Search Results

Search found 19765 results on 791 pages for 'product lifecycle management'.

Page 396/791 | < Previous Page | 392 393 394 395 396 397 398 399 400 401 402 403  | Next Page >

  • Introducing weblog OIM11gR2

    - by Shashidhar Malyala
    Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} Having a centralized Identity & Access Management Solutions in any environment can reduce costs, time and errors drastically. For many Organizations today implementing a robust and reliable I&AM solution is a challenge. As more and more an organization grows, new IT applications are used. This in turn leads to complex identity and access management process which is time consuming and subject to errors. Most of these challenges can be addressed by leveraging Oracle OIM11gR2.     Contributions to this blog are made by ATS GSD-Security team. This weblog brings to you various articles on Oracle I&AM 11g R2. The articles include OIM11gR2 new features, Various ‘How To’ with examples, Solutions/ workarounds for frequently occurring issues, APIs, code samples, Installations, patches etc…

    Read the article

  • SQL Server 2012 Integration Services - Using PowerShell to Configure Project Environments

    Continuing our discussion on how to leverage the capabilities of PowerShell to automate the most basic SSIS management tasks, this article will explore more complex topics by demonstrating the use of PowerShell in implementing and utilizing project environments. ‘Disturbing Development’Grant Fritchey & the DBA Team present the latest installment of the Top 5 hard-earned lessons of a DBA – read it now

    Read the article

  • Tips on Custom Website Development

    Today, successful businesses are not just focused on being ahead of competition but also focus on being front runners, pioneers and consistent leaders. Web king solution offers you a gamut of IT related services, top-notch management skills and marketing insight to keep you at the top of the list.

    Read the article

  • Multiple Vulnerabilities in Thunderbird

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2011-3648 Cross-site scripting (XSS) vulnerability 4.3 Thunderbird Solaris 11 11/11 SRU 04 CVE-2011-3650 Denial of Service(DoS) vulnerability 9.3 CVE-2011-3651 Denial of Service(DoS) vulnerability 10.0 CVE-2011-3652 Denial of Service(DoS) vulnerability 10.0 CVE-2011-3654 Denial of Service(DoS) vulnerability 10.0 CVE-2011-3655 Access Control vulnerability 9.3 This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Performance Tuning in the Age of Big Data

    Database Administrators must now deal with large volumes of data and new forms of high-speed data analysis. If your responsibility includes performance tuning, here are the areas to focus on that will become more and more important in the age of Big Data. Total DeploymentEnjoy easy release management for your .NET apps, services, and databases with Deployment Manager. Get your free Starter edition now

    Read the article

  • Utilisation d'Apache Maven pour le développement .NET : NPanday ?

    Bonjour, Je viens de découvrir le projet NPanday (anciennement NMaven) sur CodePlex sous licence Apache 2.0 qui correspond :à un jeu de plugins Maven pour la construction de projets .NET avec Apache Maven à un add-in Maven pour Visual Studio La version 1.2 est attendue pour demain (25 mai) Citation: Continuous Integration and Artifact Management for your .NET Applications using Open Source Technology By using NPanday you...

    Read the article

  • communication network applications in Ubuntu 12.04

    - by soporte.cs
    I have installed edubuntu on 2 computers that are networked. I installed an educational software to keep track of the teams (one student and one teacher) but the teacher software is not any student team, as I have indicated in the product support should be enabled for proper telnet performance but despite being able to telnet between computers not get it to work. I wonder which options should be active in ubuntu for this type of software to operate smoothly. Thank you.

    Read the article

  • SSDs at PASS 2012

    - by jchang
    There were 7 companies exhibiting SSD products as PASS this year, and one with a product to support SSD storage. This is not counting Dell, EMC and HP who have SSD products, but were at PASS for other reasons. This shows that many have aspirations with the hope that market leadership is not yet firmly set. The products fall into the following: PCI-E SSDs (Fusion-io, LSI, Virident) SSD SAN (Violin, TMS, Whiptail) SSD caching (LSI, GridIron) I am inclined to be of the opinion that SSD market is not...(read more)

    Read the article

  • Wireless network disabled

    - by neil delmonte
    After installing Ubuntu 11.04, my network has become disabled. Here is the output oflshw in terminal: *-network DISABLED description: Wireless interface product: BCM4312 802.11b/g LP-PHY vendor: Broadcom Corporation physical id: 0 bus info: pci@0000:02:00.0 logical name: eth1 version: 01 serial: 00:21:00:58:65:5f width: 64 bits clock: 33MHz capabilities: pm msi pciexpress bus_master cap_list ethernet physical wireless configuration: broadcast=yes driver=wl0 driverversion=5.100.82.38 latency=0 multicast=yes wireless=IEEE 802.11bg resources: irq:17 memory:d4600000-d4603fff

    Read the article

  • Steps to Rename a Subscriber Database for SQL Server Transactional Replication

    I have transactional replication configured in production. The business team has a requirement to rename the subscription database. Is it possible to rename the subscription database and ensure that transactional replication will continue to function as before? If so, how could we achieve this? Get smart with SQL Backup ProPowerful centralised management, encryption and more.SQL Backup Pro was the smartest kid at school. Discover why.

    Read the article

  • Multiple Denial of Service vulnerabilities in Ghostscript

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2011-4516 Denial of Service (DoS) vulnerability 6.8 Ghostscript Solaris 10 SPARC: 122259-06 X86: 122260-06 Solaris 11 11/11 SRU 6.6 CVE-2011-4517 Denial of Service (DoS) vulnerability 6.8 This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Windows Intune Beta: Enterprise Options for Small Orgs

    Microsoft launched a limited public beta of a new Windows 7-based desktop PC security and management service....Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • CVE-2012-2111 Access Controls vulnerability in Samba

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-2111 Permissions, Privileges, and Access Controls vulnerability 6.5 Samba Solaris 11 11/11 SRU 8.5 Solaris 10 Contact Support This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • What are the functions of modern game publishers? [closed]

    - by ApoorvaJ
    According to the Wikipedia page on Video game publishers, they are responsible for "their product's manufacturing and marketing, including market research and all aspects of advertising." From what I've read, they also arrange for the development funding. In the following questions, I'm asking about AAA, indie and mobile publishers: Do today's publishers fulfill any other functions? Is there any good reading material on these topics?

    Read the article

  • Android serait un cauchemar pour les designers, la haute flexibilité de la plateforme remise en cause par un expert

    Android serait un cauchemar pour les designers La haute flexibilité de la plateforme remise en cause par un expertÀ chacun son Android. Dave Feldman est un « Product Designer » avec un solide background dans le domaine de l'amélioration de l'expérience utilisateur. Pour cet expert, la haute flexibilité de la plateforme mobile de Google qui la rend attrayante est la pire des choses qui puisse être en termes de « Design ».Pour étayer son point de vue, l'expert articule sa démonstration sur trois...

    Read the article

  • A Look At The Three Best CMS Today

    The use of WCMS softwares or Web Content Management Systems have made it easier for many web designers and developers to make quick changes within their websites. However, the true advantage of using... [Author: Margarette Mcbride - Web Design and Development - April 13, 2010]

    Read the article

  • Use an SEO Company to Increase Profits

    It doesn't matter how great the product or service is, if potential customers can't find it with an Internet search. Online competition is fierce, and it's no easy task to get a website to come up within the first few pages of an online search. Get some tips here.

    Read the article

  • News from the Fusion Update Program Office

    Cliff Godwin, Senior Vice President for Oracle's Fusion Upgrade Program Office, speaks with Fred about how Oracle can help with the overall customer experience of moving from the Applications Unlimited product lines to Fusion Applications.

    Read the article

  • Top 10 Things to do to Prepare for Fusion Applications

    Cliff speaks with Nadia Bendjedou, Product Strategy Director for Oracle's Fusion Upgrade Office, about ways customers can prepare their current Oracle investment for Fusion by leveraging best practices, taking advantage of Oracle's Fusion Architecture and Fusion Middleware, and moving to SOA-based Integration.

    Read the article

  • Information About Mambo and Joomla

    JOOMLA and MAMBO was originally developed by a team called Mambo. In 2005, the main developers of Mambo left the team and build the JOOMLA system. Regardless of the history of these two systems, they have turn into a leading hosting system in the industry. These two CMS platform software is the most easiest to use and manage content management that is why it is the most preferred CMS software by most web developer.

    Read the article

  • Drupal Development Solutions - Helps to Create a Powerful Website

    Do you want to have a successful website for your business? It is essential to attract huge traffic to appear on top of the search engines. The utility and role of web designs are significant to attract large number of visitors. Therefore, there is a need to use powerful content management system to showcase a powerful image on the web.

    Read the article

  • CVE-2012-0050 Denial of Service (DoS) vulnerability in OpenSSL

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-0050 Denial of Service (DoS) vulnerability 5.0 OpenSSL Solaris 11 11/11 SRU 4a This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

< Previous Page | 392 393 394 395 396 397 398 399 400 401 402 403  | Next Page >