Search Results

Search found 12826 results on 514 pages for 'third party controls'.

Page 197/514 | < Previous Page | 193 194 195 196 197 198 199 200 201 202 203 204  | Next Page >

  • Webcast: SANS Institute Product Review of Oracle Identity Manager 11gR2

    - by B Shashikumar
    Translating the IT-centric, directory based view of access and authorization into the process-driven concerns of business users inevitably creates unique challenges. Enterprises struggle to determine which users have access to what resources and what they are doing with that access. Enforcing governance controls is critical to reduce the risk that an employee or malicious third party with excessive access will take advantage of that access. Dave Shackleford, SANS analyst, recently reviewed the User Provisioning capabilities of Oracle Identity Manager 11gR2. In this webcast, attendees will hear from Dave and other Oracle and customer experts on: The key challenges associated with implementing self-service user provisioning Oracle’s unique online “shopping cart” model for self-service access request Real world case study of user provisioning Best practices for deployment Register today, for this complimentary webcast, hosted by The SANS Institute. Attendees will be among the first to receive a new SANS Analyst Whitepaper on this subject. When: Thur Sep 27  9am PT/12p ET Where: Register here

    Read the article

  • Confusion about Rotation matrices from Euler Angles

    - by xEnOn
    I am trying to learn more about Euler Angles so as to help myself in understanding how I can control my camera better in the game. I came across the following formula that converts Euler Angles to rotation matrices: In the equation, I could see that the first matrix from the left is the rotation matrix about x-axis, the second is about y-axis and the third is about z-axis. From my understanding about ordinary matrix transformations, the later transformation is always applied to the right hand side. And if I'm right about this, then the above equation should have a rotation order starting from rotating about z-axis, y-axis, then finally x-axis. But, from the symbols it seems that the rotation order start rotating about x-axis, then y-axis, then finally z-axis. What should the actual order of the rotation be? Also, I am confuse about if the input vector, in this case, would be a row vector on the left, or a column vector on the right?

    Read the article

  • New version: Sun Rack II capacity calculator

    - by uwes
    A new release of the Sun Rack II capacity calculator is available on eSTEP portal. The tool calculates all the data necessary (power requirements, BTU, number of rack units, needed power outlets etc.) while inserting the many different kind of HW equipment in aSun Rack II cabinet (version 1000 and 1200). It takes into consideration most of the available servers, storage devices, tapes, and Netra products. There are also a couple of third party products which are taken into account. The spreadsheet can be downloaded from eSTEP portal. URL: http://launch.oracle.com/ PIN: eSTEP_2011 The material can be found under tab eSTEP Download.

    Read the article

  • Gnome 3 Shell extensions not working on Ubuntu 12.4 [closed]

    - by user63960
    Possible Duplicate: Gnome Shell Extension Empty I just upgraded to Ubuntu 12.4 running on a Win 7 box via VBox and switched the user interface to Gnome 3 but have a problem. In Advanced Settings (gnome tweak), the Shell Extensions window has no listings and the Theme window shows a "caution" triangle next to the Shell theme drop box. I have re-installed the default extensions using the Noobs Lab posted instructions: sudo apt-get install shell-extensions3.4 sudo apt-get install gnome-shell-extensions The commands appear to complete without error. Symptoms are: Gnome 2 visual appearance and no window borders or controls. To close a window, I have to click the window indicator in the sys tray and select the close menu item. Any ideas?

    Read the article

  • How To Remote Control Your Home Computer From Anywhere With VNC

    - by Chris Hoffman
    VNC allows you to remotely access a computer and use its desktop, either over the Internet or from another room in your house. Windows includes a Remote Desktop feature, but it’s only available in Professional editions of Windows. Some people may prefer TeamViewer or another service instead, but VNC allows you to install and manage your own server without using a centralized service. VNC clients and servers are available for all platforms, but we’ll be covering Windows here. Image Credit: photosteve101 on Flickr How To Create a Customized Windows 7 Installation Disc With Integrated Updates How to Get Pro Features in Windows Home Versions with Third Party Tools HTG Explains: Is ReadyBoost Worth Using?

    Read the article

  • 5 Ways To Quickly Launch Programs On Windows

    - by Chris Hoffman
    Do you still launch programs on Windows by hunting down a desktop shortcut and double-clicking it? There are better ways – Windows has several built-in tricks for quickly launching applications. Even if you know all the built-in tricks, you may want to try out Launchy or another third-party launcher – some people swear by them. They offer more features than the Start menu search built into Windows. HTG Explains: Is ReadyBoost Worth Using? HTG Explains: What The Windows Event Viewer Is and How You Can Use It HTG Explains: How Windows Uses The Task Scheduler for System Tasks

    Read the article

  • I loose some directories when i upgrade from Ubuntu 11.10 to 12.04

    - by maythux
    last day i upgraded my ubunut 11.10 desktop to ubuntu 12.04. I was running a KVM virtual about 7 machines and managed by virt-manage software.... anyway when i finished upgrading i found that virt-manager is not working so i have to reconfigure it again and install some other missing packages that was deleted!!!! anyway i solve this issue...then i started to restore my virtual machines i restore 2 machines without any problems the third and fourth ones (windows) make a check disk that takes more that 6 hours but finally it works... other machines i cant find their attached hard disks i don't know what happens but i cant found that files. 1- upgrading delete files!?!! 2- Is there anyway to restore those files? thanks in advance

    Read the article

  • How do I disable/modify CPU underclocking due to temperature on a laptop with a 2nd generation core cpu?

    - by Tyson Marchuk
    I am running Ubuntu 11.04 on a tablet with a Core i5-2557M processor. When doing processing intensive tasks the CPU is forcibly under-clocked to 800MHz (instead of the normal base of 1.7GHz.) The CPU temperature is around 75 C. I have disabled CPU scaling (set governor to performance) but this seems to have no effect. I would like to either modify the behavior so that the throttling happens at 95 C or I would like to disable it altogether. Changing the min/max frequency as root using cpufreq works until the temperature rises and then it ceases to work, ignoring a minimum frequency above the 800MHz. On Windows 7 there is a 3rd party utility that can do this (ThrottleStop). Thank you.

    Read the article

  • htaccess 301 redirect for payment page

    - by Chris Robinson
    I have a client who currently runs a venue and has ticket purchases made available through a third party. The way the site currently works is that there is a standard href in the nav menu to the ticket purchasing site. <a href'http://example.com/events'>Events</a> <a href'http://example.com/about'>About</a> <a href'https://someticketvendor.com/myclient?blah'>Tickets</a> They claim that they want to improve their SEO by appearing to integrate the ticket pages into their site. Having spoken to the ticket vendor, they only offer integration through iframes which is just horrible. I don't really know much about SEO but I'm wondering if I can create an htaccess rule to have http://example.com/tickets forward to href'https://someticketvendor.com/myclient?blah Are they are any negative SEO implications to doing this? Is there a better way this could be done?

    Read the article

  • How do I fix Flash player in Chrome 20?

    - by r0ckarong
    I just updated to Chrome 20.0.1132.43 which includes Flash 11.3.31.109. Since that update most of the flash videos I watch online will randomly display erratic behavior (skipping like a broken CD, "fast forwarding" at twice the frame rate with the audio being scrambled due to too fast playback, restarting every video after two seconds, fullscreen overlay being displayed but no image, fullscreen taking several seconds to actually show a picture, youtube player to go fullscreen but then hang in the controls fadeout animation with no picture -sound keeps playing). Is there anything I can do to resolve or work around this? I'm using Ubuntu 12.10 64Bit and the latest nvidia-current drivers 295.40 on a Geforce GT 440. It used to work in previous versions of Google Chrome.

    Read the article

  • Texture not rendering in correct order in xna 4?

    - by user1090751
    I am making a simple board game. In the game there is a fixed background called myTexture and others are textureGoat and textureTiger whicha are to be placed on top of the background(myTexture). But i am having problem that fourth and fifth component is not displaying however, the sixth component( i.e. myTexture) is appearing. Here is my code, please look at it protected override void Draw(GameTime gameTime) { GraphicsDevice.Clear(Color.Green); // TODO: Add your drawing code here spriteBatch.Begin(SpriteSortMode.BackToFront, BlendState.AlphaBlend); //placing tiger spriteBatch.Draw(textureTiger, new Rectangle(22, 25, 50, 50), Color.White);//first component spriteBatch.Draw(textureTiger, new Rectangle(22, 407, 50, 50), Color.White);//second component spriteBatch.Draw(textureTiger, new Rectangle(422, 25, 50, 50), Color.White);//third component spriteBatch.Draw(textureTiger, new Rectangle(422, 407, 50, 50), Color.White);//fourth component //placing goat spriteBatch.Draw(textureGoat, new Rectangle(125, 110, 50, 50), Color.White);//fifth component //placing background spriteBatch.Draw(myTexture, new Rectangle(0, 0, 500, 500), Color.White);//sixth component spriteBatch.End(); base.Draw(gameTime); }

    Read the article

  • Drop in service for account management, authentication, identity?

    - by Mike Repass
    I'm building an Android app and associated set of web services for uploading/downloading data. I need a basic (no frills) solution for account management (register, login, logout, verify credentials/token). What open source / third party solutions exist for this scenario? I need: create a new account db based on a salt simple web service to create a new account simple web service to authenticate supplied credentials and return some sort of token That's it, I can get by without 'fancy' email activation or password reset for the time being. Are there off-the-shelf components for this? Should I just use a 'blank' django or rails app to get this done? Seems crazy for everyone to be doing CREATE TABLE user_accounts ... Thoughts? Thank you.

    Read the article

  • Silverlight Release History : Q2 2010 Beta (version 2010.1.0609)

    Q2 2010 Beta New Controls: RadTreeListView As you have probably already noticed we started a major new initiative for completely re-writing the TreeListView control. Our first attempt (back in 2009) proved that our users are mostly interested in a TreeListView control that is based on theGridView control rather then the TreeView. Therefore, we decided to completely rebuild the control and the result is that the TreeListView now combines the powerful data-driven features from RadGridView with the...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Help assigning Product id for ecommerce site?

    - by Stanford Sequeira
    I am starting an eCommerce marketplace, I am new to eCommerce, but I am taking it up as a challenge. I will have multiple vendors on my site. and they will upload their products through csv.- for bulk upload however there will be certain popular products already listed in the database, they can add those to their listing(like amazon for 3rd party sellers). I have no idea how to assign product codes for every product, can you help me out? im taking about something like amazons asin number. or may be is it possible to let vendors assign their own numbers? how does that work?

    Read the article

  • Itty bitty ITTIA DB for Java Embedded Device Development

    - by hinkmond
    Here's a nice 3rd party itty-bitty database, called ITTIA DB, for Java Embedded and Mobile development See: ITTIA DB for Java Embedded Here's a quote: Java applications on mobile devices and other embedded systems can now leverage the robust shared access and data distribution features of ITTIA DB SQL with a new JDBC (Java Database Connectivity) driver released this week. This driver provides significant value for Java developers targeting embedded platforms such as QNX and Linux. Plus, it can exchange data with an Oracle back-end database. That's good if that's what you have on the back-end. Hinkmond

    Read the article

  • Internal mic not working on Aspire One D255

    - by user50652
    I can't get my internal mic to work with any app other than Sound Recorder. I've scoured the other posts on this topic and none seem to have an answer. I've installed Alsa Mixer, Pulse Audio controls, tried minimising one of the stereo channels but nothing works. The mic is not muted. There is no function key on the keyboard to mute the mic either. The only connector options are analogue mic or analgue input. Neither do anything.

    Read the article

  • About cdn architecture to route way

    - by Tony Lee
    Our web system, use the third-party cdn service. Assume that the user set the local dns with the googledns or opendns to visit our web sites, so cdn service will select the closest cdn proxy node. all right, but in fact the user's actual access position might outside there, cdn service may chose the one furthest away from the user node, so static resource access slower.. At present, my idea is if user local set dns server with googledns, and then first one we get the actual ip address of the user, tracerote to test a best routing lines, set up a cookie in user browser, and then set 302 header for response to jump to the which best cdn node. Whether the user's browser side traceroute tool can provide the best route decision-making ? Because we find that, once the user to set local dns server with the foreign network segment, for example : set dns with 8.8.8.8, so cdn routing will choose the foreign service node.

    Read the article

  • BUILD 2013 &ndash; Summary

    - by Tim Murphy
    Originally posted on: http://geekswithblogs.net/tmurphy/archive/2013/06/28/build-2013-ndash-summary.aspx BUILD was a wonderful experience.  It was great to see old friends, make new friends, learn about the latest Microsoft technology and party with a bunch of geeks.  It didn't hurt getting some awesome swag. While I Know that some people were disappointed that Microsoft didn't Say more about the XBox One, I was pleased with the information we got for developing Windows 8.1 and Windows Phone applications. Add to that the ability to pick the brains of MVPs and product team members was really worth the price of admission. It is going to take a while to digest all of the material and weeks to go through all the videos. In the end there is a lot of information that is going to improve my projects.  I look forward to what Microsoft has coming next seeing every one at the next BUILD. Technorati Tags: BUILD 2013,window's 8.1,Windows Phone,XBox One

    Read the article

  • Abandoment to blame?

    - by Larsenal
    I have a code snippet for an app that users are loading as a 3rd party script on their site. The general sequence is as follows: Site loads "http://www.example.com/foo.js" foo.js does stuff 1 to 2 seconds later, foo.js loads bar.js Now in a perfect world, I'd want to see matching counts for the calls to foo.js and bar.js. However, bar.js loads only about 94% of the time. I'm wondering how much of this discrepancy might be attributable to site abandonment given the fact that bar.js is delayed by 1 or 2 seconds. I posted here instead of StackOverflow since I think it's more a question about what would be typical time on page when users abandon the page.

    Read the article

  • Transfer domain from godaddy to another registrar and (somewhat) maintain privacy?

    - by anonymous-one
    Does anyone know if its possible in any ways to do this? Transfer a private domain (via domainsbyproxy) registered at godaddy to another registrar. While I know moving a domain from godaddy requires the privacy to be disabled, what we were thinking of doing is the following: a) Update the whois info inside domains by proxy to a 3rd party. Most likely a law firm who would in essnece become our 'custodian'. b) Wait 60 days (?) c) Disable domain privacy. Now the law firms details would become public. d) Conduct the domain transfer. e) Take ownership of the domain at the new registrar. Does something like this sound possible? Does anyone know any other way to handle this? Thanks.

    Read the article

  • Android Application for Final Year Project [closed]

    - by user1070241
    I hope this is the right place to post this question. Basically, I'm about to choose a Final Year Project for my third and final year in BSc Computer Science. I have worked with different apps and therefore I do have some experience with the Android SDK Platform in general. However, my question is this, how do you think an Android based project would go down with potential employers? I personally don't think the complexity of this project is lower than other projects proposed by my university. Please let me know what you think, and do share any experiences that you have had with this, if any. Thank you very much.

    Read the article

  • Is there a name for this use of the State design pattern?

    - by Chris C
    I'm looking to see if there is a particular name for this style of programming a certain kind of behavior into a program. Said program runs in real time, in an update loop, and the program uses the State design pattern to do some work, but it's the specific way it does the work that I want to know about. Here's how it's used. - Object Foo constructed, with concrete StateA object in it - First loop runs --- Foo.Run function calls StateA.Bar --- in StateA.Bar replace Foo's state to StateB - Second loop runs --- Foo.Run calls StateB.Bar - Third loop runs --- Foo.Run calls StateB.Bar - Fourth loop --- etc. So in short, Foo doesn't have an explicit Initialize function. It will just have Run, but Run will do something unique in the first frame to initialize something for Foo and then replace it with a different action that will repeat in all the frames following it- thus not needing to check if Foo's already initialized. It's just a "press start and go" action. What would you call implementing this type of behavior?

    Read the article

  • Java Phones: How to set up JTAPI?

    - by Adam Tannon
    I want to use JTAPI (1.4 - latest) to create an app that will call my phone whenever I need it to. I downloaded JSR043 (JTAPI specification) and have been reading the API docs and it seems pretty straight forward with respect to how to code JTAPI. However I seriously doubt that getting a Java app on my laptop to call my cell phone doesn't require some 3rd party or middle man service provider and possibly other entities/configurations as well. So I ask: besides using the JTAPI in my Java code, what do I need to install or set up to have a Java app that calls my phone? Thanks in advance!

    Read the article

  • Kansas City SQL Saturday 2012: BBQ Crawl

    - by Bill Graziano
    The next Kansas City SQL Saturday is coming up on August 4th.  We’ll have the usual SQL Saturday goodness: lots of technical sessions, great networking events and a fantastic speaker dinner.  And we’ll have the Third Annual Kansas City SQL Saturday BBQ Crawl.  On Friday afternoon we’ll visit a few BBQ places in town.  We tend to order big sampler plates and just share everything around.  It’s a great way to try a variety of styles.  This year we’ll be hitting an all new selection of BBQ joints. You don’t need to be a speaker to attend.  However the call for speakers is open until June 28th (hint, hint).  Locals and out-of-towners are all welcome. If you’re interested in attending send me an email and I’ll get you added to the list. We finish in plenty of time to get you to the speaker dinner – as if you could eat any more.

    Read the article

  • Multiple vulnerabilities in Wireshark

    - by RitwikGhoshal
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-4285 Numeric Errors vulnerability 3.3 Wireshark Solaris 11 11/11 SRU 13.4 CVE-2012-4286 Numeric Errors vulnerability 4.3 CVE-2012-4287 Resource Management Errors vulnerability 5.0 CVE-2012-4288 Numeric Errors vulnerability 3.3 CVE-2012-4289 Resource Management Errors vulnerability 3.3 CVE-2012-4290 Resource Management Errors vulnerability 3.3 CVE-2012-4291 Resource Management Errors vulnerability 3.3 CVE-2012-4292 Improper Input Validation vulnerability 3.3 CVE-2012-4293 Numeric Errors vulnerability 3.3 CVE-2012-4294 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability 5.8 CVE-2012-4295 Denial of Service (DoS) vulnerability 3.3 CVE-2012-4296 Resource Management Errors vulnerability 3.3 CVE-2012-4297 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability 8.3 CVE-2012-4298 Numeric Errors vulnerability 5.4 This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

< Previous Page | 193 194 195 196 197 198 199 200 201 202 203 204  | Next Page >