Search Results

Search found 51125 results on 2045 pages for 'access point'.

Page 734/2045 | < Previous Page | 730 731 732 733 734 735 736 737 738 739 740 741  | Next Page >

  • 301 redirect from a country specific domain

    - by Raj
    I originally started using a .do domain extension for my site, but later realized that this country specific domain would prevent us from appearing in search results for places outside of the Dominican Republic. We started using a .co domain extension and redirected all requests to the new domain using an HTTP 301. The "Crawl Stats" in Google Webmaster Tools shows me that the .co domain is being crawled, but the "Index Status" shows the number of pages indexed at 0. The "Crawl Stats" for the .do domain says that it's being crawled and the "Index Status" shows a number greater than 0. I also set a "Change Of Address" in Google Webmaster Tools to have the .do domain point to the new .co domain. We're still not appearing in search results at all even for very specific strings where I would expect to find us. Am I doing something wrong?

    Read the article

  • Books or resources about x86 64 assembly written in AT&T style?

    - by Gnijuohz
    I know what I'm asking for is quite specific and many would say if you know x86 assembly, this wouldn't be an issue. But now I'm taking a course that requires me to use x86 64 assembly in AT&T style and I'm not familiar with assembly in the first place. So I think if I can find some books or web resources about x86 64 assembly written in AT&T convention, it'll help me the most. But so far, I haven't found such books or detailed web resources yet. So can anyone point me to some good resouces? Advice on learning Assembly is also appreciated here!

    Read the article

  • What makes a language (or feature) "hackerish"?

    - by iCanLearn
    I was reading the comments and answers to this question, and among them I found this: "And Java never was cool, simply because it threw the hacking part out of programming" and this: "And javascript is very hackerish language so after developing your frontend you feel very constraint when you return to java." What's the "hacking part" in programming, and what makes a language "hackerish"? What are some good examples of languages and features in languages that you would call "hackerish"? (Someone might say that I shouldn't be confused by the word "hackerish", that's it's not really a "proper" English word or something like that, but that's besides the point)

    Read the article

  • Get all triangles that are < N dist from you?

    - by CyanPrime
    Does anyone know of a way I could add a radius to this code for p? Like basically saying "this is true if the triangle is < N dist from the point" public boolean isPointInTriangle( Vector3f p, Vector3f a, Vector3f b, Vector3f c ) { return ( pointsAreOnSameSide(p, a, b, c) && pointsAreOnSameSide(p, b, a, c) && pointsAreOnSameSide(p, c, a, b) ); } public boolean pointsAreOnSameSide( Vector3f p1, Vector3f p2, Vector3f a, Vector3f b ) { Vector3f diffba = new Vector3f(0,0,0); Vector3f.sub( b, a, diffba ); Vector3f diffp1a = new Vector3f(0,0,0); Vector3f.sub( p1, a, diffp1a ); Vector3f diffp2a = new Vector3f(0,0,0); Vector3f.sub( p2, a, diffp2a ); Vector3f cross1 = Vector3f.cross(diffba, diffp1a); Vector3f cross2 = Vector3f.cross(diffba, diffp2a); return ( Vector3f.dot( cross1, cross2 ) >= 0 ); }

    Read the article

  • Why does Linq to Entity Sum return null when the result set is empty?

    - by Hannele
    There are quite a few questions on Stack Overflow about the Linq to Entity / Linq to SQL Sum extension method, about how it returns null when the result set is empty: 1, 2, 3, 4, 5, 6, 7, and many more, as well as a blog post discussing the issue here. I feel it is an inconsistency in the Linq implementation. I am assuming at this point that it is not a bug, but is more or less working as designed. I understand that there are workarounds (for example, casting the field to a nullable type, so you can coalesce with ??), and I also understand that for the underlying SQL, a NULL result is expected for an empty result set. But because the result of the Sum extension for non-nullable types is also non-nullable, why does the Linq to SQL / Linq to Entity Sum behave this way?

    Read the article

  • Installing Silverlight applications without the browser involved

    One of the features we are introducing in Silverlight 4 is a silent install mechanism for out-of-browser applications. Currently every out-of-browser application (trusted or not) starts from an in-browser mechanism. In some instances where you want to deploy the app via managed desktop software or perhaps via CD-ROM, you dont want to have to tell the user to start on an HTML page first. Now Im not going to write here about the merits of why you might want to do this other than to point out what...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Building a touch event driven UI from scratch: what algorithms or data types?

    - by user1717079
    I have a touch display. As input I can receive the coordinates and how many touch points are in use, basically I just get an X,Y couple for every touch event/activated point at a customizable rate. I need to start from this and build my own callback system to achieve something like Object.onUp().doSomething() meaning that I would like to abstract just the detection of some particular movements and not having to deal with raw data: what algorithms can be useful in this case? What statements? Is there some C++ library that I can dissect to get some useful info? Would you suggest the use of an heuristic algorithm?

    Read the article

  • Using <strong> for introductory paragraph to a post - a bad idea?

    - by user1515699
    I have a news website and on most posts the first paragraph is in bold. Currently the authors are just using <strong> to bold the paragraph, would it be better from an SEO point of view to rather use a paragraph class that is styled with p.bold {font-weight:bold;} <p class="bold">. Does <strong> on the first paragraph send the wrong message to search engines? The text is important but the main reason it is in bold is because it is the opening paragraph. I realise <strong> is used to emphasise certain words on a page

    Read the article

  • update-grub is setting a wrong linux root partition

    - by adrian m
    Initially, Ubuntu was installed on another partition (sda5 or sda4). At some point I did manually move the root partition to sda2. Now, the problem is that whenever a new kernel is installed, the automatic regeneration of the menu.lst is using the OLD Linux partition. So I have to manually change in menu.lst the lines : root (hd0,5) into root (hd0,1) How can I configure update-grub to automatically generate menu.lst with the current Linux root partition? I assume that the (hd0,5) was written somewhere at installation, but I couldn't find it.

    Read the article

  • Escaping %’s in file-/folder-names at the command-line

    - by Synetech
    Does anybody of a way to access files and directories that have a % in their name (which is valid) from the command-line? Specifically, if there are two %’s and the text between them happens to correspond to an environment variable. For example, if there is a file called C:\blah\%temp%.txt or a folder called C:\Program Files\%temp%\, none of the following will work because the variable gets expanded: > dir "c:\blah\%temp%.txt" > dir "c:\blah\^%temp^%.txt" > dir "c:\blah\%%temp%%.txt" > dir "c:\blah\\%temp\%.txt" > dir "c:\program files\%temp%" > dir "c:\program files\^%temp^%" > dir "c:\program files\%%temp%%" > dir "c:\program files\\%temp\%" Using wildcards will work, but does not uniquely select the file/folder and may include others: > dir "c:\blah\?temp?.txt"        (also shows ztempz.temp, 1tempa.txt, etc.) > dir "c:\program files\?temp?"   (likewise) (This is frustrating because every now and then—usually when Explorer is restarted for whatever reason—the environment variables stop expanding and some places where they are used end up creating files or directories with the environment variable in it. For example, because I configured Chromium to store its cache in a subdirectory of %temp%, if the variable expands, it is fine, but when it doesn’t, Chromium creates a directory called %temp% under its own directory and stores the cache—which can get large—there. I want to add a line to my temp-/junk-file cleaning script to automatically delete that folder if it exists, but I cannot figure out how to access it from the command-line without resorting to wildcards.)

    Read the article

  • ASUS U24a can't boot without live disk

    - by user98965
    I recently picked up a new ASUS U24a while travelling in asia. I've managed to go through hell with the UEFI setup, and finally now have a working GRUB. However, I can't manage to get past the "Loading initial ramdisk". If I boot the live CD-USB (only in BIOS legacy mode), I get a wonderful, working Ubuntu. I finally managed to get UEFI installed on the hard-drive (no option for legacy BIOS boot, or I'd be there in a flash!), and can boot in UEFI mode into GRUB2. But... I can't manage to get past the "loading initial ramdisk". It appears that the disk drivers are failing (there is no disk activity after this point). Ideas? pastebin from the boot-repair is at: http://paste.ubuntu.com/1290011/ best, -tony

    Read the article

  • Microsoft va-t-il devoir racheter Nokia pour pérenniser Windows Phone ? Le constructeur finlandais est de plus en plus dans la tourmente

    Nokia de plus en plus dans la tourmente Microsoft va-t-il devoir racheter le constructeur finlandais pour Windows Phone ? Nokia coule-t-il à pic ? Peut-être pas encore, mais le constructeur se rapproche dangereusement du point de rupture. Après avoir dévoilé de mauvais résultats prévisionnels (une perte d'exploitation de plus en plus importante qui dépassera les 3% du CA), et en dessous des attentes, l'action du groupe s'est littéralement écroulée de 18 % pour atteindre son plus bas depuis plus de 12 ans. [IMG]http://ftp-developpez.com/gordon-fowler/Nokia%20Bourse%202.png[/IMG] Conséquence de ces résultats, Nokia va fermer son usine finlandaise ? seule la R&a...

    Read the article

  • Application of LGPL license on a simple algorithm

    - by georgesl
    The "scope" of the GNU license is troubling me : I know it has been answered many times ( here, here, ... ) but shouldn't we take into consideration the complexity and originality of a code before using GPL license ? I explain : I'm working on a pet project using the DTW algorithm that I have written in C using the pseudo-code given on the wikipedia page . At one point I decided to change it for a C++ implementation ( just for hone my c++ skill ) . After doing so, I've looked for an existing implementation on the web, to compare the "cleanliness" of it, and I found this one : Vectored DTW implementation, which is part of limproved, a C++ library licensed under GPL v3 . Personnally, I don't mind the GNU license because it is a personnal project, which will never led to any kind of commercial purpose, but I wonder if this implementation can abide a company using it to open their code ( and other FOSS permissions ). Theoretically, I think it can ( I may be wrong :p ), but the algorithm in question is so simple (and old) that it should not.

    Read the article

  • Next project. GW or webOS enyo framework [closed]

    - by Juanin
    I'm considering the use of GWT for next project. We already know java and the front-end its already writteng in Android java (not the same at all, but its a starting point). We are also considering enyo framework, from HP's webOS. Its seem interesting and its only javascript for everything. Does anybody have tested it yet?. Could it be a risky business to develop with HP? Target: Deskopt web browser, first. Mobile tablet browsers, second.

    Read the article

  • Port flash game to native android

    - by wirate
    Alright here is the problem: the creators of a quite popular flash-based game have asked me to port their game to Android. They are not interested in any other platforms so we don't need to be worrying about iOS or PC. They want the best performance on just Android (I guess that's the point of porting a flash-based game. They could have just went with it) They found Unity 'slow'. How would the performance (on android) of other engines compare? Are they expecting too much i.e. finding Unity slow? I am in favor of Unity since development is a little easier with more things being visual (I am not experienced as you might have guessed). This would be an example of the type of game I am to port Thanks!

    Read the article

  • NetworkManager refuses to manage my WLAN interface

    - by user104167
    I'm using Ubuntu 12.10 with Gnome 3.6 on a brand-new Samsung NP900X4C. The installer detected the wireless adapter, took in the SSID and WPA passphrase, wrote these into /etc/network/interfaces and connected perfectly. Once installation was finished I wanted to switch to using NetworkManager to manage the wireless adapter, since this is much more convenient than fiddling with /etc/network/interfaces every time I find a new hotspot. Therefore I edited /etc/NetworkManager/NetworkManager.conf to set: [ifupdown] managed=true When I rebooted NetworkManager, the problems started: - The NetworkManager tray applet changed from saying device not managed to device not ready - I lost all internet connectivity as wlan0 would not associate to the Access Point - if I set managed=false in NetworkManager.conf and restarted both NetworkManager and networking services from the command-line, the Gnome desktop "semi-crashed" and lost all its Window Decorations, the panel, the launcher and basically became unusable. However if I restart the computer completely after setting managed=false, wlan0 once again works perfectly.

    Read the article

  • Using Plesk for webhosting on Ubuntu - Security risk or reasonably safe?

    - by user66952
    Sorry for this newb-question I'm pretty clueless about Plesk, only have limited debian (without Plesk) experience. If the question is too dumb just telling me how to ask a smarter one or what kind of info I should read first to improve the question would be appreciated as well. I want to offer a program for download on my website hosted on an Ubuntu 8.04.4 VPS using Plesk 9.3.0 for web-hosting. I have limited the ssh-access to the server via key only. When setting up the webhosting with Plesk it created an FTP-login & user is that a potential security risk that could bypass the key-only access? I think Plesk itself (even without the ftp-user-account) through it's web-interface could be a risk is that correct or are my concerns exaggerated? Would you say this solution makes a difference if I'm just using it for the next two weeks and then change servers to a system where I know more about security. 3.In other words is one less likely to get hacked within the first two weeks of having a new site up and running than in week 14&15? (due to occurring in less search results in the beginning perhaps, or for whatever reason... )

    Read the article

  • How to diagnose computer freezing problem

    - by reinierpost
    I have a laptop (a Medion from Aldi) that tends to hang quite often - so often, in fact, that several attempts to install Windows XP or Ubuntu on it have all failed. However, I am able to boot and run Ubuntu as found on the standard Ubuntu 10.10 installation image. I have done this two times thus far. The first time everything was running smoothly, until at some point the GUI (i.e. X) became unresponsive. The cursor kept moving with the mouse, but menus would no longer show and clicking things no longer produced any response. So I switched to the consoles (Ctrl-F1, Ctrl-F2, etc., which in this setup automatically run shells. The shells were still responsive, and the cd command would still work, but any command that invoked an executable (e.g. /bin/ls or cd /bin; ./find caused the shell to hang up uninterruptibly. My hypothesis was that all attempts at disk access were hanging up, but I didn't actually try a command like echo /proc/$$ or while read line; do echo $line; done < /var/log/syslog to verify this. Another possibility is that an essential system library is cached in memory and somehow failing to function properly. The second time I left the system running overnight and it didn't hang itself spontaneously. I'm not sure I have the patience to just twiddle with the running system until the condition reappears, and I'm, not sure what to do once it does. Clearly we can rule out a software cause. It seems disk access related, but clearly it's not permanent hard disk failure because the system will reboot just fine. What kind of hardware problem might produce these symptoms? Can it be a memory problem?

    Read the article

  • IPTABLES syntax help to forward Remote Desktop requests to a VM [CentOS host]

    - by NVRAM
    I've a VM running MSWindows XP hosted on my CentOS 5.4 machine. I can rdesktop into it from the hosting machine and work just fine using the private ddress (192.168.122.65), but I now need to allow Remote Desktop access from other computers (not just the machine hosting the VM). [Edit] I only need to allow access for a day or so, so don't want to add a NIC (for XP activation reasons). Could someone help me with the iptables syntax? The VM is on a private/virtual network: 192.168.122.65 and my CentOS machine is on a physical network, at 10.1.3.38 (and 192.168.122.1 as the GW for the virtual net). I found this question, but none of the answers seemed to work and I'm a bit timid at blindly trying variations. My FORWARD rules are as listed. Thanks in advance. # iptables -L FORWARD Chain FORWARD (policy ACCEPT) target prot opt source destination ACCEPT all -- anywhere 192.168.122.0/24 state RELATED,ESTABLISHED ACCEPT all -- 192.168.122.0/24 anywhere ACCEPT all -- anywhere anywhere REJECT all -- anywhere anywhere reject-with icmp-port-unreachable REJECT all -- anywhere anywhere reject-with icmp-port-unreachable RH-Firewall-1-INPUT all -- anywhere anywhere [Edit] If I do play "blindly" is there a simple way to reset the settings on CentOS (a la service network restart)?

    Read the article

  • How do I get Apache 2 to read this directory?

    - by Mike
    I'm on Mac OSX and i I have apache2 installed via MacPorts, running as the _www user. I have some files I want to serve in the /Users/Me/Documents/abc folder. Right now, though, the permissions of /Users/Me/Documents are 700. So, _www can't get in, even if abc is chmod 777. I recognize the following options: Allow _www access to my Documents folder. Put the files I want to share outside of my Documents folder. Hard-link the files outside of my Documents folder, and point apache to the hard links. None of these solutions are acceptable to me, however. I don't feel safe allowing _www access to my entire Documents folder. I really want to keep the files in my Documents folder for other reasons. The files are changing all the time, so hard-linking would not always reflect the right file structure, and, as I understand it, you can't hard-link a directory (though, if you could, that would solve it). Any ideas for a solution? Is there a way to run a few httpd processes as my user account so it can get in there? Or, is there some way to hard-link a directory, or some way to get httpd to follow a symlink past a directory that is 700 not owned by _www? Thanks!

    Read the article

  • Can I stop battery charging at say 80% and switch to AC?

    - by elim
    While I was looking for a battery management utility for my Dell E5420, I came to read this post - How can I limit battery charging to 80% capacity? . Sofar, I haven't found one that relates to my laptop. So, I wonder now if any battery manager utility can be found for my laptop specified above. I would be happy if someone could point me if such utility is available under Ubuntu 12.04 that can stop charging a battery at a certain percentage and to ONLY use A/C mode. Again, to start using battery mode when the A/C is off or when the battery level reaches at certain level. Thanks for all your help. Elim.

    Read the article

  • Getting wireless N to work on Dell Vostro 3300?

    - by luisfpg
    I have a Dell Vostro 3300, which has a Broadcom BCM4313 wireless. The point is that I cannot make it work in N mode. NetwotkManager applet says I'm on 54 Mbit/s. Of course, my wireless router is N capable. I've double checked. Anyone knows what to do? Here is the output for lspci -v: 12:00.0 Network controller: Broadcom Corporation BCM4313 802.11b/g/n Wireless LAN Controller (rev 01) Subsystem: Dell Device 0010 Flags: bus master, fast devsel, latency 0, IRQ 17 Memory at fbb00000 (64-bit, non-prefetchable) [size=16K] Capabilities: <access denied> Kernel driver in use: wl Kernel modules: wl, brcm80211 Thanks a lot.

    Read the article

  • Critical Patch Update for October 2013 Now Available

    - by LuciaC
    The  Critical Patch Update (CPU) for October 2013 was released on October 15, 2013.  Oracle strongly recommends applying the patches as soon as possible.The Critical Patch Update Advisory is the starting point for relevant information.  It includes a list of products affected, pointers to obtain the patches, a summary of the security vulnerabilities, and links to other important documents. E-Business Suite Releases 11i and 12 Reference: Oracle E-Business Suite Releases 11i and 12 Critical Patch Update Knowledge Document (October 2013) (Doc ID 1585639.1) Secure Configuration Guide for Oracle E-Business Suite Release 12 (Doc ID 403537.1) Secure Configuration Guide for Oracle E-Business Suite Release 11i (Doc ID 189367.1)

    Read the article

  • Limitation of high level languages? [closed]

    - by user1705796
    My question may look bit philosophical and nonsense! But I need to know kind of instructions those are not well suitable in high level languages even in c? Or rarely use in the development of software? Like read/write content of CPU registers may useful in debugging programs. And access to cache memory required when developing OS (maybe I am wrong at this point). Is this kind of instruction available languages like Java, Python, C? I also have a second question: And Why all high level languages not having same uniform syntax; at-least same standard library interface name? In python there is and. Or operator is almost same as && and ||. I think Python is developed after C but space indentation is compulsory in Python. Why Python does not use brackets {}. I already know this question going to be highly down-voted.

    Read the article

  • Les diplômés IT plébiscités d'après le Ministère de l'Enseignement, les différences perçues entre Facultés et Grandes Ecoles s'estomperaient

    Emploi : les diplômés IT plébiscités D'après le Ministère de l'Enseignement, les différences perçues entre Facultés et Grandes Ecoles s'estomperaient Les filières technologiques, et particulièrement celles de l'informatique, seraient-elles le remède contre le chômage ? Elles semblent en tout cas pratiquement immunisées si l'on en croit le rapport du Ministère de l'Enseignement Supérieur publié par Le Point. Dans l'IT, « 97 % des diplômés 2008 ont trouvé un emploi, 93 % d'entre eux ont un CDI, et 98 % sont cadres », constate le magasine. Parmi ces jeunes diplômés, les étudiants qui sortent de facultés sont visiblement aussi bien représentés que ceux des grandes écoles...

    Read the article

< Previous Page | 730 731 732 733 734 735 736 737 738 739 740 741  | Next Page >