Search Results

Search found 4425 results on 177 pages for 'knowledge pathways'.

Page 78/177 | < Previous Page | 74 75 76 77 78 79 80 81 82 83 84 85  | Next Page >

  • Suggestions for hosted file sharing services

    - by Jon
    Before I pose my question, I will give some insight as per my scenario: I work for a small business (cost is an important factor) Our bandwidth is limited and would not support an in-house FTP server We need to share files (mostly pdf, inDesign, Illustrator documents) to our clients, and as we expand, we are finding that our current locally-hosted FTP solution is too slow and is becoming a detriment to our sales team. What we need is a remotely hosted solution to share files with our clients, specifically with the following features: Greater than 100gb of secure storage The Ability to distribute unique log in credentials to clients, granting access to a personalized directory or folder, while limiting access to other files on the server. A relatively simple web-based UI for clients with limited computer knowledge We have considered a dedicated remote server, and web-based services (box.net, yousendit.com, onehub.com, filesanywhere.com) but I am unsure as per the direction we should be taking - have I left another solution out? What would you suggest? Thanks in advance.

    Read the article

  • tricks for speeding up tar while tarring up a huge directory of little files?

    - by Trevor Harrison
    I'm trying to tar up a directory that has about 3M tiny files in it. Tar is chugging along, but I'm thinking its going to take longer than I can wait. I'm wondering if telling tar to not store metadata (owner, group, perms) would reduce the churn on reading and re-reading this huge directory and maybe speed things up, and if there is a tar switch that does this. My initial perusal of the man page only gets me something like --no-xattrs, which looks like a start, but I was hoping someone had some specific knowledge.

    Read the article

  • First-class help desk solution? [closed]

    - by Andy Gregory
    A help desk, for larger companies is a place for centralized help within an enterprise to help the users of their products and services.Therefore,to find the solution that best fits your business requirements, it is important to research, examine, and compare help desk software. As far as I know,Hesk is an free helpdesk software with some limited features while h2desk can provide the hosted solution. But for my small business,i just need a web based help desk software which can provide ticket management and knowledge base faq. We need unlimited staff support. Maybe a freeware help desk software can not meet our needs. So,we are willing to pay for effective helpdesk solution. But it should be low cost. We have gotten two choice: iKode Helpdesk Nethelpdesk Our helpdesk team are tend to iKode Helpdesk. Any other efficient first-class help desk solution to share?

    Read the article

  • How do I scale EC2 and push out code / data to my instances?

    - by chris
    Unfortunately I only have a limited knowledge of server architecture, I come from a development background. I am looking to ensure my new app can scale properly using EC2. I currently have a T1.micro for development running Windows with SQL server 2008. The system allows students to come to our site to search for a mentor, update their profile with pictures and employment history etc. Roughly the same sort of work as a LinkedIn profile. I need this to be able to scale very quickly without wasted resources. I understand the following is important. Separation of data, application etc. I will achieve this I think by hosting images using S3, Database instance via RDS and upgrade the EC2 instance. My main question is: How do I push data / code out to multiple ec2 / RDS instances seamlessly?

    Read the article

  • 'Unlimited' free trial of Windows Server 2008 by deleting and reinstalling VM? [closed]

    - by MrVimes
    I am using Virtual Machine software (VirtualBox) to learn Windows Server 2008 R2 Network Infrastructure (70-642). Trouble is - I'm learning at an extremely slow pace and so the trial periods of my virtual machines are close to running out. If I delete the VMs then install WS2008R2 from scratch on new VMs is that violating the acceptable use policy of Microsoft? I am aware that I can extend the trial, but it seems I can only do that by 10 days at a time. Also I think having to re-install from scratch is a good way to reinforce the knowledge.

    Read the article

  • Windows Home Server restore causes computer to be removed from the domain?

    - by unknown (google)
    I restored my Dell M4400 that is a company laptop, and now I get an error when I try to log on and am connected to our corporate network, which says that the domain controller could not be found or that the computer is not part of the domain. Everyone else can log on, so it seems my computer is no longer part of the domain, even though it thinks it is per the settings. One thing of note: my computer crashed on 1/14/10, but I restored from a backup that was made on 12/20/09. So I am not sure if that made a difference? Also, I tried running "gpupdate" to update my group policy, but that did not seem to help. Any ideas? Seems like a bit of a flaw in the backup system for computers that are part of a domain. I guess I wanted to hear from someone with more knowledge about how a computer is recognized as part of a domain to know if this should be expected when doing a restore or if I should file a trouble ticket.

    Read the article

  • Application deployment with Puppet

    - by michaeltwofish
    I'm new to Puppet and while I've been using *nix systems for many years, I've never worked as a sysadmin or in ops. I'm currently writing Puppet manifests for hosting a set of (PHP/MySQL/MongoDB, code in git) web applications. Clearly Puppet needs to have some knowledge of the actual applications because I'll set up a virtual host for each one, but I'm not sure whether Puppet should be managing things like code deployment and database creation. Is Puppet an appropriate tool for application deployment? If not, can you recommend a more appropriate tool?

    Read the article

  • Good Choice of Memory for Asus K52F-BBR5

    - by Christopher Painter
    I recently purchased an Asus K52F-BBR5 notebook. It's a basic laptop with an Intel P6100 CPU and Mobile Intel® HM55 Express Chipset. It came with 3GB of DDR3 SODIMM memory and I'd like to expand it to 8GB. I'm a little confused by DDR3 nomenclature and not up to date on my knowledge of chipsets. I'd like to make a good choice when selecting memory for it. Crucial's database suggests using either a PC3-8500 with CAS 7 or a PC3-10600 with a CAS of 9. Is the 8500 better because of it's CAS 7 or will my chipset run the memory async at a higher speed and get better performance? Which would be a better choice for my chipset and CPU? Price difference is negligble.

    Read the article

  • Isn't ethernet used for LAN?

    - by Alraxite
    I'm not really knowledgeable about networking stuff, hence the stupid question. I read that ethernet was used for LAN connections but I'm pretty sure what I'm currently using to connect to the internet is 'ethernet'. The only knowledge that I have about networking is that there are two types of internet connections: Dial-up and broadband. And broadband can be either DSL or cable. So where does ethernet come from? The only thing I can tell is that I have a DSL model and there is an ethernet port at the back of it, a cable from which runs to a port in the back of my CPU. So, can ethernet be used to connect to the internet? Is it a subtype of DSL? I'm really confused about this, so I would really appreciate if someone could explain this to me. Also, I will apologize if this isn't the right place to ask.

    Read the article

  • How can an RSA key be placed in a "non-folder"?

    - by Phil
    I lack a lot of knowledge regarding the subject so please excuse me if my question is very ignorant. I just started out with RSA key authentication to my test-server. It did not work at the beginning and I tried and tried and re-tried to no avail. Then I realised, I was creating "mkdir ~/.ssh" and then "mkdir ~/.ssh/authorized_keys" before placing the id_rsa.pub into the latter folder, which did not work. My question is: How can id_rsa.pub be placed in "authorized_keys", which is not created by "mkdir" therefore not a folder? Thank you.

    Read the article

  • Hyperlinks in Windows Update window not working?!

    - by w3d
    The actual links in the Windows Update window to open the relevant knowledge base article have stopped working. They still look like links, but they just don't do anything anymore?! This started happening (or not happening!) during the last Windows Update (around 2010-10-23). At the time I believe the first link worked OK and all subsequent links did not!? In the recent Windows Update (today) no links work. I can copy and paste the text of the link into the browser and OK. Web-like links from all other applications work OK. Dec 2010 - Windows Update links still do not work. I guess this must be something specific to my machine as I've not seen it reported anywhere else?!

    Read the article

  • Are Virtual-Desktop Managers good or bad for system resources?

    - by jasondavis
    I am looking at Virtual-Desktop Managers for Windows 7. Right now it seems that VirtualWin is supposed to be about the best one available for use on Windows. I have never used anything like this though and I am just curious from others experience and knowledge, does something like this hog up a lot of system resources? I do not NEED it but it is a nice feature to have when I do want to use it, my PC's performance is more important then using it. So is virtual esktop managers a resource hog or probably not? Please share any tips/advice/ or comments on them, thank you =)

    Read the article

  • Store and Encrypt data over the internet.

    - by sotsec
    I am trying to build a system where I will be able to access my files remotely. I want to setup an external hard drive or a NAS that I will access over the internet, and I want every file that is stored on that system to be encrypted. Could you please suggest me what is the best way of doing that? Or if you have any knowledge, what is the best way to access your files remotely with maximum safety? but the same time the space that the files are allocated is protected against theft(encryption) etc. thank you

    Read the article

  • Accessing to shared folders with OpenVPN

    - by Ergec
    This is my first attempt to configure a vpn so I have very little knowledge about this. Network where centos server is having local IPs 192.168.123.* Network where windows machine is having local IPs 192.168.1.* I installed and configured my openpvn server on centos 5 and client on a windows machine. Generated all keys, certificates e.t.c and transferred them to client and I'm able to connect to server. Below there is a screenshot of the client log. Also on server side I can also see incoming packets with this command tcpdump -n port 1723 So I assume I did most of the things correct. But still when I try to open shared folders using \\192.168.123.33 or \\network-name I can't access folders

    Read the article

  • VPN between Cisco ASA 5505 AND Sonicwall SOHO3

    - by user41451
    Hello. I am trying to establish a site-to-site VPN tunnel between an old SOHO3 and an ASA 5505. The ASA has a static IP and the SOHO3 is dynamic. I have tried everything my limited knowledge lets me and need some advice on how to proceed! Phase 1 (according to the ASA logs) completes - followed by a message saying "All IPSec SA proposals found unacceptable!" so I guess the settings between the two don't match. I have played with various combinations and nothing seems to work - I am overlooking something, just not sure what it is! Any help would be appreciated.

    Read the article

  • I run about 100 small traffic websites, what host would you recommend (expansion is planned)?

    - by MALON
    I know there are plenty of suggestions like asmallorange, linode, etc, but how well do these apply to someone who is running 100 sites? Traffic can be anywhere from zero hits a month up to about 1,000. The host I'm using right now doesn't allow access to httpd.conf or other important apache features. If I had to guess, it seems like Linode or other services like it are right up my alley, however, I am not great with linux. I can get by alright in Ubuntu, but that's about it. Will this knowledge be enough to get by with Linode? What about domain name transfers? The way it works now for me is if someone has an existing site, I ask them to get the domain transfer code and then I send the domain name xfer code to my current host and they take care of the rest. Does Linode take care of domain name transfers? How do I do it?

    Read the article

  • Hosting-why should I pay? [on hold]

    - by user196919
    Can I avoid, eliminate or neutralize propagation? Hours of research for a first-time unregistered domain returned the usual suspects ("Oneandblank", "GoBlanky", "BlankCow", "HostBlank-or" and others)all with 24-72hr or more. Would a roll-your-own, inhouse SHO Linux/Winserver box help? Thank you so much! edit; navigating SF for my first time I now notice the "professionals" air and feel to the comments. Although I feel justified for being here(armed with directly relevant, well-rounded knowledge/proficiency/experience)I apologize for diving in headlong without proper post etiquette or correct placement. I envy each of you and hope to gain my own inviolable foothold in the coming years.

    Read the article

  • When connected to VPN through Windows 7 running under OS X via VMWare Fusion, does traffic from the OS X side go through the VPN?

    - by user1202747
    I only have a rudimentary knowledge of VPNs. My understanding is that, in most network configurations, when a client is connected remotely to a VPN server, all network traffic passes through the VPN server before going to the client, and all data coming from the client passes through the VPN server before going out over the wider Internet. I run Windows 7 using VMWare Fusion under OS X Lion. If I access a web page in Safari, say, on the OS X side of things, does that traffic pass through the VPN server? Or does it bypass it because the two OS's are regarded as separate network devices by my LAN? I would appreciate any insight anyone can provide. Thanks.

    Read the article

  • Clicking on a link in Chrome opens up Notepad

    - by jonsca
    I'm currently using Chrome 21.0.1180.89 on Windows 7, but I have noticed this behavior in other versions before. Probably about one time in a hundred, I will click on a link on a website and an instance of Notepad will open up with a blank page rather than the browser going to the link. To my knowledge, I have no malware or viruses on the machine that could be causing this. It's a minor annoyance, so I'm not very concerned about it, but I'm wondering if there could be a MIME type that's set wrong by default in the browser?

    Read the article

  • Seeking easy to use Setup creator with logic and ability to write registry keys

    - by Mawg
    I want to create a Setup to install my application. It as to be able to do the following: ask a question (maybe 2 radio buttons?) and, depending on the reply, copy one of 2 DLLs to the Windows directory and invoke regsvr to register the DLL write some registry keys I would code my own program to do this, but I don't have enough knowledge of the different versions of Windows (XP, Vista, 7, etc) and 32/64 bit, registry layout, or permissions like UAC, etc So, it seems to me that it would be easier to use a Setup generator which has been around for a while and already handles all of this stuff. I went to my favorite site for free stuff and found this page. However, the programs mentioned there are either too simplistic or have too steep a learning curve for me. Can anyone recommend a Goldilocks solution which does what I mentioned in those two bullet points while taking into account all Windows versions, 32/64 bit, non-admin accounts, etc?

    Read the article

  • What are the methods of separating network spaces in a LAN?

    - by dash17291
    Please detail me the methods. My thoughts: put the servers in separate (sub)networks the servers are forced to go through the firewall but no NAT is required assign more IP addresses to the internal interface of the server choosing gateway addresses from the clients and servers IP address ranges split DNS Netfilter/{iptables, ipset} could be heavily involved, I'm talking about Linux servers. See for example: Destination NAT Onto the Same Network from internal clients Please do not explain what is NAT or DNS. This is a theoretical question, but my poor English knowledge prevent me to describe it in a fancy fashion.

    Read the article

  • Does "I securely erased my drive" really work with Truecrypt partitions?

    - by TheLQ
    When you look at Truecrypt's Plausible Deniability page it says that one of the reasons for partition with solely random data is that you securely erased your drive. But what about the partition table with full disk encryption? How can you explain why the partition table says there's a partition of unknown type (With my limited knowledge of partition tables I think that they store all the partition filesystem types) and with solely random data? It seems that if your going to securely erase the drive you would destroy everything, including the partition table. And even if you just wiped the partition, the partition table would still say that the partition was originally NTFS, which it isn't anymore. Does the "I securely erased my drive" excuse still work here? (Note: I know that there's hidden truecrypt volumes, but I'm avoiding them due to the high risk of data loss)

    Read the article

  • Fresher in Linux administration [closed]

    - by user127452
    i am fresher in the administration field & i just got the job as a linux support executive,though i have basic knowledge of linux .. the server handling,configuring & network related issues are a new part for me.So i am confuse for where to start with the basic requirement that linux admin should know & how to & from where to study about it .. we hav a 6 working days for +9 hours each ..so it is not possible to join any RHCE course or classes .. so please help me regarding to this issue as the there was no proper handoff is done from previous employer ... & now there is a lot work pressure on me ... so please suggest me something ... :)

    Read the article

  • How to make vim display unicode

    - by Yitzchak
    I am trying to work with a utf-8 encoded xml file in vim 7.3 running on ubuntu. ASCII characters display normally but vim gives me gibberish instead of the unicode characters. After trying the following, I've reached the limits of my knowledge: 1) Checked that unicode was enabled by running set termencoding?. Output was termencoding=utf-8. 2) I installed the script from here (vim.org/scripts) 3) moved my ~/.vimrc file into ~/.vim 4) moved it back into ~ 5) followed the instructions in the accepted answer to this question. Is there some other variable I'm supposed to set? I know my system has the fonts I need. Update: Issue seems to be limited to html files for some reason.

    Read the article

  • Network flooded with seemingly empty packets

    - by Adam Particka
    Let me preface this with the fact that I'm just a web developer at my company with little networking knowledge. Earlier today there was a department that lost all of their network connections so I popped open Wireshark and observed the influx of packets to my machine. There was normal traffic (ARP requests, etc.) coming in at ~50 packets every second. Then all of a sudden the log was flooded with packets arriving ~5000 a second. It looks as though they all contain the same data, just a looped sequence. We have someone here looking at it but I thought I would ask if anyone had seen anything like this before. Here's a selection from one of the captures in Wireshark. http://www.cloudshark.org/captures/06f950725c74

    Read the article

< Previous Page | 74 75 76 77 78 79 80 81 82 83 84 85  | Next Page >