Search Results

Search found 26256 results on 1051 pages for 'information science'.

Page 430/1051 | < Previous Page | 426 427 428 429 430 431 432 433 434 435 436 437  | Next Page >

  • XNA: Retrieve texture file name during runtime

    - by townsean
    I'm trying to retrieve the names of the texture files (or their locations) on a mesh. I realize that the texture file name information is not preserved when the model is loaded. I've been doing tons of searching and some experimenting but I've been met with no luck. I've gathered that I need to extended the content pipeline and store the file location in somewhere like ModelMeshPart.Tag. My problem is, even when I'm trying to make my own custom processor, I still can't figure out where the texture file name is. :( Any thoughts? Thanks! UPDATE: Okay, so I found something kind of promising. NodeContent.Identity.SourceFilename, only that returns the location of my .X model. When I go down the node tree he is always null. Then there's the ContentItem.Name property. It seems to have names of my mesh, but not my actual texture file names. :(

    Read the article

  • Data Source Security Part 2

    - by Steve Felts
    In Part 1, I introduced the default security behavior and listed the various options available to change that behavior.  One of the key topics to understand is the difference between directly using database user and password values versus mapping from WLS user and password to the associated database values.   The direct use of database credentials is relatively new to WLS, based on customer feedback.  Some of the trade-offs are covered in this article. Credential Mapping vs. Database Credentials Each WLS data source has a credential map that is a mechanism used to map a key, in this case a WLS user, to security credentials (user and password).  By default, when a user and password are specified when getting a connection, they are treated as credentials for a WLS user, validated, and are converted to a database user and password using a credential map associated with the data source.  If a matching entry is not found in the credential map for the data source, then the user and password associated with the data source definition are used.  Because of this defaulting mechanism, you should be careful what permissions are granted to the default user.  Alternatively, you can define an invalid default user to ensure that no one can accidentally get through (in this case, you would need to set the initial capacity for the pool to zero so that the pool is populated only by valid users). To create an entry in the credential map: 1) First create a WLS user.  In the administration console, go to Security realms, select your realm (e.g., myrealm), select Users, and select New.  2) Second, create the mapping.  In the administration console, go to Services, select Data sources, select your data source name, select Security, select Credentials, and select New.  See http://docs.oracle.com/cd/E24329_01/apirefs.1211/e24401/taskhelp/jdbc/jdbc_datasources/ConfigureCredentialMappingForADataSource.html for more information. The advantages of using the credential mapping are that: 1) You don’t hard-code the database user/password into a program or need to prompt for it in addition to the WLS user/password and 2) It provides a layer of abstraction between WLS security and database settings such that many WLS identities can be mapped to a smaller set of DB identities, thereby only requiring middle-tier configuration updates when WLS users are added/removed. You can cut down the number of users that have access to a data source to reduce the user maintenance overhead.  For example, suppose that a servlet has the one pre-defined, special WLS user/password for data source access, hard-wired in its code in a getConnection(user, password) call.  Every WebLogic user can reap the specific DBMS access coded into the servlet, but none has to have general access to the data source.  For instance, there may be a ‘Sales’ DBMS which needs to be protected from unauthorized eyes, but it contains some day-to-day data that everyone needs. The Sales data source is configured with restricted access and a servlet is built that hard-wires the specific data source access credentials in its connection request.  It uses that connection to deliver only the generally needed day-to-day information to any caller. The servlet cannot reveal any other data, and no WebLogic user can get any other access to the data source.  This is the approach that many large applications take and is the reasoning behind the default mapping behavior in WLS. The disadvantages of using the credential map are that: 1) It is difficult to manage (create, update, delete) with a large number of users; it is possible to use WLST scripts or a custom JMX client utility to manage credential map entries. 2) You can’t share a credential map between data sources so they must be duplicated. Some applications prefer not to use the credential map.  Instead, the credentials passed to getConnection(user, password) should be treated as database credentials and used to authenticate with the database for the connection, avoiding going through the credential map.  This is enabled by setting the “use-database-credentials” to true.  See http://docs.oracle.com/cd/E24329_01/apirefs.1211/e24401/taskhelp/jdbc/jdbc_datasources/ConfigureOracleParameters.html "Configure Oracle parameters" in Oracle WebLogic Server Administration Console Help. Use Database Credentials is not currently supported for Multi Data Source configurations.  When enabled, it turns off credential mapping on Generic and Active GridLink data sources for the following attributes: 1. identity-based-connection-pooling-enabled (this interaction is available by patch in 10.3.6.0). 2. oracle-proxy-session (this interaction is first available in 10.3.6.0). 3. set client identifier (this interaction is available by patch in 10.3.6.0).  Note that in the data source schema, the set client identifier feature is poorly named “credential-mapping-enabled”.  The documentation and the console refer to it as Set Client Identifier. To review the behavior of credential mapping and using database credentials: - If using the credential map, there needs to be a mapping for each WLS user to database user for those users that will have access to the database; otherwise the default user for the data source will be used.  If you always specify a user/password when getting a connection, you only need credential map entries for those specific users. - If using database credentials without specifying a user/password, the default user and password in the data source descriptor are always used.  If you specify a user/password when getting a connection, that user will be used for the credentials.  WLS users are not involved at all in the data source connection process.

    Read the article

  • Is there a program to manage movies and TV shows that supports mp4 tags?

    - by root45
    I'm looking for a media manager that will display and play movies and TV shows and will read data included in mp4 and m4v files. So far I've looked at XBMC, Moovida and Boxee and all of these seem to keep their own separate database or XML files for reading and storing tag information. I also looked at Banshee because of this answer, but it didn't read my tags. Banshee is also geared towards music videos instead of actual movies and TV shows. So I'm looking for software that Displays and plays movies and TV Shows Reads mp4 and m4v tags Preferably something with bulk import (i.e., I don't want to add 1,000 items to a new library) Bonus if it also has a tag editor Bonus if it's an XBMC extension

    Read the article

  • Ubuntu 12.04 fails to find Intel HD Graphics 3000

    - by user69785
    On my Windows 7 installation an Intel HD Graphics 3000 card/driver shows. However in Ubuntu 12.04, System ? Administration ? Hardware Drivers shows no proprietary drivers available for the system. I have tried running the following: sudo apt-get install mesa-utils Which results in the graphics driver incorrectly identifying itself as Sandy Bridge Mobile. Running the following results in no change sudo add-apt-repository ppa:xorg-edgers/ppa sudo apt-get update && sudo apt-get upgrade sudo reboot Does anybody have any information on this behavior?

    Read the article

  • Google Analytics

    - by DavidMadden
    My first post.  Working with Google Analytics (GA).  What an incredible tool this is for those that are wanting to know about their site traffic.  GA allows the user to drill down to the screen size of any mobile sources that came in contact with his site.  The user is even able to know region demographics of visitors and the types of browsers and languages being used.  This is a great tool to help determine your target audience and what direction of growth one may be needing to take.GA has Real-Time currently in beta but it already allows the user to see some information.  I can already detect that I am viewing my site from Louisville, KY and what page of my site is being accessed.  I highly recommend using GA for the sheer plethora of data available.

    Read the article

  • I Can't update 12.04 to 12.10 ERROR:"gpg: WARNING: This key is not certified with a trusted signature!"

    - by jason328
    I'm trying to update to 12.10 from a 12.04 machine. When I ran the code sudo do-release-upgrade -d in my terminal and verified my password it checked for a new upgrade. I was then returned with this: gpg: Good signature from "Ubuntu Archive Automatic Signing Key <[email protected]>" gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner.` There of course is more but it looks like it may or may not be showing private information with it. What's causing this and how do I fix this.

    Read the article

  • How can i get ubuntu to run smoother?

    - by Knuckles
    I am relatively new to ubuntu [I've used it before and loved it but one day i just randomly couldn't connect to the internet anymore so i switched back to windows... also netflix doesn't work in ubuntu...] and I've noticed that when i used it before everything ran very smoothly and the window animations and stuff like that were just beautiful. now though, everything is choppy and just ugly really. I wanna say its because i was using an older kernel but i really don't know. Anyway, i guess my point is, How can i get it to look pretty again? i really do wish i could be more descriptive but... yeah... I'm on Maverick btw. if anymore information is required i will happily oblige, just let me know.

    Read the article

  • See you at European SharePoint Conference, Barcelona, May 5-8, 2014

    - by Sahil Malik
    SharePoint, WCF and Azure Trainings: more information I’ll be at the European SharePoint Conference, in Barcelona, May 5th – 8th, 2014. They just released their full conference program. I have the following sessions planned, Monday, the 5th of May Full day workshop: SharePoint 2013 App Development (see the full outline here) Thursday the 8th of May, 10:15 AM Optimizing SQL Server for speedy SharePoint If you're a SQL Server DBA or a SharePoint admin, attend this session and WOW your bosses when you return. SharePoint is slow! Really? Okay, it is a common complaint I hear. But did you know, a few tweaks here and there, and with the very same hardware you can get many 100 times better performance. And many of these you can do on a running production environment. Read full article ....

    Read the article

  • Tooltip Support For ASP.NET Image Controls v2010 vol 1

    Tooltip property has been added to DevExpress ASP.NET image controls! Starting with DXperience v2010.1, all DevExpress ASP.NET image controls like the ASPxImage have a new property called: Tooltip. Whats a tooltip? Wikipedia defines it as: The tooltip is a common graphical user interface element. It is used in conjunction with a cursor, usually a mouse pointer. The user hovers the cursor over an item, without clicking it, and a tooltip may appear a small "hover box" with information...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • How can I set up private, per-user sections on Joomla?

    - by Michael Paulukonis
    For this weekend's GiveCamp project, my team has been tasked with adding some functionality to an existing Joomla-powered website for a non-profit. A certain type of user will login, and have access to a personal area where they can upload files, check for messages, see tasks that have been assigned, etc. Each user would have their own area. They would not be creating pages, and their information would only be visible to themselves (or a site-administrator, of course. No sort of weird HIPAA privacy involved). None of us have worked with Joomla before, but we'd like to help this non-profit. We're not sure if we're searching using the wrong terms, or if we're just not finding it. Is such a solution possible in Joomla? And/or are we better off building some standalone solution that interfaces with the same mySQL database as Joomla?

    Read the article

  • Cannot see user desktop when I log in

    - by Jesi
    I am very new to Ubuntu. I recently got a new laptop running Windows 7. I am using Virtual Box and just installed the Ubuntu 12.10 ISO as a new Virtual Machine within Virtual Box. Everything seemed to install just fine and I even added the Guest Additions under Devices. The problem is that I cannot see the menus and my login information. The virtual machine says it is running; however, I do not have the Applications, Places, System, etc. tray to select from. Is there something I am supposed to do after logging in to get this? I entered my password and everything seemed fine, I just don't have those drop-down menus available... Thank You! Jesi

    Read the article

  • Database Development and Source Control

    - by Enrique Lima
    I have been working with Database Development and the aspects that come with it, the pain and the joy of moving from Dev to QA and then on to Production.  Source Control has a place in Dev, and that is where the baselines should be established. Where am I going with this? I have been working with Redgate’s Source Control 3.0, and I am seeing some features that are great for the process of moving from Dev to … well something that allows for quite a level of control.  We are not only talking about scripting the structure of a database, but creating a baseline, working with migration scripts, and integrated with Redgate’s Schema Compare.  There is a detailed paper that will be posted here in the next day or so to provide step by step information of the process to define your baseline in Dev and then take it to the desired destination. In the meantime, check the Webinars Redgate has regarding this process and products.

    Read the article

  • Ubuntu partition won't display on screen

    - by Danny
    I installed ggobi on my MacBook Pro, and it wasn't working right. I looked up some information, and found this site: Gtk Warning: Cannot open display I followed the vague instructions, but I think I just typed export DISPLAY=:0 directly into my terminal (I'm still in my Mac partition at this point). Fast forward a few days, and I try to go into my Ubuntu partition. It only gives me command line options. I remember my reckless input from a few days back, and I'm certain that it is the issue. My problem is that I have no idea how to get my previous display settings back. My Mac partition seems unaffected, but it'd be nice to get back into my Ubuntu partition. My last resort is completely reverting my computer to my most recent backup before I changed it, but if anyone out there knows how to fix this, I'd greatly appreciate it. Thanks in advance.

    Read the article

  • What is an "integration script" and why would I want one?

    - by ændrük
    When I navigate to Launchpad in Firefox, a pop-up appears: I think, despite its failure to form a coherent question, it's trying to ask me if I want to install an "integration script" called "unity-webapps-launchpad". Sadly, it does not provide me with enough information to make an informed decision, nor does it refer me to a source where I can learn more about it. The top result in my web searches on the topic is my own bug report. While this cyclical phenomenon provides a brief source of amusement, it is ultimately unhelpful. So, once again, I've come to Ask Ubuntu for a nudge in the right direction. What is this thing?

    Read the article

  • The Properties dialog box not working for any Start Menu Program Lubuntu 14.04

    - by user236378
    When Lubuntu 14.04 first came out, the Properties dialog was present for all Start Menu Programs but did not work when right-clicked on as nothing happened and no other box popped up the the Start Menu Program information, such as the executable info, etc. Then the issue was fixed. Now the issue has returned when I upgraded to Lubuntu 14.04.1. Is there any way to retrieve the Properties info pop-up box via a configuration file? Does the issue have to do with a faulty LXShortcut? I noticed when I uninstalled the LXShortcut the Properties tab disappeared. When I re-installed the Properties tab returned however once again when you right-click on the Properties tab nothing happens. Any assistance would be greatly appreciated. Thank you.

    Read the article

  • All tweak settings not saving?

    - by mawburn
    I am running Ubuntu GNOME 14.04. After the last 2 updates, all settings in the Tweak menu are no saving. It will also not switch to the Gnome Dark theme at all. This includes all Startup Application changes as well as any changes to Extension settings. I'm not sure if I need to include any sort of log records or anything like that, so if you need any more information please ask. I've noticed the default fonts seem to be different. I don't remember that being part of the theme settings. It's almost like I'm running in Safe Mode.

    Read the article

  • Environment Award for AgroSense Java Farm Management System

    - by Geertjan
    Beating IBM's energy information system and Evoswitch's modular data central hall, Ordina's AgroSense, a farm management system for precision agriculture, received the prestigious IT Environment Award in the Netherlands yesterday. AgroSense is an agricultural services platform created in Java on the NetBeans Platform. It looks like this: Among other things, the team has been investigating whether and how to integrate JavaFX games into the AgroSense platform, as well as other JavaFX-oriented effects. Here's a pic of the red tulip award that the team received yesterday at a black tie award ceremony: The original announcement of the nominations for this competition in English can be read here. On Twitter, you can follow the AgroSense project here: @AgroSense Congratulations, AgroSense team, for this fantastic achievement!

    Read the article

  • Multiple vulnerabilities in Firefox web browser

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2011-3062 Numeric Errors vulnerability 6.8 Firefox web browser Solaris 11 11/11 SRU 9.5 Solaris 10 SPARC: 145080-11 X86: 145081-10 CVE-2012-0467 Denial of service (DoS) vulnerability 10.0 CVE-2012-0468 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability 10.0 CVE-2012-0469 Resource Management Errors vulnerability 10.0 CVE-2012-0470 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability 10.0 CVE-2012-0471 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability 4.3 CVE-2012-0473 Numeric Errors vulnerability 5.0 CVE-2012-0474 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability 4.3 CVE-2012-0477 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability 4.3 CVE-2012-0478 Permissions, Privileges, and Access Controls vulnerability 9.3 CVE-2012-0479 Identity spoofing vulnerability 4.3 This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • BPM hands-on Workshops in UK, South Africa and Spain

    - by JuergenKress
    We offer free 3 days hands-on BPM 11cPS6 workshops for Oracle partners who want to become BPM Specialized: UK 5-7 November 2013 Oracle Reading South Africa 18-20 November 2013 Oracle Johannesburg, Spain 17-19 December 2013 Oracle Madrid For further details please visit our registration page. SOA & BPM Partner Community For regular information on Oracle SOA Suite become a member in the SOA & BPM Partner Community for registration please visit www.oracle.com/goto/emea/soa (OPN account required) If you need support with your account please contact the Oracle Partner Business Center. Blog Twitter LinkedIn Facebook Wiki Mix Forum Technorati Tags: BPM Bootcamp,BPM,education,training,SOA Community,Oracle SOA,Oracle BPM,Community,OPN,Jürgen Kress

    Read the article

  • Oracle Open World 2012 Call For Papers

    - by Lionel Dubreuil
    At Oracle OpenWorld, more than a thousand people demonstrate their mastery and expertise by leading sessions on a vast array of Oracle technologies and products.Now’s the time to submit your SOA Governance success story presentation abstract for review by the selection panel.Don’t delay—submit your abstract now as the Call for Papers is open through next Monday,  April 9th.The competition is strong: roughly 18% of entries are accepted each year from more than 3,000 submissions. Review panels are made up of experts both internal and external to Oracle. Successful submissions often (but not exclusively) focus on customer successes, how-tos, or technical topics.What’s in it for you? Recognition, for one thing. Accepted sessions are publicized in the content catalog, which goes live in mid-June, and sessions given by external speakers often prove the most popular.Plus, accepted speakers get a complimentary pass to Oracle OpenWorld with access to all sessions and networking events-that could save you up to $2,595!For more information, please look here.

    Read the article

  • How to calculate maximum number of request in 128 MB VPS performance?

    - by ifdion
    I am a newbie here, please let me know if I'm using wrong webmaster terms. I am currently setting up a VPS for a multi site WordPress. The VPS uses Debian 6 LNMP setup and the DNS is being taken care by another service. Currently the VPS is running non multi site WordPress with -+ 83 MB RAM out of 128MB. As far as I know the performance is relative to the number of request, not the number of sites in the multi site setup. The question How do I calculate maximum number of request in with that setup? If the information is not enough, what other factor do I need to know? Thank you in advance.

    Read the article

  • The legal aspect of website design/application [closed]

    - by tunmise fasipe
    I have got a site to develop for a medium-sized company and I want to make sure it's being done professionally. I understand the following: Terms of Use: tells the users how the content on the website should and should not be used Privacy Policy: assuring the users that their information is safe on the site and will not be exposed without their permission. Also telling the which could be viewed by others Disclaimer (the client asked for this): tells the users the wrong/right use of the contents in the site is not the responsibility of the company My Questions are: How does copyright comes in? More light on the Disclaimer? - the client specifically asked for this What other legal actions one needs to take? Do you need to see a lawyer? How can you prevent others from having a counterfeit of your site - the client specifically asked for this too Thanks

    Read the article

  • I want to try and find and RFC for Business Listings.

    - by nc01
    I'm trying to figure out how to find out if there's a good standard format for sharing business information such as: Business Name Address - well-defined fields Lat,Lng Coords Business Type - maybe from a well-defined enum, my starting point contains Retail,Food,Drink,Coffee,Service Hours of operation - including a spot for 'except laksdasd' or 'sometimes we open late' which could be just plain language Business Keywords - don't know if this is asking too much. how well do http meta tags work in practice? So, if no such thing exists, is this something I can submit to IETF? I can't currently find it on http://www.rfc-editor.org/cgi-bin/rfcsearch.pl , and vCard doesn't suit my needs.. Thanks!

    Read the article

  • Which Git-based MIS to track workflow like Trac/Redmine but on console minimastically?

    - by hhh
    Definitions MIS = management information system Some list about console based solutions here and some GUI-hacks here. Been fed up to install all those dependencies and no make -files with GUI -things so which console-based MIS would you suggest for a game-development team with graphical -repo, animation -repo, code -repo, stories -repo, etc ? P.s. I do use Git -submodules and the reason for repo -fragmentation is due to roles and size, certain repos such as graphic -repos tend to be quite large so better to keep them separate. Perhaps useful to readers interested about this http://stackoverflow.com/questions/5881578/trac-vs-redmine https://github.com/jchris/sofa

    Read the article

  • How to tackle archived who-is personal data with opt-out?

    - by defaye
    As far as I understand it, it is possible to opt-out (in the UK at least) of having your address details displayed on who-is information of a domain for non-trading individuals. What I want to know is, after opt-out, how do individuals combat archived data? Is there any enforcement of this? How many who-is websites are there which archive data and what rights do we have to force them to remove that data without paying absurd fees? In the case of capitulating to these scoundrels, what point is it in paying for the removal of archived data if that data can presumably resurface on another who-is repository? In other words, what strategy is one supposed to take, besides being wiser after the fact?

    Read the article

< Previous Page | 426 427 428 429 430 431 432 433 434 435 436 437  | Next Page >