I want know when someone new or pro want buy (or use open source) OS what should he/she consider and how can he/she find out if this OS is proper for him/her?
I have some computers that I set up a couple years ago by creating a user account, setting it up the way I wanted, and copying that user's directory over Default User's directory. Pretty simple stuff.
One of the things that I did was to add a printer and set it as the default. Straightforward, or so I thought.
Things have changed, and that…
I noticed that the username I used to install Ubuntu got added to a bunch of groups in the /etc/group file. I'm getting rid of unneeded accounts. Would anything break if I removed that first account?
We want to give access to some Windows Server users so they can remotely have access to our server and download from a special folder of the server.
The licenses we give to users, are time base. There should be 1 month, 2 month, ..., 1 year, ... licenses.
CURRENT SITUATION (WHAT I DON'T WANT):
When users are created and added to the OS, a…
Background
I have a home server running Debian, and a workstation that runs various VirtualBox VMs (mostly Linuxen but some Windows).
At the moment, I'm creating my main user account anew for every new Linux VM. I'd like to make use of a centralized user-management scheme instead, so I can just configure the new VMs for the directory…
In our cluster, RedHat4 & 5 machines, if someone locks the computer and walks away no body can use it. Is there a feature in RedHat5, Gnome, KDE etc that would allow for the option of switching users at the lock screen, so more than one person can be logged in?
Thanks,
rd42
I have an Outlook 2010 user who can't receive email from another Outlook 2010 user. They are both in the same mailbox server in the same network. They can both send and receive email to anyone else in the organization. One just can't receive from the other. It's very strange.
Exchange server was recently migrated from 2007 to 2010…
so I wake up this morning and my mother drops the Dell laptop.
She starts it up and no desktop icons appear. I take a look (mind you I'm not totally awake yet), go to start menu, click a button (I forgot which one) and a window box pops up saying something a bout the hardrive (I think it might have said cannot be located) she's…
As I am familiar with some synthesizers, I often user real life circular sliders (e.g. to control the master volume), also called knobs. Like this one:
Sometimes I also find these controls in virtual applications (yes I like extreme minimalism =P):
But most of them are irritating, confusing or just wrong, and simple sliders…
<siteMapNode roles="*">
<siteMapNode url="~/Default.aspx" title=" Main" description="Main" roles="*"/>
<siteMapNode url="~/Items.aspx" title=" Adv" description="Adv" roles="Administrator"/>
....
any user can see Adv page. That is a trouble and a qustion : why and how to hide out of role sitenodes.…
By Misha Vaughan and Kathy Miedema, Oracle Applications User Experience
This
is the first in a series of blog posts on the user experience (UX)
highlights coming in various Oracle product families. You’ll see themes
around productivity and efficiency, as well as a thoughtful approach to
pushing UX capabilities into…
Do you have someone performing an Infrastructure DBA role within your organisation? Do you realise why today you now might need one? When I first started working with SQL Server there were three distinct roles in the SQL Server virtual team: developer , DBA and sysadmin . In my simple terms, the developer looked after the…
The age of the domain name has a very significant role to play in having the website ranked well on search engines. Search engines like Google take the age as a measuring tool for authenticating the website.
Charles Johnston, Senior Director, Insurance Industry Strategy and Marketing talks with Fred about the key business trends in the Insurance industry as well as the role of IT in the insurance industry.
I have a Samba file server running, and I was wondering how I could make multiple user accounts that have different permissions. For example, at the moment I have a user, smbusr, but when I ssh to the share, I can read, write, execute, and even navigate out of the samba directory and do stuff on the actual computer. This…
Hello everyone,
I apologize in advance for incorrect use of terminology, as I'm not an IT person by trade.
I'm doing some remote work via a VPN for a client and I need to add some DCOM Service security permissions for my remote user. Even though I'm on the VPN, the request for access to the DCOM service is using my…
I'm wondering if anyone is providing a solid solution for creating New Network User Account Request forms, and attaching workflows to them to automate account creation?
I'm currently investigating a number of options, but am surprised that such a ubiquitous task hasn't been solved a dozen times over and thoroughly…
Data validation, whether it be domain object, form, or any other type of input validation, could theoretically be part of any development effort, no matter its size or complexity. I sometimes find myself writing informational or error messages that might seem harsh or demanding to unsuspecting users, and frankly I…
Hi all,
I'd like to know if there is a way for a user account to be enabled or elevated to carry out system admin tasks WITHOUT having to use the root account or sudo.
Goal here is to allow a user account to Add/Delete users/printers without giving them the 'God' powers that the root account carries, in a way…
Data validation, whether it be domain object, form, or any other type of input validation, could theoretically be part of any development effort, no matter its size or complexity. I sometimes find myself writing informational or error messages that might seem harsh or demanding to unsuspecting users, and…
I have just fulfilled (is that a good term?) two user stories out of a new project backlog I have just built. These are user registration and password reset, both requiring mail. I need to implement a substitute mail component because my initial choice, and a normally reliable one, wasn't working.…
By Kathy Miedema, Oracle Applications User Experience
George Hackman, Senior Director, Applications User Experiences
The Oracle Applications User Experience team has some exciting things happening around Fusion Applications design patterns. Because we’re hoping to have some new…
1) user A goes to the site, creates an account, and logs in
2) user b goes to the site. Rather than having to log in, user b enters as though user b is user a. User b gets access to all of user a's data and can brows the site as user a.
Note: user b does not log in. User b just hits…