Search Results

Search found 145 results on 6 pages for 'mcafee'.

Page 3/6 | < Previous Page | 1 2 3 4 5 6  | Next Page >

  • iMac invalid memory access and then crash?

    - by Sam McAfee
    My iMac G5 from a few years ago (the square white one) dies now, with a message about an invalid memory access. It goes straight to an Open Firmware prompt and doesn't even load the Mac OS at all. Am I correct in guessing that the memory is probably the issue, and that if I replace it, we may be able to boot again as normal? That's my gut feeling anyway, so I ordered some more memory and plan to swap it today. Any thoughts? Ideas?

    Read the article

  • remove registry keys using reg.exe in a batch script

    - by Lex
    I've written this little batch script to help me auto-clean the registries of 300+ identical PC's of some very specific registry keys. It works right up to the point of passing the key variable to the "reg delete %1" command. @echo off C: cd C:\Program Files\McAfee\Common Framework\ framepkg.exe remove=agent /silent setlocal for /F %%c in ('REG QUERY HKLM\SOFTWARE /s^|FIND "HKEY_"^|findstr /L /I /C:"mcafee"') do call :delete %%c endlocal goto :EOF :delete reg delete /f %1 pause Any and all debugging help would be extremely appreciated!

    Read the article

  • Taking AIIM at Social

    - by Christie Flanagan
    Today we are pleased to have a guest post from Christian Finn (@cfinn).  Christian is Senior Director of Product Management for Oracle WebCenter and heads up the WebCenter evangelist team.Last week I had the privilege of speaking at AIIM’s new conference in San Francisco.  AIIM, for those of you not familiar with it, is a global community of information professionals and got its start with ECM and imaging long ago. With 65,000+ members, AIIM has now set about broadening its scope to focus more on the intersection between systems of record (think traditional ECM) and systems of engagement (think social solutions).  So AIIM’s conference is a natural place to be for WebCenter types like me, who have a foot in both of those worlds.AIIM used to have their name on a very large tradeshow, but have changed direction now to run a small, intimate conference.  The lineup of keynotes was terrific, including David Pogue of The New York Times, Clay Shirky, author of Here Comes Everybody, and Ted Schadler, author of Empowered among many thought-provoking and engaging speakers. (Note: Ted will soon be featured in our Social Business webcast series. Stay tuned.)John Mancini and his team at AIIM did a fabulous job running the event and the engagement from the 450 attendees was sustained over the two and a half days.  Our proudest moment was having three finalists up for AIIM awards including: San Joaquin County, CA, for a justice case management system using WebCenter Content and Oracle BPM; Medtronic and Fishbowl Solutions for their innovative iPad solutions on WebCenter Content, and the government of Louisville, Kentucky/Jefferson County for their accounts payable solution using WebCenter Content’s Image & Process Management.  The highlight of the awards night was San Joaquin winning the small organization award against some tough competition.In addition to the conversations sparked at the show, AIIM promoted the whitepapers their industry task forces have produced on the impact and opportunities created by systems of engagement and systems of record. The task forces were led by: Geoffrey Moore, the renowned high tech marketing guru and author of Crossing The Chasm; and Andrew McAfee, who coined the term and wrote the book, Enterprise 2.0. (Note: Andy will also be featured soon on the Social Business webcast series.)  These free papers make short, excellent reading and you can download them on the AIIM website: Moore highlights the changes to Enterprise IT that the social revolution will engender, and McAfee covers where and how organizations are finding value in using social techniques to foster innovation, to scale Q&A across the organization, and to connect sales and marketing for greater efficiency and effectiveness. Moore’s whitepaper is here and McAfee’s whitepapers are available here. For the benefit of those who did not get a chance to attend the AIIM conference, I’ll be posting the topics of my AIIM presentation, “Three Principles for Fixing Your Broken Organization,” here on the WebCenter blog over the rest of this week and next in a series of posts.  

    Read the article

  • PHP Object as XML Document

    - by Sam McAfee
    What is the best way to take a given PHP object and serialize it as XML? I am looking at simple_xml and I have used it to parse XML into objects, but it isn't clear to me how it works the other way around.

    Read the article

  • Do you continue development in a branch or in the trunk?

    - by Sam McAfee
    Suppose you're developing a software product that has periodic releases. What are the best practices with regard to branching and merging? Slicing off periodic release branches to the public (or whomever your customer is) and then continuing development on the trunk, or considering the trunk the stable version, tagging it as a release periodically, and doing your experimental work in branches. What do folks think is the trunk considered "gold" or considered a "sand box"?

    Read the article

  • IWebBrowser2: how to force links to open in new window?

    - by Rob McAfee
    The MSDN documentation on WebBrowser Customization explains how to prevent new windows from being opened and how to cancel navigation. In my case, my application is hosting an IWebBrowser2 but I don't want the user to navigate to new pages within my app. Instead, I'd like to open all links in a new IE window. The desired behavior is: user clicks a link, and a new window opens with that URL. A similar question was asked and answered here and rather than pollute that answered post, it was suggested I open a new discussion. The members on the related post suggested I should be able to do this by trapping DISPID_BEFORENAVIGATE2, setting the cancel flag, and writing code to open a new window, but I've found out that the browser control gets lots of BeforeNavigate2 events that seem to be initiated by scripts on the main page. For example, amazon.com fires BeforeNavigate2 events like crazy, and they are not a result of link invocation. Replies appreciated!

    Read the article

  • Best practices for withstanding launch day traffic burst

    - by Sam McAfee
    We are working on a website for a client that (for once) is expected to get a fair amount of traffic on day one. There are press releases, people are blogging about it, etc. I am a little concerned that we're going to fall flat on our face on day one. What are the main things you would look at to ensure (in advance without real traffic data) that you can stay standing after a big launch. Details: This is a L/A/M/PHP stack, using an internally developed MVC framework. This is currently being launched on one server, with Apache and MySQL both on it, but we can break that up if need be. We are already installing memcached and doing as much PHP-level caching as we can think of. Some of the pages are rather query intensive, and we are using Smarty as our template engine. Keep in mind there is no time to change any of these major aspects--this is the just the setup. What sorts of things should we watch out for?

    Read the article

  • Do you use Phing?

    - by Sam McAfee
    Does anyone use Phing to deploy PHP applications, and if so how do you use it? We currently have a hand-written "setup" script that we run whenever we deploy a new instance of our project. We just checkout from SVN and run it. It sets some basic configuration variables, installs or reloads the database, and generates a v-host for the site instance. I have often thought that maybe we should be using Phing. I haven't used ant much, so I don't have a real sense of what Phing is supposed to do other than script the copying of files from one place to another much as our setup script does. What are some more advanced uses that you can give examples of to help me understand why we would or would not want to integrate Phing into our process.

    Read the article

  • Using Variables for Class Names in Python?

    - by Sam McAfee
    I want to know how to use variables for objects and function names in Python. In PHP, you can do this: $className = "MyClass"; $newObject = new $className(); How do you do this sort of thing in Python? Or, am I totally not appreciating some fundamental difference with Python, and if so, what is it?

    Read the article

  • Keep getting invalid IP via WiFi

    - by nmuntz
    There is something wrong with my WiFi. I keep getting an invalid IP via DHCP (169.254.x.x), this happens for ALL wifi connections (home, office, etc). If I try a Local Ethernet connection via cable it works fine. I have tried downloading the latest drivers for my wireless adapter, resetting the TCP Stack and still have this issue. One strange thing I notice is under Device Manager, Network Adapters I have 4 "Unknown Devices" and three "Remote NDIS based Internet Sharing Device". My guess is that this belongs to McAfee. Not sure if this is related or not, anyways to try to fix this I tried downloading the NetLUIDfix.exe utility from McAfee but it didn't work. Any ideas how to solve this annoying issue? Thanks!!

    Read the article

  • ArchBeat Link-o-Rama Top 10 for November 2, 2012

    - by Bob Rhubart
    ADF Mobile - Login Functionality | Andrejus Baranovskis "The new ADF Mobile approach with native deployment is cool when you want to access phone functionality (camera, email, sms and etc.), also when you want to build mobile applications with advanced UI, " reports Oracle ACE Director Andrejus Baranovskis. Big Data: Running out of Metric System | Andrew McAfee Do very large numbers make your brain hurt? Better stock up on aspirin. According to Andrew McAfee: "It seems safe to say that before the current decade is out we’ll need to convene a 20th conference to come up with some more prefixes for extraordinarily large quantities not to describe intergalactic distances or the amount of energy released by nuclear reactions, but to capture the amount of digital data in the world." Cloud computing will save us from the zombie apocalypse | Cloud Computing - InfoWorld "It's just a matter of time before we migrate our existing IT assets to public cloud systems," says InfoWorld cloud blogger David Linthicum. "Additionally, it's a short window until the dead rise from the grave and attempt to eat our brains." Is is Halloween or something? Thought for the Day "A computer lets you make more mistakes faster than any invention in human history—with the possible exceptions of hand guns and tequila." — Mitch Ratcliffe

    Read the article

  • Heavy Criticism on Patch Process Thrown Microsoft's Way

    Plus: McAfee explains patching problem; what security concerns make you lose sleep?; Patching in the dark....Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • The IT Security Bubble Has Popped

    The blank check IT security enjoyed has been pulled off the table as businesses reassess how much they spend to stay safe. Need some data on the mood? McAfee reports nearly three-quarters of SMBs have cut security spending, even though 71 percent believe a serious attack would put them out of business.

    Read the article

  • The IT Security Bubble Has Popped

    The blank check IT security enjoyed has been pulled off the table as businesses reassess how much they spend to stay safe. Need some data on the mood? McAfee reports nearly three-quarters of SMBs have cut security spending, even though 71 percent believe a serious attack would put them out of business.

    Read the article

  • How Linux Saved A Fast Food Giant

    <b>Holy Crap My Hair is on Fire:</b> "Linux saved me and the company I sub contract to, a large fast food giant, from near-total disaster. Last month McAfee posted a virus definition update that flagged SVCHOST.EXE as a virus. This is my story of what happened."

    Read the article

  • WiseCustomCalla.dll ? What is that?

    - by HeavyWave
    I have a few folders in my Windows folder (I'm running Windows 7) like this: C:\Windows\1C4551A64743409391E41477CD655043.TMP\WiseCustomCalla.dll All they contain is WiseCustomCalla.dll. I've read that it is part of McAfee antivirus or whatever. The problem is: I have never ever installed any antivirus software on my machine. What is this file and what is it doing on my machine? I am also using Steam and PunkBuster if that helps.

    Read the article

  • How to remove google ads virus in Internet Explorer?

    - by msbg
    I picked up some adware that adds irrelevant advertisements to Google and Wikipedia. I have scanned with MalwareBytes, Windows Defender (Which is the same as MSE in Windows 8), Ad Aware, Spybot, and McAfee, which found no results. This only occurs in Internet Explorer 10, not in Firefox or Iron. I would like to keep IE10, I think it is a major improvement from previous versions. Any ideas on how to remove the adware?

    Read the article

  • Checkpoint Endpoint Connect Imaging - Are there any gotchas?

    - by Ben
    I am about to install CheckPoint EPC on a load of new laptops being rolled out. I plan to add it to the image, but want to check if there are any gotchas? By this I mean are there any UIDs that need removing before the image is taken to "depersonalise" the install. For example when you install LANDesk or McAfee (when using ePolicy) you need to remove the identifiers - do I need to do the same with EPC? Thanks in advance, Ben

    Read the article

  • Enterprise desktop antivirus without a Windows server

    - by Adam
    Are there any desktop antivirus products suitable for use in an enterprise environment without a Windows server? We're currently using McAfee for our Windows desktops but to get updates and alerts with the latest version it looks like you need to be running their EPO server software. I'd like to avoid the cost of hardware and Windows licensing, and if possible to run just client-based antivirus. Ideally it would support: Updates from an internal copy of the definitions (e.g. a wget mirror) Automated configuration of the install Alerts from the client via email

    Read the article

  • database scanning tools recommendation?

    - by stock99
    Lately my boss is asking me to looking into database scanners. I know very little about db scanning technology. Just wondering if it is worth to purchase tools like Sentrigo ( http://www.mcafee.com/us/about/sentrigo.aspx ) ? Does anyone have experience of using database scanner? Also, I'd like to know if there is any limitation on it. We already conducting internal OS and web scan on regular basis, by the way.

    Read the article

< Previous Page | 1 2 3 4 5 6  | Next Page >