Search Results

Search found 8470 results on 339 pages for 'office communicator 2007'.

Page 245/339 | < Previous Page | 241 242 243 244 245 246 247 248 249 250 251 252  | Next Page >

  • Patch Tuesday : une douzaine de correctifs dont trois critiques seront publiés la semaine prochaine

    Patch Tuesday : une douzaine de correctifs dont trois critiques seront publiés la semaine prochaine Mise à jour du 4/02/11, par Hinault Romaric Microsoft vient de divulguer quelques informations dans le cadre de son processus de notification préalable sur sa prochaine mise à jour de Sécurité le « Patch Tuesday ». C'est au total 12 correctifs pour 22 failles de sécurité qui seront disponibles dont 3 sont qualifiés de "critique" et le reste "d'important". Ces correctifs viennent résoudre des problèmes touchant Windows, Internet Explorer, Office, Visual Studio. L'un de ces bulletins permet de...

    Read the article

  • Pour Apple, "App Store" est bien une marque exclusive, l'entreprise juge insuffisants les arguments de Microsoft le contestant

    Pour Apple, ?App Store? est bien une marque Exclusive, l'entreprise juge insuffisants les arguments de Microsoft le contestant Mise à jour du 02/03/11, par Hinault Romaric Apple réplique au recours de Microsoft qui contestait le dépôt du nom « App Store ». Dans un document déposé auprès de l'US Patent and Trademark Office, Apple déclare que les arguments avancés par Microsoft ne prouvent pas la nature générique du terme « App Store ». Pour mémoire, en janvier dernier, Microsoft avait officiellement contesté le dépôt du nom « App Store » par Apple, le jugeant trop générique pour être une marque, etne pouvant donc ...

    Read the article

  • Android : la plainte d'Oracle risque de perdre de l'ampleur, l'organisme officiel chargé des brevets rejette 17 demandes d'Oracle

    Android : La plainte d'Oracle contre Google risque de perdre de l'ampleur L'organisme officiel chargé des brevets rejette 17 demandes d'Oracle Mise à jour du 23/06/11 L'organisme officiel américain chargé des brevets vient d'entrer en jeu dans l'affaire entre Oracle et Google sur l'utilisation de Java dans Android. Oracle accuse Google de violation de 7 de ses brevets (ou plus exactement de brevets dont il a hérité avec le rachat de Sun). Pour chaucun, les avocats d'Oracle ont déposé plusieurs demandes (des « claims »). Après examen du premier brevet, le US Patent and Trademark Office (USPTO) vient d'invalider 17 des 21 demandes d'Oracle...

    Read the article

  • Does the direction of storage make us bad data citizens?

    - by simonsabin
      My career started at a company where we hardly had email, the network was a 10base2 affair with cables running all around the office. You used floppy disks and the thought of a GB of data was absurd. You had to look after every byte and only keep what you really needed. Whilst the cost of the spinning disks gradually falls the cost and size of flash storage continues to plummet. The new Crucial SSD is £380 for 1TB I can now keep 128GB of data on a SD card the size of my finger. It only costs...(read more)

    Read the article

  • Is it possible to put software in a queue to be installed later?

    - by Gourik Goswami
    Sometime I find some software that is interesting and want to install it. At office I use pocket WiFi so I do not want to download big files. I want some how to tag these files so I can install them later when I am at home at connected with wifi network (More faster network). So is there any way that these software installation can be put in a queue, so that when I am at home it can start right away. Is there any way to do this?

    Read the article

  • Kooboo CMS 2.1.0.0 released

    Users of Kooboo CMS 2.0, please use the "Check updates" feature under System to upgradeNew featuresWebDav supportYou can now use tools like windows explorer to manage Binary folder. Drag and drop files directly from your Windows PC.Metaweblog API support.Enable you to manage your content via some third party tools like MS Office word or MS live writerCMIS support.an open and cross-platform protocol used for content synchronization between different systems or different Kooboo instances.RSS...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Working environment

    - by Yottatron
    I realise that this might not be the right place to ask questions about employment and that the question my raise debate etc. The company I work for recently decided that rather than having one web developer working on sites from a branch it would be better to make that person come into head office and work in the middle of a busy call centre. Also they're expecting the developer to answer the phone if it rings and take messages. Does anyone find that strange? Is it really the right place for a programmer to work? Thanks for the advice

    Read the article

  • Is there any way to keep launchers synchronized among machines?

    - by MMA
    Most of us use more than one machine for our purpose. The scenario for me is to use one at home, another at office. When comes to the launcher at left, the applications get added in chronological order. You can click and drag an application in launcher, but this is a tedious process. If your application placements are different among the machines, you loose the intuitive mouse click. You need to spend a few seconds to find out where actually the launcher is before you click on it. Is there any way I can keep the launcher applications (at least the locked ones) synchronized among machines? Thanks.

    Read the article

  • How do you stay in touch with a programming language?

    - by Abijeet Patro
    I'll be starting work for the first time in the IT Industry on the 18th of this month. I'll be working mostly with Microsoft technologies such as C#.NET and MS Dynamic CRM. I spent the last year working with C++. Developing small applications to automate taks and organize my notes. During this time I have developed a good basic understanding of the language. My question is how do you guys stay in touch with a programming language that you love when you need to use something else at the office?

    Read the article

  • Successful business proposal; How to negotiate with employer for bonuses on the project [on hold]

    - by user870018
    I'm the lone programmer at a small business which is falling head-over-heels for a website proposal I wrote on a project they were considering. Next week is the company meeting where it will be formally presented to the owners, and if the project is accepted it could become a (relatively) huge revenue stream when finished. Despite all the buzz I have no financial stake in the success or failure of the project. I know I haven't been profitable and they can't pay me what I should be making. I'm also the only non-management employee with no way to earn a bonus, despite having one of the most demanding jobs in the office. I'd like to know if there's any resources or advice for programmers or employees to negotiate and get invested in a projects success. Just a way to guarantee if I prove my worth I can move up a rung or two.

    Read the article

  • Microsoft conteste la marque déposée "App Store", et pense que tous les acteurs du secteur des applications devraient pouvoir l'utiliser

    Microsoft conteste l'appartenance de la marque "App Store", et pense que tous les acteurs du secteur des applications devraient pouvoir l'utiliser « Microsoft s'oppose à la requête d'Apple n°77/525433 pour l'App Store sur le motif que «App Store» est générique pour les services de magasin de détail avec des applications et non enregistrable pour les services auxiliaires tels que la recherche et le téléchargement d'applications de ces magasins ». Il semble bien qu'il va y avoir un grand procès de plus dans le monde de l'IT. En effet, Microsoft vient de lancer un recours auprès de l'US Patent Office pour contester la légitimité du brevet sur la marque "App Store", détenu par Apple. Redmond soutient ...

    Read the article

  • Microsoft choisit le HTML 5 pour la mise à jour de Skydrive, sa plateforme de stockage abandonne doucement Silverlight

    Microsoft choisit le HTML 5 pour la future mise à jour de Skydrive Sa plateforme de stockage abandonne doucement Silverlight Microsoft vient de présenter la prochaine mise à jour de son service de stockage en ligne Windows Live SkyDrive. La plateforme, comme plusieurs autres produits Microsoft (Internet Explorer 9, Windows 8, Visual Studio 2010, etc.), se met au HTML5 et au CSS 3 pour améliorer l'expérience d'accès et de partage des documents (Office, photos, vidéos, etc.) dans le Cloud. Skydrive offre désormais une nouvelle interface utilisateur, avec des vignettes dynamiques des documents disponibles en ligne, la possibilité de les rassembler en une seule vue et de les ventiler p...

    Read the article

  • Is there any way around the field-of-use restrictions in Java?

    - by Muton
    Current field-of-use restrictions defined in "Oracle Binary Code License Agreement for the Java SE Platform Products" prohibit its use in embedded systems. "General Purpose Desktop Computers and Servers" means computers, including desktop and laptop computers, or servers, used for general computing functions under end user control (such as but not specifically limited to email, general purpose Internet browsing, and office suite productivity tools). The use of Software in systems and solutions that provide dedicated functionality (other than as mentioned above) or designed for use in embedded or function-specific software applications... are excluded from this definition and not licensed under this Agreement. Do these restrictions also apply to OpenJDK and other possible implementations? Is the only way to use Java in such an environment to acquire a separate license from Oracle?

    Read the article

  • How do you remove Ubuntu? [closed]

    - by Severus
    Possible Duplicate: How to remove Ubuntu and put Windows back on? I have no idea what was deleted or uninstalled or even what system ran previously on the computer. The computers are public computers for an office and no one know's how to use this system! Most people can't figure it out and have never even heard of it (I have because I knew someone who ran it)!! So how do I remove it? Is there anyway to just do a virtual restore? I'm hoping it was windows 7 on here previously cause don't most 7 systems have a built in windows installation disk iso? Anyone know how or if this can be fixed?? No we don't have the re-installation disks (if we did I would know the system and not have a problem) HELP!!!!

    Read the article

  • ???????????????:????????????

    - by ???02
    ???????????????:??????????????????????????????????????????????????????????ID?????????????Oracle Identity Manager????????????????????Oracle Database Vault???????·?????Oracle Audit Vault????????????????·????????????????????????????????????????????·?????????·?????????????????????????????? ?????????????????????????(????????????????????)???·????????????????????? ???????????????????????????·???????????????????????????????????Oracle Database Vault ~???????????Oracle Database Vault??????????????????????????????(DBA)??????·?????????????????????????????????????????????????????????Oracle Database Vault ~???????????????????????????????????????????????????????????????????????????????????????????????IP????????????????????????????????????????????9:00-17:00?????????????????????????????????????????????????????????????????????????????????????????????????????????????????Oracle Audit Vault ~???????????????????????????????????????·??????????·DBA???????????????????????????????????????????????????????????????????Oracle Audit Vault???Oracle Audit Vault??Oracle Database Vault???????????????????????????????????ID????????????????????????ID????????????????????????????????????????????Oracle Database Standard Edition?Oracle Database Standard Edition One??????????????????Oracle Database Vault???????????Unix?Linux???OS???????????????????????Oracle Database(EE / SE / SE One)??????????????OS??????????????Oracle Identity Manager(???OIM)??????OIM??????????????????????????????ID???????????????ID???·?????????????????ID?????????????????ID????????????????·???????????Oracle Identity Manager ~ID??·????·??????OIM????????????????????(???/???????????)??????????????????????????ID??·? ???·?????????????????????????????????????ID????????????????????????????? ????Oracle Identity Manager ~??·????????????????????ID???????????????????????????????????????OIM?????????????????????????????????????Oracle Identity Manager ~??·??????????????????????1?????????????????????????????????????????????????????????????????Oracle Identity Manager ~????????????????????OIM??ID????????????????????????????????????????????????????????????????? ??40???????????????????????????????????????????????????????????????????? ????????????????????PDF?Office??????????????????????????? Oracle Direct

    Read the article

  • Register for the webcast, " Modernizing Applications - The Top IT Project" Wednesday, November 30, 9:00 a.m. PT / 12:00 p.m. ET

    - by Oracle Accelerate for Midsize Companies
      Due to the realities of the 'New Normal' economy, many midsize companies are replacing or upgrading their legacy enterprise applications. Larry Simcox, Sr. Director of the Oracle Accelerate Program Office, will lead a discussion on the 'why' and the 'how' featuring an impressive list of panelists:  Eric Kimberling, President & Chairman, Panorama Consulting Lyle Ekdahl, GVP & General Manager, Oracle's JD Edwards Enterprise Applications Jeanne Lowell, VP, Oracle's E-Business Suite Strategy. Click HERE to register.

    Read the article

  • Required Skill Sets Of A Software Architect

    The question has been asked as to what is the required skill sets of a software architect. The answer to this is that it truly depends. When I state that it depend, it depends on the organization, industry, and skill sets available on the open market and internally within a company. With open ended skill sets even Napoleon Dynamite could be an architect. Napoleon Dynamite’s Skills Pedro: Have you asked anybody yet? Napoleon Dynamite: No, but who would? I don't even have any good skills. Pedro: What do you mean? Napoleon Dynamite: You know, like nunchuck skills, bow hunting skills, computer hacking skills... Girls only want boyfriends who have great skills. Pedro: Aren't you pretty good at drawing, like animals and warriors and stuff? This example might be a little off base but it does illustrate a point. What are the real required skills of a software architect? In my opinion, an architect needs to demonstrate the knowledge of the following three main skill set categories so that they are successful. General Skill Sets of an Architect Basic Engineering Skills Organizational  Skills Interpersonal Skills Basic Engineering Skills are a very large part of what a software architect deal with on a daily bases when designing or updating systems. Think about it, how good would a lead mechanic be if they did not know how to fix or repair cars? They would not be, and that is my point that architects need to have at least some basic skills regarding engineering. The skills listed below are generic in nature because they change from job to job, so in this discussion I am trying to focus more on generalities so that anyone can apply this information to their individual situation. Common Basic Engineering Skills Data Modeling Code Creation Configuration Testing Deployment/Publishing System and Environment Knowledge Organizational Skills If an Architect works for or with an origination then they will need strong organization skills to survive. An architect is no use to a project if the project is missed managed. Additionally, budgets and timelines can really affect a company and their products when established deadlines are repeated not meet. By not meeting these timelines a company is forced to cancel the project and waste all the money and time spent or spend more money until it is completed, if it is ever completed. Common Organizational Skills Project Management Estimation (Cost and Time) Creation and Maintenance of Accepted Standards Interpersonal Skills For me personally Interpersonal skill ranks above the other types of skill sets because an architect can quickly pick up the other two skill sets by communicating with other team/project members so that they are quickly up to speed on a project. Additionally, in order for an architect to manage a project or even derive rough estimates they will more than likely have to consult with others actually working on the code (Programmers/Software Engineers) to get there estimates since they will be the ones actually working on the changes to be implemented. Common Interpersonal Skills Good Communicator Focus on projects success over personal Honors roles within a team Reference: Taylor, R. N., Medvidovic, N., & Dashofy, E. M. (2009). Software architecture: Foundations, theory, and practice Hoboken, NJ: John Wiley & Sons

    Read the article

  • Standards Corner: Preventing Pervasive Monitoring

    - by independentid
     Phil Hunt is an active member of multiple industry standards groups and committees and has spearheaded discussions, creation and ratifications of industry standards including the Kantara Identity Governance Framework, among others. Being an active voice in the industry standards development world, we have invited him to share his discussions, thoughts, news & updates, and discuss use cases, implementation success stories (and even failures) around industry standards on this monthly column. Author: Phil Hunt On Wednesday night, I watched NBC’s interview of Edward Snowden. The past year has been tumultuous one in the IT security industry. There has been some amazing revelations about the activities of governments around the world; and, we have had several instances of major security bugs in key security libraries: Apple's ‘gotofail’ bug  the OpenSSL Heartbleed bug, not to mention Java’s zero day bug, and others. Snowden’s information showed the IT industry has been underestimating the need for security, and highlighted a general trend of lax use of TLS and poorly implemented security on the Internet. This did not go unnoticed in the standards community and in particular the IETF. Last November, the IETF (Internet Engineering Task Force) met in Vancouver Canada, where the issue of “Internet Hardening” was discussed in a plenary session. Presentations were given by Bruce Schneier, Brian Carpenter,  and Stephen Farrell describing the problem, the work done so far, and potential IETF activities to address the problem pervasive monitoring. At the end of the presentation, the IETF called for consensus on the issue. If you know engineers, you know that it takes a while for a large group to arrive at a consensus and this group numbered approximately 3000. When asked if the IETF should respond to pervasive surveillance attacks? There was an overwhelming response for ‘Yes'. When it came to 'No', the room echoed in silence. This was just the first of several consensus questions that were each overwhelmingly in favour of response. This is the equivalent of a unanimous opinion for the IETF. Since the meeting, the IETF has followed through with the recent publication of a new “best practices” document on Pervasive Monitoring (RFC 7258). This document is extremely sensitive in its approach and separates the politics of monitoring from the technical ones. Pervasive Monitoring (PM) is widespread (and often covert) surveillance through intrusive gathering of protocol artefacts, including application content, or protocol metadata such as headers. Active or passive wiretaps and traffic analysis, (e.g., correlation, timing or measuring packet sizes), or subverting the cryptographic keys used to secure protocols can also be used as part of pervasive monitoring. PM is distinguished by being indiscriminate and very large scale, rather than by introducing new types of technical compromise. The IETF community's technical assessment is that PM is an attack on the privacy of Internet users and organisations. The IETF community has expressed strong agreement that PM is an attack that needs to be mitigated where possible, via the design of protocols that make PM significantly more expensive or infeasible. Pervasive monitoring was discussed at the technical plenary of the November 2013 IETF meeting [IETF88Plenary] and then through extensive exchanges on IETF mailing lists. This document records the IETF community's consensus and establishes the technical nature of PM. The draft goes on to further qualify what it means by “attack”, clarifying that  The term is used here to refer to behavior that subverts the intent of communicating parties without the agreement of those parties. An attack may change the content of the communication, record the content or external characteristics of the communication, or through correlation with other communication events, reveal information the parties did not intend to be revealed. It may also have other effects that similarly subvert the intent of a communicator.  The past year has shown that Internet specification authors need to put more emphasis into information security and integrity. The year also showed that specifications are not good enough. The implementations of security and protocol specifications have to be of high quality and superior testing. I’m proud to say Oracle has been a strong proponent of this, having already established its own secure coding practices. 

    Read the article

  • SR Activity Summaries Via Direct Email? You Bet!

    - by PCat
    Courtesy of Ken Walker. I’m a “bottom line” kind of guy.  My friends and co-workers will tell you that I’m a “Direct Communicator” when it comes to work or my social life.  For example, if I were to come up with a fantastic new recipe for a low-fat pan fried chicken, I’d Tweet, email, or find a way to blast the recipe directly to you so that you could enjoy it immediately.  My friends would see the subject, “Awesome New Fried Chicken” and they’d click and see the recipe there before them.Others are “Indirect Communicators.”  My friend Joel is like this.  He would post the recipe in his blog, and then Tweet or email a link back to his blog with a subject, “Fried Chicken.”  Then Joel would sit back and expect his friends to read the email, AND click the link to his blog, and then read the recipe.  As a fan of the “Direct” method, I wish there was a way for me to “Opt-in” for immediate updates from Joel so I could see the recipe without having to click over to his blog to search for it.The same is true for MOS.  If you’ve ever opened a Service Request through My Oracle Support (MOS), you know that most of the communication between you and the Oracle Support Engineer with respect to the issue in the SR, is done via email.  Which type of email would you rather receive in your email account? Example1:Your SR has been updated.  Click HERE to see the update. Or Example2:Your SR has been updated.  Here is the update:  “Hi John, Oracle Development has completed the patch we’ve been waiting for!  Here’s a direct “LINK” to the patch that should resolve your issue.  Please download and install the patch via the instructions (included with the link) and let me know if it does, in fact, resolve your issue!”Example2 is available to you!  All you need to do is to “Opt-In” for the direct email updates.  The default is for the indirect update as seen in Example1.  To turn on “Service Request Details in Email” simply follow these instructions (aided by the screenshot below):1.    Log into MOS, and click on your name in the upper right corner.  Select “My Account.”2.    Make sure “My Account” is highlighted in bold on the left.3.    Turn ON, “Service Request Details in Email” That’s it!  You will now receive the SR Updates, directly in your email account without having to log into MOS, click the SR, scroll down to the updates, etc.  That’s better than Fried Chicken!  (Well; almost better....).

    Read the article

  • What do you need to know to be a world-class master software developer? [closed]

    - by glitch
    I wanted to bring up this question to you folks and see what you think, hopefully advise me on the matter: let's say you had 30 years of learning and practicing software development in front of you, how would you dedicate your time so that you'd get the biggest bang for your buck. What would you both learn and work on to be a world-class software developer that would make a large impact on the industry and leave behind a legacy? I think that most great developers end up being both broad generalists and specialists in one-two areas of interest. I'm thinking Bill Joy, John Carmack, Linus Torvalds, K&R and so on. I'm thinking that perhaps one approach would be to break things down by categories and establish a base minimum of "software development" greatness. I'm thinking: Operating Systems: completely internalize the core concepts of OS, perhaps gain a lot of familiarity with an OSS one such as Linux. Anything from memory management to device drivers has to be complete second nature. Programming Languages: this is one of those topics that imho has to be fully grokked even if it might take many years. I don't think there's quite anything like going through the process of developing your own compiler, understanding language design trade-offs and so on. Programming Language Pragmatics is one of my favorite books actually, I think you want to have that internalized back to back, and that's just the start. You could go significantly deeper, but I think it's time well spent, because it's such a crucial building block. As a subset of that, you want to really understand the different programming paradigms out there. Imperative, declarative, logic, functional and so on. Anything from assembly to LISP should be at the very least comfortable to write in. Contexts: I believe one should have experience working in different contexts to truly be able to appreciate the trade-offs that are being made every day. Embedded, web development, mobile development, UX development, distributed, cloud computing and so on. Hardware: I'm somewhat conflicted about this one. I think you want some understanding of computer architecture at a low level, but I feel like the concepts that will truly matter will be slightly higher level, such as CPU caching / memory hierarchy, ILP, and so on. Networking: we live in a completely network-dependent era. Having a good understanding of the OSI model, knowing how the Web works, how HTTP works and so on is pretty much a pre-requisite these days. Distributed systems: once again, everything's distributed these days, it's getting progressively harder to ignore this reality. Slightly related, perhaps add solid understanding of how browsers work to that, since the world seems to be moving so much to interfacing with everything through a browser. Tools: Have a really broad toolset that you're familiar with, one that continuously expands throughout the years. Communication: I think being a great writer, effective communicator and a phenomenal team player is pretty much a prerequisite for a lot of a software developer's greatness. It can't be overstated. Software engineering: understanding the process of building software, team dynamics, the requirements of the business-side, all the pitfalls. You want to deeply understand where what you're writing fits from the market perspective. The better you understand all of this, the more of your work will actually see the daylight. This is really just a starting list, I'm confident that there's a ton of other material that you need to master. As I mentioned, you most likely end up specializing in a bunch of these areas as you go along, but I was trying to come up with a baseline. Any thoughts, suggestions and words of wisdom from the grizzled veterans out there who would like to share their thoughts and experiences with this? I'd really love to know what you think!

    Read the article

  • Export to excel in TFS 2012

    - by Martin
    I've installed Visual studion 2012 RC. I'm working withTFS2012 and When I want to export an user story to excel I see the following error: "TF400422: Failed to open in Microsoft Excel: Error loading type library/Dll. (Exception from HRESULT: 0x80029C4A (TYPE_E_CANTLOADLIBRARY))" I'm using Microsoft Office Professional Plus 2010. Version: 14.0.6112.5000 (64-bit) This page Shows the meaning of many error number but this error (code: TF400422) isn't there. Perhaps this relates to this other issue. Thanks!!

    Read the article

  • SharePoint 2010: CheckSuspiciousPhysicalPath exception

    - by Tommy Jakobsen
    I just installed SharePoint 2010 on my Windows Server 2008 R2 x64 server with SQL Server 2008. Everything is installed on this single server, and I configured SharePoint 2010 as described here: http://sharepoint.microsoft.com/blogs/fromthefield/Lists/Posts/Post.aspx?ID=112 Everything installed correct, and the SQL databases were created. But when I try to access the administration site through http://server:47632/_admin/adminconfigintro.aspx, I get the following exception: [HttpException] at System.Web.Util.FileUtil.CheckSuspiciousPhysicalPath(String physicalPath) at System.Web.CachedPathData.GetConfigPathData(String configPath) at System.Web.CachedPathData.GetConfigPathData(String configPath) at System.Web.CachedPathData.GetConfigPathData(String configPath) at System.Web.HttpContext.GetFilePathData() at System.Web.Configuration.CustomErrorsSection.GetSettings(HttpContext context, Boolean canThrow) at System.Web.HttpResponse.ReportRuntimeError(Exception e, Boolean canThrow, Boolean localExecute) at System.Web.HttpRuntime.FinishRequest(HttpWorkerRequest wr, HttpContext context, Exception e) The same error occurs when accessing http://server:47632/. Do you have any ideas whats causing this? I haven't been able to find anything about this issue. Edit 1: I just tried reinstalling SharePoint 2010 while monitoring the error log. When I run the configuration wizard, the following errors show up in the event log: The site /sites/Help could not be created. The following exception occurred: Dependency feature with id 5f3b0127-2f1d-4cfd-8dd2-85ad1fb00bfc for feature 'BaseSite' (id: b21b090c-c796-4b0f-ac0f-7ef1659c20ae) is not installed.. Safe mode did not start successfully. This page has encountered a critical error. Contact your system administrator if this problem persists. Safe mode did not start successfully. This page has encountered a critical error. Contact your system administrator if this problem persists. The site /sites/Help could not be created. The following exception occurred: Dependency feature with id 2ed1c45e-a73b-4779-ae81-1524e4de467a for feature 'BaseSite' (id: b21b090c-c796-4b0f-ac0f-7ef1659c20ae) is not installed.. The Execute method of job definition Microsoft.Office.InfoPath.Server.Administration.FormsMaintenanceJobDefinition (ID 59158daa-d0b6-458f-bd0a-7d1d713ac743) threw an exception. More information is included below. Access to the path 'C:\ProgramData\Microsoft\SharePoint\Config\319280433bd74178b6b1fd945c064698' is denied. The Execute method of job definition Microsoft.Office.InfoPath.Server.Administration.FormsMaintenanceJobDefinition (ID b3f45215-4d18-44f2-84bd-cc16bc339dd7) threw an exception. More information is included below. Access to the path 'C:\ProgramData\Microsoft\SharePoint\Config\319280433bd74178b6b1fd945c064698' is denied. Any ideas?

    Read the article

  • "Invalid provider type specified" when signing clickonce manifest in VS2008

    - by Mark
    I have a certificate issued by a CA on our intranet (it's a V3 sha1 pfx file). When I use this in the signing part of my clickonce (vsto addin) project, I get the error: C:\Program Files (x86)\MSBuild\Microsoft\VisualStudio\v9.0\OfficeTools\Microsoft.VisualStudio.Tools.Office.Office2007.targets(250,9): error MSB3482: An error occurred while signing: Invalid provider type specified. Does anyone know what's going on here? Thanks!

    Read the article

  • Invalid or expired security context token in WCF web service

    - by Damian
    All, I have a WCF web service (let's called service "B") hosted under IIS using a service account (VM, Windows 2003 SP2). The service exposes an endpoint that use WSHttpBinding with the default values except for maxReceivedMessageSize, maxBufferPoolSize, maxBufferSize and some of the time outs that have been increased. The web service has been load tested using Visual Studio Load Test framework with around 800 concurrent users and successfully passed all tests with no exceptions being thrown. The proxy in the unit test has been created from configuration. There is a sharepoint application that use the Office Sharepoint Server Search service to call web services "A" and "B". The application will get data from service "A" to create a request that will be sent to service "B". The response coming from service "B" is indexed for search. The proxy is created programmatically using the ChannelFactory. When service "A" takes less than 10 minutes, the calls to service "B" are successfull. But when service "A" takes more time (~20 minutes) the calls to service "B" throw the following exception: Exception Message: An unsecured or incorrectly secured fault was received from the other party. See the inner FaultException for the fault code and detail Inner Exception Message: The message could not be processed. This is most likely because the action 'namespace/OperationName' is incorrect or because the message contains an invalid or expired security context token or because there is a mismatch between bindings. The security context token would be invalid if the service aborted the channel due to inactivity. To prevent the service from aborting idle sessions prematurely increase the Receive timeout on the service endpoint's binding. The binding settings are the same, the time in both client server and web service server are synchronize with the Windows Time service, same time zone. When i look at the server where web service "B" is hosted i can see the following security errors being logged: Source: Security Category: Logon/Logoff Event ID: 537 User NT AUTHORITY\SYSTEM Logon Failure: Reason: An error occurred during logon Logon Type: 3 Logon Process: Kerberos Authentication Package: Kerberos Status code: 0xC000006D Substatus code: 0xC0000133 After reading some of the blogs online, the Status code means STATUS_LOGON_FAILURE and the substatus code means STATUS_TIME_DIFFERENCE_AT_DC. but i already checked both server and client clocks and they are syncronized. I also noticed that the security token seems to be cached somewhere in the client server because they have another process that calls the web service "B" using the same service account and successfully gets data the first time is called. Then they start the proccess to update the office sharepoint server search service indexes and it fails. Then if they called the first proccess again it will fail too. Has anyone experienced this type of problems or have any ideas? Regards, --Damian

    Read the article

  • DirectoryServicesCOMException when working with System.DirectoryServices.AccountManagement

    - by antik
    I'm attempting to determine whether a user is a member of a given group using System.DirectoryServices.AccountManagment. I'm doing this inside a SharePoint WebPart in SharePoint 2007 on a 64-bit system. Project targets .NET 3.5 Impersonation is enabled in the web.config. The IIS Site in question is using an IIS App Pool with a domain user configured as the identity. I am able to instantiate a PrincipalContext as such: PrincipalContext pc = new PrincipalContext(ContextType.Domain) Next, I try to grab a principal: using (PrincipalContext pc = new PrincipalContext(ContextType.Domain)) { GroupPrincipal group = GroupPrincipal.FindByIdentity(pc, "MYDOMAIN\somegroup"); // snip: exception thrown by line above. } Both the above and UserPrincipal.FindByIdentity with a user SAM throw a DirectoryServicesCOMException: "Logon failure: Unknown user name or bad password" I've tried passing in a complete SAMAccountName to either FindByIdentity (in the form of MYDOMAIN\username) or just the username with no change in behavior. I've tried executing the code with other credentials using both the HostingEnvironment.Impersonate and SPSecurity.RunWithElevatedPrivileges approaches and also experience the same result. I've also tried instantiating my context with the domain name in place: Principal Context pc = new PrincipalContext(ContextType.Domain, "MYDOMAIN"); This throws a PrincipalServerDownException: "The server could not be contacted." I'm working on a reasonably hardened server. I did not lock the system down so I am unsure exactly what has been done to it. If there are credentials I need to allocate to my pool identity's user or in the domain security policy in order for these to work, I can configure the domain accordingly. Are there any settings that would be preventing my code from running? Am I missing something in the code itself? Is this just not possible in a SharePoint web? EDIT: Given further testing, my code functions correctly when tested in a Console application targeting .NET 4.0. I targeted a different framework because I didn't have AccountManagement available to me in the console app when targeting .NET 3.5 for some reason. using (PrincipalContext pc = new PrincipalContext(ContextType.Domain)) using (UserPrincipal adUser = UserPrincipal.FindByIdentity(pc, "MYDOMAIN\joe.user")) using (GroupPrincipal adGroup = GroupPrincipal.FindByIdentity(pc, "MYDOMAIN\user group")) { if (adUser.IsMemberOf(adGroup)) { Console.WriteLine("User is a member!"); } else { Console.WriteLine("User is NOT a member."); } } What varies in my SharePoint environment that might prohibit this function from executing?

    Read the article

< Previous Page | 241 242 243 244 245 246 247 248 249 250 251 252  | Next Page >