Search Results

Search found 22835 results on 914 pages for 'applications menu'.

Page 93/914 | < Previous Page | 89 90 91 92 93 94 95 96 97 98 99 100  | Next Page >

  • .NET applications sometimes doesn’t work on Windows CE

    - by KZChris
    Hi, I write applications for Windowe ME and CE in C# .NET 2.0. Sometimes I’ve got problems because applications don’t work on some navigation devices. On Windowe ME it is not problem because .NET can be installed from a cab, but on most Windows CE devices it is impossible because after soft reset all changes disappear. I found out that in most difficult cases good solution is to put all dll-s belonging to .NET installation cab in the folder where the application runs and everything work well. However there are some devices for example Navroad NR460 (Windows CE 5.0) on which none of .NET applications work (it is funny because previous and next version of that navigation works well). I didn’t found on this device cgacutil.exe program. Is this possible to force the device to run any .NET application without installing the Windows again? What should I try to do to check if running .NET a applications is possible? What conditions should be fulfilled to run easiest application written even in .NET 1.0

    Read the article

  • Adding my own items to Long Click on Text Box menu on android

    - by Boardy
    Hi all, I am currently developing an application for android. I'm not sure if this is possible but here it goes. When the user clicks and holds on a text box whether it is a website or a piece of software a menu is displayed which shows paste and input method. What I want to be able to do is add my own items to this menu and when the user clicks on my item it will load my app, they can select an item from a list view. It will then copy the contents and automatically paste it into the text field the user selected. Thanks for your help in this matter

    Read the article

  • Having two backgrounds for an active menu item?

    - by HollerTrain
    Hi I have a dynamic menu where the ul li items change in width depending on the text set in the CMS (Joomla). They want the menu item, on mouse over, to both have 1. a repeated background image and 2. an image placed at the top (http://screencast.com/t/Zjk4YTJmNGQ). Now, I'm great with doing the repeated background image on a mouse over and that would be great, but I am not sure how to get both of these images in one css declaration. Any help would be greatly appreciated, as I haven't learned this technique yet :(

    Read the article

  • Secure Menu Items Based on User

    - by Mike Wills
    On this winform application I am writing, I want to secure one menu item from most users. It runs a month-end and cannot be easily backed out if accidentally run. The menu option opens up a window to prompt the user for some information before processing. I don't care where exactly I do the check, but I want to be sure only certain users can run this function. A Google search (on my question title above) didn't turn up anything obvious. Can anyone point me in a direction to pick up who is signed into Windows and how to check if they are authorized?

    Read the article

  • Drop down menu like the default iPad application menus

    - by Ryan French
    Hi Everyone, I'm currently working on my first iOS application to run on the iPad, and I've come across a problem. I have been asked to implement menu's similar to the ones in the default applications such as when you click on the "Calendars" button in the top left of the calendars app. Only issue is, I cant seem to find a standard UI object that looks like these, with the arrow connecting the menu to the button etc. Is this a standard UI component that I should be able to use, or will I have to imitate them by creating a custom object? Thanks for any help.

    Read the article

  • Changing Menu name

    - by Abu Hamzah
    Its too much code to paste here so, I have created demo please have a look at this DEMO My question is, I'm trying to change the name of the Menu from "Home" to "My Home" its quite very simple but I have already spent good amount of time figuring out but no avail.... Yes, I have debugged using firebug too... //html <div class="wrapper"> <div class="wrap"> <div class="header"> <ul class="menu"> <li class="home"><a href="" title="Downloads" class="title">My Home</a></li> <li class="genres"><a href="#" class="title">TEST 123</a></li> </ul> </div> </div> </div> //css: please see the demo

    Read the article

  • iPhone/IPod App Desktop Emulator

    - by Bill Sevil
    I want to sell my iPod Touch and buy an Andriod-based phone. However, there are some apps that I have paid for that are only from the iTunes app store where there is no good alternative on Andriod systems (eg. language learning apps with thousands of words, "references" applications). Is there a program to emulate the apps that I have already purchased (the ones in my \iTunes\iTunes Media\Mobile Applications directory) and play them on my desktop?

    Read the article

  • SAP ouvre son "SAP Store pour Mobiles" et lance une nouvelle vague d'applications professionnelles en versions nomades

    SAP ouvre son "SAP Store pour Mobiles" Et lance une nouvelle vague d'applications professionnelles en versions nomades SAP et Sybase, filiale de SAP, dévoilent aujourd'hui une nouvelle vague d'applications mobiles critiques, qui s'étendent des applications fondées sur des processus jusqu'à celles pour les consommateurs finaux. « Les nouvelles applications ouvrent à la mobilité des fonctions métiers clés », se félicite SAP qui a fait de la mobilité un des trois piliers de sa stratégie avec le Cloud et le In-Memory Computing . Le but de l'éditeur allemand est de proposer aux utilisateurs « dans leur cadre...

    Read the article

  • Oracle Fusion Supply Chain Management (SCM) Designs May Improve End User Productivity

    - by Applications User Experience
    By Applications User Experience on March 10, 2011 Michele Molnar, Senior Usability Engineer, Applications User Experience The Challenge: The SCM User Experience team, in close collaboration with product management and strategy, completely redesigned the user experience for Oracle Fusion applications. One of the goals of this redesign was to increase end user productivity by applying design patterns and guidelines and incorporating findings from extensive usability research. But a question remained: How do we know that the Oracle Fusion designs will actually increase end user productivity? The Test: To answer this question, the SCM Usability Engineers compared Oracle Fusion designs to their corresponding existing Oracle applications using the workflow time analysis method. The workflow time analysis method breaks tasks into a sequence of operators. By applying standard time estimates for all of the operators in the task, an estimate of the overall task time can be calculated. The workflow time analysis method has been recently adopted by the Applications User Experience group for use in predicting end user productivity. Using this method, a design can be tested and refined as needed to improve productivity even before the design is coded. For the study, we selected some of our recent designs for Oracle Fusion Product Information Management (PIM). The designs encompassed tasks performed by Product Managers to create, manage, and define products for their organization. (See Figure 1 for an example.) In applying this method, the SCM Usability Engineers collaborated with Product Management to compare the new Oracle Fusion Applications designs against Oracle’s existing applications. Together, we performed the following activities: Identified the five most frequently performed tasks Created detailed task scenarios that provided the context for each task Conducted task walkthroughs Analyzed and documented the steps and flow required to complete each task Applied standard time estimates to the operators in each task to estimate the overall task completion time Figure 1. The interactions on each Oracle Fusion Product Information Management screen were documented, as indicated by the red highlighting. The task scenario and script provided the context for each task.  The Results: The workflow time analysis method predicted that the Oracle Fusion Applications designs would result in productivity gains in each task, ranging from 8% to 62%, with an overall productivity gain of 43%. All other factors being equal, the new designs should enable these tasks to be completed in about half the time it takes with existing Oracle Applications. Further analysis revealed that these performance gains would be achieved by reducing the number of clicks and screens needed to complete the tasks. Conclusions: Using the workflow time analysis method, we can expect the Oracle Fusion Applications redesign to succeed in improving end user productivity. The workflow time analysis method appears to be an effective and efficient tool for testing, refining, and retesting designs to optimize productivity. The workflow time analysis method does not replace usability testing with end users, but it can be used as an early predictor of design productivity even before designs are coded. We are planning to conduct usability tests later in the development cycle to compare actual end user data with the workflow time analysis results. Such results can potentially be used to validate the productivity improvement predictions. Used together, the workflow time analysis method and usability testing will enable us to continue creating, evaluating, and delivering Oracle Fusion designs that exceed the expectations of our end users, both in the quality of the user experience and in productivity. (For more information about studying productivity, refer to the Measuring User Productivity blog.)

    Read the article

  • Plus d'un tiers des bibliothèques open source ont des vulnérabilités connues, 80% du code des applications repose sur celles-ci

    Plus d'un tiers des bibliothèques open source ont des vulnérabilités connues 80% du code des applications repose sur celles-ci, selon un rapport de Sonatype 80% du code des applications reposent sur celles-ci, selon un rapport de Sonatype De nombreuses entreprises utilisent des composants et des bibliothèques open source contenant des vulnérabilités pour la conception de leurs applications, selon un rapport mené conjointement par l'éditeur de logiciels Sonatype et la firme de sécurité Aspect Security. L'entreprise Sonatype fournit un gestionnaire de version centralisé, hébergé pour plus de 300 000 bibliothèques qui sont téléchargées pour des applications ou des solutions open...

    Read the article

  • Android : la publicité menace la vie privée des utilisateurs, la moitié des applications intègrent des bibliothèques publicitaires douteuses

    Vie privée : plus de la moitié des applications Android intègrent des bibliothèques publicitaires permettant d'accéder aux données personnelles et de tracer les utilisateurs La publicité dans les applications sur Google Play (anciennement Android Market) pourrait causer des risques à la sécurité des utilisateurs et de leur vie privée. Le constat a été fait dans deux études séparées des chercheurs de l'université de la Californie du Nord et de l'université Purdue dans l'Indiana. En analysant 100 000 applications de la galerie officielle Android, les chercheurs ont constaté que plus de la moitié de celles-ci contenaient des bibliothèques publicitaires et 297 applications ...

    Read the article

  • Vie privée : plus de la moitié des applications Android intègrent des bibliothèques publicitaires pouvant menacer la securité des utilisateurs

    Vie privée : plus de la moitié des applications Android intègrent des bibliothèques publicitaires permettant d'accéder aux données personnelles et de tracer les utilisateurs La publicité dans les applications sur Google Play (anciennement Android Market) pourrait causer des risques à la sécurité des utilisateurs et de leur vie privée. Le constat a été fait dans deux études séparées des chercheurs de l'université de la Californie du Nord et de l'université Purdue dans l'Indiana. En analysant 100 000 applications de la galerie officielle Android, les chercheurs ont constaté que plus de la moitié de celles-ci contenaient des bibliothèques publicitaires et 297 applications ...

    Read the article

  • Le Windows Phone Store passe les 125.000 applications avant le lancement de Windows Phone 8, la France 3ème galerie mondiale

    Windows Phone Marketplace franchit la barre des 100 000 applications En 20 mois contre 24 pour Google Play Mise à jour du 6 juin 2012 par Idelways Un grand jour pour le système d'exploitation mobile de Microsoft. Windows Phone Marketplace franchit la barre des 100 000 applications et rejoint le club très fermé des galeries d'applications à 6 chiffres. En 20 mois, 313 applications ont été soumises en moyenne chaque jour. En terme de croissance, le Marketplace arrache donc une place entre Google Play (

    Read the article

  • Windows Phone Marketplace franchit la barre des 100 000 applications en 20 mois contre 24 pour Google Play

    Windows Phone Marketplace franchit la barre des 100 000 applications En 20 mois contre 24 pour Google Play Mise à jour du 6 juin 2012 par Idelways Un grand jour pour le système d'exploitation mobile de Microsoft. Windows Phone Marketplace franchit la barre des 100 000 applications et rejoint le club très fermé des galeries d'applications à 6 chiffres. En 20 mois, 313 applications ont été soumises en moyenne chaque jour. En terme de croissance, le Marketplace arrache donc une place entre Google Play (

    Read the article

  • LEONARDI Application Suite 8.9 disponible, l'environnement open source de W4 pour les applications métier étend ses fonctionnalités

    LEONARDI Application Suite 8.9 disponible l'environnement open source de W4 pour les applications métier étend ses fonctionnalités LEONARDI Application Suite, la suite logicielle complète, fondée sur un framework open-source, pour créer et faire vivre des applications sur mesure suivant l'approche "Model Driven", évolue pour répondre aux besoins des utilisateurs. Application Suite 8.9, la dernière mise à jour de l'outil étend ses fonctionnalités au niveau conception, améliore l'ergonomie finale des applications, tout en renforçant leur qualité et en augmentant leur interopérabilité. Concernant l'aspect fonctionnel, le concepteur d'applications dispose d...

    Read the article

  • Android : Google veut améliorer la qualité des applications pour tablettes, l'éditeur donne ses consignes pour cibler les écrans larges

    Google veut améliorer la qualité des applications Android pour tablettes l'éditeur donne ses consignes pour mieux cibler les écrans larges Contrairement à l'App Store d'Apple qui distingue clairement les applications pour iPhone de celles destinées à l'iPad, l'écosystème de Google permet la publication d'une seule application pouvant fonctionner à la fois sur tablettes et smartphones. L'essor d'Android dans le domaine du mobile étant plus considérable que sur le marché des tablettes, les développeurs créent des applications pour mobile avant d'y apporter quelques améliorations pour le support des tablettes. Conséquence : Google Play se retrouve avec des applications maladro...

    Read the article

  • SSL certificates and types for securing your websites and applications

    - by Mit Naik
    Need to share few information regarding SSL certificates and there types, which SSL certificates are widely used etc. There are several SSL certificates available in the market today inorder to secure your domains, multiple subdomains, your applications and code too. Few of the details are mentioned below. CheapSSL certificates available today are Standard Rapidssl certificate, Thwate SSL 123 etc certificates which are basic level certificates. Most of these cheap SSL certificates are domain-validated only and don't provide the greatest trust for your customers. This means you shouldn't use cheap SSL certificates on e-commerce stores or other public-facing sites that require people to trust the site. EV certificates I found Geotrust Truebusinessid with EV certificate which is one of the cheapest certificate available in market today, you can also find Thwate, Versign EV version of certificates. Its designed to prevent phishing attacks better than normal SSL certificates. What makes an EV Certificate so special? An SSL Certificate Provider has to do some extensive validation to give you one including: Verifying that your organization is legally registered and active, Verifying the address and phone number of your organization, Verifying that your organization has exclusive right to use the domain specified in the EV Certificate, Verifying that the person ordering the certificate has been authorized by the organization, Verifying that your organization is not on any government blacklists. SSL WILDCARD CERTIFICATES, SSL Wildcard Certificates are big money-savers. An SSL Wildcard Certificate allows you to secure an unlimited number of first-level sub-domains on a single domain name. For example, if you need to secure the following websites: * www.yourdomain.com * secure.yourdomain.com * product.yourdomain.com * info.yourdomain.com * download.yourdomain.com * anything.yourdomain.com and all of these websites are hosted on the multiple server box, you can purchase and install one Wildcard certificate issued to *.yourdomain.com to secure all these sites. SAN CERTIFICATES, are interesting certificates and are helpfull if you want to secure multiple domains by generating single CSR and can install the same certificate on your additional sites without generating new CSRs for all the additional domains. CODE SIGNING CERTIFICATES, A code signing certificate is a file containing a digital signature that can be used to sign executables and scripts in order to verify your identity and ensure that your code has not been tampered with since it was signed. This helps your users to determine whether your software can be trusted. Scroll to the chart below to compare cheap code signing certificates. A code signing certificate allows you to sign code using a private and public key system similar to how an SSL certificate secures a website. When you request a code signing certificate, a public/private key pair is generated. The certificate authority will then issue a code signing certificate that contains the public key. A certificate for code signing needs to be signed by a trusted certificate authority so that the operating system knows that your identity has been validated. You could still use the code signing certificate to sign and distribute malicious software but you will be held legally accountable for it. You can sign many different types of code. The most common types include Windows applications such as .exe, .cab, .dll, .ocx, and .xpi files (using an Authenticode certificate), Apple applications (using an Apple code signing certificate), Microsoft Office VBA objects and macros (using a VBA code signing certificate), .jar files (using a Java code signing certificate), .air or .airi files (using an Adobe AIR certificate), and Windows Vista drivers and other kernel-mode software (using a Vista code certificate). In reality, a code signing certificate can sign almost all types of code as long as you convert the certificate to the correct format first. Also I found the below URL which provides you good suggestion regarding purchasing best SSL certificates for securing your site, as per the Financial institution, Bank, Hosting providers, ISP, Retail Merchants etc. Please vote and provide comments or any additional suggestions regarding SSL certificates.

    Read the article

  • IIS7.5 Windows Authentication missing providers menu item (ntlm)

    - by Alex
    Hello, I'm trying to enable NTLM authentication on a Windows Server 2008 R2 machine with IIS 7.5 for a specific file in my web root. I've been following these instructions http://docs.moodle.org/en/NTLM_authentication#IIS_Configuration In the IIS Manager I open the Authentication module, disable anonymous authentication and enable Windows Authentication however according to every post I can find on the matter I should have a 'providers' option appear but I don't. I've double checked in Server Manager that the 'Windows Authentication' security feature is enabled for IIS. Any help anyone can offer would be great, Thank you!

    Read the article

  • Clustering/load balancing for cluster unaware applications

    - by AaronLS
    Forgive me if I use any of these terms incorrectly. I am wondering if there is any kind of software that would allow my two "join" two computers together such that a cluster unaware application could utilize their combined computing resources? By "cluster unaware" I mean an application that isn't designed to share work across multiple services. My understanding is that clustering is enabled by the specific application by it's architecture, such that messaging with multiple instances of the application coordinate the sharing of work. Instead I am looking for something that enables clustering at the OS or virtualization level, so that any application could essentially be clustered. Failing that, I am also wondering about the following scenario: We have 3 different applications we will call A, B, and C. We have 2 single core computers. At any given time lets say that any combination of those applications will be CPU intensive. In cases where only 2 of those apps are very active, have one of them moved over to a different server. In a nutshell, some sort of dynamic automatic shuffling of the application's load. I have heard of virtual machines that can be migrated across physical machines while live, but I am wondering if this can be done automatically in response to an application's or VM's CPU activity?

    Read the article

  • Taskbar Network "Repair" menu option gone in Windows 7

    - by JohnB
    I used to LOVE that feature in Windows XP! Just right-clicked on the WiFi icon on the Taskbar (lower right-hand corner), then Repair. It doesn't take that long, and it usually helped me since I constantly go back and forth between LAN at work, VPN on WiFi from work and home, and also VPN to my own personal server. Even if you didn't need to refresh, doing so never hurts! Unfortunately, the feature seems to be removed from Win7 :( Now you can check for problems, but it only does the refresh if it thinks it needs too, and the whole process tasks so darn long! Is there a way to Repair my WiFi connection quickly and easily on Win7?

    Read the article

  • IIS7.5 Windows Authentication missing providers menu item (ntlm)

    - by Alex Bilbie
    I'm trying to enable NTLM authentication on a Windows Server 2008 R2 machine with IIS 7.5 for a specific file in my web root. I've been following these instructions http://docs.moodle.org/en/NTLM_authentication#IIS_Configuration In the IIS Manager I open the Authentication module, disable anonymous authentication and enable Windows Authentication however according to every post I can find on the matter I should have a 'providers' option appear but I don't. I've double checked in Server Manager that the 'Windows Authentication' security feature is enabled for IIS. Any help anyone can offer would be great, Thank you!

    Read the article

  • Bind "media" keys on MacBook keyboard to application menu items

    - by Austin
    Currently, I am using PandoraBoy to listen to my Pandora stations. In the preferences, it allows you to set global hotkeys to control playing, like/dislike, volume, stations, etc. What I would like to do is allow the built-in media keys on my MacBook Pro's keyboard (F7-F12: Previous, Play/Pause, Next, Mute, Volume Up, Volume Down) to control PandoraBoy like they do iTunes. Right now, I am using Command-F(7-12) to control it, but that requires me to hold down the "fn" and command keys Is there a way to bind these commands to the media keys without needing to function-shift them?

    Read the article

  • Converting legacy GRUB menu entries to GRUB 2

    - by WindowsEscapist
    I would like to change an entry for a solution to boot from CD from legacy grub (looks like title bla bla bla) to an entry to a format compatible to grub 2 (the one that looks like menuentry "bla bla bla" {. The original legacy GRUB entry is as follows: title Boot From CD/DVD Drive kernel /boot/grub/memdisk.din initrd /boot/grub/sbootmgr.dsk Is there any sort of conversion rule to change this to something like the example I've put here on the next line? (This is from my precise's grub.cfg.) menuentry 'Ubuntu, with Linux 3.2.0-25-generic' --class ubuntu --class gnu-linux --class gnu --class os { recordfail gfxmode $linux_gfx_mode insmod gzio insmod part_msdos insmod ext2 set root='(hd0,msdos8)' search --no-floppy --fs-uuid --set=root efc87ac0-daac-4a32-9a85-ea57beff0e28 linux /boot/vmlinuz-3.2.0-25-generic root=UUID=efc87ac0-daac-4a32-9a85-ea57beff0e28 ro quiet splash acpi_osi= $vt_handoff initrd /boot/initrd.img-3.2.0-25-generic }

    Read the article

  • Ubuntu most menu items dark-on-dark

    - by krzysz00
    Since to ubuntu 10.04 upgrade move of my drop-down menus have been dark-on-dark text, which becomes readable (changed background) when selected. I don't know what's causing this but it's a problem on Ambience and Radiance both. Any hints?

    Read the article

< Previous Page | 89 90 91 92 93 94 95 96 97 98 99 100  | Next Page >