Search Results

Search found 12923 results on 517 pages for 'product news'.

Page 265/517 | < Previous Page | 261 262 263 264 265 266 267 268 269 270 271 272  | Next Page >

  • Sustainability Reporting, Planning, and Management

    Sustainability Reporting, also referred to as the Triple Bottom Line, is the reporting of environmental, social and economic metrics to external and internal stakeholders. Tune into this conversation with John O'Rourke,* *Senior Director, Product Marketing for Oracle Enterprise Performance Management Solutions to learn what is driving the need for this reporting, how companies are responding and the solutions that Oracle offers to help alleviate the complexity, provide an audit trail and a repeatable reporting process.

    Read the article

  • Multiple vulnerabilities in Apache HTTP server

    - by RitwikGhoshal
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-0883 Permissions, Privileges, and Access Controls vulnerability 6.9 Apache HTTP server Solaris 10 SPARC: 120543-30 X86: 120544-30 Solaris 11.1 Contact Support CVE-2012-2687 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability 2.6 This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Ouverture de la rubrique Windows Azure : toutes les ressources et l'actualité de la plateforme Cloud de Microsoft

    Bonjour, La rubrique Windows Azure vient d'être mise en ligne à l'adresse : http://windows-azure.developpez.com/ Cette rubrique hébergera toutes les news et ressources nécessaires au développement sur la plateforme PaaS de Microsoft. Windows Azure est une plateforme dédiée au cloud computing (ou informatique dans le nuage) fournie par Microsoft. Elle a été largement mise en avant au cours de l'année 2010, que ce soit dans les différents événements consacrés aux développeurs et autres professionnel de l'informatique, que dans les blogs ou dans des challenges divers et variés - dont celui en partenariat avec Développez. Au niveau le plus élevé, Azure permet d'héberge...

    Read the article

  • UK Data Breaches Up by 10 fold in 10 years.

    - by TATWORTH
    At http://www.v3.co.uk/v3-uk/news/2201863/uk-data-breaches-rocket-by-1-000-percent-over-past-five-years there is an interesting report on the increase in data breaches reported in the UK.A lot of this increase may simply a change in legislation that has made reporting a statutory obligation.Some questions to ask yourself:Are server logs checked for untoward activity?Do you have a reporting policy if something is amiss?Did you design security in for the start of your application design?Do you log for example failed logons?Do you run tools to check for code integrity?Is my defense, a strategy of defense in depth?Do you realise that 60% of hack attacks are internal?Whilst SQL Injection is a problem that affects practically all application code platforms, within Microsoft Applications do you run FXCOP? Do you run any of the other free tools for checking?

    Read the article

  • Partitioned Tables, Indexes and Execution Plans: a Cautionary Tale

    Table partitioning is a blessing in that it makes large tables that have varying access patterns more scalable and manageable, but it is a mixed blessing. It is important to understand the down-side before using table partitioning. "SQL Backup Pro 7 improves on an already wonderful product" - Don KolendaHave you tried version 7 yet? Get faster, smaller, fully verified backups. Download a free trial of SQL Backup Pro 7.

    Read the article

  • LOPPSI 2 adoptée par l'Assemblée Nationale, le filtrage des sites se fera sans regard de la CNIL ou d'un juge

    LOPPSI 2 adoptée par l'Assemblée Nationale, le filtrage des sites se fera sans regard de la CNIL ou d'un juge Mise à jour du 22.12.2010 par Katleen Hier, l'Assemblée Nationale a adopté le projet de loi LOPPSI 2, dont son sulfureux article 4, dans une nouvelle version (le tout devra encore être définitivement approuvé par le Sénat en janvier pour être promulgué). L'article qui fait polémique porte sur le filtrage administratif du Net, pour "lutter contre la pédopornographie", et inquiète fortement internautes et certains acteurs du Web. Il est jugé dangereux (nous vous en parlions déjà, voir news précédentes). C'est l'OCLCTIC (Office Central de Lutte contre la Criminalité lié...

    Read the article

  • How to Become an SEO Expert

    Do you have a website, a quality product but need targeted traffic. Search engine optimization is the foundation of getting organic traffic to any site or blog. Today were going to discuss several simple yet powerful ways of making your site SEO friendly and getting you that targeted traffic you need.

    Read the article

  • CVE-2012-3236 Buffer overflow vulnerability in Gimp

    - by RitwikGhoshal
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-3236 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability 4.3 Gimp Solaris 10 Contact Support Solaris 11 11/11 SRU 11.4 This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • CVE-2012-5166 Denial of Service vulnerability in ISC BIND

    - by Umang_D
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-5166 Denial of Service vulnerability 7.8 BIND Solaris 11 Contact Support Solaris 10 SPARC : 119783-25 x86 : 119784-25 Solaris 9 Contact Support This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Mac theme for Firefox

    - by Anirudha
    Originally posted on: http://geekswithblogs.net/anirugu/archive/2013/10/19/mac-theme-for-firefox.aspxFrom a long time There is a theme for Firefox that is called MacOSX Theme This is used for make Firefox appearance like Mac. The bad news about this add-ons is that this plugin doesn’t maintain as good as it should be. Now this add-ons theme doesn’t work current Firefox. Don’t worry. You can got it f1beta.com/macosx_theme_firefox_4-1.8.1-fx.xpi  Note:-  This plugin is work of https://addons.mozilla.org/en-US/firefox/user/golf-at/ and found online https://addons.mozilla.org/en-US/firefox/addon/macosx-theme-firefox-4/?src=api I just patch it for people who have problem with installing it on latest Firefox. You can still use This theme from original site with this hack https://addons.mozilla.org/en-US/firefox/addon/checkcompatibility/ this plugin make the unsupported plugin worked.

    Read the article

  • 12.1.3 Spares Management Enhancements Transfer of Information (TOI)

    - by Oracle_EBS
    Transfer of Information (TOI) presentation is available. It covers the following enhancements made to the EBS Spares Management Product: Restrict Sources with no Shipping Network definition Create Internal Order when Source is Manned Warehouse Display Delivery status in Parts Requirement UI Order Sources by distance when Shipping cost remains same Calculate Parts Shipping Distances using Navteq Data Consider Warehouse Calendar to calculate Parts Arrival Date Create Requisitions in Operating Unit of Destination Inventory Org Uptake of HZ address structure in Parts Requirement UI

    Read the article

  • CVE-2012-0841 Denial of Service (DoS) vulnerability in libxml2

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-0841 Denial of Service (DoS) vulnerability 5.0 libxml2 Solaris 11 11/11 SRU 10.5 Solaris 10 SPARC: 125731-08 X86: 125732-08 Solaris 9 SPARC: 114014-29 X86: 114015-29 This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Understanding Long Tail Keywords For SEO

    Long tail keywords are typically two or more words (a phrase) that you type into a search engine like Google when you are searching for a product, service, the answer to a question or any kind of research you might find necessary. And if you're not at the top of the search engines (preferably in one of the first 3 positions), your chances of making money online decrease substantially.

    Read the article

  • Search Engine Optimization Placement

    If you are doing business or marketing your product online, surely you have heard of the phrase "Search Engine Optimization Placement" or "SEO Placement." This refers to the means by which your website is given maximum exposure through search engine optimization and placement.

    Read the article

  • Legitimate SEO Services

    SEO is symbol of search engine optimization which is the key to success in the business. No website has meaning if it is not properly promoted. Whenever any internet surfer is in search of any specific product, services or information he uses the simplest way of searching through search engine and this is habit of many people to only look in to five or six top websites for their purpose. No one has time to look in to 100 pages of search engine as there is no need when he finds in top pages.

    Read the article

  • A review of the latest version of Crypto Obfuscator for .NET and its features.

    Crypto Obfuscator For .Net is a powerful and easy-to-use product for code protection, deployment and optimization of your your .Net software. A review of the latest version of Crypto Obfuscator for .NET and its features.  read moreBy Peter BrombergDid you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Multiple vulnerabilities in OpenSSL

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-2110 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability 7.5 OpenSSL Solaris 10 SPARC: 147159-05 147707-06 X86: 146672-07 CVE-2012-2131 Numeric Errors vulnerability 7.5 This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Database Insider - October 2012 issue

    - by Javier Puerta
    The October issue of the Database Insider newsletter is now available. (Full newsletter here) NEWS   Newly Launched Oracle Exadata X3 Redefines Extreme Performance At Oracle OpenWorld 2012, Oracle announced the general availability of Oracle Exadata Database Machine X3, a complete package of servers, storage, networking, and software that is massively scalable, secure, and fully redundant—and ideally suited for the varied and unpredictable workloads of cloud computing. Read More WEBCASTS What Are Oracle Users Doing to Improve Availability and Disaster Recovery? The Independent Oracle Users Group (IOUG) surveyed more than 350 data managers and professionals regarding planned and unplanned downtime, database high availability, and disaster recovery solutions. Download the report and watch the Webcast today.

    Read the article

  • Multiple vulnerabilities in OpenSSL

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-2110 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability 7.5 OpenSSL Solaris 11 Contact Support Solaris 10 SPARC: 147159-05 147707-06 X86: 146672-07 CVE-2012-2131 Numeric Errors vulnerability 7.5 This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • CVE-2009-2409 Cryptographic Issues in OpenSSL

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2009-2409 Cryptographic Issues vulnerability 5.1 OpenSSL Solaris 10 SPARC: 147707-02 X86: 146672-03 Solaris 9 Contact Support This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Do SEO Services Really Boost Your Online Business?

    In this fast moving world, no one wants to spend much time on their shopping and hence they opt for online purchase rather than going for a retail store. Hence it is mandatory for any product or service providing companies to have their presence online and hence they could make more money. The first step in taking your business online is to design a suitable website which provides complete details about your company as well as other important stuffs you would like to convey to your customer.

    Read the article

  • Where is the best and easiest place to store global website settings [migrated]

    - by Darkcat Studios
    I'm just putting together an internal data system for a client, which is ASP.NET VB, backed by an SQL database, on an in-house IIS7.5 dedicated server. I want to store certain global settings, such as the age limit for news articles, admin contacts etc, in a file NOT within the database (i.e. to avoid unnecessary database query's) Where would the best place to store this be? global.asax? app.config? or a custom XML file? how would i import these at runtime? (probably to session variables) ETA: Also - the settings must be editable from within the site, i.e. an admin section i'm yet to build

    Read the article

  • Multiple vulnerabilities in LibTIFF

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2010-2595 Denial of Service (DoS) vulnerability 4.3 LibTIFF Solaris 10 SPARC: 119900-13 X86: 119901-12 CVE-2010-4665 Denial of Service (DoS) vulnerability 4.3 CVE-2011-0192 Denial of Service (DoS) vulnerability 9.3 CVE-2011-1167 Buffer Overflow vulnerability 6.8 This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Le moteur de recherche Baidu fait son entrée sur le marché des navigateurs mobiles, dominé par Apple et Google

    Le moteur de recherche Baidu fait son entrée sur le marché des navigateurs mobiles Dominé par Apple et Google Le moteur de recherche chinois Baidu lance son propre navigateur Web mobile dans le but de générer plus de bénéfices auprès des utilisateurs de smartphones, dont le nombre se chiffre désormais en centaines de millions d'utilisateurs en Chine. [IMG]http://idelways.developpez.com/news/images/baidu-logo.jpg[/IMG] Baidu a choisi de cibler les utilisateurs chinois et se place comme principal rival à Safari sur les appareils d'Apple et à Chrome sur Google Android. Il ne compte pas que sur la fierté nationale : selon la société Baidu, les tests de perform...

    Read the article

< Previous Page | 261 262 263 264 265 266 267 268 269 270 271 272  | Next Page >