Search Results

Search found 14292 results on 572 pages for 'high integrity systems'.

Page 175/572 | < Previous Page | 171 172 173 174 175 176 177 178 179 180 181 182  | Next Page >

  • A quick look at: sys.dm_os_buffer_descriptors

    - by fatherjack
    SQL Server places data into cache as it reads it from disk so as to speed up future queries. This dmv lets you see how much data is cached at any given time and knowing how this changes over time can help you ensure your servers run smoothly and are adequately resourced to run your systems. This dmv gives the number of cached pages in the buffer pool along with the database id that they relate to: USE [tempdb] GO SELECT COUNT(*) AS cached_pages_count , CASE database_id ...(read more)

    Read the article

  • Linux: Configure Xorg X11 Window System

    <b>nixCraft:</b> "My xorg.conf file is missing as I deleted accidentally for some reason. Now, Xorg try to probe my hardware on every startup. How do I configure Xorg under Debian or any Linux distro / operating systems?"

    Read the article

  • No Time for IT? Try Managed Services

    If maintaining your small business computer systems is a drag on your time and psyche, consider IT outsourcing. It frees up time, delivers better results, and a recent study shows it&#146;s more affordable than you might think.

    Read the article

  • No Time for IT? Try Managed Services

    If maintaining your small business computer systems is a drag on your time and psyche, consider IT outsourcing. It frees up time, delivers better results, and a recent study shows it&#146;s more affordable than you might think.

    Read the article

  • No Time for IT? Try Managed Services

    If maintaining your small business computer systems is a drag on your time and psyche, consider IT outsourcing. It frees up time, delivers better results, and a recent study shows it&#146;s more affordable than you might think.

    Read the article

  • Do We Still Need Database Design in the Era of Big Data?

    Many big data application implementations seem to begin with an existing data warehouse, one or more new high-volume data streams, and some specialized hardware and software. The data storage issue is often accommodated by installing a proprietary hardware appliance that can store huge amounts of data while providing extremely fast data access. In these cases, do we really need to worry about database design?

    Read the article

  • Increase Search Engine Ranking in 3 Simple Steps

    SEO is not difficult. All that is required is a basic understanding of the what goes into SEO. Generating backlinks and getting ranked well in search engines is one part of SEO and if you do that right, 95% of your work is done. Read on to know a simple way of generating high quality backlinks from authoritative websites.

    Read the article

  • Just what comes in the box?

    - by GavinPayneUK
    As a SQL Server architect/consultant/advisor/advocate/you name it, one of my roles is to advise clients on the best solution for their requirements and their budget .  That last piece may seem like common sense but people often forget with SQL Server where the dividing line between the Standard and Enterprise editions sits.  Knowing what comes in each edition, or more commonly what doesn’t come in Standard Edition especially in the area of high availability, is critical for me when I’m...(read more)

    Read the article

  • How Do You Get More Visitors to Your Website?

    If you are looking out to create revenue, remember one thing that having your company mentioned online, will not help. Your sales will not boost high, just because you have created a web portal and uploaded it. You must find out is the search engine indexing your web site.

    Read the article

  • Prevent specific applications from being run as administrator

    - by Unsigned
    Background Most installation toolkits have the ability to launch, automatically or otherwise, external programs after installation. This is often appears in the installer via such options as "Show readme", or "Start program". Issue The problem is, many of these installers are poorly coded, and do not drop permissions appropriately. For example, starting the application automatically, or opening the application's homepage in the browser, often results in launching the application or browser with the installer's Administrative privileges, or a "High" UAC integrity level! This has the potential to open up security breaches, by opening up the installed application, or a web page (and possibly browser add-ons), that are now running with elevated permissions. (This is the reason I strongly recommend never choosing auto-launch options when installing software.) Question The question is: Is there a way to prevent certain applications (such as a web browser) from ever being launched with Administrative privileges, i.e., an automatic drop-privilege?

    Read the article

  • How to Build Your Own Web Page in Just Minutes

    Is it possible, you ask? Can you, the non-technical computer user, build your own Web page quickly and without the need to employ a team of graphic and web designers? Yes, you can! There are simple web page design systems that show even the most inexperienced users how to create professional looking web pages in minutes.

    Read the article

  • Borrowing Advertising Links From SEO Websites

    SEO link building is just another form of mass advertising for products and services though on a strenuous criteria of earning more space on an online site. But just like other forms of advertisement, the best tried methods like the traditional brokerage of ads from known media entities also work for it. One can acquire high value links on a credit basis from an intermediary that will help advertise the firm using these lent links.

    Read the article

  • Prevent applications from being run as administrator

    - by Unsigned
    Background Most installation toolkits have the ability to launch, automatically or otherwise, external programs after installation. This is often appears in the installer via such options as "Show readme", or "Start program". Issue The problem is, many of these installers are poorly coded, and do not drop permissions appropriately, for example, opening the application's homepage in the browser... launching the browser with the installer's Administrative privileges, or a "High" UAC integrity level. This has the potential to open up security breaches, by opening up a webpage (and possibly browser addons), that are now running with elevated permissions. Question The question is: Is there a way to prevent certain applications (such as a web browser) from ever being launched with Administrative privileges, i.e., an automatic drop-privilege?

    Read the article

  • Ubuntu in USB.. Boot from fixed HDD?

    - by Z9iT
    I am having Ubuntu 12.04 minimal installed on my USB pen-drive; which I use on several systems as portable OS. I was thinking to edit the boot parameters so that before the main Ubuntu OS is loaded, it shows an option to Boot from Hard Drive for 5 seconds, and then boots to Ubuntu. This way i'll be able to have an option to boot to the OS installed on the Hard-Drive, without removing or unplugging my ubuntu USB stick. How do I edit the boot parameters to achieve this?

    Read the article

  • 5 Tips to Budget SEO and Improve Search Engine Ranking

    Some SEO people say if you've got a website, it's difficult to improve its search engine ranking. Actually, it's not. The success of SEO depends on the achievement of high quality and do follow backlinks. Most people used link building methods such as blog and forum postings. On the other hand, Google seemed to know the said techniques that's why the Googlebots are now looking for more unique backlinks.

    Read the article

  • Minitube, a YouTube Desktop Client for Linux

    <b>Tech Source:</b> "Do you want to watch YouTube videos in High-definition format without opening a web browser or without having the need to install Flash Player? If yes, then let me introduce you to a simple but capable YouTube desktop client called Minitube."

    Read the article

  • Automate hashing for each file in a folder?

    - by Kennie R.
    I have quite a few FTP folders, and I add a few each month and prefer to leave some sort of method of verifying their integrity, for example the files MD5SUMS, SHA256SUMS, ... which I could create using a script. Take for example: find ./ -type f -exec md5sum $1 {} \; This works fine, but when I run it each time for each shaxxx sum afterwards, it creates a sum of the MD5SUMs file which is really not wanted. Is there a simpler way, or script, or common way of hashing all the files in to their sums file without causing problems like that? I could really use a better option.

    Read the article

  • The Linux community is fragmented, or is it?

    <b>Technology & Life Integration:</b> "t has been said many times that if only the Linux community were to band together and start rooting for the same team so to speak, then Linux could easily surpass other proprietary operating systems. "

    Read the article

  • 5 Ways to Get Higher Returns on Your Investment With SEO

    There are any number of ways that you can optimize results on major search engines around the globe, and I'm going to discuss some of the several way's that you can choose to obtain high return on your investments. Some of the popular ways are through sites that you've developed, and ways to code them, making them more visible to major search engines.

    Read the article

  • Closed source software hurts GUI development

    <b>The Inquirer: </b>"As operating systems increasingly become visual feasts, those who want to create useful interaction enhancements are having to bend over backwards thanks to closed source software in order to bring innovation to the user's environment."

    Read the article

  • Landscape-like tool to distribute security upgrades to OS?

    - by Ichikata
    i'm looking for an alternative to Landscape, Spacewalk (for RHEL), or CTL to perform a specific job. I need to control and apply OS upgrades on ubuntu systems, for 100+ servers, and so far i wasn't that lucky. I've tried Approx tool (similar to apt-proxy), but it just caches the content, and what i really need to do is set update milestones, apply the upgrades to QA servers, validate, then Stage environment, and so on to Production. I hope I was clear enough, any answer will be much appreciated.

    Read the article

< Previous Page | 171 172 173 174 175 176 177 178 179 180 181 182  | Next Page >