Search Results

Search found 17249 results on 690 pages for 'resource management'.

Page 147/690 | < Previous Page | 143 144 145 146 147 148 149 150 151 152 153 154  | Next Page >

  • Password manager solution: Symbian based phone and a Linux machine (Windows is not important, but wo

    - by Kent
    Hi, I currently use KeePassX to manage my passwords on my Linux (Xubuntu) machine. It's nice to have all the passwords encrypted, but sometimes I'd like to be able to tell a password when I'm on the run. Therefore I'm looking for a solution which I can synchronize with my phone. I have a Nokia N82 which is a Symbian OS v9.2 based phone for the S60 3rd Edition platform with Feature Pack 1. I like an open source solution if it's possible. In case it isn't I wouldn't mind paying for a good solution. If Windows may be added to the synchronization mix it's nice, but it's absolutely not a primary requirement (I don't even have any computer running Windows).

    Read the article

  • Anyone interested in obtaining a cable list from a visio Diagram? [closed]

    - by Alex
    it's my first post here. Just wondering if anyone had to deal with the following problem - you have to install over say a 100 network elements and servers - cabling is done via contractors, so you need to provide them with an accurate, error-free cable list - your inputs are a set of detailed, port by port, visio diagrams. Prb is to obtain the cable list and get the cabling started while you're busy crafting the switch/routers configs. I coded a Visio plugin, which I plan to release under the GNU license, that returns a cable list from a diagram, and tested it on intermediate size infrastructure, 2K+ cables. It works well. The tool needs a little work to be user friendly, so before getting started, I wanted to know if that was worth the effort. Questions are welcomed, let me know -A PS: the tool is targeted for those who need a port by port description of their network, in the form Source/slot/port/Destination/slot/port.

    Read the article

  • Fujitsu Siemens V6535 laptop doesn't wake up - crash when going into standby?

    - by marc
    I'm having trouble with my laptop (Fujitsu Siemens model V6535). It runs Windows 7, and after I upgraded from Vista I've noticed something that makes me really angry. When my laptop goes into Standby, the power LED changes to red and starts blinking (standby mode). When I push the power button to wake it up it, the blinking LED changes to green but nothing else happens. Nothing on the display, no HDD sound. When I press the power button for a few seconds and then try turn it on again, it doesn't display anything. I have to unplug the charger, shut it off, and power it on again without the power cable. Then it starts working. A few days ago I upgraded the BIOS to the newest version, but it doesn't help. Does anyone have any idea what can be wrong?

    Read the article

  • What requirements does an IT department work space need?

    - by Rob
    Hello all, i need to provide a list of workspace requirements to the IT director for my network operations team. So far I got Secure workspace - so nothing gets stolen and people cant come up to us asking for support (they need a ticket from the helpdesk) Quite area - so that we can work and not be disturbed by the loud project managers who play soccer in the office sometimes. A large table or desk where we can setup and or config systems and servers if needed. What else do we need? Thanks in advance.

    Read the article

  • Mount drive when symbolic link is accessed

    - by Danilo Campos
    I have a MacBook Pro with two internal drives: an SSD and a slow rotational drive. On the rotational drive I keep heavy, rarely accessed files like movies, photos, etc. These are symlinked from the SSD, so applications like iPhoto and iTunes will still find everything where they expect. I don't usually have the rotational drive mounted because it's loud and mostly unused. Is there a way to mount it when the system tries to access data behind a symlink, then unmount it automatically later? (Intermediate *nix user, here, feel free to tell me I am asking for magic.) Thanks for your help!

    Read the article

  • How can I make gitosis distinguish between two users with the same username

    - by bryan kennedy
    I have a gitosis system that seems to be working correctly except for a common problem we run into where I can't distingush permissions between two users who have the same username, but different hosts. For example: [email protected] 's SSH key is in the key folder. And so is [email protected] 's SSH is also in the key folder. These two jsmith's are two different people on two different computers. However, when I configure them in the gitosis.conf file with the usernames jsmith@computer or jsmith@machine, it seems like each user just gets the same permission. Can gitosis not distinguish the full username (name and host)? If not, how do I deal with multiple users accessing our system with common usernames? Thanks for any help.

    Read the article

  • Recommendations on managing dot files for users using Puppet

    - by Beaming Mel-Bin
    Goal is to have a collection of dot files (.bashrc, .vimrc, etc.) in a central location. Once it's there, Puppet should push out the files to all managed servers. I initially was thinking of giving users FTP access where they could upload their dot files and then having an rsync cron job. However, it might not be the most elegant or robust solution. Wanted to see if anyone else had some recommendations.

    Read the article

  • How can I use fetchmail (or another email grabber) with OSX keychain for authentication?

    - by bias
    Every fetchmail tutorial I've read says putting your email account password clear-text in a config file is safe. However, I prefer security through layers (since, if my terminal is up and someone suspecting such email foolery slides over and simply types "grep -i pass ~/.*" then, oops, all my base are belong to them!). Now, with msmtp (as opposed to sendmail) I can authenticate using the OSX keychain. Is there an email 'grabber' that lets me use Keychains (or at least, that lets me MD5 the password)?

    Read the article

  • Amazon EC2, fastest way to get a node into an existing cluster

    - by imaginative
    I'm new to Amazon AWS. A lot of the time I hear about people folks spawning instances and almost instantly putting them behind a load balancer and into an existing cluster. In the traditional world of managed machines, this would include provisioning hardware, installing an OS, configuring the network on the machine and once the network is available, use a tool of your choice such as CFengine, Puppet or Chef to bootstrap the machine based on its class. It seems like there are "shortcuts" that are able to get a server of a particular class up and running in Amazon EC2. If I have a particular stack running on my server, such as erlang, tomcat6 etc.. what's the fastest way to get these up and running and hooked into Amazon's load balancer? From network, to software stack to kernel tuning? Is it a combination of creating an AMI then running a tool like Puppet against the new instance? Any idea

    Read the article

  • Nginx Rate Limiting by Referrer?

    - by SteveEdson
    I've successfully set up rate limiting on IP addresses like so, limit_req_zone $binary_remote_addr zone=one:10m rate=1r/s; But I was wondering if its possible to do the same on referrers? For example, if a site gets placed in an iframe on a third party site, which generates too much traffic to handle. I can't find any nginx variables for the referrer anywhere. Is this possible? Or can the solution be achieved in a different way? Thanks.

    Read the article

  • Which tool do you use for your to-do list?

    - by howitzer
    I've been constantly switching tools that keep track of my to-do list: Online account in SimpleGTD To-do applet in my RSS aggregator Outlook's builtin Task List My cellphone's built-in to-do list Post-it notes on my monitors at home and at work Paper list in my wallet (thought about enhancing it and adding a pen like Jeff Atwood did) Which proved most useful for you?

    Read the article

  • Windows 7, weird/annoying explorer problem

    - by Shiki
    First of all, I'm asking the moderators if you could summarize my problem in the Title and modify it according to that. Thanks in advance and sorry, my english is not that good. The problem. It happened on two of my machines already. Once it happens there are many problems with explorer. I'll try to describe at precisely I just can. So. Basically when you create a new folder, you have to hit the enter key TWICE because first it'll throw an error that "there is no such file..". Okay. Then if you try to delete some, this happens also. Renaming is the same. Here is an example. I tried adding a "2" to the end of the folder name, hit enter and got this. Here I can press cancel, nothing happens. If I press retry, the popup disappears and it'll finally change the folder name. I can't come up with anything for this. Using BitDefender (registered, full protection), Windows 7 x86 Ultimate retail (boxed, english version). The other PC had the same anti-virus protection , but it have a Windows 7 x64. Both systems are activated, updated totally. I don't remember installing any new stuff on the PCs. All the stuff on the PCs are legal, no cracked / any other software present. It just happened, so to say. Already reinstalled the other PC because I thought * I * messed up something and its just something FUBAR. However, I dont want to reinstall my laptop also. Any ideas are welcome. (Today I had a strange bug. Windows Explorer had 1.0+gb memory usage with 100% cpu. Killed it, launched a new explorer.exe and thats all. Nothing changed, but it may worth a try. The other PC did NOT have this problem, ever.) Isn't there a registry fix for this or something? :/

    Read the article

  • System files not hidden Win XP

    - by ULTRA_POROV
    I recently copied my win xp install from one hard to another(via ubuntu live cd) Everything went well, except that all the hidden system files(boot.ini, ntdlr, io.sys) are no longer hidden. I tried this: attrib +s c:/IO.sys No effect. The files are still visible even though the setting to hide system files is checked. Any solutions? Thanks.

    Read the article

  • Sort files in folders by size (Mac OS X)

    - by Željko Filipin
    I have a folder full of folders and files. I want to sort files by size (so I could remove the largest files). I know how to do that in Windows Explorer, but I can not find a way to do it in Mac OS X Finder. Windows 2003: open folder in Windows Explorer click button Search leave Search for files or folders named and Containing text text fields empty click button Search Now sort by size Is there a way to do something like this in Finder on Mac OS X?

    Read the article

  • How to prevent windows from being resized?

    - by endolith
    Adobe Audition is really stupid in that when you change the size of the window, and then change it back to the original size, all the frame positions are lost and you have to tediously reposition them by hand. I'd like to make it completely impossible to ever resize the window, just keep it maximized at all times. If I accidentally click "Restore" or drag the title bar, it should either ignore it, or move around the screen while staying the same size. Is there any way to do this?

    Read the article

  • How can I correlate a wall jack to a user/machine on the domain?

    - by harryfino
    After reading Valve's new employee handbook, I was really interested in setting up a company map like they described on page 6: "The fact that everyone is always moving around within the company makes people hard to find. That’s why we have http://user — check it out. We know where you are based on where your machine is plugged in, so use this site to see a map of where everyone is right now." What I'm trying to figure out is: how I can tell which machine or domain user (either will do) is connected to a particular wall jack?

    Read the article

  • How do you keep track of applications for specific purposes

    - by The Journeyman geek
    I tend to have a handful of 'core' applications that cover most of what i need. On the other hand, there tend to be some programmes that i need once in a blue moon, and i'm finding that i'm forgetting what they are. At one point i had a wiki for it, but i'm curious how other people handle the problem. So, what's the means that you use to keep a database or other record of rarely used, but useful applications?

    Read the article

  • Parse/Edit Apache conf files with Ruby?

    - by Josh
    I need to write some scripts to make changes to Apache conf files, namely to add/update VirtualHosts. I plan on doing this in Ruby. before I write my own, are there any scripts/rubygems which allow Ruby to parse/modify Apache conf files, specifically <VirtualHost> directives?

    Read the article

  • Push Windows Updates?

    - by Edge
    Is there a method or software that will allow the ability to push windows updates to clients in an non-active directory environment? WSUS is not an option for the situation as it doesn't have the ability to push the updates to the clients, only for the clients to pull updates.

    Read the article

  • Work Time Start / Stop Tracking Software

    - by Shaharyar
    Is there a software that allows you to keep track of someones working time digitally? We are growing to an extent where we work remotely and we would like to have fixed working times. All it should do is kind of register when someone starts working (i.e. someone needs to login somewhere or set a flag.. really it could be anything) Do you have any ideas?

    Read the article

  • Why did my laptop turn off?

    - by darenw
    Normally I can slip my running laptop into a backpack, go somewhere, and if it's no more than about half an hour later, it'll still be running. At the destination I plug in the AC power unit and all is well. I run it off of the AC unit before and after the trip, have the screen at less than full backlight brightness, and don't have any peripherals that burn power. Sometimes the wireless switch accidentally slides in the backpack, and that causes extra power to be used and the laptop dies before I reach the destination. Sad, but so be it. But sometimes the wireless switch is off, I've reached the destination in less than 30 minutes (typically 10-20 min), and I know the battery was fully charged, yet the machine is off. Is there a way to determine, after the fact, why the machine shut itself off? I'm running Linux on a fairly powerful Gateway with 4GB RAM, fancy nvidia graphics, dual core cpu, chosen more for number crunching power than battery life, but should last easily for half an hour if not an hour.

    Read the article

< Previous Page | 143 144 145 146 147 148 149 150 151 152 153 154  | Next Page >