Search Results

Search found 9471 results on 379 pages for 'technology tid bits'.

Page 164/379 | < Previous Page | 160 161 162 163 164 165 166 167 168 169 170 171  | Next Page >

  • Book Review: MCTS Self-Paced Training Kit (Exam 70-667): Configuring Microsoft SharePoint 2010

    Microsoft Certification Exams are tough even though it is multiple choice. You should refer to training kits available on the market before attempting an exam. Configuring Microsoft SharePoint 2010 is a comprehensive Self-Paced Training Kit for those looking to obtain Microsoft Certified Technology Specialist Certification. The book examines all aspects of Microsoft SharePoint 2010 in a detailed manner with the help of a mock exam in the accompanying CD-ROM. In this review, Anand analyses the content of the book and also provides suggestions for the improvement.

    Read the article

  • 10 Steps to Kick-Start Your VMware Automation with PowerCLI

    Virtualization is a powerful technology, but it comes with its own host of monotonous and time-consuming tasks, no matter how big or small your organization is. Eliminating these mind-numbing tasks (and the potential for error which they bring with them) is a goal with striving for, and well within your reach. Jonathan Medd explains.

    Read the article

  • Message "Getting information" don't close

    - by William
    I have Windows 7 x64 I installed this software and I have a problem. I like Ubuntu but I feel the softwares related Linux often have problems. We each time need to seek to resolve the malfunctions. my problem is , I am getting a message as Getting information, please wait and it don't disappear. My firewall is completely deactivate and I already go to the UAC or the firewall to allow the "exe" of the Ubuntu One software in the settings. Nothing runs.Linux never run at the first time. I'm really disappointed and discouraged. Please help me. Thank you for your answers... Ps : I have Windows 7 64 bits

    Read the article

  • choppy streaming audio

    - by user88503
    I could use some help troubleshooting choppy streaming audio. The problem is jerky playback regardless of audio or video with audio. Both Chromium and Firefox have the problem, however files played directly on the machine with Rhythmbox sound just fine. I'm running 12.04 LTS on a C2D T9300. Most of the audio problems others ask about seem to be hardware related, so the following information might be relevant. sudo lshw -c multimedia *-multimedia description: Audio device product: 82801H (ICH8 Family) HD Audio Controller vendor: Intel Corporation physical id: 1b bus info: pci@0000:00:1b.0 version: 03 width: 64 bits clock: 33MHz capabilities: pm msi pciexpress bus_master cap_list configuration: driver=snd_hda_intel latency=0 resources: irq:48 memory:f8400000-f8403fff

    Read the article

  • Stuck on Ubuntu Startup Screen

    - by Pietro
    Since yesterday, my system won't get past the startup screen (the Ubuntu logo with the blinking red dots). I left it for over an hour and didn't get the login screen. It was working normally before that and I don't recall any changes (no new software, etc). I can login through the terminal with ALT+F1 but I don't know what to do to get the graphic mode. The command startx fails. I'm running Ubuntu 12.10 64 bits on a Core I5 with Intel motherboard. No video card or sound card.

    Read the article

  • YouTube Developers Live: WeVideo

    YouTube Developers Live: WeVideo Please use Google Moderator to ask questions: goo.gl This week, we chat with the folks behind WeVideo. They're a cloud-based video editor, which lets users publish their final movie on YouTube. WeVideo's rendering farm prepares the complete movie from high-quality originals and uploads the final file to the user's YouTube channel using the Data API. From: GoogleDevelopers Views: 0 0 ratings Time: 00:00 More in Science & Technology

    Read the article

  • Highlights from Google I/O 2011

    Highlights from Google I/O 2011 Google I/O brings together thousands of developers for two days of deep technical content, focused on building the next generation of web, mobile, and enterprise applications with Google and open web technologies such as Android, Google Chrome, Google APIs, Google Web Toolkit, App Engine, and more. From: GoogleDevelopers Views: 19561 281 ratings Time: 01:54 More in Science & Technology

    Read the article

  • Why ASP.NET MVC is Preferable Today

    The marvelous technology inception from Microsoft, ASP.NET has for the past few years conquered the favoritism of a large section of the web application development community owing to its maturity and stability. The passage of time has rendered the ASP.NET not obsolete but a little behind the times maybe.

    Read the article

  • Debunking Dart Myths For Web Developers

    Debunking Dart Myths For Web Developers Addy Osmani interviews Seth Ladd to learn more about Dart. Join this episode to discover how Dart relates to JavaScript, who the intended audience for Dart is, and what Dart's motivations are. If you're curious what Dart is all about, and if it wants to replace JavaScript, this is the episode for you! From: GoogleDevelopers Views: 0 1 ratings Time: 00:00 More in Science & Technology

    Read the article

  • Plays Well With Others - Influence versus Authority

    - by KKline
    Originally appearing on http://KevinEKline.com on Nov 13, 2010 You’ve probably found that the prefix “lead” is a fairly common occurrence in the technology world. We have “lead developers”, “lead DBAs”, “lead architects”, and “lead consultants”. Yet, we don’t have “lead managers”, “lead directors”, or “lead VPs”. Why is that? Well, there are probably a number of different reasons for having “lead” technologist titles depending on who you ask. For example, the HR department might say that adding “lead”...(read more)

    Read the article

  • Analyze Your SEO Competition

    It is vital to analyze your Search Engine Optimization or SEO competition as part of running any business. With your online business technology has made it a relatively simple task, but it is essential to verify regularly where you stand against your competition.

    Read the article

  • New Whitepaper - Exalogic Virtualization Architecture

    - by Javier Puerta
    One of the key enhancements in the current generation of Oracle Exalogic systems—and the focus of this whitepaper—is Oracle’s incorporation of virtualized InfiniBand I/O interconnects using Single Root I/O Virtualization (SR-IOV) technology to permit the system to share the internal InfiniBand network and storage fabric between as many as 63 virtual machines per physical server node with near-native performance simultaneously allowing both high performance and high workload consolidation. Download it here: An Oracle White Paper - November 2012- Oracle Exalogic Elastic Cloud: Advanced I/O Virtualization Architecture for Consolidating High-Performance Workloads

    Read the article

  • Oracle Turkey Applications Strategy Update Event

    - by [email protected]
    By [email protected] on April 12, 2010 10:42 PM Oracle Turkey recently gathered a wide range of customers and associates for an Oracle Applications Strategy update event in Istanbul, as part of the worldwide Global Applications Smart Strategies Tour. The program discussed new technologies and with real-world examples, presented strategies for leveraging technology to succeed in today's challenging business environment.

    Read the article

  • Issue with text in a Intel 82945G Express Chipset Family

    - by user34681
    I am on Ubuntu 11.04 and the text in all the applications often looks with visual artifacts. I have installed xserver-xorg-video-intel. Attached a image so you can appreciate. lshw -c video output: *-display description: VGA compatible controller product: 82945G/GZ Integrated Graphics Controller vendor: Intel Corporation physical id: 2 bus info: pci@0000:00:02.0 version: 02 width: 32 bits clock: 33MHz capabilities: msi pm vga_controller bus_master cap_list rom configuration: driver=i915 latency=0 resources: irq:16 memory:dfe00000-dfe7ffff ioport:8800(size=8) memory:e0000000-efffffff memory:dfe80000-dfebffff In the text selected in green you can see the 'Online', 'File' and 'hassle' words cut.

    Read the article

  • Apple driving Adobe into Android's arms?

    <b>Linux Devices:</b> "Earlier this month, an Adobe employee told Apple to go screw itself over its new restrictive developer policies for the iPhone 4.0. Now, Adobe says, it's moving on, officially focusing its Flash technology on Google's Android and other competing smartphone platforms."

    Read the article

  • More Than a Map - Upande

    More Than a Map - Upande In Nairobi, Kenya, we met with Mark de Blois and Bernadette Ndege. Upande has created a variety of geospatial solutions using Google Maps and Earth for a diverse range of business clients, UN organizations, Government, Non-Governmental Organizations and the public sector. Upande project Virtual Kenya is an online geospatial platform to visualize and share data about Kenya. Read more on morethanamap.com #morethanamap From: GoogleDevelopers Views: 11 0 ratings Time: 02:05 More in Science & Technology

    Read the article

  • 3G Market Forecast to 2013

    With the introduction of 3G technology to offer customers better and high quality services, the development of wireless broadband communication system in both developed and developing countries has p... [Author: RNCOS E-Services Pvt. Ltd. - Computers and Internet - June 11, 2010]

    Read the article

  • A System That Creates Unlimited Traffic Without Google

    A new breakthrough technology that gives mass web traffic through a huge scale of ad networks without a need of the common ways of ads promotion. It is packed with all your needs in driving big number of prospects a day with no stress of maintaining and updating your website.

    Read the article

  • Google I/O Sandbox Case Study: Evite

    Google I/O Sandbox Case Study: Evite We interviewed Evite at the Google I/O Sandbox on May 10, 2011 and they explained to us the benefits of using App Engine to build their website. Evite is the world's largest online personal invitations platform, allowing users to create customized invitations for any type of gathering. For more information on App Engine Developers, visit: code.google.com For more information on Evite, visit: www.evite.com From: GoogleDevelopers Views: 29 0 ratings Time: 01:51 More in Science & Technology

    Read the article

  • Google I/O 2010 Keynote, pt. 3

    Google I/O 2010 Keynote, pt. 3 Video footage from Day 1 keynote at Google I/O 2010 For Google I/O session videos, presentations, developer interviews and more, go to: code.google.com/io From: GoogleDevelopers Views: 0 0 ratings Time: 09:59 More in Science & Technology

    Read the article

  • How can I estimate the entropy of a password?

    - by Wug
    Having read various resources about password strength I'm trying to create an algorithm that will provide a rough estimation of how much entropy a password has. I'm trying to create an algorithm that's as comprehensive as possible. At this point I only have pseudocode, but the algorithm covers the following: password length repeated characters patterns (logical) different character spaces (LC, UC, Numeric, Special, Extended) dictionary attacks It does NOT cover the following, and SHOULD cover it WELL (though not perfectly): ordering (passwords can be strictly ordered by output of this algorithm) patterns (spatial) Can anyone provide some insight on what this algorithm might be weak to? Specifically, can anyone think of situations where feeding a password to the algorithm would OVERESTIMATE its strength? Underestimations are less of an issue. The algorithm: // the password to test password = ? length = length(password) // unique character counts from password (duplicates discarded) uqlca = number of unique lowercase alphabetic characters in password uquca = number of uppercase alphabetic characters uqd = number of unique digits uqsp = number of unique special characters (anything with a key on the keyboard) uqxc = number of unique special special characters (alt codes, extended-ascii stuff) // algorithm parameters, total sizes of alphabet spaces Nlca = total possible number of lowercase letters (26) Nuca = total uppercase letters (26) Nd = total digits (10) Nsp = total special characters (32 or something) Nxc = total extended ascii characters that dont fit into other categorys (idk, 50?) // algorithm parameters, pw strength growth rates as percentages (per character) flca = entropy growth factor for lowercase letters (.25 is probably a good value) fuca = EGF for uppercase letters (.4 is probably good) fd = EGF for digits (.4 is probably good) fsp = EGF for special chars (.5 is probably good) fxc = EGF for extended ascii chars (.75 is probably good) // repetition factors. few unique letters == low factor, many unique == high rflca = (1 - (1 - flca) ^ uqlca) rfuca = (1 - (1 - fuca) ^ uquca) rfd = (1 - (1 - fd ) ^ uqd ) rfsp = (1 - (1 - fsp ) ^ uqsp ) rfxc = (1 - (1 - fxc ) ^ uqxc ) // digit strengths strength = ( rflca * Nlca + rfuca * Nuca + rfd * Nd + rfsp * Nsp + rfxc * Nxc ) ^ length entropybits = log_base_2(strength) A few inputs and their desired and actual entropy_bits outputs: INPUT DESIRED ACTUAL aaa very pathetic 8.1 aaaaaaaaa pathetic 24.7 abcdefghi weak 31.2 H0ley$Mol3y_ strong 72.2 s^fU¬5ü;y34G< wtf 88.9 [a^36]* pathetic 97.2 [a^20]A[a^15]* strong 146.8 xkcd1** medium 79.3 xkcd2** wtf 160.5 * these 2 passwords use shortened notation, where [a^N] expands to N a's. ** xkcd1 = "Tr0ub4dor&3", xkcd2 = "correct horse battery staple" The algorithm does realize (correctly) that increasing the alphabet size (even by one digit) vastly strengthens long passwords, as shown by the difference in entropy_bits for the 6th and 7th passwords, which both consist of 36 a's, but the second's 21st a is capitalized. However, they do not account for the fact that having a password of 36 a's is not a good idea, it's easily broken with a weak password cracker (and anyone who watches you type it will see it) and the algorithm doesn't reflect that. It does, however, reflect the fact that xkcd1 is a weak password compared to xkcd2, despite having greater complexity density (is this even a thing?). How can I improve this algorithm? Addendum 1 Dictionary attacks and pattern based attacks seem to be the big thing, so I'll take a stab at addressing those. I could perform a comprehensive search through the password for words from a word list and replace words with tokens unique to the words they represent. Word-tokens would then be treated as characters and have their own weight system, and would add their own weights to the password. I'd need a few new algorithm parameters (I'll call them lw, Nw ~= 2^11, fw ~= .5, and rfw) and I'd factor the weight into the password as I would any of the other weights. This word search could be specially modified to match both lowercase and uppercase letters as well as common character substitutions, like that of E with 3. If I didn't add extra weight to such matched words, the algorithm would underestimate their strength by a bit or two per word, which is OK. Otherwise, a general rule would be, for each non-perfect character match, give the word a bonus bit. I could then perform simple pattern checks, such as searches for runs of repeated characters and derivative tests (take the difference between each character), which would identify patterns such as 'aaaaa' and '12345', and replace each detected pattern with a pattern token, unique to the pattern and length. The algorithmic parameters (specifically, entropy per pattern) could be generated on the fly based on the pattern. At this point, I'd take the length of the password. Each word token and pattern token would count as one character; each token would replace the characters they symbolically represented. I made up some sort of pattern notation, but it includes the pattern length l, the pattern order o, and the base element b. This information could be used to compute some arbitrary weight for each pattern. I'd do something better in actual code. Modified Example: Password: 1234kitty$$$$$herpderp Tokenized: 1 2 3 4 k i t t y $ $ $ $ $ h e r p d e r p Words Filtered: 1 2 3 4 @W5783 $ $ $ $ $ @W9001 @W9002 Patterns Filtered: @P[l=4,o=1,b='1'] @W5783 @P[l=5,o=0,b='$'] @W9001 @W9002 Breakdown: 3 small, unique words and 2 patterns Entropy: about 45 bits, as per modified algorithm Password: correcthorsebatterystaple Tokenized: c o r r e c t h o r s e b a t t e r y s t a p l e Words Filtered: @W6783 @W7923 @W1535 @W2285 Breakdown: 4 small, unique words and no patterns Entropy: 43 bits, as per modified algorithm The exact semantics of how entropy is calculated from patterns is up for discussion. I was thinking something like: entropy(b) * l * (o + 1) // o will be either zero or one The modified algorithm would find flaws with and reduce the strength of each password in the original table, with the exception of s^fU¬5ü;y34G<, which contains no words or patterns.

    Read the article

  • How to get KeePass to properly work with Chromium?

    - by Tom
    The two-channel auto-type obfuscation feature of KeePass doesn't work for me with Chromium (on Ubuntu 12.04 64 bits). However, it works just fine with Firefox. Dows anyone know how to fix this? Textboxes in web forms in Chromium seems to have something special that causes this feature to fail. Only some of the username/password characters are being auto-typed. This might be related to this: if I select an entry in KeePass and click "Copy User Name", I can paste it fine with Ctrl+V in any textbox in Firefox, but I can't on Chromium. However, text copied using Ctrl+C from a regular text file (say, from gedit), can be pasted fine on both browsers. What may be wrong? I wouldn't like to deactive this feature for all the entries in my keepass files as I use them on Windows too and they work just fine there (even on Google Chrome for Windows). This feature gives an appreciated extra security measure against spyware/keyloggers.

    Read the article

  • Google Games Chat, Episode #9

    Google Games Chat, Episode #9 The Google Games Chat (official motto: "Way less fun than actually playing games") is back! We're hoping to deliver another exciting discussion about industry trends and hot new game-related technologies, but there's a pretty good chance it'll just devolve into 45 minutes of awkward silence. From: GoogleDevelopers Views: 0 5 ratings Time: 03:00:00 More in Science & Technology

    Read the article

< Previous Page | 160 161 162 163 164 165 166 167 168 169 170 171  | Next Page >