Search Results

Search found 21130 results on 846 pages for 'nfs client'.

Page 252/846 | < Previous Page | 248 249 250 251 252 253 254 255 256 257 258 259  | Next Page >

  • What percentage should a consulting company take off the top of your pay?

    - by JasonStoltz
    Let's say that, hypothetically, a programmer is being paid $40 / hour for a 6 month contract, through a contracting agency. That contracting agency is being paid $85 / hour for every hour that programmer works by the client. So the programmer only actually takes home 47% of what the client is paying per hour. Is this normal, or is the percentage unusually low? Other things to consider: The consulting agency isn't paying benefits P.S (If this is normal, I'd also be curious what the justification would be to take that high of a percentage. And if it is NOT normal, what would be a normal percentage?)

    Read the article

  • Mouse not clicking properly

    - by RamoneDexter
    Okay guys, here's a tricky one. I'm running 10.10 on my pc but i've had this issue for some time now.I'm having strange issues with the mouse. What happens is when I get into Ubuntu, I can click anything, but as soon as I click something to open a window, run a program, I can no longer click anything EXCEPT the last thing I clicked. When I right click the last thing I clicked, it allows me to click everything normally, but only until I open something new. So for example I'll click the email icon on docky to open up my email client, which opens but is unresponsive until I right click docky. Then if I open an attatchment, I must also right click the MENU bar on my email client. Sometimes it also works if I simply right click on the newly opened window. I have tried this mith mutiple mice and still the same issue.

    Read the article

  • Rails backend: debugging [closed]

    - by banditKing
    I have a rails -API app with Rabl. Im trying to build a photo sharing app. Im getting status 500 codes when my client communicates with the server. Im trying to find out how to debug this. The client is an iOS app I wrote. Where should I begin the debugging process and what are the best tools for debugging rails-api backend apps. Im new to server development so trying to learn the tricks of the trade. Any help would be appreciated. Thanks

    Read the article

  • Data Source Security Part 2

    - by Steve Felts
    In Part 1, I introduced the default security behavior and listed the various options available to change that behavior.  One of the key topics to understand is the difference between directly using database user and password values versus mapping from WLS user and password to the associated database values.   The direct use of database credentials is relatively new to WLS, based on customer feedback.  Some of the trade-offs are covered in this article. Credential Mapping vs. Database Credentials Each WLS data source has a credential map that is a mechanism used to map a key, in this case a WLS user, to security credentials (user and password).  By default, when a user and password are specified when getting a connection, they are treated as credentials for a WLS user, validated, and are converted to a database user and password using a credential map associated with the data source.  If a matching entry is not found in the credential map for the data source, then the user and password associated with the data source definition are used.  Because of this defaulting mechanism, you should be careful what permissions are granted to the default user.  Alternatively, you can define an invalid default user to ensure that no one can accidentally get through (in this case, you would need to set the initial capacity for the pool to zero so that the pool is populated only by valid users). To create an entry in the credential map: 1) First create a WLS user.  In the administration console, go to Security realms, select your realm (e.g., myrealm), select Users, and select New.  2) Second, create the mapping.  In the administration console, go to Services, select Data sources, select your data source name, select Security, select Credentials, and select New.  See http://docs.oracle.com/cd/E24329_01/apirefs.1211/e24401/taskhelp/jdbc/jdbc_datasources/ConfigureCredentialMappingForADataSource.html for more information. The advantages of using the credential mapping are that: 1) You don’t hard-code the database user/password into a program or need to prompt for it in addition to the WLS user/password and 2) It provides a layer of abstraction between WLS security and database settings such that many WLS identities can be mapped to a smaller set of DB identities, thereby only requiring middle-tier configuration updates when WLS users are added/removed. You can cut down the number of users that have access to a data source to reduce the user maintenance overhead.  For example, suppose that a servlet has the one pre-defined, special WLS user/password for data source access, hard-wired in its code in a getConnection(user, password) call.  Every WebLogic user can reap the specific DBMS access coded into the servlet, but none has to have general access to the data source.  For instance, there may be a ‘Sales’ DBMS which needs to be protected from unauthorized eyes, but it contains some day-to-day data that everyone needs. The Sales data source is configured with restricted access and a servlet is built that hard-wires the specific data source access credentials in its connection request.  It uses that connection to deliver only the generally needed day-to-day information to any caller. The servlet cannot reveal any other data, and no WebLogic user can get any other access to the data source.  This is the approach that many large applications take and is the reasoning behind the default mapping behavior in WLS. The disadvantages of using the credential map are that: 1) It is difficult to manage (create, update, delete) with a large number of users; it is possible to use WLST scripts or a custom JMX client utility to manage credential map entries. 2) You can’t share a credential map between data sources so they must be duplicated. Some applications prefer not to use the credential map.  Instead, the credentials passed to getConnection(user, password) should be treated as database credentials and used to authenticate with the database for the connection, avoiding going through the credential map.  This is enabled by setting the “use-database-credentials” to true.  See http://docs.oracle.com/cd/E24329_01/apirefs.1211/e24401/taskhelp/jdbc/jdbc_datasources/ConfigureOracleParameters.html "Configure Oracle parameters" in Oracle WebLogic Server Administration Console Help. Use Database Credentials is not currently supported for Multi Data Source configurations.  When enabled, it turns off credential mapping on Generic and Active GridLink data sources for the following attributes: 1. identity-based-connection-pooling-enabled (this interaction is available by patch in 10.3.6.0). 2. oracle-proxy-session (this interaction is first available in 10.3.6.0). 3. set client identifier (this interaction is available by patch in 10.3.6.0).  Note that in the data source schema, the set client identifier feature is poorly named “credential-mapping-enabled”.  The documentation and the console refer to it as Set Client Identifier. To review the behavior of credential mapping and using database credentials: - If using the credential map, there needs to be a mapping for each WLS user to database user for those users that will have access to the database; otherwise the default user for the data source will be used.  If you always specify a user/password when getting a connection, you only need credential map entries for those specific users. - If using database credentials without specifying a user/password, the default user and password in the data source descriptor are always used.  If you specify a user/password when getting a connection, that user will be used for the credentials.  WLS users are not involved at all in the data source connection process.

    Read the article

  • Change A-Record in Hetzner Konsoleh

    - by Charles
    I am a Hetzner level 19 shared hosting client and would like to change the A-record for my domain. When I log in to konsoleh, I see which IP-address it points to at the moment, but not where I can change it. Does anyone know how to do it? Thanks! Solution I called Hetzner support. It was because I had to log in with my client id, not with my domain. Then I could just click on the A-record and edit it.

    Read the article

  • share folder in server torrent daemon like in DC(Direct Connect )

    - by alex_bubuker
    So my question: is it possible to share on a server torrent daemon/application a whole folder with films? I had expirience with DC(Direct Connect) applications and it worked well. I selected folder and exec command share == other people stared to download files from my computer. In my expirience with torrent application you should first create torrent file and then people can download file from you. So is there any torrent client/plugin for torrent client that DC-like behaviour become possible? If it is possible at all ... Thank you

    Read the article

  • Quelle est la place des mobiles en entreprise ? De quel service de téléphonie votre entreprise a-t-e

    Quelle est la place des mobiles en entreprise ? De quel service de téléphonie votre entreprise a-t-elle le plus besoin ? Microsoft lance une grande campagne pour promouvoir son OS mobile Windows Phone. La firme cherche particulièrement à atteindre les entreprises, en leur promettant que "grande entreprise ou PME, il existe forcément une solution Windows Phone pour vous." Voici les cinq grands axes autour desquels s'articulent l'emploi de Windows Phone dans les entreprises : - Gestion de la relation client Grâce aux solutions de gestion de la relation client, vous pouvez consulter les toutes dernières données de vente...

    Read the article

  • Transfer a ssh session between the same physical devices from one network to another

    - by Vivek V K
    My server has 2 IP addresses via two networks. Due to some restrictions,my client will be able to access only one of the network at a time. Hence, I want a way to transfer a live ssh session with all the open applications seamlessly from one network to another. The physical devices (client and the server) are the same. What changes is the network through which it connects. can this be done? Thanks!

    Read the article

  • Pros and cons of integrated vs. standalone tools [closed]

    - by eckes
    When it comes to version control, for example, there seem to be two different types of users: those using standalone VCS tools those using integrated tools from their IDE In my opinion, both have pros: Integrated tools do everything out of the IDE, no need to leave the environment you're used to ... Standalone tools usable for every type of project, not only for those associated with an IDE always behave the same (e.g. no difference like Eclipse-SVN-Client vs. AnkhSVN client for VS) ... I would be interested in your opinions and use cases.

    Read the article

  • How to have a PHP web site that can play videos offline?

    - by greco
    Our client asked to implement a system with web technologies and the basic functionalities of: We have 3 users: Admin, User, Visitor. provide videos with an indexing system. Videos and other info about them are uploaded from an admin panel. Users can make playlists, add extra info to videos etc. Visitors watch playlists, videos, track their progress etc. This are some of the very basic functionalities of the system, just to get an idea. So we agreed it's a saas project and we started with php,symphony,jquery,requireJS etc. Now our client says that he wants the user and visitor part has to be accessible offline only. He says the user can download the videos and software, and continue offline. What are your suggestions on this? Provide the ability for the user to download a local server, or another way?

    Read the article

  • SIP clients not working on Ubuntu 12.04

    - by Xlearner
    I am trying to find a SIP client that works on Ubuntu 12.04. I have an account on voipdiscount (www.voipdiscount.com) and 12voip (www.12voip.com) Earlier on Ubuntu 11.10, I was able to use SIP clients: Twinkle, SFL Phone. Using these clients, I was able to access my account and make the phone calls to different destinations. But after I installed 12.04, Twinkle, SFL Phone and Ekiga stopped. Whenever I try to make a phone call using one of these software, for some reason they are not able to register. They are failing. Any suggestions as to what I can do? Is there any SIP client that works on Ubuntu 12.04? Thanks!

    Read the article

  • Products missing from backend after import

    - by byronyasgur
    My client imported about 70 products into magneto and the all imported properly it seemed, but now only about half of them appear in the catalog ( backend ) searching for the SKU returns no results. I have searched the net for an hour looking for some information on this but I cant find any, furthermore I cant seem to find out how to verify whether the products are in the database or not, I thought I could just look for the products table in phpmyadmin, but Magento's EAV database structure looks more complicated than I'm used to. Does anyone know how to fix this, or even to locate products in the database. Edit : From talking to the client she thinks that this might have happened after she did a reindex.

    Read the article

  • Alternatives to using cookies?

    - by theclueless1
    Whate are alternatives to using cookies/client-side storage for a PHP/MySQL based site on Apache. Scenario/Requirements: I want to try using some anti-bot code to prevent specific scrapers etc. from accessing the site. I would like to run this code before launching the rest of the site (before DB access etc.). I don't want to constantly run the same code on every page-load after a visitor has passed the initial check. I'd like to avoid the use of Cookies/Client side storage if at all possible. The only solution I can currently think of is to write files to the server based on the visitors IP/UA, or to write a list of them to a single file. Yet this has the limitation of multiple users through a proxy/same connection, etc ... So, any ideas/suggestions? Or am I simply over working the issue?

    Read the article

  • What type of application is this called?

    - by boatingcow
    I am working on a web-based application which combines elements of what my client would call a CMS (content management system) and CRM (customer relations management) but also adds in many other business-specific features such as bookings management, staff task allocation management, wages calculations, document version control etc. However, I'm struggling to find a catch-all term for this type of application so I can research how other people have gone about creating such an integrated solution. Can anyone recommend a term I can use to refer to this, both internally in our team, for the client so they know what to call the 'system' and also for me personally, so that I can ask the Stack community further questions?

    Read the article

  • Remote Desktop advice

    - by spoon16
    Coming from Windows, so that is what my expectations are based on. I have a Ubuntu desktop edition instance running as a virtual machine on a server. I would like to use it as my primary open source dev environment but the VNC tools I have used don't seem to be as rich as "Remote Desktop Connection" in Windows. The two things that are missing for me: connecting/logging into a non-console user sessions dynamically resizing the graphical resolution based on the size of the remote desktop window device sharing (USB devices plugged into client shared with remote) Is there an appropriate client that I can run on Windows to connect to my ubuntu dev instance that provides these capabilities?

    Read the article

  • Steam not opening or responding at all

    - by user109409
    The steam client won't open nor does it display any error message. I have tried right click > Games. I ran steam steam://open/games command, but the client just does not respond. Removing it with apt-get remove steam, deleting the Steam directory & the .deb file and reinstalling it, did not work either. This problem only occurred after I used killall steam.sh to force quit it, it was working fine before. I'm running 12.10 on a 64bit laptop with no additional drivers installed. Anyone else have this problem and a possible workaround? Thank you

    Read the article

  • processing gamestate with a window of commands across time?

    - by rook2pawn
    I have clients sending client updates at a 100ms intervals. i pool the command inputs and create a client command frame. the commands come into the server in these windows and i tag them across time as they come in. when i do a server tick i intend to process this list of commands i.e. [ {command:'duck',timestamp:350,player:'a'}, {command:'shoot',timestamp:395,player:'b'}, {command:'move', timestamp:410,player:'c'} {command:'cover',timestamp:420,player:'a'} ] how would i efficiently update the gamestate based on this list? the two solutions i see are 1) simulate time via direct equation to figure out how far everyone would move or change as if the real gameupdate was ticking on the worldtick..but then unforseen events that would normally trigger during real update would not get triggered such as powerups or collissions 2) prepare to run the worldupdate multiple times and figure out which commands get sent to which worldupdate. this seems better but a little more costly is there a canonical way to do this?

    Read the article

  • Spam problem through cPanel

    - by mrtunes
    On a new website, I publicly display an email address, [email protected]. Then I set up an email forwarder in my hostmonster cPanel, so that if the public email address ever became spam ridden then we can chop off the forwarding. However, the client received a spam message that looked like the following. To: client's personal email address (not the public address) Subject: domain.com opportunities Body: marketing junk The problem is that the "to" should have said [email protected]. I am now worried that the real email address was retrieved on the backend of hostmonster.

    Read the article

  • Ubuntu not mounted?

    - by z3matt
    In Live CD i went in the terminal and when i do 'sudo update-grub' it responds /usr/sbin/grub-probe: error: cannot find a device for / (is /dev mounted?). Here's the breakdown of my drive: sda1 - vfat - Windows 7: FAT32 sda2 - sda3 - nfs - Windows Vista/7: NTFS - Windows 7 sda3/Wubi: - sda4 - Grub2 sda5 - Ubuntu 12.04.1 LTS sda6 - sda7 - sda8 - BIOS Boot Partition Also at the top of the page it states : = No boot loader is installed in the MBR of /dev/sda Any and all help is appreciated and welcomed. When my computer boots, it goes into GRUB and has the options for Windows 7 and Windows Memory Test but no option for Ubuntu. I want to run a dual-boot through it.

    Read the article

  • What would one call this architecture?

    - by Chris
    I have developed a distributed test automation system which consists of two different entities. One entity is responsible for triggering tests runs and monitoring/displaying their progress. The other is responsible for carrying out tests on that host. Both of these entities retrieve data from a central DB. Now, my first thought is that this is clearly a server-client architecture. After all, you have exactly one organizing entity and many entities that communicate with said entity. However, while the supposed clients to communicate to the server via RPC, they are not actually requesting services or information, rather they are simply reporting back test progress, in fact, once the test run has been triggered they can complete their tasks without connection to the server. The request for a service is actually made by the supposed server which triggers the clients to carry out tests. So would this still be considered a server-client architecture or is this something different?

    Read the article

< Previous Page | 248 249 250 251 252 253 254 255 256 257 258 259  | Next Page >