicking the wireless icon, it seems to recognize the card, because the option "Enable wifi" was ticked. But, once again, i was not able to "turn the wi-fi" on. In second place, i didn't try installing the drives, because the card is already recongnized. The issue is that i cannot seem to turn it on! One thing i've probably missed is that the Toshiba cames with a windows sofntware that allows you to enable / disable the wifi tools. So, it does not have an external "button" to turn it off. I don't know if that's the problem, but i have the feeling that the issue may be aroud there: in how to turn ON the wifi-signal (or to verify if it's on or off) in my ubuntu.

    Read the article

  • Is there a browser independet bookmarktool supporting tags, date and free comments?

    - by bernd_k
    I am looking for a tool, which helps me to organize my personal bookmarks. I want to be able to assign tags and free comments to a bookmark. I want to search my bookmarks by tags date of bookmarking pattern in title pattern in url It would be nice to be web based to enable sharing my bookmarks between different machines. But for it would be OK, if it works on a single machine as long as it has some import/export way to transfer the links to a new machine replacing the old. As browsers I'm using Firefox and ChromePlus. It would be nice, if the solution works with both browsers. With free comments, I mean additional remarks stored for a bookmark, which is not essential for searching.

    Read the article

  • Install Firefox on Windows 7 for all users

    - by Pointy
    This has got to be among the simplest possible things in the word for those who know how to do it. However, I don't, and I have been astonished to find nothing about it from google searches other than unanswered copies of the exact same question. All I want is Firefox, and I want it for all users on a Windows 7 laptop. In fact, the real story is that I want it to work again for all users after updating from Firefox 5 to Firefox 8, which process has apparently left it unavailable to anybody but the administrator. I'll probably find the answer to this in the time it takes for this question to get answered, but I promise I'll upvote you anyway :-) I mainly wanted to get this question (hopefully with good answers) out there so that it turns up on a Google search.

    Read the article

  • Is it possible to put an 8000 series socket-F Opteron into a dual-socket motherboard?

    - by René Kåbis
    Exactly what it says on the Tin. I have a dual-socket, socket-F motherboard in which I am looking to put two high-end quad-core Opterons, but the 2000 series are nearly double the price of the 8000 series on eBay. Can I just drop in a pair of 8000 series processors and be done with it, or are there processor-critical motherboard features that would be present on a quad(+)-socket motherboard that don’t exist on a dual-socket motherboard? Please elaborate or link to resources that can explain this further, as I am not adverse to research (and I am interested in the technical issues involved) I am probably using the wrong search terms, as Google failed to return anything within the first few dozen results.

    Read the article

  • Number of malicious attacks defended/done on the average user daily [closed]

    - by DalexL
    As a web hoster, it is very easy to notice the large amounts of exploit/abuse attempts done on my servers. Out of curiosity, how often are these attempts done on the average user? I'm assuming almost all of them are prevented just by simple security protocols in place by their browsers, local network, etc. How many attempts, on average, are committed against a single user daily through any method? (email, internet, downloads, etc.)? If known, what percentage of these things are blocked by the average users security? I tried googling but I was having a hard time getting the right search terms together.

    Read the article

  • Apache log lines contain "..."

    - by mtah
    We have a custom log line format for Apache logs which are analyzed. CustomLog "|/usr/sbin/rotatelogs -l /mnt/var/log/apache2/access-%Y%m%d%H%M%S.log 900" "%a %{%s}t \"%r\"" However, some log lines are mysteriously shortened with "..." for some reason, but how can this be? The shortest length line discovered where this occurs is 317 chars while the longest line is way over 2000 chars. "GET /exposure?sg=&ap=0x0&fv=WIN%2010,0,22,87&si=IH95VDUAVLJ0&pt=Lage%20hjemmelaget%20sengegavl%20-%20Forum%20-%20Diskusjon.no&iv=0&sd=1024x600&ct=680&tz=-120&eu=http%3A//www.diskusjon.no/index.php%3Fshowtopic%3D1011139&l...AS3&an=NO%20-%20180x500%20Pretail%20CPC&wd=1024x483&rf=http%3A//www.google.no/search%3Fhl%3Dno%26source%3Dhp%26q%3Dsengegavl+lage%26meta%3D%26aq%3D2%26aqi%3Dg10%26aql%3D%26oq%3Dsengega%26gs_rfai%3D&ui=3INYF5QAZL10&ws=0x417&ad=180x500&sa= HTTP/1.1"

    Read the article

  • There's Not an App for That (Yet)

    - by Mark Hesse
    With an earlier-than-normal departure this morning to avoid the stalemate known as traffic congestion, I suddenly realized what I had failed to grab on my way out the door...  my company ID badge.  Unfortunately, at the time of my epiphany, I was far enough into commuter no-man's land where turning back would completely negate my early departure and increase my overall drive time exponentially.  Not being one to retrace my steps, I decided to press on. Upon arrival at the office and with an hour to go before a security guard would be on duty, I started thinking about the number of times I had forgotten my ID vs. the number of times I had forgotten my phone.  While rare on both accounts, my ID was most likely the missing artifact. I then wondered why there isn't an app for my smartphone that allows me to verify my credentials with my employer and then, provided with a secure token for the day, have the ability to access my building's card entry system.  On many levels, this seems much more secure than an ID card which can be lost, stolen or even forged and then used simply by tailgating into and around buildings at facilities where card scanning can generally be avoided.   As it turns out, another building on the campus has 24 x 7 guard coverage, so I was able to gain access in a relatively short time and secure a temporary ID badge.  Once inside and online, a quick internet search on the subject of smartphone badge access shows that efforts are underway to do exactly what I was thinking needed to be done. Having not spent any time studying about the technology, I discovered that it relies on Near Field Communications (NFC) enabled smartphones (of which, mine does not provide).  The only other option would require modifications to the security infrastructure to support alternative authentication technologies, such as barcode readers, which would be extremely costly to implement. For now, my best option is to put my corporate ID under my car keys... 

    Read the article

  • Dictionary-based text auto-completion in Windows (i.e. Mozilla Thunderbird e-mail client)?

    - by None
    Most programmer's text editors and IDEs have it, automatic completion of the first few characters (letters) of a keyword or function name. Also, most address bars or search fields feature this (like the tag input below the posting form). I would like the same for a few, often-occuring words in business correspondance. Since I could not find an extension for the application in question, Mozilla Thunderbird, I would like to know if there are applications or methods that suggest the complete words from a dictionary like sup per eruser erfluent PS: Here's an article on Wikipedia: Word completion Here's a product for $25: Type Booster Ideally, the solution is free.

    Read the article

  • Identify malicious subnet

    - by Macros
    I have been experiencing performance issues on a website for a while, and it always seems to hit around the same time. Having analysed the logs I've found a big spike in requests which corresponds with this slowdown, with all requests coming from the same subnet. It feels to me like an attempt to scrape the site (it is a car hire site and the requests are sequential for each IP and with incremental search criteria) and I would like to identify the source. The Subnet in question is 209.67.89.x which I can see is owned by Savvis however I can't reverse DNS any of the IPs - is there any other way I can gain more info on this (other than contacting them direct - I am also doing this)?

    Read the article

  • How can I install a scanner by IP?

    - by user54266
    I'm trying to install a scanner by IP the same way you would install a printer by IP. I don't want to install the horrible HP Solution Center software but I don't know how to install a network scanner without the software. I'm having a hard time googling this because when I search for things like "install network scanner" or "install scanner by IP" all the results are for things like Angry IP Scanner which is clearly different than what I'm trying to get. Thanks in advance. This is for Windows Vista, but Windows 7 instructions will do.

    Read the article

  • No wireless adapter in msi u200

    - by Mino Marimat
    I have a MSi u200, and the weird thing was that I was using this normally before, then after a few minutes all of a sudden it couldn't find the wifi signal from my house. I did some troubleshooting and a bit of search in the control panel, and it seems like my hardware is missing. :( I can't even turn on the wireless light using Fn+F8, so my suspicions about the missing hardware strengthened. I tried searching for DIY fixes, but I found out that the wireless card is actually built-in deeper, unlike the RAM cards and the hard drive where you can either replace or add more cards. What do I do?? As of the moment, I can get connected to my wifi here at home using a wireless adapter via usb, and it's working. So my guess about the hardware problem seems correct. HELP!!! Thanks!

    Read the article

  • What is the easiest way to apply database functionality into my daily life?

    - by Daddy Warbox
    let me try to explain it by listing some of the things I want to do: Submit random thoughts, notes, facts, and to-do tasks of any sort and at any time. Tag each of these submissions freely. Manage these tags centrally. Associate meta-data with submissions and tags. Search, filter, and sort submissions. I want lots of power here. Display views of submissions (including within searches) in a hierarchy. Create said hierarchies easily out by ordering relevant tags. I'm thinking towards some kind of desktop program that allows me to quickly do all of these things. A web service could also work, too, but it will need offline capabilities. I don't want to have to pay for this, if that's possible. Also, as I know regex and SQL, I wouldn't mind solutions involving the use of either.

    Read the article

  • Windows xp media center, iTunes, Home sharing problem with app Remote and Apple tv2

    - by Amador
    Hello everybody, greetings from Mexico, sorry about my english but here it goes: I recently bought and apple tv 2nd generation it works just fine, i can see you tube videos but i cant see my library. My pc is conected to the same wi-fi than my apple tv. I have the latest software. I have my firewall off. I turned off and on my router. Search for iphone, ipad remotes on, sharing my library on my local network on, in itunes. Ive checked that my id was the same. On top of that the Remote app doesnt seem to work either. Please help, im kinda loosing my mind over this

    Read the article

  • enable tcp_syncookies even after reboot

    - by Tim
    I'm running Scientific Linux 6.1 and would like to set net.ipv4.tcp_syncookies=1. I've set that in /etc/sysctl.conf and, if I do a sysctl -p then sysctl -q net.ipv4.tcp_syncookies it shows it's properly set. Sadly, if I reboot the machine, and sysctl -q again, it goes back to 0. I've tried to grep around and see if something else is resetting it to 0 during the boot process but haven't turned up anything. I've googled and everything points to sysctl.conf. The only thing I can think of is maybe networking isn't up by the time that file gets read but, honestly, I'm a developer and well beyond my natural skills here:) I'm tempted to just set it directly in /etc/init.d/network but then that feels hackish and so, I thought better of it and I'm here in search of the "right" way to do it. Any pointers?

    Read the article

  • Does it exists a way to do a (software) switch between DVI and VGA screens?

    - by gogolb
    I'd like to know if there is a way (a software, a keyboard combination, etc...) to switch between DVI and VGA screen on the same monitor. I've two PCs connected to the same monitor, far away (80cm) from me. To push the monitor button is not so easy and comfortable as could seems, moreover if you have to do it almost 20 times a day. I've tried to check on search engine/Samsung (SyncMaster SA450) site for a solution but with no success. Any suggestion? Thank you all in advance, gb

    Read the article

  • BIND: How do I allow DNS query from specific external host?

    - by krbvroc1
    I'm running Centos 5.8 (bind 9.3.6). Here is my issue... I run my own DNS server to serve the local machine. I would like to use my DNS server from home. Since my home is a dynamic IP address, I am not sure how this would be accomplished. In my named.conf, there is an allow-query{} and allow-recursion{}. It seems both of those take an IP address, but i need to specify a hostname (at least a cname). This is not a public DNS server (so any is not an option). My hostname/cname is already updated automatically using nsupdate. The only solution I can think of, which I do not like, is to change my nsupdate script to somehow modify the named.conf to search/replace the allow-query/recursion IP address. That would require restarting named whenever the hostname changes as well as Is there some other way to handle this?

    Read the article

  • Best practice for storing information from a php script for future use

    - by tRudgeF3llow
    My employer uses forms to help people search for products. The product lists can change from time to time and the forms need to be updated again. The product information can be accessed through a third party API which I started tinkering with, I've recently built a script that retrieves the information with PHP and creates and populates a form dynamically with Javascript. So far so good, but... There are limitations to the API, mainly it can only be accessed a certain number of times per hour, it is probably more than my form/script would use but I want to create a script that is minimally intrusive. My main question is... What is the best practice for accessing the information once and storing it long enough to let the API reset? I was wondering about creating a cookie but there is the possibility of users that have them disabled. (Also, I am doing this as a personal project but I like the people I work for and I think this would help them out.) Thanks in advance.

    Read the article

  • Running VMWare EXS(i) on Apple Xserve

    - by xzyfer
    So we're running VMWare Esx(i) (I'm not completely sure which as I'm out of the office) running on Windows Server 2008. However it turns out the machine we're running it on has serious hardware limitations, most importantly it's restricted to 4gb of ram. We've since inherited a much more powerful server. The problem being the new server is an Apple Xserver running, I believe, Snow Leopard Server. My question is, can I run VMWare Exs(i) on Xserver, or an equivalent? I'm done some hardcore Googling and the best that I can find is that it's not supported, but it might work, but there are no guarantees (this has been stated many times on the VMWare forums by the VMWare support staff). But all these search results are years old, so I can't find any recent answers regarding this. Has anyone accomplished this?

    Read the article

  • How does Linux's unlink on a NTFS filesystem differs from Window's own implementation?

    - by DavideRossi
    I have an external USB disk with an NTFS filesystem on it. If I remove a file from Windows and I run one of the several "undelete" utilities (say, TestDisk) I can easily recover the file (because "it's still there but it's marked as deleted"). If I remove the file from Linux (I'm using Ubuntu) no utility can recover the file (unless I use a deep-search signature-based one). Why? It looks like Linux does not just "mark it as deleted" but it wipes away some on-disk structure, is this the case?

    Read the article

< Previous Page | 591 592 593 594 595 596 597 598 599 600 601 602  | Next Page >