Search Results

Search found 9371 results on 375 pages for 'existing'.

Page 112/375 | < Previous Page | 108 109 110 111 112 113 114 115 116 117 118 119  | Next Page >

  • Identity Globe Trotters (Sep Edition): The Social Customer

    - by Tanu Sood
    Welcome to the inaugural edition of our monthly series - Identity Globe Trotters. Starting today, the last Friday of every month, we will explore regional commentary on Identity Management. We will invite guest contributors from around the world to share their opinions and experiences around Identity Management and highlight regional nuances, specific drivers, solutions and more. Today's feature is contributed by Michael Krebs, Head of Business Development at esentri consulting GmbH, a (SOA) specialized Oracle Gold Partner based in Ettlingen, Germany. In his current role, Krebs is dealing with the latest developments in Enterprise Social Networking and the Integration of Social Media within business processes.  By Michael Krebs The relevance of "easy sign-on" in the age of the "Social Customer" With the growth of Social Networks, the time people spend within those closed "eco-systems" is growing year by year. With social networks looking to integrate search engines, like Facebook announced some weeks ago, their relevance will continue to grow in contrast to the more conventional search engines. This is one of the reasons why social network accounts of the users are getting more and more like a virtual fingerprint. With the growing relevance of social networks the importance of a simple way for customers to get in touch with say, customer care or contract departments, will be crucial for sales processes in critical markets. Customers want to have one single point of contact and also an easy "login-method" with no dedicated usernames, passwords or proprietary accounts. The golden rule in the future social media driven markets will be: The lower the complexity of the initial contact, the better a company can profit from social networks. If you, for example, can generate a smart way of how an existing customer can use self-service portals, the cost in providing phone support can be lowered significantly. Recruiting and Hiring of "Digital Natives" Another particular example is "social" recruiting processes. The so called "digital natives" don´t want to type in their profile facts and CV´s in proprietary systems. Why not use the actual LinkedIn profile? In German speaking region, the market in the area of professional social networks is dominated by XING, the equivalent to LinkedIn. A few weeks back, this network also opened up their interfaces for integrating social sign-ons or the usage of profile data for recruiting-purposes. In the European (and especially the German) employment market, where the number of young candidates is shrinking because of the low birth rate in the region, it will become essential to use social-media supported hiring processes to find and on-board the rare talents. In fact, you will see traditional recruiting websites integrated with social hiring to attract the best talents in the market, where the pool of potential candidates has decreased dramatically over the years. Identity Management as a key factor in the Customer Experience process To create the biggest value for customers and also future employees, companies need to connect their HCM or CRM-systems with powerful Identity management solutions. With the highly efficient Oracle (social & mobile enabling) Identity Management solution, enterprises can combine easy sign on with secure connections to the backend infrastructure. This combination enables a "one-stop" service with personalized content for customers and talents. In addition, companies can collect valuable data for the enrichment of their CRM-data. The goal is to enrich the so called "Customer Experience" via all available customer channels and contact points. Those systems have already gained importance in the B2C-markets and will gradually spread out to B2B-channels in the near future. Conclusion: Central and "Social" Identity management is key to Customer Experience Management and Talent Management For a seamless delivery of "Customer Experience Management" and a modern way of recruiting the best talent, companies need to integrate Social Sign-on capabilities with modern CX - and Talent management infrastructure. This lowers the barrier for existing and future customers or employees to get in touch with sales, support or human resources. Identity management is the technology enabler and backbone for a modern Customer Experience Infrastructure. Oracle Identity management solutions provide the opportunity to secure Social Applications and connect them with modern CX-solutions. At the end, companies benefit from "best of breed" processes and solutions for enriching customer experience without compromising security. About esentri: esentri is a provider of enterprise social networking and brings the benefits of social network communication into business environments. As one key strength, esentri uses Oracle Identity Management solutions for delivering Social and Mobile access for Oracle’s CRM- and HCM-solutions. …..End Guest Post…. With new and enhanced features optimized to secure the new digital experience, the recently announced Oracle Identity Management 11g Release 2 enables organizations to securely embrace cloud, mobile and social infrastructures and reach new user communities to help further expand and develop their businesses. Additional Resources: Oracle Identity Management 11gR2 release Oracle Identity Management website Datasheet: Mobile and Social Access (pdf) IDM at OOW: Focus on Identity Management Facebook: OracleIDM Twitter: OracleIDM We look forward to your feedback on this post and welcome your suggestions for topics to cover in Identity Globe Trotters. Last Friday, every month!

    Read the article

  • Is acousting fingerprinting too broad for one audio file only?

    - by IBG
    So we were looking for some topics related to audio analysis and found acoustic fingerprinting. As it is, it seems like the most famous application for it is for identification of music. Enter our manager, who requested us to research and possible find an algorithm or existing code that we can use for this very simple approach (like it's easy, source codes don't show up like mushrooms): Always-on app for listening Compare the audio patterns to a single audio file (assume sound is a simple beep) If beep is detected, send notification to server With a flow this simple, do you think acousting fingerprinting is a broad approach to use? Should we stop and take another approach? Where to best start? We haven't started anything yet (on the development side) on this regard, so I want to get other opinion if this is pursuit is worth it or moot.

    Read the article

  • How do I reopen an instance window once it has disappeared from desktop?

    - by Mohamad
    I'm new to Ubuntu. I use Skype and often the main window just disappears from my desktop. The Skype instance itself is still running in the background. I know this because I can see its notifications on the bottom right side of the screen. If I click on the Skype icon again, Ubuntu will launch a new instance instead of maximizing the running instance. Of course this will not work because Skype will not let you sign in: Another instance of Skype may be running. How do I refocus/bring to the foreground the existing Skype instance? In Windows, you can restore running instances through the taskbar. I've tried cycling through open windows, but the running instance window is no where to be seen.

    Read the article

  • How to clear a Firefox address bar without selecting its content?

    - by zuba
    Sometimes I need to move an url from an app to a browser. I select the url, say in gvim, and make Firefox window active. Then I see that I should clear address bar before pasting the new url, which requires selecting existing url, which wipes the new url from PRIMARY clipboard out. What is the best way to put the new url from PRIMARY clipboard to address bar? Is there a shortcut to clear address bar and then to move focus there? ps I know I can use Ctrl-C to put the new url to CLIPBOARD clipboard, but I prefer to use PRIMARY clipboard.

    Read the article

  • Getting graduates up to speed?

    - by Simon
    This question got me thinking about how comapnies deal with newly-hired graduated. Do experienced programmers expect CS graduates to write clean code (by clean I mean code easily understandable by others — maybe that is too much to expect?) Or do significant portion of graduates at your place (if any) just end up testing and fixing small bugs on existing applications? And, even if they do bug fixes, do you end up spending double the amount of time just checking they did not end up breaking anything and creating new bugs? How do you deal with such scenarios when pair programming and code reviews are not available options (for reasons such as personal deadlines), and also what techniques did you find to get fresh graduate up to speed? Some suggestions would be great.

    Read the article

  • Introducing Windows Phone 7 Development Tools

    Today at MIX10, we are introducing the Windows Phone 7 Series development story.  At the heart of Windows Phone 7 Series development is Silverlight.  This enables you to bring your existing development skills in building Windows Phone 7 applications. Windows Phone Developer Tools CTP, Microsofts developer toolset for Windows Phone 7 Series, is available for download today. The Windows Phone Developer Tools CTP contains what you need to get started with Windows Phone 7 development. ...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • username mapped to a different account

    - by Ubuntuser
    I had 4 accounts on UBuntu 11.10. The /home folder is in a separate partition. Now, after I reinstalled Ubuntu 12.04 beta 2, I manually created the remaining 3 usernames so that it can use the existing home locations. However, after creating the users i found that the usernames have got mapped to the other home folders. For example user A got mapped to home folder of user B User B got mapped to home folder of user C User C got mapped to home folder of user A How do I change this so that the users get mapped to their correct account.

    Read the article

  • My wireless/WiFi connection does not work. What can I do?

    - by Wild Man
    Your situation You have successfully installed Ubuntu. You have just downloaded and booted Ubuntu live media. The latest LTS (see also HWE) or latest non-LTS release are preferred. See the list of Ubuntu releases that are currently supported.) You upgraded your Ubuntu installation to the latest release that the software updater offered you. WiFi worked before, but not now on the new release. You migrated your existing Ubuntu installation to new hardware. Your problem The wireless of your laptop or dekstop is not working. You tried switching the wireless switch off and on and you tried rebooting several times, but you don't see any WiFi access points. You can see your wireless access point, but you cannot establish a connection. You want to analyze the problem, but you don't know where to start or what information you can provide. Related questions I have a hardware detection problem, what logs do I need to look into?

    Read the article

  • Tree position terminology/naming

    - by wst
    This is a naming things question. I am processing trees (XML documents), and there are often special rules applied to nodes based on structure. It's been very difficult coming up with concise naming conventions for some cases, namely for nodes in the first position among their siblings, along with some recursive relationship: Given an arbitrary node, I want to describe its first child, and then that node's first child, and so on recursively. Given another arbitrary node, I want to describe its parent if the parent is first among its siblings, and that parent's parent if it's first, and so on recursively. Is there existing terminology to describe these tree positions? How would you name a variable or function that captures one of these cases so that it's intuitive to an unfamiliar developer trying to understand an algorithm?

    Read the article

  • Wubi on Windows 8 without secure boot?

    - by emersonhsieh
    I have a MacBook Pro. I've heard rumours that if Windows 8 is going to have this thing called "Secure boot", Wubi cannot work. At first I plan to install Ubuntu on my mac via Wubi(and windows via bootcamp), but since I can't find my Windows 7 Installation CD, I installed Windows 8 on my Mac and installed Ubuntu on a VM. Then suddenly Windows 8 Release Preview was released today so I decided to install over my existing copy of Windows 8 Consumer Preview. When I went to the Windows 8 Upgrade assistant, it said that the firmware on my Mac doesn't support Secure booting. I don't even know what it means, but since the Upgrade assistant said that the Mac cannot support secure booting, can I install Wubi successfully? And what is secure booting anyways? Any help will be appreciated.

    Read the article

  • RadCaptcha for ASP.NET AJAX audio feature available in Q1 2010

    Now that the Q1 2010 release is here, I want to bring your attention to a cool new feature in our RadCaptcha control for ASP.NET AJAX - audio support. Head on over to our online demos to see the feature in action. Enabling this on an existing CAPTCHA is easy - you just need to set the CaptchaImage-EnableCaptchaAudio property to true. Adding this feature to your site will allow blind or partially sighted people to use it as well. The audio support presents some very interesting possibilities for people who like to customize things. For example, you can replace the original audio files that come with the control (stored in the ~/App_Data/RadCaptcha/ folder in your web application) and add some custom ones - instead of hearing simply "alpha", you can make the control ask "enter the third letter in the word boat". You can also make it speak in ...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Single responsibility principle - am I overusing it?

    - by Tarun
    For reference - http://en.wikipedia.org/wiki/Single_responsibility_principle I have a test scenario where in one module of application is responsible for creating ledger entries. There are three basic tasks which could be carried out - View existing ledger entries in table format. Create new ledger entry using create button. Click on a ledger entry in the table (mentioned in first pointer) and view its details in next page. You could nullify a ledger entry in this page. (There are couple more operation/validations in each page but fore sake of brevity I will limit it to these) So I decided to create three different classes - LedgerLandingPage CreateNewLedgerEntryPage ViewLedgerEntryPage These classes offer the services which could be carried out in those pages and Selenium tests use these classes to bring application to a state where I could make certain assertion. When I was having it reviewed with on of my colleague then he was over whelmed and asked me to make one single class for all. Though I yet feel my design is much clean I am doubtful if I am overusing Single Responsibility principle

    Read the article

  • Introducing the Hardware Sales Consultant (Presales) Team in Greece

    - by fboufis
    Hello World and welcome to the blog of the Oracle Hardware Presales Team in Athens.The team is responsible for a cluster of six (6) countries which includes Greece, Cyprus, Malta, The Former Yugoslav Republic of Macedonia, Albania and Kosovo.We handle the complete hardware & systems software portfolio, namely: Engineered Systems: Purpose-build and General-purpose solutions Servers: SPARC (M & T-Series) & x86 (X-Series) servers Operating Systems: Oracle Solaris & Oracle Linux Virtualization Technologies: Oracle VM, Solaris Zones & Dynamic Domains Storage: NAS (ZFSSA), SAN (Axiom) & Tape (StorageTek) Systems Software: High Availability (Solaris Cluster) & Systems Management (Ops Center) and a multitude of other products, all of which will be the main topic of our blog. We design and propose solutions based on these products and assist both customers and partners in integrating those solutions in existing datacenters.We will be happy to support you in your projects, provide information and discuss your business issues, so do not hesitate to contact us.Filippos Boufis – Oracle Hardware Principal Sales Consultant

    Read the article

  • New: StorageTek SL150 Modular Tape Library Guided Learning Paths

    - by Cinzia Mascanzoni
    Now Available – The StorageTek SL150 Modular Tape Library Guided Learning Paths (GLPs). In order to apply to distribute the StorageTek SL150, partners must meet the following criteria: Be a Gold, Platinum or Diamond member of the Oracle PartnerNetwork in good standing with a valid OPN Agreement. Have confirmed acceptance from Oracle into the StorageTek Tape Storage Knowledge Zone. Have a valid Full Use Distribution Agreement (FUDA) v041610 or later with Oracle, be in the process of applying for one, or have a valid addendum to your existing Full Use Distribution Agreement with current hardware terms. Have met the resale competency criteria (GLPs): a.) StorageTek SL150 Modular Tape Library Sales Specialist (2 completed) b.) StorageTek SL150 Modular Tape Library PreSales Specialist (1 completed).

    Read the article

  • Nameservers and migrating a VPS

    - by MeltingDog
    I am primarily a front end developer who has been tasked with upgrading my companies VPS. As far as I understand, this is just the process of obtaining a new VPS with WHM/CPanel and then migrating the existing accounts over to the new VPS, testing the sites out, then pointing the DNS to the new nameserver records. That sounds pretty straightforward. What I am having trouble understanding is how to set up the new nameservers on the new VPS. How do I obtain/establish the new nameserver records for the new, blank VPS?

    Read the article

  • How can I port a MonoGame Windows Phone 8 game to iOS?

    - by Homer_Simpson
    I downloaded the trial version of Xamarin Studio and installed it on my iMac. In addition, I installed Xcode on my iMac so that I can use the iPhone emulators in Xamarin Studio. But I don't know how to use my MonoGame Windows Phone 8 source files in a Xamarin iPhone project. How can I use my Windows Phone code in an iPhone project? Can I import all my existing classes(for example Game1.cs) in an iPhone project without changing something? How can I port a MonoGame Windows Phone 8 game to iOS?

    Read the article

  • Announcement - Advisor Webcast HFM - Calc Manager

    - by THE
    Stay tuned for next weeks Advisor Webcast.Greg and Tanya are going to run a 45 Minute session on HFM and Calc Manager: Advisor Webcast: New Features and Improvements in HFM and Calculation Manager 11.1.2.2.300on Wednesday, 14.Nov.2012 - 16:00 CET As of the  Registration Note 1494304.1: This webcast is intended for people responsible for the operation and maintenance of Oracle Hyperion Financial Management application. This overview of new features and changes in HFM and Calc Manager, as well as upgrade paths and certified products is intended to support decision process for product upgrade. TOPICS WILL INCLUDE: New features and enhancements in Hyperion Financial Management Adding custom dimensions to existing applications Enhancements in Smartview, ICT, Equity Pickup and Taskflows modules Changes in User Interface Enhanced Copy Application Utility New in Calculation Manager Financial Management Script to Graphical Conversion

    Read the article

  • Bunny Inc. Season 2: Find Specialist Partner Resources for Success

    - by kellsey.ruppel
    You may need an additional hand to improve your IT infrastructure, or advice to evolve existing enterprise applications. Or perhaps you’re seeking revolutionary ideas to refresh online presence. Whatever the case, spotting the right partners’ ecosystem will be a central step to grow your business. Don't be a Hare Inc. company by wasting valuable time sourcing relevant expertise, competencies and proven successes on Oracle's product portfolio on your own. Follow Bunny Inc. in the fourth episode of the saga and discover what our worldwide partner community can do for you thanks to the new Oracle Partner Network Specialized program. 

    Read the article

  • Ubuntu 11.10 Unity - all Windows decorations disappear after I maximize any window

    - by korda
    When I maximize some of the windows all decorations disappear (by all, I mean on all windows)... Is that common issue on Unity or I'm just unlucky to have some prone to that bug configuration? Anyone have idea how to fix this? EDIT: It won't fix after unmaximize. It seems like maximazing window simply crashes window decorator. Decoration isn't displayed for all existing windows and any new ones. Only way I found to fix this is to run compiz --replace (but this ruins current windows placement - all windows end up on same desktop). It happens almost every time I maximize window.

    Read the article

  • Dynamic navigation mesh changes

    - by Nairou
    I'm currently trying to convert from grids to navigation meshes for pathfinding, since grids are either too coarse for accurate navigation, or too fine to be useful for object tracking. While my map is fairly static, and the navigation mesh could be created in advance, this is somewhat of a tower defense game, where objects can be placed to block paths, so I need a way to recalculate portions of the navigation mesh to allow pathing around them. Is there any existing documentation on good ways to do this? I'm still very new to navigation meshes, so the prospect of modifying them to cut or fill holes sounds daunting.

    Read the article

  • How to deal with "software end-of-life" situations?

    - by rwong
    When a vendor declares that they no longer intend to provide any support or services to a piece of software (and stated the intent to exit the business - offering no upgrade paths), and stated that customers must pay a nominal fee in order to have the existing data exported, what kind of recourse do programmers/customers have? Things I can think of: Need to purchase spare hardware and set up a spare environment on which the software can continue to operate. Various data export methods which do not require vendor involvement. (For example, screen scraping, printing to image followed by re-scanning, etc) Parallel systems where staff will duplicate the old data into a new system manually or semi-automatically Legal means, in case the vendor is in financial trouble Any other ideas? Assuming that there is no "circumvention" involved (no DRM, no DMCA), is data recovery or reverse engineering legal/acceptable?

    Read the article

  • If all variables are a subset of the superkey, is the database design 5NF? [migrated]

    - by Lukazoid
    I have a table called LogMessages, which has the following columns: Level A numeric value which represents Trace, Debug, Info, Warning, Error or Fatal Time A UTC time Message Foreign key to a Messages table Source Foreign key to a Sources table User Foreign key to a Users table From what I can see, all of these columns are a part of the super key; if any single value differs to an existing row, a new row can be created. My question is, does this design comply to fifth normal form? I am unsure as some groups of data will be repeating, however I don't believe this violates 5NF? (correct me if I'm wrong)

    Read the article

  • Resize images to specific height value in ImageMagick?

    - by Jason
    I've looked around for this, and can't find an easily implemented solution. Currently I'm working on an application that deals with panoramas. As they come out of the batch stitch process, the dimensions average 18000x4000. Using ImageMagick, how can I downscale those images to a specific height value while maintaining aspect ratio? According to the manual, the convert operation takes in both height and width to resize to while maintaining the same aspect ratio. What I'd like is to put in 600 and 1000 in my existing resize script function and have both a regular viewable image as well as a reduced size.

    Read the article

  • Game maps with "counties" that are split along lines that aren't necessarily straight

    - by pm_2
    I want to create a game environment that supports a 2D map. This is a really basic map, but must be split along lines that are not necessarily straight. So imagine a country with county boundaries. I then want to be able to detect drag / drop events within these counties. What I'm really looking for here is a pointer to where to start on this (how it has been done before - any existing libraries out there), as I'm sure that what I'm trying to do is not new - although I can't find a beginners guide for this anywhere.

    Read the article

  • How to script a reinstall (apt repo's and installed packages)

    - by Kurtosis
    I need to wipe my hard drive and reinstall Ubuntu. /home is on a separate partition, so I can back that up to a backup drive, then copy it back to the wiped drive, install ubuntu, and point it at the existing /home, no problem. However, I also want to script a reinstall of all my apt repo's and the packages I currently have installed, so I don't have to waste hours doing that manually. Anyone know a good way to do this? PS - At least, I'm pretty sure I have to wipe the drive. Need to install Windows 7, and only have an HP system restore disk that formats the whole drive, and not a legit Windows 7 install disk that lets me install on a single partition. If somebody know a way to trick the system restore disk to install only to a single partition, I'd love to hear it.

    Read the article

< Previous Page | 108 109 110 111 112 113 114 115 116 117 118 119  | Next Page >