Search Results

Search found 65206 results on 2609 pages for 'real time'.

Page 891/2609 | < Previous Page | 887 888 889 890 891 892 893 894 895 896 897 898  | Next Page >

  • Google I/O Sandbox Case Study: DayZipping

    Google I/O Sandbox Case Study: DayZipping We interviewed DayZipping at the Google I/O Sandbox on May 10, 2011. They explained to us the benefits of integrating with Google Maps. DayZipping is a website where users can find and share day trips for a variety of popular destinations. For more information about developing on Google Maps, visit: code.google.com For more information on DayZipping, visit: www.dayzipping.com From: GoogleDevelopers Views: 33 0 ratings Time: 02:09 More in Science & Technology

    Read the article

  • Important SEO Mistakes

    Nowadays, you can see many Companies providing SEO services. Some SEO guys use purely ethical SEO techniques, while others use unethical SEO. Even the person who hired the SEO guy do not know about this. When his site gets punished that time he came to know. So the conclusion is, if you want to hire SEO, choose a reputable SEO consultant, one who will keep in regular contact with progress reports and updates

    Read the article

  • Google I/O 2010 - Keynote Day 2 Android Demo, pt. 1

    Google I/O 2010 - Keynote Day 2 Android Demo, pt. 1 Google I/O 2010 - Keynote Day 2 Android Demo, part 1 Video footage from Day 2 keynote at Google I/O 2010 For Google I/O session videos, presentations, developer interviews and more, go to: code.google.com/io From: GoogleDevelopers Views: 20 0 ratings Time: 10:23 More in Science & Technology

    Read the article

  • Keyword Selection

    As most marketers know from having experience on line, keyword selection is one of the top priorities to having your sales copy or article found in the search engines. Not only is this a top priority, it's the one thing you must spend time on to make sure you do have the keyword selection correct. You may ask.

    Read the article

  • How do I change my username?

    - by Takkat
    Some time ago when I installed Ubuntu I chose a rather stupid username for my account that I do not want to use anymore. How do I change this (including the name of my home directory) without loosing settings for applications? How do I keep permissions and my keys for various authentification (e.g. email, SSH, GPG and more)? What settings could possibly get lost if I changed my username? Both, command-line and graphical solutions are appreciated.

    Read the article

  • SSIS Training Comes to NYC 30 Jul-3 Aug!

    - by andyleonard
    Linchpin People is excited to announce the scheduling of From Zero To SSIS in New York City 30 Jul – 03 Aug 2012! Training Description From Zero to SSIS was developed by Andy Leonard to train technology professionals in the fine art of using SQL Server Integration Services (SSIS) to build data integration and Extract-Transform-Load (ETL) solutions. The training is focused around labs and emphasizes a hands-on approach. Most technologists learn by doing; this training is designed to maximize the time...(read more)

    Read the article

  • Minotaur V2.0 Released

    - by BizTalkMonitoring
    Raging Bull Tech released the next version of their monitoring product for BizTalk Server this week. Minotaur V2.0 brings to the market powerful new usability features allowing administrators to maintain monitored BizTalk solutions in less time with much less effort. The new analytical features allow administrators to quickly identify trends to isolate problematic components within the monitored solutions. Enhancements to the monitoring engine as well as the application will make Minotaur a powerful asset in the BizTalk operations team's arsenal

    Read the article

  • Google Games Chat, Episode #9

    Google Games Chat, Episode #9 The Google Games Chat (official motto: "Way less fun than actually playing games") is back! We're hoping to deliver another exciting discussion about industry trends and hot new game-related technologies, but there's a pretty good chance it'll just devolve into 45 minutes of awkward silence. From: GoogleDevelopers Views: 0 5 ratings Time: 03:00:00 More in Science & Technology

    Read the article

  • Starting problem fresh installed 12.10

    - by Emir Bulic
    I have downloaded ubuntu 12.10 image recently,and burned it to disc to install on my laptop everything worked fine until now,when i started it first time it got stuck on loading (Ubuntu title and dots below) i tried restarting and it got through,but new problem appeared After typing my password and logging in,it just freezes there with background and mouse pointer only visible.i can start terminal with ctrl alt f4 but thats all then after few mins,error comes up saying that application compiz has closed unexpectedly.whatever i click (relaunch or leave closed) it just stays frozen with background only.

    Read the article

  • Enhance That! [Comic]

    - by Asian Angel
    Works perfectly every time, right? Note: You can view the full-size version at the link below if you have trouble reading any of the text… I hate it in espionage TV series when… [Manu Cornet - Bonkers World Blog] Secure Yourself by Using Two-Step Verification on These 16 Web Services How to Fix a Stuck Pixel on an LCD Monitor How to Factory Reset Your Android Phone or Tablet When It Won’t Boot

    Read the article

  • Sending notification after an event has remained open for a specified period

    - by Loc Nhan
    Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 Enterprise Manager (EM) 12c allows you to create an incident rule to send a notification and/or create an incident after an event has been open for a specified period. Such an incident rule will help prevent premature alerts on issues that may correct themselves within a certain amount of time. For example, there are some agents in an unstable network area, and often there are communication failures between the agents and the OMS lasting three, four minutes at a time. In this scenario, you may only want to receive alerts after an agent in that area has been in the Agent Unreachable status for at least five minutes. Note: Many non-target availability metrics allow users to specify the “number of occurrences” or the number of consecutive times metric values reach thresholds before a notification is sent. It is best to use the feature for such metrics. This article provides a step-by-step guide for creating an incident rule set to cater for the above scenario, that is, to create an incident and send a notification after the Agent Unreachable event has remained open for a five-minute duration. Steps to create the incident rule 1.     Log on to the console and navigate to Setup -> Incidents -> Incident Rules. Note: A non-super user requires the Create Enterprise Rule Set privilege, which is a resource privilege, to create an incident rule. The Incident Rules - All Enterprise Rules page displays. 2.     Click Create Rule Set … The Create Rule Set page displays. 3.     Enter a name for the rule set (e.g. Rule set for agents in flaky network areas), optionally enter a description, and leave everything else at default values, and click + Add. The Search and Select: Targets page pops up. Note:  While you can create a rule set for individual targets, it is a best practice to use a group for this purpose. 4.     Select an appropriate group, e.g. the AgentsInFlakyNework group. The Select button becomes enabled, click the button. The Create Rule Set page displays. 5.     Leave everything at default values, and click the Rules tab. The Create Rule Set page displays. 6.     Click Create… The Select Type of Rule to Create page pops up. 7.     Leave the Incoming events and updates to events option selected, and click Continue. The Create New Rule : Select Events page displays. 8.     Select Target Availability from the Type drop-down list. The page shows more options for Target Availability. 9.     Select the Specific events of type Target Availability option, and click + Add. The Select Target Availability events page pops up. 10.   Select Agent from the Target Type dropdown list. The page expands. 11.   Click the Agent unreachable checkbox, and click OK. Note: If you want to also receive a notification when the event is cleared, click the Agent unreachable end checkbox as well before clicking OK. The Create New Rule : Select Events page displays. 12.   Click Next. The Create New Rule : Add Actions page displays. 13.   Click + Add. The Add Actions page displays. 14.   Do the following: a.     Select the Only execute the actions if specified conditions match option (You don’t want the action to trigger always). The following options appear in the Conditions for Actions section. b.     Select the Event has been open for specified duration option. The Conditions for actions section expands. c.     Change the values of Event has been open for to 5 Minutes as shown below. d.     In the Create Incident or Update Incident section, click the Create Incident checkbox as following: e.     In the Notifications section, enter an appropriate EM user or email address in the E-mail To field. f.     Click Continue (in the top right hand corner). The Create New Rule : Add Actions page displays. 15.   Click Next. The Create New Rule : Specify name and Description page displays. 16.   Enter a rule name, and click Next. The Create New Rule : Review page appears. 17.   Click Continue, and proceed to save the rule set. The incident rule set creation completes. After one of the agents in the group specified in the rule set is stopped for over 5 minutes, EM will send a mail notification and create an incident as shown in the following screenshot. In conclusion, you have seen the steps to create an example incident rule set that only creates an incident and triggers a notification after an event has been open for a specified period. Such an incident rule can help prevent unnecessary incidents and alert notifications leaving EM administrators time to more important tasks. - Loc Nhan

    Read the article

  • Changing jobs and leaving a project without a leader (aka, me)

    - by AnonUntilAfterTheEvent
    I'm the lead on a project that has been underway for about a year and a half. Two of us have been working on it. One is the database guy. I'm the javascript/ui guy. Which is to say, essentially no overlap in code knowledge. Here's the thing. Someone is about to offer me a sweet job with a nearly 30% bump in pay. Though I am perfectly happy with my current job and love the project, the new one would be better and I can't imagine saying no. The big problem is that my project is supposed to go into production starting in a few weeks. I will consider the new guys to have disqualified the new job by being bad people who would ruin my life if they won't cooperate and let me start after deployment. Since they seem like decent, ethical people, I don't expect that to be a problem. The current project will be brutalized by my absence. I take some comfort in the fact that I have emphatically requested an understudy for at least six months. That puts a little of the responsibility on the boss's head, but still, it's going to be a really bad thing. What do others of you do when you are a critical to a project when it's time to move on? Do I owe any obligation to stick around even though something better shows up? I know my spouse would object if I found someone else. Does that apply to work? I do have an understudy now, though he's fresh out of college. He's not going to replace me anytime soon. It's a small shop and the boss is going to be crushed. I am traumatized in anticipation of telling him and feel guilty about the practical consequences. I'm looking for some solace and some strategy about how to deal with this transition. Thank you for listening. =========================Subsequent notes ========================= @ChaosPandion, Chance: No, I can't stay to finish the project. I will insist on a compromise where I finish the current sprint (about a month from now) but there is at least a half year, probably a year of solid, full-time, work still to be done. I wouldn't expect the new employer to hold the job that long.

    Read the article

  • Grid Game Algorithm

    - by 7Aces
    Problem Link - http://www.iarcs.org.in/inoi/2009/zco2009/zco2009-1a.php You have to find the path with the maximum weight, from the top-left cell to the bottom-right cell. It could've been solved with a simple Dynamic Programming approach, if it were not for the special condition - you are allowed at most one move that can be either to the left or up. How do I now approach the problem with this special case? Also, I'm looking for a time-efficient approach. Thanks!

    Read the article

  • core.* files eating up server space (~50MB)

    - by skytreader
    I'm renting server space from someone and, upon logging in my control panel after quite sometime, noticed an abnormal spike (~50MB) in the disk usage. Upon investigating, I found a lot of core.* files scattered around my public_html directory. Each one is more than 5MB in size but no more than 6MB. The * part is all numbers (in programming regex, that should be core\.\d+). I downloaded one and checked the contents. There was a lot of balderdash characters (NUL mostly, but also a scattering of ETB, ETX, STX) but there's this block of readable text which says: This text is part of the internal format of your mail folder, and is not a real message. It is created automatically by the mail system software. If deleted, important folder data will be lost, and it will be re-created with the data reset to initial values. Pretty self-explanatory. A few blocks above the text are some more readable messages that look like logs but is sandwiched in between non printable characters. I've extracted some below. Scan not valid for mh mailboxes Bogus character 0x%x in news state Can't rewrite news state %.80s Error closing backup news state %.80s No state for newsgroup %.80s found Now, a few concerns: Am I under attack? The messages seem to be about my webmail but I don't use my personal webmail that much---only for a vanity email address and an inbox for an outdated comments system. However, lately, I seem to notice a spike in the spam for my vanity mail. (Note: the comments system is covered by a captcha but every now and then some get through. My vanity email has a spam filter but it isn't as good as I'd like). Next, if this is a feature, can I turn it off? Is it advisable to? I've only 150MB so you see why I'm fretting over a 50MB spike. Some final details: my only server-side scripts are in PHP. The directory which accumulated the most number of these core files is the one containing the Wordpress-managed subdomain of my site. I manage my server through CPanel. Lastly, I decided to delete this files and after some checking nothing seems amiss in my websites nor in my mail. They are indeed the ones responsible for the ~50MB spike as my disk space usage is back to expected.

    Read the article

  • How can I force SSH to give an RSA key instead of ECDSA?

    - by broiyan
    Upon the first time accessing a server, how can I force SSH to give me the RSA key and automatically store it if the user approves? Presently it is offering me the ECDSA key. Because I already know the RSA key, I would prefer to see the RSA key presented at this point. I have tried: ssh -o RSAAuthentication=yes user@server Unfortunately this gives me an ECDSA key and the Are you sure you want to continue connecting (yes/no)? message.

    Read the article

  • The Top Ten Myths From a Search Engine Optimization Point of View

    There are hundreds, if not thousands of SEO myths that continue to fly around the internet, forums and blogs on a daily basis, with new ones being added all of the time. For anyone beginning in the world of SEO or looking to optimize their website, these myths can often be confusing, especially when you are looking for the truth and just want to make sure your website does well.

    Read the article

  • Forums and SEO - A Friendly Best Friend

    Just as the title says it, forums are SEO's best friend. Proper utilization of forums can be a HUGE plus for your SEO, but at the same time, can completely trash and destroy your SEO and company. So forums need to be posted on correctly.

    Read the article

  • Why Use SEO on Your Website?

    SEO can be a time consuming, difficult and frustrating experience. Many webmasters abandon the process altogether, but there are many good reasons why you should pursue SEO for your internet website. A large amount of consumers use the internet first when attempting to find local businesses.

    Read the article

  • How I Built My First Paid Website

    I have been a web master or a website administrator for around a year or so, initially I built two sites which were entirely made using a free domain registrar and a free web host. The free things are always got at the cost of quality. It applied here as well, the main problem I faced with free web host was that their server up time was very low, most of the times the server was down and another problem was server overload, since lots of websites were built on a single server, the load on the server was very...

    Read the article

  • Friday Fun: Archers Oath

    - by Asian Angel
    This week’s game puts your archery skills to the test as you race against time to save innocent captives from the hangman’s noose. Are you good enough to show Robin Hood a thing or two about using a bow or will you be shot down in shame? How to Stress Test the Hard Drives in Your PC or Server How To Customize Your Android Lock Screen with WidgetLocker The Best Free Portable Apps for Your Flash Drive Toolkit

    Read the article

  • Has Your Site Been Sandboxed?

    In the first place, you want to avoid getting in to the 'box, and there are several ways this can be done. The first thing you should do is to be careful about how many links you get in the beginning. Submitting your new site to thousands of directories is sure to trigger some filters because it's not seen as natural. Similarly, a new site with thousands of pages could trigger a filter because websites generally grow over time.

    Read the article

  • How do you prevent inflation in a virtual economy?

    - by Tetrad
    With your typical MMORPG, players can usually farm the world for raw materials essentially forever. Monsters/mineral veins/etc are usually on some sort of respawn timer, so other than time there really isn't a good way to limit the amount of new currency entering the system. That really only leaves money sinks to try to take money out of the system. What are some strategies to prevent inflation of the in-game currency?

    Read the article

< Previous Page | 887 888 889 890 891 892 893 894 895 896 897 898  | Next Page >