Search Results

Search found 35371 results on 1415 pages for 'oracle technology network'.

Page 488/1415 | < Previous Page | 484 485 486 487 488 489 490 491 492 493 494 495  | Next Page >

  • JumpStart your implementation with Oracle User Productivity Kit pre-built content!

    Project teams are faced with tight deadlines for enterprise application implementations or upgrades. Learn how organizations can reduce their time to deployment by using pre-built content for Oracle User Productivity Kit. When organizations use this content for baseline system transaction flows early in a project, they can then simply modify and update the content as the application evolves to create user acceptance test scripts, transaction recordings, job aids, classroom training, online training, and support materials post-go-live. The value of pre-built content dramatically reduces time to deployment and overall implementation costs.

    Read the article

  • ldap samba user access issue

    - by ancillary
    I have a samba share that is on the LAN. It is auth'd via ldap. Users access file system via ad windows shares. There are shortcuts in directories that point to dir's on samba. Typically a user will click the shortcut to the smb dir, and will be met with a permission denied error. Upon closing explorer and reopening, it will work. DNS is handled by the domain controller, and that is the only server any of the machines use for DNS. Nothing in eventvwr. Only see successful auth entries in samba log. Any ideas?

    Read the article

  • Gone in 60 Seconds: An Insecure Database is an Easy Target

    - by Troy Kitch
    According to the recent Verizon Data Breach Investigations Report, 98% of breached data originates from database servers and nearly half are compromised in less than a minute! Almost all victims are not even aware of a breach until a third party notifies them and nearly all breaches could have been avoided through the use of basic controls. Join us for this November 28th webcast to learn more about the evolving threats to databases that have resulted in over 1 billion stolen records. Also, hear how organizations can mitigate risks by adopting a defense-in-depth strategy that focuses on basic controls to secure data at the source - the database. There's no turning back the clock on stolen data, but you can put in place controls to ensure your organization won't be the next headline. Note, this webcast will be recorded for on-demand access after November 28th. 

    Read the article

  • INDIA Legislation: New State 'Telangana' Added in IN_STATES System Lookup

    - by LieveDC
    With effect from June 02, 2014 the new state of Telangana will be operational in the Indian Union.Details of the new state are explained in the official gazette released on 1 March, 2014 by the Ministry of Home Affairs: http://mha.nic.in/sites/upload_files/mha/files/APRegACT2014_0.pdf This new State has been added in the IN_STATES System Lookup: a new lookup code 'TG' with meaning 'Telangana' has been added.For available patches on different R12 patch levels check out: Doc ID 1676224.1 New State Telangana Be Added In IN_STATES System Lookup.

    Read the article

  • wireless printer - entering WPA - is there a quicker way?

    - by camcam
    I have a wireless printer (Brother DCP-585CW). The wireless setup instruction says I should enter the WPA key to the printer. The key is entered using up and down buttons on the printer. So, I am supposed to enter 64 characters using up and down buttons. To enter 1 character, it takes on average (24+10)/2 = 17 times pressing the button (digits start after 24 letters). So 17*64 = 1088 times. Is there a quicker way to setup a wireless printer? Maybe there is a Windows program that discovers printers connected to computer through USB or Ethernet (my printer has both sockets) and allows to pre-configure it for wireless usage (enter the long WPA key)? Update There is BRAdmin program and it allows to set up almost all wireless settings... almost - all except WPA :(

    Read the article

  • CloudCruiser Chargeback in the cloud

    - by llaszews
    Another company that does chargeback has just been pointed out to me: CloudCruiser There is interesting quote on this company's web site: "Accurate and transparent chargeback is a key requirement in this age of cloud computing. By 2015, we forecast more than 50% of the Global 2000 will charge back most IT costs using service-based pricing, up from less than 10% today. New integrated tools will be needed to implement IT service-based chargeback." - Jay Pultz, Vice President and Distinguished Analyst, Gartner

    Read the article

  • New Nokia SDK 2.0 for Java (beta)

    - by Tori Wieldt
    Nokia recently launched the Asha 305, 306, and 311, which are full touch devices with smartphone-like functionality at a low price. This makes them particularly attractive to consumers in the developing and developed world who may not be able to afford a smartphone but have a strong demand for apps and the smartphone experience. The Asha phones are the latest addition to Nokia's Series 40 platform, all of which support Java ME. The SDK includes new Full Touch API's (e.g. supporting pinch zoom) and Sensor support delivering an enhanced App experience. It also adds improved Maps API support for creating socio-local apps. There are a number of improvements in the tools including the Nokia IDE for Java ME with in-build Device-SDK Manager. Many code examples, training videos, webinars and sample code will help get you started. Porting guides and sample code show you how to port your android app to Java ME. If you don't have access to the hardware you can use Remote Device Access to test on real hardware that's remotely hosted for free. You can also find Light Weight UI Toolkit (LWUIT) support, which can speed development significantly. Both In-App Advertising and In-App Purchase (beta) is supported. Here's a great revenue-making opportunity for developers and a great way of reaching a new app-hungry mass-market audience. Download the new Nokia SDK 2.0 for Java (Beta) and get developing! 

    Read the article

  • Technical Article: Experimenting with Java Timers

    - by Tori Wieldt
    OTN's new tech article is "Experimenting with Java Timers" by T. Lamine Ba. This article studies time—how Java handles timers and the scheduling of tasks. Java timers are utilities that let you execute threads or tasks at a predetermined future time, and these tasks can be repeated according to a set frequency. The article starts with a simple "Hello World" program in a web application that's composed of JavaServer Pages (JSP) and uses the model-control-view (MVC) design pattern. The IDE used in this article is NetBeans IDE 7.1, but you can use any IDE that supports Java. "Experimenting with Java Timers" demonstrates how to get started scheduling jobs with Java. To learn about Swing timers, check out the Java tutorial "How to Use Swing Timers" and additional information in the Java Platform, Standard Edition 7 API Specification for Class Timer. 

    Read the article

  • good books about server architecture?

    - by ajsie
    when the traffic for a website grows i dont think one apache server in a vps is the way to go. i would like to know more about how i then should set up the server side architecture. im not that much into hardware stuff (what kind of cables to use, different cpu architectures etc), but interested in the software architecture: what servers (apache, nginx, squid, varnish etc) to use and how they interact with each other one server in one machine? how many mysql servers. how many apache, nginx servers and so on. how the "machine court" looks like. are there any good books about this area?

    Read the article

  • VDC Research Webcast: Engineering Business Value in the IoT with Java 8

    - by tangelucci
    Date: Thursday, June 19, 2014 Time: 9:30 AM PDT, 12:30 PM EDT, 17:30 GMT The growth of the Internet of Things (IoT) opens up new service-driven opportunities, delivering increased efficiencies, better customer value, and improved quality of life. Realizing the full potential of the Internet of Things requires that we change how we view and build devices. These next-generation systems provide the core foundation of the services, rapidly transforming data to information to value. From healthcare to building control systems to vehicle telematic systems, the IoT focuses on how conneted devices can become more intelligent, enhance interoperability with other devices, systems and services, and drive timely decisions while delivering real business return for all. Join this webcast to learn about: Driving both revenue opportunities and operational efficiencies for the IoT value chain Leveraging Java to make devices more secure How Java can help overcome resource gaps around intelligent connected devices Suggestions on how to better manage fragmentation in embedded devices Register here: http://event.on24.com/r.htm?e=793757&s=1&k=4EA8426D0D31C60A2EDB139635FF75AB

    Read the article

  • Sharing wifi connection

    - by andser
    I have some little problem while sharing wifi connection. I have 2 laptops. I need connection scheme like this: laptop1 [wlan0] >>>>>>>> laptop2 [wlan0] (in ad-hoc mode, as ap, etc) >>>>> laptop2 [wlan1] >>>> internet. laptop1 [wlan0] connecting to laptop2 [wlan0]. laptop2 connecting to internet through wlan1. Is it possible? OS: Ubuntu on both machines I tried this man (setting laptop2 wlan0 in ad-hoc mode): https://help.ubuntu.com/community/WifiDocs/Adhoc#Network_Manager laptop1 connects to laptop2, but can't access to internet.

    Read the article

  • Hilfreiche Linemode Skripte

    - by Ulrike Schwinn (DBA Community)
    Die mitgelieferten Skripte im Verzeichnis $ORACLE_HOME/rdbms/admin bieten schon seit jeher DBAs und Entwickler eine zusätzliche Unterstützung bei ihrer Arbeit. Sie stehen automatisch nach jeder Installation im Verzeichnis rdbms/admin zur weiteren Verwendung zur Verfügung. Nur wie findet man genau das Skript, das einem die richtige Unterstützung bietet? Eine Dokumentation aller Skripte existiert nicht. Man kann sich an den Namen der Skripte orientieren, da sie mit sprechenden Namen aufgelistet sind und kann die Kurzeinleitung im Skript nachlesen. Das ist mühselig und kostet Zeit. Daher wird im neuen Tipp ein Überblick über wichtige Skripte einschließlich einer Kurzbeschreibung gegeben. Mehr dazu hier

    Read the article

  • USB 3 to Gigabit Ethernet adapters: where are they?

    - by intuited
    I'm looking for an adapter that will let me use a USB 3 port as a Gigabit Ethernet port. This is proving surprisingly hard to find! Is there some reason why this product is either unavailable or very obscure? Is there an online shop (US/Canada) where I can buy such an item? Newegg, TigerDirect, NCIX, etc. do not seem to carry such an item. I find this surprising since it will provide at least double the bandwidth (possibly quadruple) compared to a USB 2 Ethernet adapter.

    Read the article

  • Stores Still Matter In The World Of E-Commerce

    - by Michael Hylton
    You may think that more and more consumers are moving their purchasing to the Web or mobile device.  However, according The NPD Group, Inc., a leading market research company, 15-20 percent of consumers in 2011 checked out products in stores before buying online, or called “showrooming”, for product categories like stand mixers, electric knives, sewing machines, and some floor cleaners. Other categories like power tools, hairsetters, and robotic vacuums are now beginning to show signs of the “showrooming” trend as well. It is doubly important to present a consistent, personalized, and relevant shopping experience for your customers, no matter whether they interact with you in-person in your store, with your sales agents or call center agents, over the Web, or using a mobile device.  Your goal is to make that experience across touchpoints as seamless as possible.

    Read the article

  • Stores Still Matter In The World Of E-Commerce

    - by Michael Hylton
    You may think that more and more consumers are moving their purchasing to the Web or mobile device.  However, according The NPD Group, Inc., a leading market research company, 15-20 percent of consumers in 2011 checked out products in stores before buying online, or called “showrooming”, for product categories like stand mixers, electric knives, sewing machines, and some floor cleaners. Other categories like power tools, hairsetters, and robotic vacuums are now beginning to show signs of the “showrooming” trend as well. It is doubly important to present a consistent, personalized, and relevant shopping experience for your customers, no matter whether they interact with you in-person in your store, with your sales agents or call center agents, over the Web, or using a mobile device.  Your goal is to make that experience across touchpoints as seamless as possible.

    Read the article

  • securing communication between 2 Linux servers on local network for ports only they need access to

    - by gkdsp
    I have two Linux servers connected to each other via a cross-connect cable, forming a local network. One of the servers presents a DMZ for the other server (e.g. database server) that must be very secure. I'm restricting this question to communication between the two servers for ports that only need to be available to these servers (and no one else). Thus, communication between the two servers can be established by: (1) opening the required port(s) on both servers, and authenticating according to the applications' rules. (2) disabling IP Tables associated with the NIC cards the cross-connect cable is attached to (on both servers). Which method is more secure? In the first case, the needed ports are open to the external world, but protected by user name and password. In the second case, none of the needed ports are open to the outside world, but since the IP Tables are disabled for the NIC cards associated with the cross-connect cables, essentially all of the ports may be considered to be "open" between the two servers (and so if the server creating the DMZ is compromized, the hacker on the DMZ server could view all ports open using the cross-connect cable). Any conventional wisdom how to make the communication secure between two servers for ports only these servers need access to?

    Read the article

  • Printer in a AD double side print problem

    - by Spidfire
    ive got a printer in my Active directory but its standard set to double sided printing but the problem is the printer doesnt support that so you have to switch it manualy Ive found the setting for the user but it is automatically set to the original value if you reboot Where can i find the setting in the active directory ? the printer is a :HP Color LaserJet CP1510 Series PCL 6 (its possible that there is a script for this but i dont know where to look)

    Read the article

  • Lesetipp: Der TDAzlan Exadata Value Guide

    - by Alliances & Channels Redaktion
    Fast 20 Jahre sind Oracle und TDAzlan schon erfolgreiche Partner. Als VAD unterstützt TDAzlan Oracle Partner bei deren Business, zum Beispiel durch Sales- und Marketing-Support, Webcasts, Zertifizierungstrainings oder Enablement Workshops bis hin zur Spezialisierung. Jetzt wurde der Exadata Value Guide von Azlan für Partner und Kunden aktualisiert auf aktuelle 12c und X4 Technologien. Die Broschüre bündelt Fakten und Tipps rund um die Themen Exadata und Engineered Systems. Sie schlüsselt technische Details zu Oracle Software- und Hardware-Komponenten auf und bietet Verkaufsargumente sowie hilfreiche Erläuterungen zum Salesprozess. Außerdem wird das Oracle Authorized Solution Center (OASC) von TDAzlan in München vorgestellt. Dort haben Partner die Möglichkeit, Oracle Gesamtlösungen zu testen und Ihren Kunden zu präsentieren. Den Exadata Value Guide können sie auch auf der Oracle Informations-Webseite von TDAzlan herunterladen.

    Read the article

< Previous Page | 484 485 486 487 488 489 490 491 492 493 494 495  | Next Page >