Search Results

Search found 606 results on 25 pages for 'frequent'.

Page 5/25 | < Previous Page | 1 2 3 4 5 6 7 8 9 10 11 12  | Next Page >

  • Migrate Your Site to TYPO3 CMS

    What else can you ask from a CMS system that gives you complete freedom from maintaining your site, coding, frequent changes, low cost of ownership, self administered back end and a lot more. This list can continue and go on and on. TYPO3 CMS has got many more advantages from the contemporary CMS systems. It is not only affable to the development community but also liked by most of the users who comes across this CMS.

    Read the article

  • Problems with Airtel

    I am a housewife from Delhi, currently living in Chennai. My husband is a businessman and I usually use skype so I can constantly keep in touch with my husband. But due to frequent robberies in my ar... [Author: Francis Regan - Computers and Internet - April 16, 2010]

    Read the article

  • Is Tracking Software Usage Illegal?

    - by Graviton
    Let's say if I am doing desktop application, and I am interested to know whether our software really gets used or not. Is it alright to insert in code that tracks whether our software is used, for how long and so on? Note that no person-identifiable information will be collected, all I am interested to know is how frequent and for how long the software is used. The information will be sent to our server for diagnosis. What do you think?

    Read the article

  • How To - Securing a JAX-WS with OWSM Message Protection Policy in JDeveloper - 11g

    - by Prakash Yamuna
    As promised in this post, here is a How-To that describes how to secure a simple HelloWorld JAX-WS with OWSM message protection policy and test it with SOAP UI. The How-To reuses the picture I posted earlier about the relationship and interplay b/w Keystore, Credential store, jps-config.xml ,etc. One of the other more frequent requests I hear from folks within Oracle and customers is how to test OWSM with SOAP UI. SOAP UI in general works very well as testing tool for web services secure with wss10 policies.

    Read the article

  • Reading A User's Profile

    - by Ricardo Peres
    One frequent question is: how can we read a user's profile properties? The answer is simple, we use class ProfileBase: //a specific user ProfileBase profile = ProfileBase.Create("username", true); //all users BaseProfile [] profiles = Membership.GetAllUsers().Cast().Select(u = ProfileBase.Create(u.UserName, true)).ToArray(); SyntaxHighlighter.config.clipboardSwf = 'http://alexgorbatchev.com/pub/sh/2.0.320/scripts/clipboard.swf'; SyntaxHighlighter.brushes.CSharp.aliases = ['c#', 'c-sharp', 'csharp']; SyntaxHighlighter.all();

    Read the article

  • Best way to land a new job while working full time?

    - by JerryC
    I work full time as a software engineer but I would like to find another job. I'm a little worried about posting my resume directly to monster or dice just in case someone at my company finds out about it. Recruiters occasionally call me (maybe once a month or so) but I'd like some more frequent correspondence so I can speed this process up. What are some good strategies to find a new job while working?

    Read the article

  • The death of Linux and other predictions

    <b>Really Linux:</b> "Unfortunately, I then stumble on the ever so frequent prophetic Linux article. One declares, "This is the year of Linux on the desktop." Another declares, "The desktop is dead." And another declares, "This is the year of the death of Linux on the desktop.""

    Read the article

  • WebCenter Content Technical Resources

    - by John Klinke
    Some useful WebCenter Content technical resources that you might not be aware of: WebCenter Content Support's Twitter Account: Follow Oracle WebCenter Content Support on Twitter @OrcleWCCSupport to keep informed about webcasts, patches, new releases, tips and tricks, and more. Oracle WebCenter & ADF Architecture Team Blog: Frequent posts by the Oracle Fusion Middleware A-Team discussing WebCenter implementation and configuration topics.  

    Read the article

  • Traveling With Laptop

    Laptops are great, especially if your business requires frequent traveling or if you simply cannot leave your home without your computer for one reason for another. "Laptops are great, especially i... [Author: Jeremy Mezzi - Computers and Internet - May 29, 2010]

    Read the article

  • Non-x86 Blade Server Buyer's Guide

    When it comes to blade servers, x86 is the most frequent architecture of choice. Bladed or not, however, x86 servers are not the perfect tool for every task. Non-x86 blade server options, while limited, fill many of the gaps that their x86 siblings leave.

    Read the article

  • Non-x86 Blade Server Buyer's Guide

    When it comes to blade servers, x86 is the most frequent architecture of choice. Bladed or not, however, x86 servers are not the perfect tool for every task. Non-x86 blade server options, while limited, fill many of the gaps that their x86 siblings leave.

    Read the article

  • Why Doing SEO "The Right" Way Works

    Online searching has been found to be the third most frequent activity for people who log on to the net. This is why it is important to stay on top of the search engine result pages, as this will help the users to find the website, thus increasing qualified traffic.

    Read the article

  • Things to Take Note of When Writing Directory Submissions

    Directory submissions though past their glory are still a highly regarded form of getting traffic onto websites. There are a lot of people who still frequent directories and use search engines. A high placement on search engine directories not only increases the quantity of traffic but also appends to the quality of traffic. In some ways directory submissions depend a lot on your accuracy of descriptions.

    Read the article

  • Search Engine Optimization - Article Authors Area

    When you think of starting a new online business make the authors area a frequent place to visit. Writing your own original content will brand your business. Submit your one of a kind article to only one directory and then write a new one to submit to another directory. Branding your business products and or services will create a structure of trust, when others see that you understand what you are doing.

    Read the article

  • SEO Solutions - For Better Page Views!

    Your products and services will not reach out to your target audience, unless your web site appears prominently in the page one of the search engines. If your rankings are better, visibility for your web portal will be higher and you will get better ROI. You may have heard of companies shelling out a lot of money for internet marketing in order to get frequent visitors to their web portal.

    Read the article

  • What methods of requirements elicitation are suitable when I do not have direct access to the user base?

    - by metadice
    I am working on an application to create invoices. There are some features that are required based on the type of the application and are common to all invoice applications. However, we still need to determine what unique needs the user base might have. We do not have direct access to the users to obtain requirements or user stories. What techniques are most suitable for eliciting high-quality requirements from users when direct or frequent access is not possible?

    Read the article

  • Benefits and Future of Web Applications

    A web application is an application that is contacted in excess of a network such as the Internet or an intranet. The term should also mean a computer software application that is hosted in a browser-controlled environment or coded in a browser-supported language and dependent on a frequent web browser to provide the application executable.

    Read the article

  • Search Engine Ranking Software - 5 Powerful Factors

    If you are one of the frequent users of the internet, then you will surely know the importance of having good search engine ranking software. Indeed, you are one of those who are adding to the demand of such tool and there are many out there who are working to meet that demand.

    Read the article

  • Top 7 Ways to Get Traffic For Free

    Website without high site traffic is useless. Site traffic is truly important for website with high end design is not good if not followed by several visitors and frequent viewers. If you don't get large volume of traffic, don't worry for here are the top 7 ways on how to get site traffic for free.

    Read the article

  • How to Optimize Your Website With SEO Placement Strategies

    The best way to win the SEO optimization game is to use a combination of different techniques. Compelling content, unique keywords and link exchange are methods that have proven to be effective in optimizing your website. The next step is to combine all these into a frequent, if not daily, activity.

    Read the article

  • Server configurations for hosting MySQL database

    - by shyam
    I have a web application which uses a MySQL database hosted on a virtual server. I've been using this server when I started the application and when the database was really small. Now it has grown and the server is not able to handle the db, causing frequent db errors. I'm planning to get a server and I need suggestions for that. Like I said, the db is now 9 GB, and is growing considerably fast. There are a number of tables with millions of rows, which are frequently updated and queried. The most frequent error the db shows is Lock wait timeout exceeded. Previously there used to be "The total number of locks exceeds the lock table size" errors too, but I could avoid it by increasing Innodb buffer pool size. Please suggest what configurations should I look for in the server I should buy. I read somewhere that the db should ideally have a buffer pool size greater than the size of its data, so in my case I guess I'd need memory gt 9 GB. What other things should I look for in the server? Just tell me if I should give you more info about the

    Read the article

  • Out of memory errors but not actually out of memory...

    - by commradepolski
    So, myself and my fellow support techs have been fighting with this issue and we still dont know what the problem is. Lets start off with the system specs: Windows XP 32 bit Corporate (SP2 and SP3) Intel D975XBX2 Mobo 4gb of ram Intel Core 2 Quad Q6600 ATI Radeon HD 3600 - 512mb After a few hours of working on the machine, the end user will begin to see the following symptoms: Out of memory messages Title bars and menus dont draw in properly Problems accessing network resources Problems opening up documents such as MSWord and MSPowerpoint and text files Problems opening up explorer windows General instability We have looked at task manager while this issue was occurring, and all indicators, like PF usage, threads, handles, etc. are normal. We have been having trouble pinpointing the root cause of this issue. It is also not situated with one user, it affects 8-10. So far we have tried: Resetting CMOS (Waiting to see results) Replacing video card (didnt help) Windows updates (didnt help) Updating network drivers (didnt help) Switching user from 1gbps to 100mbps network connection (awaiting results) Swapping the affected user's hardware (waiting for results) Increasing desktop heap size (helped for a bit but then the issue became more frequent) Applying the /3 switch to XP (didnt help) Increasing and decreasing and setting PF to system managed state (didnt help) We did have a power outage at the office a couple weeks ago, and all these issues became more frequent. Prior to the power outage it may take a week or so for the users to experience the issues but since the power outage it takes 3-4 hours or less. We havent had reports of the above issues causing BSODs, although that would be easier to diagnose :). Any help is greatly appreciated.

    Read the article

  • Things I've noticed with DVCS

    - by Wes McClure
    Things I encourage: Frequent local commits This way you don't have to be bothered by changes others are making to the central repository while working on a handful of related tasks.  It's a good idea to try to work on one task at a time and commit all changes at partitioned stopping points.  A local commit doesn't have to build, just FYI, so a stopping point doesn't mean a build point nor a point that you can push centrally.  There should be several of these in any given day.  2 hours is a good indicator that you might not be leveraging the power of frequent local commits.  Once you have verified a set of changes works, save them away, otherwise run the risk of introducing bugs into it when working on the next task.  The notion of a task By task I mean a related set of changes that can be completed in a few hours or less.  In the same token don’t make your tasks so small that critically related changes aren’t grouped together.  Use your intuition and the rest of these principles and I think you will find what is comfortable for you. Partial commits Sometimes one task explodes or unknowingly encompasses other tasks, at this point, try to get to a stopping point on part of the work you are doing and commit it so you can get that out of the way to focus on the remainder.  This will often entail committing part of the work and continuing on the rest. Outstanding changes as a guide If you don't commit often it might mean you are not leveraging your version control history to help guide your work.  It's a great way to see what has changed and might be causing problems.  The longer you wait, the more that has changed and the harder it is to test/debug what your changes are doing! This is a reason why I am so picky about my VCS tools on the client side and why I talk a lot about the quality of a diff tool and the ability to integrate that with a simple view of everything that has changed.  This is why I love using TortoiseHg and SmartGit: they show changed files, a diff (or two way diff with SmartGit) of the current selected file and a commit message all in one window that I keep maximized on one monitor at all times. Throw away / stash commits There is extreme value in being able to throw away a commit (or stash it) that is getting out of hand.  If you do not commit often you will have to isolate the work you want to commit from the work you want to throw away, which is wasted productivity and highly prone to errors.  I find myself doing this about once a week, especially when doing exploratory re-factoring.  It's much easier if I can just revert all outstanding changes. Sync with the central repository daily The rest of us depend on your changes.  Don't let them sit on your computer longer than they have to.  Waiting increases the chances of merge conflict which just decreases productivity.  It also prohibits us from doing deploys when people say they are done but have not merged centrally.  This should be done daily!  Find a way to partition the work you are doing so that you can sync at least once daily. Things I discourage: Lots of partial commits right at the end of a series of changes If you notice lots of partial commits at the end of a set of changes, it's likely because you weren't frequently committing, nor were you watching for the size of the task expanding beyond a single commit.  Chances are this cost you productivity if you use your outstanding changes as a guide, since you would have an ever growing list of changes. Committing single files Committing single files means you waited too long and no longer understand all the changes involved.  It may mean there were overlapping changes in single files that cannot be isolated.  In either case, go back to the suggestions above to avoid this.  Committing frequently does not mean committing frequently right at the end of a day's work. It should be spaced out over the course of several tasks, not all at the end in a 5 minute window.

    Read the article

  • Managing Operational Risk of Financial Services Processes – part 1/ 2

    - by Sanjeevio
    Financial institutions view compliance as a regulatory burden that incurs a high initial capital outlay and recurring costs. By its very nature regulation takes a prescriptive, common-for-all, approach to managing financial and non-financial risk. Needless to say, no longer does mere compliance with regulation will lead to sustainable differentiation.  Genuine competitive advantage will stem from being able to cope with innovation demands of the present economic environment while meeting compliance goals with regulatory mandates in a faster and cost-efficient manner. Let’s first take a look at the key factors that are limiting the pursuit of the above goal. Regulatory requirements are growing, driven in-part by revisions to existing mandates in line with cross-border, pan-geographic, nature of financial value chains today and more so by frequent systemic failures that have destabilized the financial markets and the global economy over the last decade.  In addition to the increase in regulation, financial institutions are faced with pressures of regulatory overlap and regulatory conflict. Regulatory overlap arises primarily from two things: firstly, due to the blurring of boundaries between lines-of-businesses with complex organizational structures and secondly, due to varying requirements of jurisdictional directives across geographic boundaries e.g. a securities firm with operations in US and EU would be subject different requirements of “Know-Your-Customer” (KYC) as per the PATRIOT ACT in US and MiFiD in EU. Another consequence and concomitance of regulatory change is regulatory conflict, which again, arises primarily from two things: firstly, due to diametrically opposite priorities of line-of-business and secondly, due to tension that regulatory requirements create between shareholders interests of tighter due-diligence and customer concerns of privacy. For instance, Customer Due Diligence (CDD) as per KYC requires eliciting detailed information from customers to prevent illegal activities such as money-laundering, terrorist financing or identity theft. While new customers are still more likely to comply with such stringent background checks at time of account opening, existing customers baulk at such practices as a breach of trust and privacy. As mentioned earlier regulatory compliance addresses both financial and non-financial risks. Operational risk is a non-financial risk that stems from business execution and spans people, processes, systems and information. Operational risk arising from financial processes in particular transcends other sources of such risk. Let’s look at the factors underpinning the operational risk of financial processes. The rapid pace of innovation and geographic expansion of financial institutions has resulted in proliferation and ad-hoc evolution of back-office, mid-office and front-office processes. This has had two serious implications on increasing the operational risk of financial processes: ·         Inconsistency of processes across lines-of-business, customer channels and product/service offerings. This makes it harder for the risk function to enforce a standardized risk methodology and in turn breaches harder to detect. ·         The proliferation of processes coupled with increasingly frequent change-cycles has resulted in accidental breaches and increased vulnerability to regulatory inadequacies. In summary, regulatory growth (including overlap and conflict) coupled with process proliferation and inconsistency is driving process compliance complexity In my next post I will address the implications of this process complexity on financial institutions and outline the role of BPM in lowering specific aspects of operational risk of financial processes.

    Read the article

< Previous Page | 1 2 3 4 5 6 7 8 9 10 11 12  | Next Page >