Search Results

Search found 20285 results on 812 pages for 'selling software'.

Page 607/812 | < Previous Page | 603 604 605 606 607 608 609 610 611 612 613 614  | Next Page >

  • How to correctly write an installation or setup document

    - by UmNyobe
    I just joined a small start-up as a software engineer after graduation. The start-up is 4 year old, and I am working with the CEO and the COO, even if there are some people abroad. Basically they both used to do almost everything. I am currently on some kind of training phase. I have at my disposition architecture, setup and installation internal documentation. Architecture documentation is like a bible and should contain complete information. The rest are used to give directions in different processes. The issue is that these documents are more or less dated, as they just didn't have the time to change them. I will be in charge of training the next hires, and updating these documents is part of my training. In some there is a lot of hard-coded information like: Install this_module_which_still_exists cd this_dir_name_changed cp this_file_name_changed other_dir_name_changed ./config_script.sh ./execute_script.sh The issues i have faced : Either the module installation is completely different (for instance now there is an rpm, or a different OS) Either names changed, and i need to switch old names by new names Description of the purpose of the current step missing. Information about a whole topic is missing Fortunately these guys are around and I get all the information I want and all the explanations I need. I want to bring a design to the next documents so in the future people don't feel like they are completely rewriting a document each time they are updating it. Do you have suggestions? If there is a lightweight design methodology available online you can point me to it's nice too. One thing I will do for sure is set up a versioning repository for the documents alone. There is already one for the source code so I don't know why internal documents deserve a different treatment.

    Read the article

  • why are transaction monitors on decline? or are they?

    - by mrkafk
    http://www.itjobswatch.co.uk/jobs/uk/cics.do http://www.itjobswatch.co.uk/jobs/uk/tuxedo.do Look at the demand for programmers (% of job ads that the keyword appears), first graph under the table. It seems like demand for CICS, Tuxedo has fallen from 2.5%/1% respectively to almost zero. To me, it seems bizarre: now we have more networked and internet enabled machines than ever before. And most of them are talking to some kind of database. So it would seem that use of products whose developers spent last 20-30 years working on distributing and coordinating and optimizing transactions should be on the rise. And it appears they're not. I can see a few causes but can't tell whether they are true: we forgot that concurrency and distribution are really hard, and redoing it all by ourselves, in Java, badly. Erlang killed them all. Projects nowadays have changed character, like most business software has already been built and we're all doing internet services, using stuff like Node.js, Erlang, Haskell. (I've used RabbitMQ which is written in Erlang, "but it was small specialized side project" kind of thing). BigData is the emphasis now and BigData doesn't need transactions very much (?). None of those explanations seem particularly convincing to me, which is why I'm looking for better one. Anyone?

    Read the article

  • Trying to get a new user up on pfSense IPSec VPN; Config file import failed, now getting gateway err

    - by Chris
    Caveat: I am not a sysadmin, so please forgive the n00bness of the query. We have a new user and I'm trying to get them up on VPN. We use pfsense as an IPSEC endpoint. This person is using Shrewsoft for the client. I had created an entry in pfsense for them and then edited a previous user's config file. Shrewsoft didn't import the config file very well and I had to hand edit the information. Now we are getting gateway errors. One thing I've noticed is that there is a different between the values of the preshared key stored on the firewall and the psk stored in the config file. I assume it has something to do with a hash, but I've no idea if that's the case and whether that might be what's causing the problem. Any suggestions greatly appreciated! Tangentially, is there some software used to generate these config files?

    Read the article

  • Recommend AntiVirus for Plesk 8.6.0 + CentOS 5

    - by cappuccino
    I am using a virtual server on Media Temple running CentOS 5 and Pleak 8.6.0, I have done all their security recommendations and more some, blocking everything except http and mail, string passwords and running Rootkit Hunter daily. But i'm thinking I should run a antivirus of some sort? I'm still new to Linux CentOS security so please forgive :)... Can you recommend a good antivirus/antispyware software for CentOS 5 and Plesk 8.6.0? I've been searching for some plesk modules and have come across a few like Kaspersky, not sure which one to use... Any tips on security would be good too.

    Read the article

  • How can I decrease the time spent reformatting / restoring user's workstations?

    - by CT
    I just working for a medium sized company (approx. 150 users). When user's workstations need to be reformatted for any variety of reasons, we reformat, reinstall windows from an oem disk, install drivers, install shop desired software, and restore user's documents from latest backup. While the process isn't very difficult it is very time consuming. What are some options simplify / speed up this process? Mostly a complete Windows shop with most servers running Win2k3 Enterprise and workstations running a variety of XP, Vista, and 7. Workstations are purchased through a variety of OEMs mostly Dell.

    Read the article

  • PDAnet on Android IP on PC is not public IP. Where does the NAT take place, PDAnet or Verizon?

    - by lcbrevard
    When using PDAnet on a PC (Win7 ultimate) to USB tether a Motorola Droid on Verizon 3G the IP address of the PC appears to be public - 64.245.171.115 (64-245-171-115.pools.spcsdns.net) - but connections show as coming from another public IP - 97.14.69.212 (212-sub-97.14.69.myvzw.com). Someone is performing Network Address Translation - either PDAnet or within the Verizon 3G network. Can someone tell me who is doing the NAT? Is it PDAnet or is it at Verizon? Is there any possibility of setting up port forwarding, such that connections to the public IP 97.14.69.212 (212-sub-97.14.69.myvzw.com) are forward to the PC? We are testing a network protocol that requires either a true public IP or forwarding a range of ports from the public Internet to the system on which the software runs (actually Linux hosted by VMware Player or Workstation on a PC running Windows).

    Read the article

  • Change default code page of Windows console to UTF-8

    - by Regent
    Currently I'm running Windows 7 x64 and usually I want all console tools to work with UTF-8 rather than with default code page 850. Running chcp 65001 in the command prompt prior to use of any tools helps but is there any way to set is as default code page? Update: Changing HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Nls\CodePage\OEMCP value to 65001 appear to make the system unable to boot in my case. Proposed change of HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor\Autorun to @chcp 65001>nul served just well for my purpose. (thanks to Ole_Brun)

    Read the article

  • How to fix incorrect margins when printing from Windows 7?

    - by Rodrigo Guerreiro
    My printer is a HP Photosmart 2575. When I print from my Windows XP the margins are all ok, but when I print from my Windows 7 laptop the top margin is 2x larger for the same document, and as a result the bottom is cropped. I've already found one (http://h30434.www3.hp.com/t5/Printer-All-in-One-Software-and/Deskjet-5150-printer-incorrect-margins-with-Vista-64-bit/td-p/103166) thread in HP forums from someone that seems to have the same problem than me, but no solution is provided. My Windows 7 is the Home Premium x64. Can anyone help me?

    Read the article

  • 32 bit programs can't access Internet in Windows 7 64 bit

    - by korona
    I recently got a new ASUS laptop with Windows 7 Home Premium pre-installed. It worked OK for a while but a couple of days ago, suddenly I couldn't access the Internet any more. After narrowing down the problem, I've reached the conclusion that what's happened is that 32 bit programs are suddenly not able to use the Internet, but 64 bit applications work just fine. Examples of programs that DON'T work any more: Google chrome Firefox Internet Explorer 8 World of Warcraft Examples of programs that DO work: Internet Explorer 8 (64 bit) ping (command line) nslookup (command line) ftp (command line) I'm pretty sure that those command line apps are 64 bit native. A re-install of Windows using the recovery partition on the laptop did fix the problem temporarily, but now it's back again. And I seem to be stuck between a rock and a hard place getting someone to take the responsibility for this; the vendor says to talk to ASUS, ASUS says it's a software issue, and Microsoft doesn't give support on OEM licenses... Does anyone know how to solve this issue?

    Read the article

  • Connecting to iSCSI Target

    - by Joost Verdaasdonk
    I've installed Microsoft iSCSI Software Target 3.3 on a server 2008 R2 machine and created a new iSCSI Target. In the target I created a new Virtual Disk. From another server I started iSCSI Initiator and in Targets | Target I typed the IP of the Target. (Also tried DNS name.) But when I click Refresh I never see the target. Through googling I found this Youtube tut from a French guy doing pretty much what I did (only difference is I'm in a domain). I first though that maybe Port 3260 was closed but its not I can telnet to it. Also disabled all firewalls to see if that was blocking anything... No luck so far. Does anybody know of possible reasons why I can't connect to the iSCSI Target? If I can provide more info please let me know what's needed? Extra info: I've used this tut to set things up.

    Read the article

  • Is there a schematic overview of Ubuntu's architecture?

    - by joebuntu
    Hi there, as enthusiastic, advanced Linux learner, I'd love to get an overview about Linux' architecure/structure in general. You know, like "the big picture". I'm thinking of a large schematic graphic showing what is what, who is who, what system (e.g. X) comprises which subsystems (GDM/Gnome/Compiz) on the way from a to z, from boot to interactive desktop, including the most important background services (auth, network, cron, ...). Maybe a bit like this: http://www.flickr.com/photos/pgc/140859386/ but way more detailed. There's bootchart, which produces very comprehensive charts, but they again are too detailed and difficult to get the "big picture" from. Is there such a thing? Possibly not for the whole System, but maybe for single subsystems? I had trouble searching for this, because using search terms like "scheme" or "architecture" pointed to the wrong direction (a tool called "scheme" or CAD software for linux). I appreciate any links. If there's interest in those schematic overviews and links, maybe someone could turn this post into a wiki post? Cheers, joebuntu

    Read the article

  • Installing Solaris 10 on sunT5220 - ZFS/UFS raid 10?

    - by Matthew
    I am in a bit of a time crunch, and need to get two T5220's built. We were very happy to see two boxes in our aged inventory which had 8 HDD's each, but didn't think to check if they were running hardware RAID or not. Turns out that they aren't. When we install, we are given the option to use UFS or ZFS, but when we select a place to install we're only given the option of installing on one single disk. Is it possible to create a software raid 10 across all of the disks and install the OS on that? Sorry if any lingo is wrong, I'm not really a Sun guy and our guru is out of town right now. Any help would be really appreciated! Note: Most of the guides I've found on google entail installing the OS on a single disk, and then creating a separate RAID 10 on other disks. We would actually like the OS to reside on the RAID 10. Hope that clarifies things.

    Read the article

  • save as pdf in linux

    - by Neilvert Noval
    I have seen how simple it is for Mac OS to generate pdf from a document without additional software to install. But I am looking for this functionality in Linux. One scenario, for example, if I have myDocument.txt that contain an article, how can I convert this into pdf? My next question is, assuming that myDocument.txt is a 3-paged document, will it generate a 3-page continuous pdf and not just 3 separate pdfs? Any tools for linux that does this? (GUI is fine, but commandline is preferable)

    Read the article

  • Using Zentyal to control several servers

    - by user1301428
    I am currently in the process of creating a home server, made up of several virtual machines, each running a different type of server (i.e. a file server, a multimedia server, a firewall and a print server as of now). Today I discovered this new software, Zentyal, which looks interesting for system and network administration. However, I haven't understood one thing: can it be used only with its preconfigured packages or can it also be used to control other servers running other programs (in my case, the four virtual machines)?. Also, would you suggest to use such a program or do you think it's better to control each server on its own?

    Read the article

  • Are there any good examples of open source C# projects with a large number of refactorings?

    - by Arjen Kruithof
    I'm doing research into software evolution and C#/.NET, specifically on identifying refactorings from changesets, so I'm looking for a suitable (XP-like) project that may serve as a test subject for extracting refactorings from version control history. Which open source C# projects have undergone large (number of) refactorings? Criteria A suitable project has its change history publicly available, has compilable code at most commits and at least several refactorings applied in the past. It does not have to be well-known, and the code quality or number of bugs is irrelevant. Preferably the code is in a Git or SVN repository. The result of this research will be a tool that automatically creates informative, concise comments for a changeset. This should improve on the common development practice of just not leaving any comments at all. EDIT: As Peter argues, ideally all commit comments would be teleological (goal-oriented). Practically, if a comment is made at all it is often descriptive, merely a summary of the changes. Sadly we're a long way from automatically inferring developer intentions!

    Read the article

  • Keyboard doesn't work after Windows resume from sleep (S3) -- how to fix?

    - by Marco Z
    I have a weird issue with my keyboard after resuming from S3 sleep: I can type perfectly for maybe 5 seconds, but afterwards the keyboard ceases to work until I hibernate or restart (or sleep again -- see below.) The rest of my system runs just fine -- just the keyboard apparently "freezes" up. Some closer observations: The keyboard will work for 5 seconds (and freeze again) every time I resume from sleep, even if it was frozen from a previous sleep The caps lock light will work fine within the 5 seconds. But after the keyboard "freezes", the light will remain on, but I'll be unable to turn it off. Perhaps this means power wasn't cut off from the keyboard, but it's just some software freezing up the port??? Given this info, would this indicate a problem with Windows itself? Drivers, maybe? Can I rule out the BIOS as the culprit? Finally, any ideas on how to fix? Thanks! Specs: Windows 7 x64 HP tx1000 laptop

    Read the article

  • How secure is cloud computing?

    - by Rhubarb
    By secure, I don't mean the machines itself and access to it from the network. I mean, and I suppose this could be applied to any kind of hosting service, when you put all your intellectual property onto a hosted provider, what happens to the hard disks as they cycle through them? Say I've invested million into my software, and the information and data that I have is valuable, how can I be sure it isn't read off old disks as they're recycled? Is there some kind of standard to look for that ensures a provider is going to use the strictest form of intellectual property protection? Is SAS70 applicable here?

    Read the article

  • What's the typical latency for key strokes using an ssh connection on a local wifi network?

    - by dan
    I develop software on a Macbook Air 1.6 Ghz but find running Rails test suites and generators on this computer very slow. I'm thinking about buying a Linux tower to put on my local wireless network to do my Rails development on. I would want to use my Macbook Air and ssh into the Linux box and do my development with Gnu Screen, vim, etc. Can I expect the keystroke and echo latency for a ssh session between two machines on a local wireless network to be negligible? Does anyone develop using this kind of local setup?

    Read the article

  • Can we change control of two keys on keyboard?

    - by mr_eclair
    I'm using Eliteook 8440p hp machine and two keys on my keyboard aren't working v and b. laptop keyboard replace will take 2-3 days, and I can't stop my office work. I'm bored of using On screen keyboard to write v and b. I don't have any portable USb keyoard to connect to laptop right now. I'm thinking I'm not using Pg up and Pg Down button at all, is there any software or trick which can make it possible so that If i press Pg Up it will write v on page and Pg Down will write b. Hoping for quick and positive response.

    Read the article

  • Windows 7: Use VirtualStore technology as user for own benefit?

    - by mfn
    I've researched a bit and came to the understanding that VirtualStore is part of the new UAC feature in Vista/W7 which is the file system part of the transparent data redirection and redirects write access to folders like program files to C:\User\<username>\AppData\Local\VirtualStore\ in lack of applications respecting the LUA principles. Now I'm interested if that kind of transparent redirection can also be used as a power to the user. Here's an example which comes to my mind: I install any kind of software to e.g. D:\Whatever\ThisAndThisApp\ and I set up things that, after initial installation, any write access to this folder is transparently redirected to e.g. D:\MyOwnVirtualStore\Whatever\ThisAndThisApp\file_only_writable_here.txt. Is this thinking too far or can I actually use that power of VirtualStore as a user on Windows 7? I'm using the Professional version of that matters.

    Read the article

  • Emulate a USB port as a USB flash drive?

    - by Wilco
    Does anyone know of any software that can emulate a USB flash drive through an available USB port in OS X? Perhaps some way to map a directory to a USB port that could then be connected to another device that supports reading USB storage devices? I'd love to connect my laptop to my car's USB port and access files as if it were a USB drive. I know about the target disk mode with firewire (not sure if this is also supported over USB), but I was hoping for something that doesn't require booting outside of the OS (I want to retain use of the machine). Any ideas?

    Read the article

  • How to check the OS is running on bare metal and not in virtualized environment created by BIOS?

    - by Arkadi Shishlov
    Is there any software available as a Linux, *BSD, or Windows program or boot-image to check (or guess with good probability) the environment an operating system is loaded onto is genuine bare metal and not already virtualized? Given recent information from various sources, including supposed to be E.Snowden leaks, I'm curious about the security of my PC-s, even about those that don't have on-board BMC. How it could be possible and why? See for example Blue Pill, and a number of papers. With a little assistance from network card firmware, which is also loadable on popular card models, such hypervisor could easily spy on me resulting in PGP, Tor, etc. exercises futile.

    Read the article

  • how to skip grub dual boot option menu entirely (without picking an OS to boot)

    - by bevcan izBevk
    I'd like to skip the entire Grub 2 interface, where I have to decide booting Linux or Windows im running linux ubuntu lastest version (14.04.1 LTS) and windows 8.1 both 64 bit versions. I've installed easyBCD software, which I want to use as (my only) boot manager. Issue: whenever I run my computer, I get grub interface to pick Linux or Windows, after that I get easyBCD interface where I have to pick linux or windows again. If both choices are the same, proper system boots, else I get thrown back to beggining (grub UI). I'd like to somehow delete / skip grub from appearing. TLDR title :) thank you for helping!

    Read the article

  • eSTEP Newsletter November 2011 now available

    - by uwes
    Dear Partners,We would like to inform you that the November issue of our Newsletter is now available.The issue contains informations to the following topics:Notes from Corporate: Magic Quadrant for Enterprise Application Servers, Oracle Buys RightNow Technical Corner: Oracle Solaris 11 – The First Cloud OS, Oracle Solaris 10 8/11 now available, New RAC/Containers certifications, DTrace and Container for Oracle Linux, Oracle Enterprise Manager Ops Center released, News from the Oracle Solaris Cluster, SPARC - New roadmap, T-Series Benchmarks Learning & Events: eSTEP Events Schedule, Recently Delivered TechCasts, Delivered Campaigns in 2011 How to ...: About Oracle Solaris Containers, Detailed feature comparison between the different versions of database 11g, Upgrade Advantage Program + table with examples, Sun Software Name ===> New Oracle Name, Oracle Linux and OVM Certification Search, TO YOUR ATTENTION - Repricing Servers and Xoptions You find the Newsletter on our portal under eSTEP News ---> Latest Newsletter. You will need to provide your email address and the pin below to get access. Link to the portal is shown below.URL: http://launch.oracle.com/PIN: eSTEP_2011Previous published Newsletters can be found under the Archived Newsletters section and more useful information under the Events, Download and Links tab. Feel free to explore and any feedback is appreciated to help us improve the service and information we deliver.Thanks and best regards,Partner HW Enablement EMEA

    Read the article

  • How do I capture the output of a tty while still allowing sent characters to reach the correct desti

    - by Zak
    I currently have some systems that multiple people have access to for administration purposes. We've modified the history log so that we capture 2k lines of history per user to help aid in who has done what on the system. However, we would additionally like to capture all keyboard input when we (the administrators) log in, and log it to a file so we can see what changes were made to files once people go into vi to edit them. It will also aid us in documenting when we are going through a compile of software and the like. How can I do this? CentOS 5.4 if it makes a difference.

    Read the article

< Previous Page | 603 604 605 606 607 608 609 610 611 612 613 614  | Next Page >