Search Results

Search found 34093 results on 1364 pages for 'identity access managem'.

Page 325/1364 | < Previous Page | 321 322 323 324 325 326 327 328 329 330 331 332  | Next Page >

  • Oracle Magazine, September/October 2009

    Oracle Magazine September/October features articles on benefits of Oracle Fusion Middleware 11g, Oracle's database security and identity management solutions, Oracle OpenWorld preview, easily move application data with Oracle Data Integrator, scripting Oracle RMAN commands, Tom Kyte answers your questions, debugging with Oracle Application Development Framework, array binding, best PL/SQL practices, Oracle Application Express and Amazon EC2, Oracle WebCenter for integrating applications and much more.

    Read the article

  • Microsoft (Bing) Offers Innovative Approach to Search

    In seemingly constant evolution, Microsoft's search engine has not only been desperately seeking search engine market-share; but a brand and corporate identity as well. The most recent approach from Microsoft, describes Bing as a "decision engine". Bing endeavors to be the search engine that finds and organizes the answers you need, so you can make faster; more informed decisions.

    Read the article

  • Qualcomm Receives Value from Fusion Technologies

    Qualcomm's CIO, Norm Fjeldheim, tells listeners how his company is preparing for IT growth, how using Fusion technologies like SOA is cutting development costs, and how Oracle's Identity Management solution is improving security. Fjeldheim also discusses his thoughts around Fusion applications.

    Read the article

  • Incorporating SEO Into Web Design

    Design is a very important aspect for a successful website; it an effective tool in increasing brand awareness, establishing an effective online identity, and connecting with the target marketing thus increasing the return on the website. However, to truly maximise the efficiency of the website and increase the ROI effective web design needs to be coupled with search engine optimisation (SEO). After all, a web site could have the most exciting products and offer the ultimate shopping experience but still remain unsuccessful if there is no traffic.

    Read the article

  • Engage Customers & Empower Employees

    - by Michelle Kimihira
    Oracle WebCenter and Oracle Identity Management help people collaborate more efficiently with social tools that optimize connections between people, information and applications while ensuring timely, relevant and accurate information is always available. See this demo with Andy Kershaw, Senior Director of Product Management, Oracle WebCenter. Additional Information Product Information on Oracle.com: Oracle Fusion Middleware Follow us on Twitter and Facebook and YouTube Subscribe to our regular Fusion Middleware Newsletter

    Read the article

  • Graphic Designing in the Corporate Business World

    Every company or business organization wants to craft a positive brand identity of their own in the market and make people brand aware so that desired profits are gained. We all identify our favorite... [Author: Alan Smith - Web Design and Development - June 11, 2010]

    Read the article

  • Allow a web designer to modify DNS without letting them transfer the domain?

    - by PhilCK
    We are in the process of having a web designer create a new website for us, but I don't want to give access to the control panel for the domain names (and have no way to limit it, it seems), while at the same time I don't want to be the go between guy for editing the settings. Is there a way or a service for me to point the domains at a 3rd party DNS system, that I can then give access for the web designer, without worrying that he can find my personal info or try and transfer my domain out?

    Read the article

  • Mounting Wubi part from another Linux installation

    - by FrankSus
    hope someone can help. I need to access 11.04 ubuntu files residing on a second hard drive (dual boot XP/Ubuntu) from a 10.04 hard drive installation. The 11.04 system co-exists with XP on the second drive. This drive is HPFS/NTFS. My 10.04 installation mounts and displays the contents of the XP installation and all files but the 11.04 system is nowhere to be seen. How can I see and access the Ubuntu partition, please?

    Read the article

  • Correct permissions for /var/www and wordpress

    - by dpbklyn
    Hello and thank you in advance! I am relatively new to ubuntu, so please excuse the newbie-ness of this question... I have set up a LAMP server (ubuntu server 11.10) and I have access via SSH and to the "it works" page from a web browser from inside my network (via ip address) and from outside using dyndns. I have a couple of projects in development with some outside developers and I want to use this server as a development server for testing and for client approvals. We have some Wordpress projects that sit in subdirectories in /var/www/wordpress1 /var/www/wordpress2, etc. I cannot access these sub directories from a browser in order to set up WP--or (I assume) to see the content on a browser. I get a 403 Forbidden error on my browser. I assume that this is a permissions problem. Can you please tell me the proper settings for the permissions to: 1) Allow the developers and me to read/write. 2) to allow WP set up and do its thing 3) Allow visitors to access the site(s) via the web. I should also mention that the subfolder are actually simlinks to folder on another internal hdd--I don't think this will make a difference, but I thought I should disclose. Since I am a newbie to ubuntu, step-by-step directions are greatly appreciated! Thank you for taking the time! dp total 12 drwxr-xr-x 2 root root 4096 2012-07-12 10:55 . drwxr-xr-x 13 root root 4096 2012-07-11 20:02 .. lrwxrwxrwx 1 root root 43 2012-07-11 20:45 admin_media -> /root/django_src/django/contrib/admin/media -rw-r--r-- 1 root root 177 2012-07-11 17:50 index.html lrwxrwxrwx 1 root root 14 2012-07-11 20:42 media -> /hdd/web/media lrwxrwxrwx 1 root root 18 2012-07-12 10:55 wordpress -> /hdd/web/wordpress Here is the result of using chown -R www-data:www-data /var/www total 12 drwxr-xr-x 2 www-data www-data 4096 2012-07-12 10:55 . drwxr-xr-x 13 root root 4096 2012-07-11 20:02 .. lrwxrwxrwx 1 www-data www-data 43 2012-07-11 20:45 admin_media -> /root/django_src/django/contrib/admin/media -rw-r--r-- 1 www-data www-data 177 2012-07-11 17:50 index.html lrwxrwxrwx 1 www-data www-data 14 2012-07-11 20:42 media -> /hdd/web/media lrwxrwxrwx 1 www-data www-data 18 2012-07-12 10:55 wordpress -> /hdd/web/wordpress I am still unable to access via browser...

    Read the article

  • Can I connect to my company's Exchange server through Kontact?

    - by jjesse
    Running Kubuntu 11.04 (Natty) and am trying to replace Outlook. I need access to calendaring and email but have not been able to figure things out. A Google of things doesn't give me very good information so turning here to ask the gurus. System information: Running Kubuntu 11.04 and would like to use Kontact (KMail) to connect to work. Also would like to avoid installing GNOME if possible. Connecting to Exchange 2010 and I don't have access to change anything on the Exchange server Thanks in advance

    Read the article

  • When working with contractors/interns how protective should one be of your codebase?

    - by Shizam
    We're considering hiring a contractor or intern to work with us on our iOS project but this causes me to get really paranoid that we're giving somebody who doesn't work for the company access to our precious codebase. I mean, I could just give them access to the classes I'd like them to work on but that seems rude and it would make it more difficult for them to develop what we need them to. How paranoid should one be about people running off with their entire application?

    Read the article

  • LAG function – practical use and comparison to old syntax

    - by Michael Zilberstein
    Recently I had to analyze huge trace – 46GB of trc files. Looping over files I loaded them into trace table using fn_trace_gettable function and filters I could use in order to filter out irrelevant data. I ended up with 6.5 million rows table, total of 7.4GB in size. It contained RowNum column which was defined as identity, primary key, clustered. One of the first things I detected was that although time difference between first and last events in the trace was 10 hours, total duration of all sql...(read more)

    Read the article

  • Website that allows twitter like message accessed via tinyurl

    - by blunders
    Looking for a website that allows me to post twitter like messages that are accessed via tinyurls and that I'm able to create an account to get reports on the access of each of these messages. Basically, unlikely twitter each message would require the tinyurl to access the message, but the would be no central author index of messages, but the author would not only be able to login and see a centralized listing of all the messages, but also reports on if the messages had been accessed.

    Read the article

  • LAG function – practical use and comparison to old syntax

    - by Michael Zilberstein
    Recently I had to analyze huge trace – 46GB of trc files. Looping over files I loaded them into trace table using fn_trace_gettable function and filters I could use in order to filter out irrelevant data. I ended up with 6.5 million rows table, total of 7.4GB in size. It contained RowNum column which was defined as identity, primary key, clustered. One of the first things I detected was that although time difference between first and last events in the trace was 10 hours, total duration of all sql...(read more)

    Read the article

  • Introducing weblog OIM11gR2

    - by Shashidhar Malyala
    Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} Having a centralized Identity & Access Management Solutions in any environment can reduce costs, time and errors drastically. For many Organizations today implementing a robust and reliable I&AM solution is a challenge. As more and more an organization grows, new IT applications are used. This in turn leads to complex identity and access management process which is time consuming and subject to errors. Most of these challenges can be addressed by leveraging Oracle OIM11gR2.     Contributions to this blog are made by ATS GSD-Security team. This weblog brings to you various articles on Oracle I&AM 11g R2. The articles include OIM11gR2 new features, Various ‘How To’ with examples, Solutions/ workarounds for frequently occurring issues, APIs, code samples, Installations, patches etc…

    Read the article

  • How hard is to be the anonymous owner of a website?

    - by silla
    I'd like to create a website with a very radical political message. It won't be unethical (encouraging violence, etc) but I feel the points I plan to list in it will definitely make me a lot of enemies. How hard would it be to protect my identity from anyone finding out who I am? I know domains always have a $10/year option for privatizing your registration information but is there any other protection I should think about having? Thanks!

    Read the article

  • How do I replace the desktop by an application?

    - by Takkat
    Sometimes it may be needed that a user only has access to a certain application. Running the desktop environment then may be unwanted be it either for security reasons or for acchieving a better accessibility to the given application. In these cases it may be desired to replace the desktop by an application that runs immediately after login. Other users should have a normal access to their desktops.

    Read the article

  • October patch links

    - by THE
    Along the lines of patching... While it is not 100% in our LOB, it might still be interesting for some of our readers: The Oracle critical patch update Advisory for October 2012 You will find a very detailed List with links to patches and matrices on that overview page for products ranging from Database via E-Business Suite to MySQL. Of course you can find patches for Identity Management, SOA and Weblogic also via the "Master Note on Fusion Middleware Proactive Patching - Patch Set Updates (PSUs) and Bundle Patches (BPs) [ID 1494151.1]"

    Read the article

  • Is there a way to create a cmd shortcut for a specific folder on W7 or/and W8? [migrated]

    - by Hinstein
    Let say i have 3 different folders that i want to access with CMD C:\Users\Henok\Documents\Visual Studio 2012\Projects\TestApp1\Debug C:\Users\Henok\Documents\Visual Studio 2012\Projects\TestApp2\Debug C:\Users\Henok\Documents\Visual Studio 2012\Projects\TestApp3\Debug I wonder if there is a way to create 3 different cmd shortcut to access those directory(folder) individually without changing the default cmd directory location. Forgive me for my broken English, and thanks for your time.

    Read the article

  • Local Restaurant SEO - Improving Visibility Through Reviews

    Search Engine Optimization is often tough to become successful when dealing with hyper-local businesses. For starters, many of these companies' websites are not designed or maintained directly by the business themselves - frequently, these small to mid sized organizations enlist the services of an Internet Yellow Pages (IYP) company to create and manage their website. While they may have access to change content in these cases, it is common for IYPs to only allow access to certain fields within a site, and not the entire HTML/CSS back-end.

    Read the article

  • Does geographic location of domain registrator matter?

    - by Joudicek Jouda
    Does it matter where I register my domain geographically when I'm planning to change nameset (nameservers) to a server in my target area? Example Target audience: USA Server location: USA Domain origin: bought from French registrator website Question: When a user in the U.S. tries to access my web, will there be a delay, because he had to access the French registrator servers first or will he go directly to my U.S. server?

    Read the article

  • IP blocked because: (smtpauth) Failed SMTP AUTH login from - can someone explain?

    - by gdaniel
    Today I had a few users blocked in our server firewall because of: (smtpauth) Failed SMTP AUTH login from Can someone explain the reason? What does it exactly mean? Could someone be using the our website to access SMTP for spamming purpose? UPDATE: Server info: Centos OS with CPanel and WHM. However no one has access to either. Taking a look at the logs it looks like someone repetitively attempted to login with a known existent user/pass.

    Read the article

  • configuring and authenticating proxy on ubuntu 12.04 terminal

    - by awuni joshua
    I am very new to ubuntu, I decided to try it out two days ago. I am using proxy server [41.74.91.139 with user name and password]. I cant access any on-line resources both with the terminal, transmission(to download torrents), or Ubuntu software center. For firefox, I have configured it and can download .deb and other files but need direct access. Please give me step by step instruction as to how to configure and authenticate 12.04 terminal. Thank you

    Read the article

< Previous Page | 321 322 323 324 325 326 327 328 329 330 331 332  | Next Page >