Search Results

Search found 2672 results on 107 pages for 'michael tiller'.

Page 40/107 | < Previous Page | 36 37 38 39 40 41 42 43 44 45 46 47  | Next Page >

  • Placement of Variables in Puppet module

    - by Michael Duffy
    Hi guys; I've got a puppet module to setup several Gigaspaces PU's. Each of these have quite a few variables to be placed within the configuration file templates. We're also using several different environments so these variables are repeated several times to contain the values for each environment. My question is where the best place to store these variables would be? A class of their own, an external .pp I import, or something other?

    Read the article

  • How can I configure Adobe Help so it doesn't chatter so much with Adobe's domain?

    - by Michael Prescott
    Adobe Help that came with Creative Suite 5 and/or Flash Builder Pro is constantly creating network traffic with an Adobe site, www.wip4.adobe.com In the Adobe Help application Preferences, I find that I can change the settings so that I must manually download updates, but apparently the application still likes to call home and chatter non-stop with www.wip4.adobe.com. I could use something like Little Snitch to block all this spyware-like behavior, but I'd really prefer to just change the application's behavior. Is there a hidden setting or configuration file to adjust this behavior to something more appropriate and polite?

    Read the article

  • Reinstalling Default Website for Exchange 2010

    - by Michael
    The Default Website for Exchange 2010 on Windows SBS Server 2010 has been deleted (how and why is not important). Now, obviously, I cant access emails via OWA or via HTTP for people offsite. I can not figure out how to reinstall the default website to reinstall OWA and settings? I also can't log into Exchange Mangement Console. The attempt to connect to... using "kerberos" jauthenication failed (probably because it does not exist).

    Read the article

  • Is a reboot required to refresh permissions after adding a user to a new group?

    - by Michael Prescott
    On ubuntu server, I've noticed more than once now that after adding a user to a group that user doesn't have group permissions until I reboot the system. For example: User 'hudson' needs permission to read directory 'root:shadow /etc/shadow' So I add hudson to the shadow group. hudson still cannot read. So, I 'sudo shutdown -h -r now' and when the system comes up again user hudson can read. Is a reboot required or is there a better way to get permissions applied after adding the user to the group?

    Read the article

  • Permissions to run a SharePoint 2010 Application Pool?

    - by Michael Stum
    I'm currently in the process of setting up a SharePoint 2010 farm. In my Dev Environments, I have one account that is Local Admin, Farm Administrator and runs all Application Pools. For Production Environment, I would like to go with best Security Practices and run the Web Applications (At least 2: Main Portal and My Sites) with separate Domain Accounts. It's been some time that I worked with IIS, and I remember that there were issues with accessing files in c:\inetpub by non-Admin users. On the other hand, SharePoint "automagically" sets most permissions anyway. Does anyone have some experience with which permissions I need to give to the domain account at minimum in order to work?

    Read the article

  • Outlook 2007 disconnecting after sending email to specific email

    - by Michael
    So when a user emails another tech in my domain they get the prompt for username/password as though they got disconnected. I have not seen any issues in the event logs, tried deleting the email address from his auto correct, ran Outlook in safe mode and searched online as well. I am kind of lost. Checked the event logs on the exchange server as well in the security and still nothing. Exchange 2010, Client OS: Vista x64, Outlook 2007. Thanks!

    Read the article

  • How to work with code examples in Apple's Keynote?

    - by Michael Easter
    I'm creating a presentation in Keynote on the Mac. It is intended for an audience of Java developers, and has some slides that contain blocks of Java code. Even with a monospaced font, I find the TextBox feature to be difficult in terms of formatting. Crazy Bob has an article on how he handled it in 2004 (he creates PDFs from the code samples and then includes those). However, I would like to know if there have been any changes since then. How do you work with code examples (Java, C#, Javascript, whatever) in Keynote?

    Read the article

  • Load images in parallel - supported by browser or a feature to implement?

    - by Michael Mao
    Hi all: I am not a pro in web development and Apache server still remains a mystery to me. we've got a project which runs on LAMP, pretty much like all the commercial hosting plans. I am confused about one problem : does modern browsers support image loading in parallel? or this requires some special feature/config set up from server side? Can this be done with PHP coding or by some server-side configuration? Is a special content delivery networking needed for this? The benchmark demonstration will be the flickr website. I am too suprised to see how all image thumbnails are loaded in a short time after a search as if there were only one image to load. Sorry I cannot present any code to you... completed lost in this:(

    Read the article

  • Share history in multiple zsh shell

    - by michael
    I am trying to setup zsh so that it shares command history between different zsh sessions: in multiple tabs in multiple gnome-terminals in different screen sessions I have put this in .zshrc #To save every command before it is executed (this is different from bash's history -a solution): setopt inc_append_history #To retrieve the history file everytime history is called upon. setopt share_history but that does not work. e.g. I type 1 command: gedit afile and then I go to and zsh and type history. I don't see gedit afile. output of 'setopt' is % setopt nohistbeep histexpiredupsfirst histfindnodups histignorealldups histignoredups histignorespace histnostore histreduceblanks histsavenodups histverify incappendhistory interactive monitor promptsubst sharehistory shinstdin zle How can I achieve this?

    Read the article

  • DPM server 2010 Attach agent error : administrator privileges missing?

    - by Michael
    I’m hoping you would be able to help me out with this little problem I’m having. I installed DPM 2010 in our test environment to test backups on Exchange 2010 servers. The environment includes : 1xDC 2x Exchange Server 2010 1x DPM 2010 server All of these are running on Microsoft server 2008 R2 Virtual machines. The host machines are using Hyper-v. So the problem goes like this : 1- I tried to install the agents from the DPM server GUI, which failed saying I didn’t have the correct permissions. 2- So then I tried the manual installation using the commands from : the Microsoft site http://technet.microsoft.com/en-us/library/bb870935.aspx 3- The agent installation worked but when I get to attaching the agents to the DPM server it still gives me the error saying that the specified account does not have administrator rights. 4- I tried the Domain admin, users who are domain admin + local admin, single local admins. 5- I have turned off the windows firewall and made sure all the services are running. So now I’m out of ideas and really need help, the agent attach to the DPM server is the last thing that is holding me back from deploying everything to the production site. Any help would be really appreciated.

    Read the article

  • Why can't I use my Bluetooth Headset with my laptop?

    - by Michael Haren
    I just received a new Plantronics M50 bluetooth headset. It works great with my phone, but I can't get it working with my laptop. What are the things I should be checking? Here's what I've done so far: It pairs successfully: It's not in multipoint mode--it's only paired to my laptop I've installed all available drivers from Plantronics and Dell I have no (!) in Device Manager (though I don't see the headset there either--would I?) I can "configure" the headset by double clicking on it: "Allow the computer to turn off this device to save power" is unchecked in the Bluetooth radio settings Apps that let me choose the playback/mic device only list my laptop, not the headset [UPDATE] I went into the Bluetooth device's properties and Checked "headset" under the services tab. This was successful but hasn't delivered any functionality as far as I can tell I'd like to use this headset for VOIP conferencing (Goto meeting, Gmail voice chat, G+ hangouts, Skype, etc.) and listening to music (iTunes). Where else should I be digging? Is it possible that this new headset is simply not compatible with computers (i.e. it's only compatible with phones)?

    Read the article

  • How to setup 802.11n wireless card in ubuntu

    - by michael
    Hi, I have installed ubuntu 9.10 on my laptop. It has a 802.11n wireless card. When I boot up to ubuntu, the wireless does not work. And if I connect to a wire network within ubuntu, it works. Can you please tell me how can I setup my wireless card in ubuntu 9.10? Thank you.

    Read the article

  • ssh - "Connection closed by xxx.xxx.xxx.xxx" - using password

    - by Michael B
    I attempted to create an new user account that I wish to use to log in using ssh. I did this (in CentOs): /usr/sbin/adduser -d /home/testaccount -s /bin/bash user passwd testaccount This is the error I receive when trying to log in via ssh: ~/.ssh$ ssh -v [email protected] OpenSSH_5.1p1 Debian-5ubuntu1, OpenSSL 0.9.8g 19 Oct 2007 debug1: Reading configuration data /etc/ssh/ssh_config debug1: Applying options for * debug1: Connecting to xxx.xxx.xxx [xxx.xxx.xxx.xxx] port 22. debug1: Connection established. debug1: identity file /home/user/.ssh/identity type -1 debug1: identity file /home/user/.ssh/id_rsa type 1 debug1: Checking blacklist file /usr/share/ssh/blacklist.RSA-2048 debug1: Checking blacklist file /etc/ssh/blacklist.RSA-2048 debug1: identity file /home/user/.ssh/id_dsa type -1 debug1: Remote protocol version 2.0, remote software version OpenSSH_4.3 debug1: match: OpenSSH_4.3 pat OpenSSH_4* debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_5.1p1 Debian-5ubuntu1 debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: server->client aes128-cbc hmac-md5 none debug1: kex: client->server aes128-cbc hmac-md5 none debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP debug1: SSH2_MSG_KEX_DH_GEX_INIT sent debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY debug1: Host 'xxx.xxx.xxx.xxx' is known and matches the RSA host key. debug1: Found key in /home/user/.ssh/known_hosts:8 debug1: ssh_rsa_verify: signature correct debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: SSH2_MSG_SERVICE_REQUEST sent debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue: publickey,gssapi-with-mic,password debug1: Next authentication method: gssapi-with-mic debug1: Unspecified GSS failure. Minor code may provide more information No credentials cache found debug1: Unspecified GSS failure. Minor code may provide more information No credentials cache found debug1: Unspecified GSS failure. Minor code may provide more information debug1: Next authentication method: publickey debug1: Offering public key: /home/user/.ssh/id_rsa debug1: Authentications that can continue: publickey,gssapi-with-mic,password debug1: Trying private key: /home/user/.ssh/identity debug1: Trying private key: /home/user/.ssh/id_dsa debug1: Next authentication method: password testaccount@xxx's password: Connection closed by xxx.xxx.xxx.xxx The "connection closed" message appeared immediately after entering the password (if I enter the wrong password it waits and then prompts for another password) I am able to log in from the same computer using other accounts that had been setup previously. When logged into the remote machine I am able to do 'su testaccount' Thanks for your time.

    Read the article

  • Can I autologin a specific user on a specific VT, but still have other login shells running?

    - by Michael
    I'm running a linux system with Ubuntu Karmic on it, and I use it to run a webcam and a program that continuously outputs on the console. Is there any way I can force a user to login on VT2, and then switch VTs to VT2, but still have other login consoles running so I can hook a keyboard up to it and CTRL-ALT-F# to get to another terminal? I have a feeling this needs to go in my rc.local file, but nothing in the login manpage seems to suggest it can do what I want it to do. If there is no way to login a user on the vt, launching the program directly on a specific VT will work as well, since the user's shell in /etc/passwd is set to the program anyway.

    Read the article

  • OpenSwan + xl2tpd VPN: How can I share Internet connection

    - by Michael
    I have an OpenSwan IPSec + L2TP VPN on Linux setup working from off of my server so I can connect to it from my laptop (roadwarrior setup). I am able to connect to the VPN remotely just fine, however the internet connection is not shared. I'm assuming there is some sort of masquerading I am supposed to be doing, but I have no idea how to go about doing that (iptables?). Any help getting this working so I can essentially use my VPN connection as a proxy would be great. Thanks

    Read the article

  • No internet connection for some programmes after installing ad hoc wireless network

    - by Michael
    After installing a wireless network (through the program iPhoneModem) several programmes have stopped working when connected to the Internet using another wireless connection. Working programmes: Firefox (browser) uTorrent (p2p) FileZilla (ftp) etc. Programmes that are not working: Chrome (browser) Digsby (IM client) etc. I'm running Windows 7. I have tried to disable Windows Firewall entirely as well as AVG anti virus, with no effect. I've tried to run the FixIt program from Microsoft adressing a corrupt TCP/IP stack. This too had no effect. Any suggestions?

    Read the article

  • 3 Monitors 1 graphic card

    - by Michael
    I have a Nvidia GT 120 graphic card. It has a vga, dvi and hdmi output. Can I have 3 monitors with this? One for each port. Also if not, can I use dvi and hdmi and have 2 monitors. I know I can do 2 with the vga and dvi but I am wondering about dvi and hdmi. Also my last question is, if I can have 2 monitors with the dvi and hdmi, can I use a hdmi to dvi and still have the same success? Thanks

    Read the article

  • Any software to remove $NtUninstallxxxxx (Windows XP)

    - by Michael
    Any commercial or free software to give me a list and descriptions of patch uninstalls and let me remove selected ones? I've tried Windows XP Update Remover, but seems it doesn't provide any information for majority of items and I have to delete one by one... I also know I can do it manually, but just wondering if there is more professional software to make it more accurate and quick.

    Read the article

  • Can I turn a 2D image into something like a ribbon without 3D Tools?

    - by Michael Stum
    I have a picture that's very long and not very tall. I want to create a graphic like the one below, but with my picture as the "texture". Can Photoshop do something like that? I'd like to avoid to spin up a 3D Program because then I need to render it, get the image out of it and into Photoshop. They seem to have added 3D Functionality into CS5, I just never looked at it. Obvious question after that: What would the backside look like? Are there other applications that can do something like that in a simple way?

    Read the article

  • ShoreTel 230 phone calls from website

    - by Michael Irey
    Our company uses these fancy ShoreTel 230 phones. We make many phone calls from our custom built web based contact management system. It would be nice if our employees could click on a phone number from a webpage and have it automatically start dialing the number. (Similar to how iPhone handles this) Anyone every deploy something like this? I would imagine it would require some kind of background running ShoreTel process to accommodate this. 90% of our employees use PC (Windows 7) 10% use OS X Even a PC only solution would be great. Is this even possible and if so, where should one begin? Thanks!

    Read the article

< Previous Page | 36 37 38 39 40 41 42 43 44 45 46 47  | Next Page >