Search Results

Search found 32459 results on 1299 pages for 'internet connection'.

Page 290/1299 | < Previous Page | 286 287 288 289 290 291 292 293 294 295 296 297  | Next Page >

  • Will the netinstall (minimal) work with a USB cellular modem?

    - by Z9iT
    Installing Ubuntu minimal is extremely easy when the system has a LAN card and connected to internet via Cable & Router... I Recently came across a situation where I needed to install Ubuntu Minimal on a system which wash not having a LAN card and cable internet anywhere around... The only access to the internet was through a USB Plug n Play Data-Card Modem. May anyone suggest something so that I may install Ubuntu Minimal using USB Modem as the only source of Internet, if it's possible at all?? (This relates to Ubuntu 12.04 in specific)

    Read the article

  • .NET DAL and arhitecture

    - by Parhs
    I have seen lots of articles but none really help me. That is because I want to use dapper as a DAL. Should I create repositories with special functions? Like getStaffActive()? If I use repositories I can implement with dapper-extension a generic crud I have no idea how to handle database connection. Where to open the connection? If I do this at every function then how am I supposed to use transaction scope? Somehow the repositories I work with should share a connection in order transaction to work. But how to do this? Openning connection in BLL? If I use queries and execute them directly then still the same thing.

    Read the article

  • L'ICANN distribue les dernièrs lots d'adresses IPv4, la pénurie est proche et toucherait l'Asie en premier

    L'ICANN distribue les dernières plages d'adresses IPv4 La pénurie d'adresses Internet est proche et touchera l'Asie en premier Mise à jour du 04/02/2011 par Idelways L'IANA, l'autorité en charge de la gestion de l'espace d'adressage IP composante de l'ICANN, vient de livrer les dernières adresses IPv4. Elle a en effet annoncé la fin imminente de l'ère IPv4 lors d'une cérémonie organisée hier à Miami. « C'est un tournant majeur dans le développement continu de l'Internet », a déclaré Rod Beckstrom, Président directeur général de l'ICANN, l'autorité suprême de régulation de l'Internet, lors de la cérémonie.

    Read the article

  • How to download apps from different OS to USB and then transfer to Ubuntu?

    - by kb67
    I just installed Ubuntu on my old desktop computer, and I have to say—I freaking love it! Except at the moment I do not have internet connection (i'm using a unsecured connection) and i'm using my Windows 7 Laptop to get a connection to the web. I would love to install some useful apps on the desktop, but I can't figure out how to do this, is there any way to download Ubuntu/Linux apps on my windows computer and put them into a USB then transfer to the desktop?

    Read the article

  • Kubuntu won't go into suspend mode while connected to network

    - by PaulW2U
    I'm currently testing Kubuntu 11.04 but I don't think this is a bug regarding what I appreciate is still an alpha version. After extensive searching of various forums and websites I found something that made me suspect that the reason I could not go into suspend mode was due to the fact that my network connection was still active. I found that if I unmount my network connection then I can go into suspend mode without any problem. I then have to remember to mount the connection when I next use the PC. Am I missing a program or setting? Is there a config file that I can edit? How can I fix this so that my network connection is broken and remade at the appropriate time? I haven't found any indication that a bug has been reported relating to this. Thanks in advance.

    Read the article

  • How to create a VPN between a Host and VMWare VMs?

    - by Anindya Chatterjee
    I have a set of machines as follows My home laptop running Win7 Ultimate with internet connection. A vmware workstation vm running Windows Server 2003 Standard edition server in my laptop w/o internet connectivity Some of my peers' machines connected to internet I want to create a VPN with these machines, provided the VM will not have any direct internet connection and my peers should able to connect to the SVN server application running on this Win2003 server VM. Can anybody please suggest me how to setup this network, what software I need to install in both physical machine and vm, what kind of network connectivity should be there between vmware guest and host machine? EDIT: I deliberately don't want to connect the VM with internet. The host will work more of a gateway of the VPN connection for the VM.

    Read the article

  • WSS V3 and connections to it’s internal database

    - by ptahiliani
    Have you ever wanted to connect to the “Windows Internal” database that WSS V3 uses? While “Windows Internal Database” is Microsoft SQL Server 2005 in a limited edition (just like MSDE, WMSDE before it), the familiar access tools to the DB went missing, and connecting using standard ways doesn’t work either. It doesn’t work right out of the box. First, you need SQL Management Studio Express. Install and start it. Specify the following connection string: \\.\pipe\mssql$microsoft##ssee\sql\query Please note that, as implied by the connection string, this connection only works locally. If you are looking for the connection string than here it is: “Provider=Sqloledb;Data Source=\\.\pipe\MSSQL$MICROSOFT##SSEE\sql\query;Database=SUSDB;Trusted_Connection=yes”

    Read the article

  • Search Engine Optimization and SEO Services - What Do They Offer?

    Search engine optimization involves using the Internet as a marketing tool. Companies that are using the Internet to attract customers desire to optimize their exposure to potential to customers. In order to best advantage of SEO, it is recommended that you hire a professional service that can implement programs to evaluate the optimum marketing potential of the Internet. When considering hiring a company to assist you in this process it is important to understand how such services work.

    Read the article

  • Creating database connections - Do it once or for each query?

    - by webnoob
    At the moment I create a database connection when my web page is first loaded. I then process the page and run any queries against that conection. Is this the best way to do it or should I be creating a database connection each time I run a query? p.s It makes more sense to me to create 1 connection and use it but I don't know if this can cause any other issues. I am using C# (ASP.NET) with MSSQL.

    Read the article

  • Can I use my prepaid phone balance (in pesos) to buy from the Software Centre?

    - by obetus
    Using local network broadband, we can use it to buy games and applications from load balance. Is there any possible ways to use it also in Ubuntu software Center? additional: I'm using mobile broadband for the internet connection,this broadband has a sim card and account number where you can download money from buying a prepaid card worth 100 pesos,300 pesos or 500 pesos, provided by our local network. We use this mobile broadband when there is no wifi connection. There are two kinds of mobile broadband, one is postpaid account and the other is prepaid account. I use prepaid account, this kind of account can load a money for transaction like data plans, from 10 pesos for 30 minutes internet connection or 200 pesos for 5 days internet connection., and this prepaid account can load 5 pesos up to thousands of pesos. Now, if this prepaid mobile broadband can provide money in pesos and has internet connection, I think it can also use it for buying goods or applications or games via internet. i think its only need a software that can detect the sim card number and the money balance for transactions. Sorry for my bad english but I hope you got my point.

    Read the article

  • Concurrent wireless and wired network

    - by Stew Megaw
    Hi, I am concerned with maintaining a wireless and wired network connection on my laptop. Basically I can change the metric on each interface so that Windows prefers one connection over the other. I am wondering is following scenario possible.... Some applications uses the wireless while other applications use the wired... I want Internet Explorer (only) to use the wireless connection while Outlook and everything else uses the wired connection. Perhaps adding some lines to the routing table might work? - Adding the ip addresses of websites I want to view via the wireless connection? Many Thanks in advance for any replies!

    Read the article

  • Inexpensive SEO Tips

    Search engine optimization or SEO is the best way to guide targeted traffic to your internet site. This maximizes the benefits of a correctly optimized web site will yield lots of income for the internet marketer. Conversely, optimizing your internet site might cost you 1000's of dollars if you are not skilled in this area.

    Read the article

  • Data Source Security Part 2

    - by Steve Felts
    In Part 1, I introduced the default security behavior and listed the various options available to change that behavior.  One of the key topics to understand is the difference between directly using database user and password values versus mapping from WLS user and password to the associated database values.   The direct use of database credentials is relatively new to WLS, based on customer feedback.  Some of the trade-offs are covered in this article. Credential Mapping vs. Database Credentials Each WLS data source has a credential map that is a mechanism used to map a key, in this case a WLS user, to security credentials (user and password).  By default, when a user and password are specified when getting a connection, they are treated as credentials for a WLS user, validated, and are converted to a database user and password using a credential map associated with the data source.  If a matching entry is not found in the credential map for the data source, then the user and password associated with the data source definition are used.  Because of this defaulting mechanism, you should be careful what permissions are granted to the default user.  Alternatively, you can define an invalid default user to ensure that no one can accidentally get through (in this case, you would need to set the initial capacity for the pool to zero so that the pool is populated only by valid users). To create an entry in the credential map: 1) First create a WLS user.  In the administration console, go to Security realms, select your realm (e.g., myrealm), select Users, and select New.  2) Second, create the mapping.  In the administration console, go to Services, select Data sources, select your data source name, select Security, select Credentials, and select New.  See http://docs.oracle.com/cd/E24329_01/apirefs.1211/e24401/taskhelp/jdbc/jdbc_datasources/ConfigureCredentialMappingForADataSource.html for more information. The advantages of using the credential mapping are that: 1) You don’t hard-code the database user/password into a program or need to prompt for it in addition to the WLS user/password and 2) It provides a layer of abstraction between WLS security and database settings such that many WLS identities can be mapped to a smaller set of DB identities, thereby only requiring middle-tier configuration updates when WLS users are added/removed. You can cut down the number of users that have access to a data source to reduce the user maintenance overhead.  For example, suppose that a servlet has the one pre-defined, special WLS user/password for data source access, hard-wired in its code in a getConnection(user, password) call.  Every WebLogic user can reap the specific DBMS access coded into the servlet, but none has to have general access to the data source.  For instance, there may be a ‘Sales’ DBMS which needs to be protected from unauthorized eyes, but it contains some day-to-day data that everyone needs. The Sales data source is configured with restricted access and a servlet is built that hard-wires the specific data source access credentials in its connection request.  It uses that connection to deliver only the generally needed day-to-day information to any caller. The servlet cannot reveal any other data, and no WebLogic user can get any other access to the data source.  This is the approach that many large applications take and is the reasoning behind the default mapping behavior in WLS. The disadvantages of using the credential map are that: 1) It is difficult to manage (create, update, delete) with a large number of users; it is possible to use WLST scripts or a custom JMX client utility to manage credential map entries. 2) You can’t share a credential map between data sources so they must be duplicated. Some applications prefer not to use the credential map.  Instead, the credentials passed to getConnection(user, password) should be treated as database credentials and used to authenticate with the database for the connection, avoiding going through the credential map.  This is enabled by setting the “use-database-credentials” to true.  See http://docs.oracle.com/cd/E24329_01/apirefs.1211/e24401/taskhelp/jdbc/jdbc_datasources/ConfigureOracleParameters.html "Configure Oracle parameters" in Oracle WebLogic Server Administration Console Help. Use Database Credentials is not currently supported for Multi Data Source configurations.  When enabled, it turns off credential mapping on Generic and Active GridLink data sources for the following attributes: 1. identity-based-connection-pooling-enabled (this interaction is available by patch in 10.3.6.0). 2. oracle-proxy-session (this interaction is first available in 10.3.6.0). 3. set client identifier (this interaction is available by patch in 10.3.6.0).  Note that in the data source schema, the set client identifier feature is poorly named “credential-mapping-enabled”.  The documentation and the console refer to it as Set Client Identifier. To review the behavior of credential mapping and using database credentials: - If using the credential map, there needs to be a mapping for each WLS user to database user for those users that will have access to the database; otherwise the default user for the data source will be used.  If you always specify a user/password when getting a connection, you only need credential map entries for those specific users. - If using database credentials without specifying a user/password, the default user and password in the data source descriptor are always used.  If you specify a user/password when getting a connection, that user will be used for the credentials.  WLS users are not involved at all in the data source connection process.

    Read the article

  • How can I force certain applications to use specific network connections?

    - by snicker
    Let's say I have two active network connections that let me out to the internet. I want certain applications to only use Network Connection 1, while some others should use Network Connection 2. Is this possible in Windows XP? If so, how can it be done? The main reason I wish to do this is I want to use a tethered phone's network for certain applications and an ethernet connection for others. Certain ports and networks are blocked by the ethernet connection, whereas they are not on my tethered phones connection.

    Read the article

  • How to use OpenVPN through a restrictive firewall?

    - by R.L. Stine
    I'm currently in the situation of attempting to setup OpenVPN on a personal VPS, for connection primarily through an overly restrictive firewall. All of the setups mentioned below work when used through a reasonably-firewalled connection. I have tried: OpenVPN running on the standard port OpenVPN running on port 443 (I start OpenVPN manually from the command line on the VPS and see that the server reports the connection being closed almost immediately, I assume this is a result of DPI on the firewall) STunnel running on port 443 to access OpenVPN and evade DPI. This is the most successful and allows a connection and internet access through the VPN for ~10-20 seconds, before the connection is forcibly closed. Is there anything else I can attempt?

    Read the article

  • Website Marketing - Essential Skills For Driving Search Engine Traffic (SEO)

    When the internet was populated by only a few thousand websites, it was easy to have a presence on the internet, and there was not much need for a search engine. Things have changed in the last few decades, and with more than 162 million websites currently populating the internet you need to be aware of a few search engine optimization (SEO) basics. These skills will help you make smart choices as you build, edit, and market your website.

    Read the article

  • How Microsoft copy the result from user for Bing.

    - by anirudha
    from some days before i read about the problem google show with another search engine Bing who come from Microsoft. well google show that bing copycat and Microsoft show that they not. i am not known matter much more but predict something that maybe true if google are right in what they tell. if MS really copy the search from User then they use Live service who used by all user who use the internet or on the internet. see the snapshot i have in this snapshot they tell that Help improved search results,internet safety and Microsoft software by allowing Microsoft to collect and retain information about your system, the searches you do and the websites you visit. Microsoft will not use this information to personally identify or contact you. Learn more so why they need the research on what user search on internet even the not contact but user their is no reason as well as bing. well their is a example who maybe possible they  use for bing.

    Read the article

  • Should I create repositories with special functions like getStaffActive()?

    - by Parhs
    I have seen lots of articles but none really help me. That is because I want to use dapper as a DAL. Should I create repositories with special functions? Like getStaffActive()? If I use repositories I can implement with dapper-extension a generic crud I have no idea how to handle database connection. Where to open the connection? If I do this at every function then how am I supposed to use transaction scope? Somehow the repositories I work with should share a connection in order transaction to work. But how to do this? Openning connection in BLL? If I use queries and execute them directly then still the same thing.

    Read the article

  • Search Marketing Agency - Cost Efficient Way to Promote Your Business!

    These days, it's the demand for the Internet that is exactly going too high. Over the years, the Internet has managed to establish itself as the most effective marketing platform for many businesses. On the other hand people across the globe now prefer to opt for the Internet in order to grab their necessary details or information easily.

    Read the article

  • Is Web Application Development Affordable?

    With the increased growth of the internet, internet based companies and internet marketing are taking their form. Several companies, marketers, and investors are moving forward in creating new and innovative techniques in which web application development will help to promote your company globally improving it overall.

    Read the article

  • Is Web Application Development Affordable?

    With the increased growth of the internet, internet based companies and internet marketing are taking their form. Several companies, marketers, and investors are moving forward in creating new and innovative techniques in which web application development will help to promote your company globally improving it overall.

    Read the article

  • Choosing the Right SEO Packages

    Since internet was developed SEO or Search Engine Optimization has already been part of it. The process is the most effective way in promoting a website to those who are fond of using internet. Using this process, a website will be more recognized by the internet users that will result for its popularity.

    Read the article

< Previous Page | 286 287 288 289 290 291 292 293 294 295 296 297  | Next Page >