Difference in responsivity between root and user accounts.

Just as the subject says.  The transition between menu's tabs in kde 4,1 is much faster and smoother on root account. The same thing goes for other apps like firefox, gimp etc. (they start faster and work better overall). The difference is noticeable, I can see it with a bare eye.
Last edited by dcfighter (2008-10-02 21:28:30)

I've experienced this too a year or two ago; amazed it's still there If this was the same on all linux distros(which i think from seeming to recall a google search i did..) it's a pretty obvious case for improvement... At that time i entertained the thought that perhaps it was because of not needing to check permissions "because you are root"...
Last edited by test1000 (2008-10-04 09:39:52)

Similar Messages

  • What is the difference between "Adiministrator" & "Standard" user accounts?

    Hi,
    I was wondering what is the difference was between "Adiministrator" & "Standard" user accounts?
    Is "Standard" more sucre for everyday use than "Administrator"?

    An administrator has more latitude in taking actions that have potential for harming the computer intentionally or accidentally than a standard user. Also, an administrator has the power to enable the "root" user--the user who can do the most harm intentionally or accidentally. The less one knows about his or her computer and its environment the more important it is for the individual to run as a standard user. If one is running as a standard user, then he or she will have to take a time out, which allows a period of reflection, before actually taking potentially harmful action since to do so he or she would have to logout and back in.

  • Differences between BADIS and User-exits

    Hi everybody,
    I am new to ABAP and wonder what are the differences between BADIS and User-Exits. I read paper but did not find a SAP documentation yet.
    Does anybody know where to find a sap document which explains both technologies?
    Greetings, AD

    Hi,
    User-Exit is a specific place in a transaction-process where SAP offers
    third parties to include there own business functionality. Actually
    User-Exit is the namespace used for Exits programmed by SAP specifically
    for SD. For the other modules it's called Customer-Exit.=20
    >Business Add-Ins (BADI) =20
    The use of object orientated code within SAP has lead to new method of
    enhancing standard SAP code called Business Add-Ins or BADI's for short.
    Although the implementation concept is based on classes, methods and
    inheritance you do not really have to understand this fully to implement
    a BADI.
    For better understanding visit.
    http://sap.ittoolbox.com/groups/technical-functional/sap-r3-dev/779183#
    Hope it was useful.
    Thansk,
    Sandeep.

  • Difference Between BADI and User Exits

    Hi..
    generally BADIs & User Exis are used exensively in SAP SD...
    Can anybody throw some light waht is difference between them ...
    Kindly please reply......
    Regards
    Nisha

    Hi
    ifference Between BADI and User Exits
    Business Add-Ins are a new SAP enhancement technique based on ABAP Objects. They can be inserted into the SAP System to accommodate user requirements too specific to be included in the standard delivery. Since specific industries often require special functions, SAP allows you to predefine these points in your software.
    As with customer exits two different views are available:
    In the definition view, an application programmer predefines exit points in a source that allow specific industry sectors, partners, and customers to attach additional software to standard SAP source code without having to modify the original object.
    In the implementation view, the users of Business Add-Ins can customize the logic they need or use a standard logic if one is available.
    In contrast to customer exits, Business Add-Ins no longer assume a two-level infrastructure (SAP and customer solutions), but instead allow for a multi-level system landscape (SAP, partner, and customer solutions, as well as country versions, industry solutions, and the like). Definitions and implementations of Business Add-Ins can be created at each level within such a system infrastructure.
    SAP guarantees the upward compatibility of all Business Add-In interfaces. Release upgrades do not affect enhancement calls from within the standard software nor do they affect the validity of call interfaces. You do not have to register Business Add-Ins in SSCR.
    The Business Add-In enhancement technique differentiates between enhancements that can only be implemented once and enhancements that can be used actively by any number of customers at the same time. In addition, Business Add-Ins can be defined according to filter values. This allows you to control add-in implementation and make it dependent on specific criteria (on a specific Country value, for example).
    All ABAP sources, screens, GUIs, and table interfaces created using this enhancement technique are defined in a manner that allows customers to include their own enhancements in the standard. A single Business Add-In contains all of the interfaces necessary to implement a specific task.
    The actual program code is enhanced using ABAP Objects. In order to better understand the programming techniques behind the Business Add-In enhancement concept, SAP recommends reading the section on ABAP Objects.
    What is difference between badi and user-exists?
    What is difference between enhancements and user-exists? and what is the full form of BADI?
    I have another doubt in BDC IN BDC WE HAVE MSEGCALL (i did not remember the > correct name) where the error logs are stored, MSEGCALL is a table or structure.
    What is the system landscape?
    1) Difference between BADI and USER-EXIT.
        i) BADI's can be used any number of times, where as USER-EXITS can be used only one time.
           Ex:- if your assigning a USER-EXIT to a project in (CMOD), then you can not assign the same to other project.
        ii) BADI's are oops based.
    2) About 'BDCMSGCOLL' it is a structure.  Used for finding error records.
    3) Full form of BADI 'Business addins'.
    3) System land scape will be depends on your project
        Ex:- 'Development server'>'Quality server'-> 'Production server'......

  • Amount difference (0.01) between GL and profit center reporting

    Hi,
      After we run 1KEK for ARAP transfer to profit center there is amount difference (0.01) between GL and profit center reporting for customere reconciliation account. We checked F.5D and rerun 1KEK this issue still exit.
    Any idea for it? Thanks.

    hi Kyle,
    thanks for the effort, but it wasn't the thing i asked for ...
    what i would like to find out is:
    if CO area settings are set w/o profit centers, why the system still demands profit center assignment with cost center master data (ie.)
    well, i can always turn off the message, but this isn't the solution i want to use ...
    i will rather open one PC (along with dummy, of course) even though those are not used for the customer ... although, this will not solve statistical posting to cc with cost element category 11 ...
    d.

  • Is there any difference in quality between mp4 and m4v?

    Is there any difference in quality between mp4 and m4v? I am figuring out how best to save old VCR files. Is the 264 category the best?

    So, what would that software be? Anything that I mentioned, e.g., iMovie? Any Video Converter?
    I'm a Mac user so I want files that play "natively" in QT X, QT 7, QL, iPod Touch, iPhone, iPad, and/or TV players. This means I want the H.264/AAC compressed data in MOV, MP4, or M4V file containers. I can use QT 7 Pro, MPEG Streamclip, and /or QT X to move MPEG-4/AAC compressed data to MOV file containers, MPEG Streamclip to movie M4V and MOV MPEG-4/AAC data to MP4 file containers, and Subler to move MP4 or MOV MPEG-4 AVC/AAC/AC3/Chapter data to M4V file containers. This is strictly a simple "copy" operation and no recompression of data is involved. (I.e., the quality is not changed.)
    iMovie is a video editor and it forces an export conversion of your project once completed which can degrade quality. Have never used the Any Video Converter so I don't know if it has an audio and/or video "passthrough" feature for data already in a compatible compression formats. If it doesn't then any conversion it makes has the potential to degrade video content.
    As to AVI, this is a legacy file container abandoned by Microsoft a dozen years ago in favor of their modernized WMV compression format/file type products. Compared to MKV, AVI is an outmoded/out-of-date container which I don't recommend you use unless you are a glutton for punishment. However, if you must use it, then you might try the AvidMux app. It can "copy" compatible content to a number of file container types—including AVI and MKV. Just don't blame me if its use creates more problems than it solves on current Mac systems.

  • Default acl permissions for root and user?

    after running permissions i keep getting acl permissions changed and will repair. Apparently it doesn't. Is their a manual way of resetting to defaults for both root and user.

    Turns out they didn't change themselves, but authentication got out of whack. This post fixed it for me, but I just jogged access on ical and blogs. Not sure which or both is needed, but after I toggled them over and back I was up and running again.
    <SNIP>
    Solution found athttp://michaeljin.wordpress.com/2010/01/05/locked-out-of-mac-os-x-server/
    It’s blog update time! Updates have been a little scarce lately, been super busy with getting trophies on PS3
    Anyway, recently encountered the following with a Mac mini server running Snow Leopard Server:
    Despite being able to ARD / Screenshare the Mac mini, I was unable to get any further than the login window. Authentication credentials are obviously valid. No weird access permissions have been set. However, the weird thing was, I can connect to the server via Server Admin tools (from another Mac) and all other services were running without a hitch.
    After much head scratching it turns out to be a sACL (Service Access Control List) issue.
    This thread solved the mystery!
    http://discussions.apple.com/thread.jspa?threadID=1654864
    To save you the trouble, I’ll lay it out here. I cannot take credit for this, but Randall can!
    Open Server Admin on a computer (any), and connect with the local admin to the machine.
    Select the server and authenticate.
    Select Settings, then go to Access. You’ll want to make sure that Login Window and SSH have the local admin account listed if you select the option to “Allow only these users”. For now, I would suggest making sure all services have “Allow all users and groups” selected.
    If (as in my case) it was set to Allow All in the first place, simply toggle the settings – back and forth.
    Save.
    Try logging in again… should be a good one!
    </SNIP>

  • Diff between BADI and USER EXITs

    Hi,
    What is the difference between the BADI and USER EXITs?
    Thanks,
    Satish

    HI
    GOOD
    Business Add-Ins are a new SAP enhancement technique based on ABAP Objects. They can be inserted into the SAP System to accommodate user requirements too specific to be included in the standard delivery. Since specific industries often require special functions, SAP allows you to predefine these points in your software. 
    As with customer exits two different views are available:
    In the definition view, an application programmer predefines exit points in a source that allow specific industry sectors, partners, and customers to attach additional software to standard SAP source code without having to modify the original object. 
    In the implementation view, the users of Business Add-Ins can customize the logic they need or use a standard logic if one is available.
    In contrast to customer exits, Business Add-Ins no longer assume a two-level infrastructure (SAP and customer solutions), but instead allow for a multi-level system landscape (SAP, partner, and customer solutions, as well as country versions, industry solutions, and the like). Definitions and implementations of Business Add-Ins can be created at each level within such a system infrastructure.
    SAP guarantees the upward compatibility of all Business Add-In interfaces. Release upgrades do not affect enhancement calls from within the standard software nor do they affect the validity of call interfaces. You do not have to register Business Add-Ins in SSCR.
    The Business Add-In enhancement technique differentiates between enhancements that can only be implemented once and enhancements that can be used actively by any number of customers at the same time. In addition, Business Add-Ins can be defined according to filter values. This allows you to control add-in implementation and make it dependent on specific criteria (on a specific Country value, for example).
    All ABAP sources, screens, GUIs, and table interfaces created using this enhancement technique are defined in a manner that allows customers to include their own enhancements in the standard. A single Business Add-In contains all of the interfaces necessary to implement a specific task.
    The actual program code is enhanced using ABAP Objects. In order to better understand the programming techniques behind the Business Add-In enhancement concept, SAP recommends reading the section on ABAP Objects.
    What is difference between badi and user-exists?
    What is difference between enhancements and user-exists? and what is the full form of BADI?
    I have another doubt in BDC IN BDC WE HAVE MSEGCALL (i did not remember the > correct name) where the error logs are stored, MSEGCALL is a table or structure.
    What is the system landscape?
    1) Difference between BADI and USER-EXIT.
        i) BADI's can be used any number of times, where as USER-EXITS can be used only one time.
           Ex:- if your assigning a USER-EXIT to a project in (CMOD), then you can not assign the same to other project.
        ii) BADI's are oops based.
    2) About 'BDCMSGCOLL' it is a structure.  Used for finding error records.
    3) Full form of BADI 'Business addins'.
    3) System land scape will be depends on your project 
        Ex:- 'Development server'>'Quality server'-> 'Production server'...... 
    THANKS
    MRUTYUN

  • Can't Change Lock Screen Background Image and User Account Picture in Windows 8.1.

    I am running Windows8.1 Single Language with windows activated. Upgraded from Window 8 to Windows 8.1.
    Lenovo Y410p.
    4th generation Intel® Core™ i7-4700MQ (2.40GHz 1600MHz 6MB) with 16GB RAM.
    NVIDIA® GeForce® GT750M 2GB .
    I tried all methods that I found on web included :
    1. http://www.askvg.com/fix-cant-change-lock-screen-background-and-user-account-picture-in-windows-8/
    2. http://answers.microsoft.com/en-us/windows/forum/windows8_1-desktop/lockscreen-issues-on-windows-81/c51f570a-7a69-4e92-8348-3ebbed778592
    3. I deleted the C:\ProgramData\Microsoft\Windows\SystemData file and folder
    4. I restored the Libraries Features.
    5. I run SFC / Scannow 3 times but get no error.
    6.  I created a new local account but the same problem shows up. (I'm using live for main account.)
    Now, Please tell me what should I do, Thanks.

    Hi,
    First of all, please run the command slmgr.vbs /dlv
    After that, check the License status if it is licensed.
    Is there any error message when you couldn't change lock background or this option just grey out?
    Roger Lu
    TechNet Community Support

  • Difference in value Between BW and R/3

    Hi,
    We are in the process of validating reports .We have observed difference in value for  credit and debit amount fields in BW and for the same data is coming from standard data source 0EN_JVA_2 (Joint venture: Actual line item using delta extraction) we have done full data load. In the data source the data coming from a single field and that is spited based on debit/credit indicator in R/3.
    I need your valuable input on where the problem is for the difference of value between BW and R/3.
    Regards
    Deva

    Hi,
    Is there any filterations in the IP?
    Any data packet deletion activity in the start rountine?
    Any update rule for the key figure is having routine with modifiying the value?
    Kindly check.
    In case if you are seeing number of records, always aggregation happens.
    If the difference is in terms of quantity of the key figure values, kindly check the above three.
    Kindly come to us so that we can suggest
    Hope this helps
    Janardhan Kumar

  • Checking Computer AND User Account against AD without TLS

    Hi Folks,
    i am working on a customer site with 5500/ACS5.2/AD/WZC. The Customer looks for a good Authentication Scenario but decides against TLS. So we tested PEAP with checking the AD for a valid Computer Account and User Auth. But, if i use a Laptop with no Domain Computer Account but a valid User Account, i  can gain Access. Is it possible that the ACS can check for a valid Computer AND User Account and successes the Client only if both Accounts are available and valid?
    Regards, Michael

    Hi Nicolas, thx for this Hint. I did  today the Host Lookup and "was machin auth" thing, but anyway, my own Laptop
    that is not in the Domain can connect with a Domain User ID to the Network. Any Hint or Trick? I saw on other Discussions you referred to that some Users did an AD Rejoin, what do you think?
    Regards, Michael

  • Check for Updates and User Account Control

    With Adobe Reader the 'Check for Updates' function under Help does not appear to function when 'User Account Control (UAC)' in Windows Vista is turned on.
    When UAC is turned off, the 'Check for Updates' works, and if there an update is available for Adobe Reader, it will download and install.
    Other programs that update software funtion with UAC turned on, albeit with the additional dialog boxes that UAC brings, namely the CTL/ALT/DEL and user account logon (when applicable.)
    Without updating the Adobe Reader software, users are leaving themeselves open to vulnerabilities.  Without UAC turned on, users are also leaving themselves open to certain risks.  So there appears to be a dilemma presented.
    Does anyone know if/when Adobe will be changing the 'Check for Updates' functionality so it will behave more in-line with the UAC functionality?
    Thank you in advance for your time and attention.

    With UAC enabled, I start Adobe Reader, click on Help, and there is no selection for updating.  There is nothing for me to click.  Additionally, in Edit, Preferences, Updater, "Do not download or install updates automatically" is selected, and everything on the right pane is greyed-out.
    With UAC disabled, I start Adobe Reader, click on Help, and there is a selection for 'Check for Updates.'  In Edit, Preferences, Updater, I can select the various methods of downloading/updating Adobe Reader.  The option to download the update but not install was selected, as I wanted it to be.
    Finally, I noticed that the notice from Adobe, 'Update is ready to install,' appears in the Windows tray.  And it is this point that somewhat changes the serverity of the problem, that is, while 'Check for Updates' is not available when UAC is enabled, it appears that Adobe can still be updated through the automatic download feature.  The only problem with this is that I cannot tell if the update was downloaded while UAC was enabled (probably not since the download setting says not to) or while UAC was disabled.
    In any case, it still does not appear that our clients can get their Adobe Reader software updated while UAC is enabled.  And this represents a security dilemma for us.

  • Difference Between Service Account and User Account

    What is the Difference Between Service Account and User Account

    Hello Mohit,
    Basically there are two types of approches which you should understand.
    In many environments, administrators prefer to simply create a domain user account and assign appropriate privileges to it. Then this user account is used in order to start a specific service on a computer.
    In that case there is really no difference between a user account and the so called service accounts. Since this service account is simply a domain user, all the task related to managing the domain users apply to it. For example you
    should keep the password up to date manually. Some environment move step forward and assign
    Deny Logon Locally of this type of service account in order to enhance the security.
    The second concept is Managed Service Accounts. There are plenty of differences between a Managed Service Account and a User Account.
    The Display Icon is different from a view perspective.
    The type of object is different. 
    Managed service accounts password management is automatic.
    You can not create Managed Service Accounts using GUI. They are only created using Powershell.
    You can refer to link below for more inormation:
    Service Accounts Step-by-Step Guide
    Regards.
    Mahdi Tehrani   |  
      |  
    www.mahditehrani.ir
    Please click on Propose As Answer or to mark this post as
    and helpful for other people.
    This posting is provided AS-IS with no warranties, and confers no rights.
    How to query members of 'Local Administrators' group in all computers?

  • Difference between IMAP and "Exchange" account in mail?

    Hi,
    I'm using a Hosted Exchange 2007 account with Entourage 2004 actually. Now I want to try using Mail as an alternative application. As the server offers IMAP I could setup a new IMAP account in Mail and receive my Mails from Exchange. But Mail offers an "Exchange" account additionally. Can anyone explain me the difference between theese two Mail accounts? Is one better, faster or whatever?
    Best regards,
    Heiko

    Exchange uses a proprietary mail exchange protocol, while imap is standard. You can use a lot of different mail clients on different platforms with imap, and you don't have to worry about synchronization or conflicts since its server based. When you establish an imap connection, though, you stay connected to the server, so it's a relatively high resource user. Exchange is more verbose, and although its fundamentally server based using different exchange clients from different places doesn't synchronize well. Exchange will also update your outlook calendar, while imap will not. If it's just for mail, I vastly prefer imap.

  • Difference between administrators and users

    Hi,
    I just created a new site for my client on Business Catalyst, using Adobe Muse, and would like to give my client acces to the sites tools.  The site has settings for creating User Roles.  What is the difference between an Administrator role and a User role.  Are there limits on how many Administrators and/or Users there can be?    Thanks.
    Edit:  I think I'm getting a few ideas on how it works from this link http://helpx.adobe.com/business-catalyst/using/site-users.html#id_37324  but still not sure.  I gather from the thread that there is a limit of 3 administrators.  Does this include administrators plus users to total 3?  Thanks.
    Barbara

    "Administrators" and "Users" are two different (and default) User Roles <http://helpx.adobe.com/business-catalyst/using/user-roles.html> on a BC site that distinguishes between a site admin/user's role or access permissions. Every BC site irrespective of it's plan has 3 admin/site users <http://www.businesscatalyst.com/pricing/monthly> that can be later upgraded to a higher number from the Partner portal for non-trial sites that are under BC standalone subscription <http://helpx.adobe.com/business-catalyst/kb/detailed-plan-breakdown.html#id_32561>.
    Thanks,
    Vinayak

Maybe you are looking for

  • Document flow of MM

    HI, i done the MM flow Like This TCs. create PO :me25 Delivery --VL10B PGI--VL02 Create To---LT03 Billing--VF01,VF04 and finaly i need document flow of MM. please help me. regards, dhanush

  • Power Pivot Data Model with Linked Table

    Can anyone provide me with some suggestions as to how to accomplish the following in Power Pivot? I have the following Pivot Table fields. I'm trying to create a data model to allow me to filter all of the projects by the selected Fiscal Year. The Fi

  • Can't Print from Adobe

    I'm the only person in the office that cant print from my Adobe software.  I have a XP computer like most of my workmates.  I can print from all my other programs just not adobe.  When I print a pdf it doesn't even put it in the que.  When I click on

  • Security update 2007-005 and Imovie problem

    Yesterday my macbook automatically installed security update 2007-005. I later opened Imovie HD 6 and found a problem - when opening, the program title etc was shown in the desktop menu but then the last movie I worked on started to open, putting the

  • Missing entries in primary key column

    I want to find out the missing entries in column which is primary key column. Please give me the query. Thanks