Search Results

Search found 20168 results on 807 pages for 'service'.

Page 466/807 | < Previous Page | 462 463 464 465 466 467 468 469 470 471 472 473  | Next Page >

  • How to Deauthorize Flash Content Before You Sell Your PC

    - by Taylor Gibb
    When it comes to selling your old digital equipment you usually should wipe it of all digital traces with something like DBAN, however if you cant there are some precautions you should take, here’s one related to flash content you may have viewed on your PC. When you rent or purchase a movie over a service that uses flash, it authorizes your PC to play that particular content. When you sell your PC, unless you deauthorize your PC, the new owner will still be able to view and play the content your purchased. 6 Ways Windows 8 Is More Secure Than Windows 7 HTG Explains: Why It’s Good That Your Computer’s RAM Is Full 10 Awesome Improvements For Desktop Users in Windows 8

    Read the article

  • Can the following Domain Entity contain logic for creating/deleting other entities?

    - by user702769
    a) As far as I understand it, in most cases Domain Model DM doesn't contain code for creating/deleting domain entities, but instead it is the job of layers ( ie service layer or UI layer ) on top of DM to create/delete domain entities? b) Domain entities are modelled after real world entities. Assuming particular real world entity being abstracted does have the functionality of creating/deleting other real world entities, then I assume the domain entity abstracting this real world entity could also contain logic for creating/deleting other entities? class RobotDestroyerCreator { ... void heavyThinking() { ... if(...) unitOfWork.registerDelete(robot); ... if(...) { var robotNew = new Robot(...); unitOfWork.registerNew(robotNew); { ... } } Thank you

    Read the article

  • WP: Oracle Multitenant on SuperCluster T5-8: Study of Database Consolidation Efficiency

    - by uwes
    Consolidation in the data center is the driving factor in reducing capital and operational expense in IT today. This is particularly relevant as customers invest more in cloud infrastructure and associated service delivery. Database consolidation is a strategic component in this effort. Oracle Database 12 c introduces Oracle Multitenant , a new database consolidation model in which multiple Pluggable Databases (PDBs) are consolidated within a Container Database (CDB). While keeping many of the isolation aspects of single databases, it allows PDBs to share the system global area (SGA) and background processes of a common CDB . The white paper recently published on OTN: Oracle Multitenant on SuperCluster T5-8: Study of Database Consolidation Efficiency analyzes and quantifies savings in compute resources, efficiencies in transaction processing, and consolidation density of Oracle Multitenant compared to consolidated single instance databases (SIDBs) running in a bare-metal environment.

    Read the article

  • RIM facilite la mise à jour des applications BlackBerry avec Push, un nouvel outil pour les développ

    RIM facilite la mise à jour des applications BlackBerry avec Push, un nouvel outil pour les développeurs La bataille fait rage entre les différents constructeurs de smartphones, à celui qui proposera le plus d'applications, et bien sûr les meilleures. Dans ce marché tendu, BlackBerry sait que pour conserver ses utilisateurs, il doit leur apporter un catalogue de petits programmes sans cesse renouvelés, utiles et divertissants. Research In Motion (la firme propriétaire de la marque BlackBerry) a donc fait un mouvement en ce sens en dévoilant son Push Service. A l'attention des développeurs utilisant l'OS BlackBerry, cette offre apporte des mises à jour qui sont directement implémentées au logiciel sans l'interrompre...

    Read the article

  • Google active la recherche en temps réel en France, en y incluant les flux des réseaux sociaux

    Google active la recherche en temps réel en France, en y incluant les flux des réseaux sociaux Un peu plus de trois mois après sa mise en service dans la version américaine du moteur de recherche, la recherche en temps réel débarque sur Google.fr aujourd'hui. Cette fonction, qui se décline désormais pour les francophones, permet d'obtenir des résultats de recherche mêlant à la fois les titres des journaux, mais aussi les blogs, tweets, et autres changements de statuts sur les sites communautaires. Les réponses données par le moteur de recherche peuvent être classées par ordre chronologique, et prennent désormais en compte les contenus de Facebook, Twitter, MySpace et FriendFeed. L'utilisateur peut, a...

    Read the article

  • How to fix Bluetooth Sound in Ubuntu 11.10

    - by Cerin
    Bluetooth sound worked perfectly for me in Ubuntu 10.04. I recently upgraded to 11.10, and although sound in general works fine, Bluetooth sound almost never works. My headset is paired, and Sound Settings shows it's selected as the output device, but no sound is being output. I've tested the headset with other devices, and confirmed it still works, so the issue is definitely with 11.10. I'm not seeing any explicit errors and I can't find any similar issues with 11.10 through Google. I tried restarting the bluetooth service, but that had no effect. What can I do to fix this?

    Read the article

  • Implementing a Custom Coherence PartitionAssignmentStrategy

    - by jpurdy
    A recent A-Team engagement required the development of a custom PartitionAssignmentStrategy (PAS). By way of background, a PAS is an implementation of a Java interface that controls how a Coherence partitioned cache service assigns partitions (primary and backup copies) across the available set of storage-enabled members. While seemingly straightforward, this is actually a very difficult problem to solve. Traditionally, Coherence used a distributed algorithm spread across the cache servers (and as of Coherence 3.7, this is still the default implementation). With the introduction of the PAS interface, the model of operation was changed so that the logic would run solely in the cache service senior member. Obviously, this makes the development of a custom PAS vastly less complex, and in practice does not introduce a significant single point of failure/bottleneck. Note that Coherence ships with a default PAS implementation but it is not used by default. Further, custom PAS implementations are uncommon (this engagement was the first custom implementation that we know of). The particular implementation mentioned above also faced challenges related to managing multiple backup copies but that won't be discussed here. There were a few challenges that arose during design and implementation: Naive algorithms had an unreasonable upper bound of computational cost. There was significant complexity associated with configurations where the member count varied significantly between physical machines. Most of the complexity of a PAS is related to rebalancing, not initial assignment (which is usually fairly simple). A custom PAS may need to solve several problems simultaneously, such as: Ensuring that each member has a similar number of primary and backup partitions (e.g. each member has the same number of primary and backup partitions) Ensuring that each member carries similar responsibility (e.g. the most heavily loaded member has no more than one partition more than the least loaded). Ensuring that each partition is on the same member as a corresponding local resource (e.g. for applications that use partitioning across message queues, to ensure that each partition is collocated with its corresponding message queue). Ensuring that a given member holds no more than a given number of partitions (e.g. no member has more than 10 partitions) Ensuring that backups are placed far enough away from the primaries (e.g. on a different physical machine or a different blade enclosure) Achieving the above goals while ensuring that partition movement is minimized. These objectives can be even more complicated when the topology of the cluster is irregular. For example, if multiple cluster members may exist on each physical machine, then clearly the possibility exists that at certain points (e.g. following a member failure), the number of members on each machine may vary, in certain cases significantly so. Consider the case where there are three physical machines, with 3, 3 and 9 members each (respectively). This introduces complexity since the backups for the 9 members on the the largest machine must be spread across the other 6 members (to ensure placement on different physical machines), preventing an even distribution. For any given problem like this, there are usually reasonable compromises available, but the key point is that objectives may conflict under extreme (but not at all unlikely) circumstances. The most obvious general purpose partition assignment algorithm (possibly the only general purpose one) is to define a scoring function for a given mapping of partitions to members, and then apply that function to each possible permutation, selecting the most optimal permutation. This would result in N! (factorial) evaluations of the scoring function. This is clearly impractical for all but the smallest values of N (e.g. a partition count in the single digits). It's difficult to prove that more efficient general purpose algorithms don't exist, but the key take away from this is that algorithms will tend to either have exorbitant worst case performance or may fail to find optimal solutions (or both) -- it is very important to be able to show that worst case performance is acceptable. This quickly leads to the conclusion that the problem must be further constrained, perhaps by limiting functionality or by using domain-specific optimizations. Unfortunately, it can be very difficult to design these more focused algorithms. In the specific case mentioned, we constrained the solution space to very small clusters (in terms of machine count) with small partition counts and supported exactly two backup copies, and accepted the fact that partition movement could potentially be significant (preferring to solve that issue through brute force). We then used the out-of-the-box PAS implementation as a fallback, delegating to it for configurations that were not supported by our algorithm. Our experience was that the PAS interface is quite usable, but there are intrinsic challenges to designing PAS implementations that should be very carefully evaluated before committing to that approach.

    Read the article

  • Would security be comprimised if I install a gui (e.g. zPanel) for LAMP?

    - by Kirk
    I am an Ubuntu/Linux noob. There are many questions I have regarding the use of my system as a server. First and foremost is security. I want to install a simple GUI (zPanel appears the most user friendly) that will allow others to log into the server and database with ease, similar to a hosting service, though my intent is for the development of one site. Upon looking at the instructions of numerous GUI's, they require installation as root. This makes me uneasy, as my thoughts spiral to the possibilities of the developers creating the elusive 'back-door', thereby giving them root access to my entire system. Am I just being paranoid or is that theoretically possible? If it is possible, what steps are necessary to ensure security?

    Read the article

  • Premera Blue Cross Deploys PeopleSoft Enterprise 9.1 Human Capital Management, Financial Management, Enterprise Learning Management and Enterprise Portal Solutions

    - by jay.richey
    Optimum Solutions Implements Oracle's PeopleSoft Enterprise 9.1 at Premera Blue Cross Premera chose to upgrade to the latest version of PeopleSoft to help the company achieve its strategic goals, which include building and maintaining a skilled employee team that enables the company to deliver highly efficient and valuable service to plan subscribers, sponsors, and healthcare providers. Its decision was influenced by the key capabilities in PeopleSoft Talent Management 9.1, as well as the common technology enhancements for the PeopleSoft PeopleTools 8.50 toolset across all business process areas, which has helped Premera to maximize process automation, increased ease of use, and minimize long term IT support overhead. Read more...

    Read the article

  • What stack of technologies should I use for my online game?

    - by Vee Bee
    I built a TicTacToe game to learn the .Net MVC3 framework. The basic functionality works (display board, make a move, detect winning move etc.) What I'd like to do is make it a "real" application - well-architected and using the right technology at the right layer. For instance, I'm currently saving every move to the database via a service call, which feels klugey and may become a bottleneck if this was an MMO game. How do you determine a good architecture (or right set of technologies) to use in a situation like this? I'd like to learn not just what to do, but why certain decisions are better than others. I noticed a similar thread here but it just offered opinions without explaining WHY something would be better (e.g. why Node instead of MVC3, etc.)

    Read the article

  • SQL SERVER Fix : Error : 8501 MSDTC on server is unavailable. Changed database context to publisher

    During configuring replication on one of the server, I received following error. This is very common error and the solution of the same is even simpler.MSDTC on server is unavailable. Changed database context to publisherdatabase. (Microsoft SQL Server, Error: 8501)Solution:Enable Distributed Transaction Coordinator in SQL Server.Method 1:Click on StartControl Panel-Administrative Tools-ServicesSelect the service [...]...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Le nouvel Hotmail pourra-t-il concurrencer Gmail ? Découvrez ses nouvelles fonctionnalités en détail

    Mise à jour du 19.05.2010 par Katleen Le nouvel Hotmail pourra-t-il concurrencer Gmail ? Découvrez ses nouvelles fonctionnalités en détails En matière de client mail, Microsoft est très en retard et part avec un gros handicap. Même si son service est celui qui compte le plus d'abonnés (majoritairement à cause de l'utilisation de Messenger), c'est aussi celui dont les utilisateurs sont le moins satisfait, face à un Gmail fonctionnel et sur, par exemple. La firme de Redmond a donc décidé de sortir l'artillerie lourde en remodelant totalement sa messagerie Hotmail. L'accent sera mis sur la sécurité, qui jusqu'ici laissait à désirer. Il sera désormais possible de s'authentifier grâce à des...

    Read the article

  • Upload Recordings Of The Problem To Your SR

    - by jhpierce
    Do you find yourself trying several times to explain a problem in a Service Request? Does the support engineer ask more than once for clarification? If so, you might be interested in DITO -- Demo It To Oracle. DITO uses CamStudio (free download!) to record the exact nature of the problem, and upload the output to your SR. The following articles provide more details: Working with Support - MOSSOS (Doc ID 1265130.1) "Demo It To Oracle" (DITO) - CamStudio Help ( Doc ID 11.1) Why take up valuable time first explaining the problem, then trying to get a web conference setup to show exactly what is going on? The next time you file an SR, try including a recording showing exactly which application is failing, where it is failing, and what it looks like when it fails.

    Read the article

  • Is the escaping provided by the Google-Gson library enough to ensure a safe JSON payload?

    - by Lifetime_Learner
    I am currently using the Google-Gson library to convert Java objects into JSON inside a web service. Once the object has been converted to JSON, it is returned to the client to be converted into a JSON object using the JavaScript eval() function. Is the character escaping provided by the Gson library enough to ensure that nothing nasty will happen when I run the eval() function on the JSON payload? Do I need to HTML Encode the Strings in the Java Objects before passing them to the Gson library? Are there any other security concerns that I should be aware of?

    Read the article

  • Le SP 1 de Windows 7 et Windows Server 2008 R2 disponible, Microsoft recommande l'installation via Windows Update

    Le SP 1 de Windows 7 et Windows Server 2008 R2 disponible Microsoft recommande l'installation via Windows Update Mise à jour du 23/02/11 Une semaine après sa disponibilité pour les abonnés MSDN/TechNet, le Service Pack 1 de Windows 7 et de Windows Server 2008 R2 est disponible pour tous. Ce SP1 est avant tout un pack cumulatif des mises à jours publiées jusqu'en décembre 2010. Pour Windows Server 2008 R2, il ajoute cependant « deux nouvelles fonctionnalités majeures », souligne justement Jean-Michel Ormes sur son blog Développez. « RemoteFX est une plateforme d'accélération graphique qui permet aux utilisateurs distan...

    Read the article

  • How can I compile an IP address to country lookup database to make available for free?

    - by Nick
    How would I go about compiling an accurate database of IP addresses and their related countries to make available as an open source download for any web developer who wants to perform a geographic IP lookup? It seems that a company called MaxMind has a monopoly on geographic IP data, because most online tutorials I've seen for country lookups based on IP addresses start by suggesting a subscription to MaxMind's paid service (or their less accurate free 'Lite' version). I'm not completely averse to paying for their solution or using the free one, but the concept of an accurate open source equivalent that anyone can use without restriction appeals to me, and I think it would be useful for the web development community. How is geographic IP data collected, and how realistic is it to hope to maintain an up-to-date open version?

    Read the article

  • A simple deployment example using Oracle Solaris 11

    - by Glynn Foster
    Last week I was over in Melbourne and Sydney to present at an Oracle Technology Network System Administration Day. During a set of morning sessions, I presented on some of the new things that we've done in Oracle Solaris 11 and our focus for the future. One of the sessions I presented was giving a quick technical overview of what a typical application deployment scenario would look like using technologies like the Image Packaging System (IPS), Service Management Facility (SMF), Oracle Solaris Zones, and network virtualization. While it's just a simple example, it provides the basic building blocks for a more advanced configuration that a data center would typically deploy. Given these would likely be of general interest, I thought I'd upload the slides for others to view - enjoy! You can download the original source PPTX without some of the formatting errors in the above.

    Read the article

  • Le Projet Hudson change de nom et devient Jenkins pour respecter les droits d'Oracle, sa migration vers GitHub devrait suivre

    Le Projet Hudson change de nom et devient Jenkins Pour respecter les droits d'Oracle, sa migration vers GitHub devrait suivre Mise à jour par Romaintaz du 12/01/11 Hudson est sans doute l'un des serveurs d'intégration continue les plus utilisés aujourd'hui, en tout cas dans l'éco-système Java. Hudson était un produit Sun. Avec le rachat de cette compagnie il y a un an par Oracle, Hudson est devenu de fait un produit Oracle. En fin d'année dernière, un grand débat - houleux - a agité la communauté autour de cet outil. Oracle ne souhaitait pas que ce projet soit hébergé sur GitHub (un service d'hébergement de projets basé sur le ge...

    Read the article

  • Ce que Microsoft a appris de la lutte contre les botnets, exposé par l'un de ses chercheurs

    Mise à jour du 20.03.2010 par Katleen Ce que Microsoft a appris en matière de lutte contre les botnets, exposé par l'un de ses chercheurs "Voici publiées les premières leçons que nous et d'autres chercheurs avons tirées de l'impact de l'opération b49." Microsoft semble avoir beaucoup appris de son action de neutralisation du botnet Waledac (même si celui-ci a depuis repris du service). Les unités spécialisées de la Digital Crimes Units ont d'abord du attaquer le botnet par couches. Ceci, via des perturbations de communications P2P et des désactivations de noms de domaine pour empêcher les échanges entre les ordinateurs zombies et les serveurs de commande et de ...

    Read the article

  • New Endpoint options that enable additional application patterns

    - by kaleidoscope
    The two communication-related capabilities:  a) inter-role communication and b) external endpoints on worker roles enable new application patterns in Windows Azure-hosted services. Inter-role Communication - A common application pattern enabled by this is client-server, where the server could be an application such as a database or a memory cache. External Endpoints on Worker Roles - A common application type enabled by this is a self-hosted Internet-exposed service, such as a custom application server. For further details click on the following link: http://blogs.msdn.com/windowsazure/archive/2009/11/24/new-endpoint-options-enable-additional-application-patterns.aspx   Tinu, O

    Read the article

  • ArchBeat Link-o-Rama for November 7, 2012

    - by Bob Rhubart
    Updated Business Activity Monitoring (BAM) Class | @OracleSOA Oracle SOA Team blogger Gary Barg has news for those interested in a skills upgrade. This updated Oracle University course "explains how to use Oracle BAM to monitor enterprise business activities across an enterprise in real time. You can measure your key performance indicators (KPIs), determine whether you are meeting service-level agreements (SLAs), and take corrective action in real time." Oracle Solaris 11.1 update focuses on database integration, cloud | @markfontecchio TechTarget editor Mark Fontecchio reports on the recent Oracle Solaris 11.1 release, with comments from IDC's Al Gillen. Thought for the Day "Why is composing symphonies tough? I don't know. It's just very few people in the world can do it well. And I think that's the case with upfront design. It is very hard to do well." — Martin Fowler Source: SoftwareQuotes.com

    Read the article

  • S&OP best practices that can help your organization be more responsive and effective

    - by user717691
    If you want to increase revenue by quickly responding to market changes or want to ensure that your operating plans drive towards corporate financial goals, you need real-time sales and operations planning.Watch the replay of our recent Webcast to hear Christopher Neff from NCR Corporation discuss how NCR Corporation is leveraging Oracle's Real-Time Sales and Operations Planning solutions. Learn best practices that can help your organization be more responsive and effective. Discover how Oracle's comprehensive suite of best-in-class capabilities can: Synchronize plans and actions across the extended enterprise Maximize profits with the ability to sense, influence, and fulfill demand with industry leading demand management and real-time sales & operations Drive tactical decisions into operational planning and execution, while monitoring performance Profitably balance supply, demand, and budgets Move planning processes from periodic and reactive to real-time, iterative and proactive Register now for the on demand Webcast! http://www.oracle.com/webapps/dialogue/ns/dlgwelcome.jsp?p_ext=Y&p_dlg_id=8664804&src=6811174&Act=99NCR Corporation is a leader in Self Service Solution such as POS Solutions, Payment and Imaging Systems.

    Read the article

  • New Solaris 11 book available

    - by user12611852
    A new Solaris 11 book is now available.  Congratulations to my colleague in the Oracle Public Sector Hardware sales organization "Dr. Cloud" Harry Foxwell and his co-writers on publishing Oracle Solaris 11 System Administration The Complete Reference Table of contents 1 The Basics of Solaris 11 2 Prepare a System for Solaris3 Installation Options4 Alternative Installations for Enterprise5 The Solaris Graphical Desktop Environment6 The Service Management Facility7 Solaris Package Management "Image Packaging System"8 Solaris at the Command Line9 File systems and ZFS10 Customize the Solaris Shells11 Users and Groups HF12 Solaris 11 Security13 Basic System Performance Tuning14 Solaris Virtualization15 Print Management16 DNS and DHCP17 Mail Services18 Mgmt of Trusted Extensions19 The Network File System 20 The FTP Server21 Solaris and Samba 22 Apache and the Web Stack Buy one today

    Read the article

  • Need a Holistic view of your Concurrent Processing? Choose CP Analyzer

    - by user793044
    The Concurrent Processing Analyzer is a Self-Service Health-Check script which reviews the overall Concurrent Processing Footprint, analyzes the current configurations and settings for the environment providing feedback and recommendations on Best Practices. This is a non-invasive script which provides recommended actions to be performed on the instance it was run on.  For production instances, always apply any changes to a recent clone to ensure an expected outcome. Benefits include: E-Business Applications Concurrent Processing Analyzer Overview E-Business Applications Concurrent Request Analysis E-Business Applications Concurrent Manager Analysis Identifies Concurrent System Setup and configurations Identifies and recommends Concurrent Best Practices Easy to add Tool for regular Concurrent Maintenance Execute Analysis anytime to compare trending from past outputs Go to Doc ID 1411723.1 for more details and script download. Feedback welcome!

    Read the article

  • Security Alert for CVE-2011-5035 Updated

    - by Eric P. Maurice
    Hi, this is Eric Maurice again.  Oracle has just updated the Security Alert for CVE-2011-5035 to announce the availability of additional fixes for products that were affected by this vulnerability through their use of the WebLogic Server and Oracle Container for J2EE components.  As explained in a previous blog entry, a number of programming language implementations and web servers were found vulnerable to hash table collision attacks.  This vulnerability is typically remotely exploitable without authentication, i.e., it may be exploited over a network without the need for a username and password.  If successfully exploited, malicious attackers can use this vulnerability to create denial of service conditions against the targeted system. A complete list of affected products and their versions, as well as instructions on how to obtain the fixes, are listed on the Security Alert Advisory.  Oracle highly recommends that customers apply these fixes as soon as possible.

    Read the article

< Previous Page | 462 463 464 465 466 467 468 469 470 471 472 473  | Next Page >