Search:

Type: Posts; User: Xiomar

Page 1 of 2 1 2

Search: Search took 0.01 seconds.

  1. Replies
    8
    Views
    2,082

    Re: 10 Tips for NAS selection

    Tip 10: NAS hardware or software?

    Of course there is also the question of whether any NAS hardware and software from a single complete product is needed. For an alternative, there are now a number...
  2. Replies
    8
    Views
    2,082

    Re: 10 Tips for NAS selection

    Tip 9: What add-ons you really need?

    The question is whether and what additional features useful and necessary. Examples of such functions are built-in media server, print server or connectivity...
  3. Replies
    8
    Views
    2,082

    Re: 10 Tips for NAS selection

    Tip 7: Snapshot functions check

    Other measures against data loss and unauthorized access is indispensable for professional systems. Standard mechanism against data loss is on NAS systems today,...
  4. Replies
    8
    Views
    2,082

    Re: 10 Tips for NAS selection

    Tip 5: Ease of use is key

    Just because SMEs often time-consuming phases of learning are not, should NAS systems are easy to use especially. Most convenient is it if the control via a Web interface...
  5. Replies
    8
    Views
    2,082

    Re: 10 Tips for NAS selection

    Tip 4: pure NAS solution or combination?

    In advance, you should take some thought, whether only unstructured data is stored on the system. It may be, for example in departmental systems, quite...
  6. Replies
    8
    Views
    2,082

    Re: 10 Tips for NAS selection

    Tip 3: CPU, RAM and connections determine the performance

    However, the capacity can be used only as good and fast as possible using the integrated processor. Whether a system is operated with a...
  7. Replies
    8
    Views
    2,082

    Re: 10 Tips for NAS selection

    Tip 2: Storage capacity planning

    Of course, there is opportunity in addition to these aspects, a host of technical issues that must be observed when users and administrators, then, using their NAS...
  8. Replies
    8
    Views
    2,082

    10 Tips for NAS selection

    Unstructured data such as pictures, e-mail attachments, documents and the like now make up the bulk of the data growth in enterprises. Such information is stored usually on NAS systems. Almost no...
  9. Re: Remove the icon for the Microsoft Office Upload Center from the desktop

    Remove the icon for the Microsoft Office Upload Center from the desktop

    When you install Office 2010, Microsoft Office Upload Center installed automatically. If you prefer, you can delete its icon...
  10. Re: How to use Microsoft Office 2010 upload center

    The Microsoft Office Upload Center open by clicking the icon which is given for the Microsoft Office Upload Center in the notification area, click, or another way is by selecting it from the Start...
  11. How to use Microsoft Office 2010 upload center

    Many users don't know how to and why are the Microsoft Office 2010 upload center are used. So I thought to post some tips that can guide you about the Microsoft Office 2010 upload center.

    In...
  12. Right hardware for virtualization and cloud computing

    The server performance is above average rise from some days. In contrast, the power consumption of server systems in terms of computing power has dropped tremendously. According to efficiently use...
  13. Replies
    4
    Views
    880

    Information about Intel X25-M Postville G2

    Intel X25-M offers the G2 - code-named "Postville" - to its new generation SSD. With 32-nm MLC NAND, cache and doubling capacity to 320 GB X25-M wants the G2 very fast SSDs from Samsung, OCZ rebuke &...
  14. Replies
    2
    Views
    1,067

    Re: Receive email on Linux system

    Run the following command to install it on a distribution based on Debian:

    apt-get install sendmail
    update-rc.d sendmail defaults
    / Etc / init.d / sendmail start Or these for distribution...
  15. Replies
    2
    Views
    1,067

    Re: Receive email on Linux system

    Then run this command, to take account of changes (it recreated the file / etc / aliases.db):

    newaliases System messages will now be redirected to your email account. Be careful though, so that...
  16. Replies
    2
    Views
    1,067

    Receive email on Linux system

    Linux servers are able to send emails to their directors to inform them of the good or bad operating system (result of a Crontab and logwatch...). By default, this feature is not enabled, here's how...
  17. Overclocking Corsair Dominator DDR3 1600 CL9 Memory

    http://img811.imageshack.us/img811/8830/unt1.png

    http://img442.imageshack.us/img442/152/img6n.jpg

    The three major 4GB Corsair Dominator bolt ran on standard clock surprisingly stable, with...
  18. Replies
    4
    Views
    1,534

    Poll: Best FTP client to access files remotely

    When it comes to FTP it comes to access and transfer files remotely, the old way. You can then log on to an FTP server to upload, edit, or download files from a computer remotely, using this...
  19. Replies
    4
    Views
    1,070

    Mobile Apps - native, web-based or hybrid?

    The hype about the apps for the iPhone, Google Android and other mobile platforms Smartphone-Web applications are almost forgotten. Basically, both approaches are suitable for the development of...
  20. Replies
    2
    Views
    1,542

    Re: VLSM and Routing Using RIPv2 Protocol

    For communication between different autonomous systems require routing protocols, which are classified as External Gateway Protocols (EGP). Within the class of IGP protocols are classified as:

    ...
  21. Replies
    2
    Views
    1,542

    Re: VLSM and Routing Using RIPv2 Protocol

    These protocols will be studied during this activity. Meanwhile, for more on this issue should give you the following questions:

    1. Why is it said that the subdivision VLSM subnets network into...
  22. Replies
    2
    Views
    1,542

    VLSM and Routing Using RIPv2 Protocol

    With IPv4 routing protocol, as the network grew, it entered a crisis of leadership, so both designers and network administrators had to make more efficient routing schemes. One technique is the use...
  23. Replies
    4
    Views
    858

    Using the replaceable parameter $ *

    You can use the replaceable parameter $ * to all of the text of the command to start a macro, followed by, a single parameter assign. Usually, different MS-DOS parameters by a space looking for. The...
  24. Replies
    4
    Views
    2,204

    Re: Some tricks of PHP code optimization

    Prefer the use of the function foreach () instead of using the couple while (list () = each ()). We'll prove it to fill an array of 1000 random values, then we'll walk 200 times this picture of two...
  25. Replies
    4
    Views
    2,204

    Re: Some tricks of PHP code optimization

    Turning now to the loops, and more specifically to the use of the count () function in a loop. Many of you put a count () in a loop so that the loop stops once to increment the variable exceeds the...
  26. Replies
    4
    Views
    2,204

    Re: Some tricks of PHP code optimization

    It is noted here that there is no average difference between print and echo (attention, however, I found that print could be faster than echo, but it's usually the opposite. The average has smoothed...
  27. Replies
    4
    Views
    2,204

    Re: Some tricks of PHP code optimization

    The single and double quotes:

    Let's start with a classic PHP namely single and double quotes (quotation marks). They derive their main difference is that everything is within single quotes is not...
  28. Replies
    4
    Views
    2,204

    Some tricks of PHP code optimization

    PHP is a language for programming interpreted, meaning that the text file containing the PHP code is parsed and then processed directly (not compiled code). We'll see how to improve the performance...
  29. Replies
    5
    Views
    1,515

    AMD Phenom II X4 965 C3 stepping

    AMD is once again a little life in the high-end sector of its own processor business. This does not happen with new releases in the true sense. Talking about the "known" AMD Phenom X4 965 Black...
  30. Thread: Linux Makefile

    by Xiomar
    Replies
    2
    Views
    723

    Re: Linux Makefile

    Using variables

    It defines and uses a variable like that. do not forget the parentheses.

    TEX = 1.tex
    LATEX = latex-interaction = nonstopmode-shell-escape

    all:
    $ (LATEX) $...
  31. Thread: Linux Makefile

    by Xiomar
    Replies
    2
    Views
    723

    Re: Linux Makefile

    Orders must be on one line. If you need more lines, we will put a backslash at the end. (Find a good example ...)

    all:
    trial.tex latex, bibtex trial; trial.tex latex, latex trial.tex;...
  32. Thread: Linux Makefile

    by Xiomar
    Replies
    2
    Views
    723

    Linux Makefile

    The make command knows how to make some files for example, it will create foo from foo.c or toto.cc. In these cases, a Makefile is not even necessary. However, most of the time, we need a Makefile:...
  33. Replies
    4
    Views
    653

    IBM Smart Business Desktop Cloud

    Cloud IBM Smart Desktop gives users the option of using a thin client or a PC with Java and a web browser to connect to a virtual machine operating system on a central server to produce. Smart...
  34. Re: Inheritance, Cascade, conflicts between styles

    Specificity

    The specificity, as the name might suggest, describes the relative importance of different rules within a style sheet. There are strict rules to calculate and apply are those that the...
  35. Re: Inheritance, Cascade, conflicts between styles

    Weight and origin

    From here on out will face another set of basic concepts, however, all traceable to the same area: the possible conflicts between the styles and rules. We will try in practice to...
  36. Inheritance, Cascade, conflicts between styles

    We're going to get into the heart of the mechanism of how CSS works. These rules are a bit complex, but basic. So maximum attention. The examples that accompany the theoretical part will help in the...
  37. Replies
    5
    Views
    1,268

    Security Protocols in Bluetooth

    In addition, protocols have various other application-related input in the Bluetooth standard displayed. These include the Object Exchange (OBEX) protocol, which was acquired from the IrDAStandard...
  38. Re: Interrogating database with the query in MySQL

    INTO OUTFILE is used to write the table result to an output file that will be created on the server (you can not use a file name already exists). The options are the same FIELDS and LINES already...
  39. Re: Interrogating database with the query in MySQL

    The terms that will form the columns in output may refer to columns of tables referenced, but can also be obtained with functions applied to columns, or mathematical expressions, or functions that...
  40. Re: Interrogating database with the query in MySQL

    In this case we will always have a line, because even here we used functions of the column. The columns, however, will be two, because we asked two values: the number of rows and the maximum value of...
  41. Interrogating database with the query in MySQL

    The SELECT statement is probably the most widely used in SQL, because it is one that allows us to perform the essential work that needs to do a database, retrieve data that is stored. Each SELECT...
  42. Replies
    2
    Views
    1,716

    Re: Blender : Images in cartoon style

    We can do is change the color of the two lamps duplicate: to the main assign the color yellow (R = 1.0, G = 1.0, B = 0.0) and red (R = 0.8 G = 0.0, B = 0.0) to the sphere above. To complete the...
  43. Replies
    2
    Views
    1,716

    Re: Blender : Images in cartoon style

    Once this together, we can replicate it twice to get the three traffic light. To duplicate one or more objects, you must select them and press 'Shift + D'. Then pressing 'G' and 'Z' (in succession),...
  44. Replies
    2
    Views
    1,716

    Blender : Images in cartoon style

    Here, we attempt to produce three-dimensional models in style "cartoon", a modus operandi that may prove helpful for creating stylized set of icons.

    Create an image of a traffic light in cartoon...
  45. Replies
    2
    Views
    1,319

    Re: High-Level Graphics in J2ME

    Graphic objects allow you to manage any commands that the user may be given from the terminal. This is done by creating objects Command whose associated actions are handled by a class that implements...
  46. Replies
    2
    Views
    1,319

    Re: High-Level Graphics in J2ME

    Our midlet start showing a form in which to insert the name of a friend of ours and his three phone numbers. The class that we use to start with, is the class Form : the use of other objects that...
  47. Replies
    2
    Views
    1,319

    High-Level Graphics in J2ME

    Classes that can be used to create interfaces in our applications are:

    high-level graphical components that derive from the class Screen (TextBox, List, Alert, and Form);
    class Canvas and...
  48. Modeling and composing objects in Expression Design

    Transactions between the tracks

    To easily create new forms we can use complex logic operations between the tracks. Drawing two overlapping objects can, through the Object menu> path operations,...
  49. Re: Countdown, redirects and text loader in Javascript

    As long as the seconds value does not reach zero, we will go back to our countdown, updating innerHTML with the id in which you will actually see the countdown.

    e = 0;
    function dots () {
    if...
  50. Countdown, redirects and text loader in Javascript

    You know, the title is a bit cryptic. But I do not think it was a better one, also because in fact, what I want to mark for future reference here is how to set a countdown in seconds, and at the end...
Results 1 to 50 of 63
Page 1 of 2 1 2
Page generated in 1,711,692,726.15754 seconds with 19 queries