Is PAPI-WS necessary for Workspace in Enterprise?
HI Friends,
Is PAPI webservice necessary for running the Workspce in ENTERPRISE.
I mean I can able to login to Workspace without PAPIWS ear being depoyed to OBPM Enterprise (Websphere Application Server)
But I cannot see any activities in Applications pane required to start the applicaiton.
Please let me know if anybody knows if Workpspace used PAPI-WS appliction in Enterprise environment?
Look forward for help.
Cheers
Sh
Hi,
No, PAPI WS is not used by Workspace. It is used by Office Ribbon and you can also use it to build your own application.
If you do not see any application, you should check if your participant has the appropriate roles to see the applications of the deployed processes.
Hope this helps,
Ariel
Similar Messages
-
PAPI Web Service (PAPI-WS) Example for Oracle BPM Enterprise Standalone
Here is the location of a step-by-step explanation on how to use PAPI Web Service (PAPI-WS) to create a work item instance and then run the instance inside an activity in a process running on Oracle BPM Enterprise Standalone.
http://www.4shared.com/file/128249957/9bd6ef61/PAPI-WS_for_Oracle_BPM_Standalone.html
Be sure to use the project that is in the zip file for this example.
To see how to invoke PAPI-WS when using Oracle BPM Studio, go to this thread: PAPI Web Service (PAPI-WS) Example for Oracle BPM Studio
If you need a step-by-step example of how to use PAPI (the Java API) go to this thread: Creating a new work item instance in a process using PAPI
Hope this helps,
DanDan,
I tried in both studio and Standalone.
From Studio :*
1. The Url for the Webservice is (http://localhost:8585/papiws/PapiWebServiceEndpoint?wsdl). From studio by default port number was 8585.From this studio wsdl URL(http://localhost:8585/papiws/PapiWebServiceEndpoint?wsdl),I did n't see any wsdl text in the browser.
From Standalone :*
1. In BPM Admin Center, I have selected *"PAPI Web Services"* check box(Page 5 of your document).
2. In The BPM Admin Center, I have clicked on *"Start BPM Web Applications"*.
3. After Stand alone server started *"Launch PAPI WebServices Console"* link was enabled,And I clicked on that link.It opened a browser with URL (http://localhost:8686/papiws/PapiWebService)
Oracle® BPM PAPI Web Services
Service Name 'PapiWebService'
Style: Document Literal Wrapped
SSO Enabled: false
WS-Security UsernameToken Profile Authentication Enabled: false
HTTP Basic Authentication Enabled: true
Preset Authentication Enabled: false
MTOM Optimization for attachments Enabled*: false
Endpoint: http://localhost:8686/papiws/PapiWebServiceEndpoint
WSDL: http://localhost:8686/papiws/PapiWebServiceEndpoint?wsdl
I have copied wsdl URL(http://localhost:8686/papiws/PapiWebServiceEndpoint?wsdl) and pasted it into a browser's URL field.I did n't see any wsdl text in the browser,but I see following error
HTTP Status 404 - Servlet PapiWebServiceServlet is not available
type Status report
message Servlet PapiWebServiceServlet is not available
description The requested resource (Servlet PapiWebServiceServlet is not available) is not available.
Apache Tomcat/5.5.15
Edited by: Prabhasankar on Dec 24, 2010 9:10 AM -
PAPI Web Service (PAPI-WS) Example for Oracle BPM Studio
Here is the location of a step-by-step explanation on how to use PAPI Web Service (PAPI-WS) to create a work item instance and then run the instance inside an activity in a process running on Oracle BPM Studio.
http://www.4shared.com/file/128256802/f20abc7a/PAPI-WS_for_Oracle_BPM_Studio.html
Be sure to use the project that is in the zip file for this example.
If you need an example of how to use PAPI-WS on Oracle BPM Enterprise, go to this thread: PAPI Web Service (PAPI-WS) Example for Oracle BPM Enterprise Standalone
If you need a step-by-step example of how to use PAPI (the Java API) go to this thread: Creating a new work item instance in a process using PAPI
Hope this helps,
DanHi,
Is there any sample code showing PAPI-WS with VS 2008? AFAIK, there is a sample using VS 2005 and WSE 3.0, but I'm interested in using VS 2008/WCF.
Regards, -
Call for participation: OASIS Enterprise Key Management Infrastructure TC
We would welcome your participation in this process. Thank you.
Arshad Noor
StrongAuth, Inc.
To: OASIS members & interested parties
A new OASIS technical committee is being formed. The OASIS Enterprise Key
Management Infrastructure (EKMI) Technical Committee has been proposed by the
members of OASIS listed below. The proposal, below, meets the requirements of
the OASIS TC Process [a]. The TC name, statement of purpose, scope, list of
deliverables, audience, and language specified in the proposal will constitute
the TC's official charter. Submissions of technology for consideration by the
TC, and the beginning of technical discussions, may occur no sooner than the
TC's first meeting.
This TC will operate under our 2005 IPR Policy. The eligibility
requirements for becoming a participant in the TC at the first meeting (see
details below) are that:
(a) you must be an employee of an OASIS member organization or an individual
member of OASIS;
(b) the OASIS member must sign the OASIS membership agreement [c];
(c) you must notify the TC chair of your intent to participate at least 15
days prior to the first meeting, which members may do by using the "Join this
TC" button on the TC's public page at [d]; and
(d) you must attend the first meeting of the TC, at the time and date fixed
below.
Of course, participants also may join the TC at a later time. OASIS and the TC
welcomes all interested parties.
Non-OASIS members who wish to participate may contact us about joining OASIS
[c]. In addition, the public may access the information resources maintained for
each TC: a mail list archive, document repository and public comments facility,
which will be linked from the TC's public home page at [d].
Please feel free to forward this announcement to any other appropriate lists.
OASIS is an open standards organization; we encourage your feedback.
Regards,
Mary
Mary P McRae
Manager of TC Administration, OASIS
email: mary.mcrae(AT)oasis-open.org
web: www.oasis-open.org
a) http://www.oasis-open.org/committees/process.php
b) http://www.oasis-open.org/who/intellectualproperty.php
c) See http://www.oasis-open.org/join/
d) http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=ekmi
CALL FOR PARTICIPATION
OASIS Enterprise Key Management Infrastructure (EKMI) TC
Name
OASIS Enterprise Key Management Infrastructure (EKMI) TC
Statement of Purpose
Public Key Infrastructure (PKI) technology has been around for more than a
decade, and many companies have adopted it to solve specific problems in the
area of public-key cryptography. Public-key cryptography has been embedded in
some of the most popular tools -- web clients and servers, VPN clients and
servers, mail user agents, office productivity tools and many industry-specific
applications -- and underlies many mission-critical environments today.
Additionally, there are many commercial and open-source implementations of PKI
software products available in the market today. However, many companies across
the world have recognized that PKI by itself, is not a solution.
There is also the perception that most standards in PKI have already been
established by ISO and the PKIX (IETF), and most companies are in
operations-mode with their PKIs -- just using it, and adopting it to other
business uses within their organizations. Consequently, there is not much left
to architect and design in the PKI community.
Simultaneously, there is a new interest on the part of many companies in the
management of symmetric keys used for encrypting sensitive data in their
computing infrastructure. While symmetric keys have been traditionally managed
by applications doing their own encryption and decryption, there is no
architecture or protocol that provides for symmetric key management services
across applications, operating systems, databases, etc. While there are many
industry standards around protocols for the life-cycle management of asymmetric
(or public/private) keys -- PKCS10, PKCS7, CRMF, CMS, etc. -- however, there is
no standard that describes how applications may request similar life-cycle
services for symmetric keys, from a server and how public-key cryptography may
be used to provide such services.
Key management needs to be addressed by enterprises in its entirety -- for both
symmetric and asymmetric keys. While each type of technology will require
specific protocols, controls and management disciplines, there is sufficient
common ground in the discipline justifying the approach to look at
key-management as a whole, rather than in parts. Therefore, this TC will
address the following:
Scope
A) The TC will create use-case(s) that describe how and where
the protocols it intends to create, will be used;
B) The TC will define symmetric key management protocols,
including those for:
1. Requesting a new or existing symmetric key from a server;
2. Requesting policy information from a server related to caching of keys on the
client;
3. Sending a symmetric key to a requestor, based on a request;
4. Sending policy information to a requestor, based on a request;
5. Other protocol pairs as deemed necessary.
C) To ensure cross-implementation interoperability, the TC will create a test
suite (as described under 'Deliverables' below) that will allow different
implementations of this protocol to be certified against the OASIS standard
(when ratified);
D) The TC will provide guidance on how a symmetric key-management infrastructure
may be secured using asymmetric keys, using secure and generally accepted
practices;
E) Where appropriate, and in conjunction with other standards organizations that
focus on disciplines outside the purview of OASIS, the TC will provide input on
how such enterprise key-management infrastructures may be managed, operated and
audited;
F) The TC may conduct other activities that educate users about, and promote,
securing sensitive data with appropriate cryptography, and the use of proper
key-management techniques and disciplines to ensure appropriate protection of
the infrastructure.
List of Deliverables
1. XSchema Definitions (XSD) of the request and response protocols (by August
2007) 2. A Test Suite of conformance clauses and sample transmitted keys and
content that allows for clients and servers to be tested for conformance to the
defined protocol (by December 2007)
3. Documentation that explains the communication protocol (by August 2007)
4. Documentation that provides guidelines for how an EKMI may be built,
operated, secured and audited (by December 2007)
5. Resources that promote enterprise-level key-management: white papers,
seminars, samples, and information for developer and public use. (beginning
August 2007, continuing at least through 2008)
Anticipated Audiences:
Any company or organization that has a need for managing cryptographic keys
across applications, databases, operating systems and devices, yet desires
centralized policy-driven management of all cryptographic keys in the
enterprise. Retail, health-care, government, education, finance - every industry
has a need to protect the confidentiality of sensitive data. The TC's
deliverables will provide an industry standard for protecting sensitive
information across these, and other, industries.
Security services vendors and integrators should be able to fulfill their use
cases with the TC's key management methodologies.
Members of the OASIS PKI TC should be very interested in this new TC, since the
goals of this TC potentially may fulfill some of the goals in the charter of the
PKI TC.
Language:
English
IPR Policy:
Royalty Free on Limited Terms under the OASIS IPR Policy
Additional Non-normative information regarding the start-up of the TC:
a. Identification of similar or applicable work:
The proposers are unaware of any similar work being carried on in this exact
area. However, this TC intends to leverage the products of, and seek liaison
with, a number of other existing projects that may interoperate with or provide
functionality to the EKMI TC's planned outputs, including:
OASIS Web Services Security TC
OASIS Web Services Trust TC
W3C XMLSignature and XMLEncryption protocols and working group
OASIS Digital Signature Services TC
OASIS Public Key Infrastructure TC
OASIS XACML TC (and other methods for providing granular access-control
permissions that may be consumed or enforced by symmetic key management)
b. Anticipated contributions:
StrongAuth, Inc. anticipates providing a draft proposal for the EKMI protocol,
at the inception of the TC. The current draft can be viewed at:
http://www.strongkey.org/resources/documentation/misc/skcl-sks-protocol.html
and a working implementation of this protocol is available at:
http://sourceforge.net/projects/strongkey for interested parties.
c. Proposed working title and acronym for specification:
Symmetric Key Services Markup Language (SKSML), subject to TC's approval or
change.
d. Date, time, and location of the first meeting:
First meeting will be by teleconference at:
Date: January 16, 2007
Time: 10 AM PST, 1PM EST
Call in details: to be posted to TC list
StrongAuth has agreed to host this meeting.
e. Projected meeting schedule:
Subject to TC's approval, we anticipate monthly telephone meetings for the first
year. First version of the protocol to be voted on by Summer 2007. StrongAuth is
willing to assist by arranging for the teleconferences; we anticipate using
readily available free teleconference services.
f. Names, electronic mail addresses, of supporters:
Ken Adler, ken(AT)adler.net
June Leung,June.Leung(AT)FundServ.com
John Messing, jmessing(AT)law-on-line.com
Arshad Noor, arshad.noor(AT)strongauth.com
Davi Ottenheimer, davi(AT)poetry.org
Ann Terwilliger, aterwil(AT)isa.com
g. TC Convener:
Arshad Noor, arshad.noor(AT)strongauth.comHi Bilge,
did you put your text in a blender before sending it?
I understood everything works fine except the miscellaneous menu item in the configuration tab of ERM?
Have you already tried to clear all browser cache, close all browsers and try it again?
Best,
Frank -
Configurations necessary for using EDI.
Dear All,
Kindly Give some light on configurations necessary for using EDI. I mean What is the use of EDI, How to use, what are the steps involve in that...
Regards
San Rao.Dear San,
EDI (Electronic Data Interchange) The transmitting of documents from one computer application to another computer application using a standardized format.
Why implement EDI?
Improves data accuracy: You can eliminate the need to re-enter data from paper documents and thus prevent potential data entry errors. It is estimated to be one-tenth the cost of handling its paper equivalent.
Reduces technical complexity: With EDI, companies use standardized data formats to exchange documents. EDI allows companies using different systems to achieve computer-to-computer electronic exchange of business documents.
Lowers personnel needs: EDI can help companies reduce the need for personnel involved in paper business transaction processing.
Accelerates information exchange: The lead time between start and completion of order processing is greatly reduced. By timeous scheduling companies can plan production more accurately and thus reduce stock inventories.
EDI technologies have evolved as a data carrier replacing the paper document. It is not a new concept or a new practice. EDI has existed for more than 2 decades in Europe and North America.
Early electronic interchanges used proprietary formats agreed upon between two trading partners requiring new programs each time a new partner was added to the existing system. Lateron some industry groups began a cooperative effort to develop industry EDI standards for purchasing, transportation, and financial applications. Many of these standards supported only intra-industry trading, which led to a large number of EDI formats.
In 1979, the Accredited Standards Committee (ASC) X12 was formed to develop a generic EDI standard. In 1993, Version 3, Release 4 contained 192 standards. There are over 100 additional standards in development. In the U.S., the most commonly used standard is ANSI X12, coordinated by the American National Standards Institute (ANSI). While in Europe, it is the Electronic Data Interchange for Administration, Commerce, and Transportation (EDIFACT) standard. SAP maps it message types by EDIFACT naming conventions
Hope this helps you.
Do award points if you found them useful.
Regards,
Rakesh -
Dimension tool plugin necessary for Illustrator ?
Hello,
unfortunatley my company bought CS4, but a few employees also sometimes need to add dimensions to drawings similar like in CAD software for engineer drawings possible.
But it looks like that it is NOT working with Illustrator CS4. (although written in Wikipedia, that illustrator closes gap between CAD and pixel basing software.)
Is there any possibility to install plugin for Illustrator or is Illustrator having such tool ?
Thanks for helping !
JanI have an AI Javascript that I built for my own convenience, which creates simple linear dimension callouts, as described here.
It is dependendent upon two Graphic Styles and one Paragraph Style which can be added to your documents (or templates) by copying / pasting from the .ai file that is included in the download .zip. However...
It is little unbelievable that Adobe, eliminated dimension tool from Illustrator. Why ?
Illustrator never had dimension tools.
although written in Wikipedia, that illustrator closes gap between CAD and pixel basing software
Whomever wrote that should be horse-whipped. (Or worse, forced to do techish commercial drawing with Illustrator in a roomful of others who are using either Canvas or CorelDraw.) That is probably the worst mis-characterization of what Illustrator is that I have ever heard.
Did my company buy the wrong software ?
Probably. If dimension tools and a few other very common features necessary for techish illustration are a frequent need, absolutely. Illustrator not only lacks ordinary dimension tools, it also lacks:
Reliable snaps.
User-defined drawing scales.
Connector lines.
Callout objects.
Live shape primitives (rectangles, polygons, ellipses, arcs) with geometric parameters (corner radii, etc.) that can be adjusted after creation.
Proper corner rounding / chamfering commands.
Any feature assist for mechanically corrrect perspective construction.
Is there any other software from adope, which is able to work on .jpg picture and using dimensioning, too ?
JPEG is just a lossy compression format for raster images. I don't know what it, in particular, would have to do with what you have described so far (using a mainstream drawing program to make attractive commercial illustration based on line work exported from CAD software).
But unlike most of its direct competitors these days, Illustrator does not provide any features (other than the ability to apply Photoshop filters) for actually editing raster images. It can import a raster image (JPEG or other) and manipulate it as an object (rotate it, scale it, mask it, etc.). But there are no pixel-editing features.
You have not very well described what your company's needs are. But just given your mention of dimension tools as being important and your need for something to "bridge" between working product drawings and commercial product illustration, I dare say you would be far better off with Canvas, Corel Draw, or Corel Designer.
Unlike its competitors, Illustrator has always treated anything the least bit "techish" as if it's something to fear. It's competitors embrace it as what it is: a huge segment of the overall mainstream commercial illustration world. And it isn't just this seeming "technical" vs. "paper doily" aversion. Much of it is simply the fact that Illustrator has never kept up with its competitors in straighforward, no-nonsense path drawing features. Illustrator has always sat too fat-and-lazy on its Adobe label for market share.
People (including myself) do technical/commercial illustration in Illustrator all the time. Most commerical product illustration is of that nature. But in doing so, they constantly employ tedious, cumbersome, and time-wasteful workarounds for the pathetically weak feature set of Illustrator--or they buy add-ons which cost half what they paid for Illustrator all over again. (I've never understood that mindset. No matter how well-done the plug-in, it's never as cleanly-integrated with the overall program as built-in features; and you have to put up with everything that goes along with mission-critical dependency upon add-ons from small third-party providers.)
JET -
Paper weight specs for HPLaserJet 100 color MFP M175nw
I have been trying (without success) to find the paper weight specs for my HP LaserJet 100 color MFP M175nw printer. Both the user manual and the online help only offer useless, non-specified info, such as : Use only heavy paper that is approved for use in laser printers and meets the weight specifications for this product. Tried to search for the paper weight specs for this product - no luck! I want to print on 200gsm (laser friendly paper), but don't want to damage my printer. PLEASE help?
This question was solved.
View Solution.I will provide a link to a page that should be able to help out. Once you have the page pulled up click on the drop down titled “Paper-handling Specifications” then click on “Paper Tray Capacities”. That will open a chart that gives chart that list the paper, Paper weight, and the Capacity. I hope that this helps. Here is the link: http://goo.gl/xBtGF.
I am a former employee of HP...
How do I give Kudos?| How do I mark a post as Solved? -
CA and Certificate Issue in ACS 4.0 For Windows 2003 Enterprise Server
Hi,
I have configured Microsoft CA server on the same ACS 4.0 for Windows 2003 enterprise server which was configured earlier using the self generated certificates for EAP and PEAP authentications.
After I change the certificate from self generated to the new CA certificate that can be viewed under install ACS certificate option on ACS server but having the following problems
1. SSL is not functioning while internet browser access to the ACS server and going through http instead of https.
2. Wireless clients are authenticated successfully even after the certificate is uninstalled.
Any help on these problems will be appreciated.
Thanks
Best Regards,
AhmedHi Rohit,
Thanks for reminding the HTTPS option under Administration Control on ACS.
I have some doubts pertaining to installation of certificates on Wireless clients though it is optional for Self Generated Certificates but what in case of Mirosoft CA as I tested wireless client authentications even after removing the certificate from microsoft supplicant WindowsXP SP2 having installed the patch KB885453 for PEAP. How the certificate on wireless client works.
Is it mandatory or optional to keep certificate on Wireless Clients as they could able to get authenticated through ACS after removing the certificate.
Thanks
Best Regards,
Ahmed -
Is model view(BD64) necessary for EDI
is model view created using BD64 necessary for a EDI transactions? I have created a logical system, a RFC destination and a EDI File Port.
After all this i am trying to push a material master data using BD10 to the file port. When i do that the system gives me a message saying that master idoc created but it does not create a communication idoc. Only if i have a Model view set up in BD64 it creates a communication idoc. So my question is do we need a model view for EDI configuration?
~SureshHi,
BD64 is required for master data distribution..
If you are having a interface that sends IDOCs to the customer or receive IDOCs from the vendor..You don't require BD64 setup..
Thanks,
Naren -
HT3231 What cables are necessary for the fastest transfer of data from MacBook Pro to MacBook Air
What cables are necessary for the fastest transfer of data from MacBook Pro to MacBook Air
As I posted "it is an Unknown", at least to me, what type FW port is on the OPs older Mac.
LowLuster
HT3231 Re: What cables are necessary for the fastest transfer of data from MacBook Pro to MacBook Air
Dec 26, 2013 8:04 PM (in response to OGELTHORPE)
But the newest Mac notebooks do not have a firewire port.
So he may need a TB to FW adapter, $29, a FW 400 or 800 cable, $??, and then a FW 400 to 800 cable/port adapter (If the old Mac only has a FW 400 port), $??.
It is unknown if the old Mac has a FW 400 or 800 port. -
I am running windows XP professional X64 Edition and it is necessary for me to instll Adobe reader 9
I am running windows XP profession X64 edition and it is necessary for me to install and use Adobe reader 9. Please advise procedure(s)
If you're NEVER going to EVER open a PDF, then no, it wouldn't be necessary. But you're going to be in an extremely rare set of circumstances if that's going to be the case.
Otherwise, you'll need it, and Reader 11 works with XP Pro. -
I've installed Visual Studio Enterprise 6.0, Which
edition of Visual Studio 2013 does the i need to purchase as the legalization for Visual Studio Enterprise 6.0?Hi,
Here is a topic for MS Visio forum, you'd better post your question to Visual Studio forum.
http://social.msdn.microsoft.com/Forums/vstudio/en-US/home?forum=visualstudiogeneral&filter=alltypes&sort=lastpostdesc
Thanks for your understanding.
Regards,
George Zhao
TechNet Community Support -
Release notes for iPlanet-WebServer-Enterprise/4.1SP7
Hi,
Where can i get the release notes, known bugs and fixes for iPlanet-WebServer-Enterprise/4.1SP7.
Plesae reply back.
Thanx
ShivaHi,
You can find the release note for iPlanet Web Server SP7 from the following link
http://docs.sun.com/?p=/doc/816-5676-10
Srini -
Where is the official documentation for Wireless OTA Enterprise App Distribution?
Where is the official documentation for Wireless OTA Enterprise App Distribution? It used to be here:
http://developer.apple.com/library/ios/#featuredarticles/FA_Wireless_Enterprise_ App_Distribution/Introduction/Introduction.html
The above link is present in many posts in these forums (cf. More Like This below this question.
The information I seek may also have been here:
http://support.apple.com/kb/index?page=answerlink&url=http://manuals.info.apple. com/en_US/Enterprise_Deployment_Guide.pd…
The article in question had official details on
the itms-services:// link,
the app manifest file format and
the general information.
Currently I cannot find anything official on enterprise app distribution - only third party information. Has something changed, or is this a documentation glitch? Surely wireless OTA enterprise app distribution is still available via the enterprise developer program?
Note: We currently use this for one of our enterprise clients. But before recommending other clients to join the enterprise developer program, we would like an official citation on whether this mechanism still exists.OK, the link in my question is no longer a 404. It's been replaced by a redirect to a new iOS Enterprise Deployment subsite which has been remade for iOS 8.
http://www.apple.com/iphone/business/it/deployment.html
My actual question about the technical reference is now located in the iOS Deployment Reference section of Apple Help:
https://help.apple.com/deployment/ios/#/apda0e3426d7 -
Make IBAN field necessary for vendor master
Hi SAP gurus,
is there any way to make IBAN field in bank details necessary for vendor master?
I have tryed with SAPMF02K - EXIT_SAPMF02K_001 but there isn' t a iban filed.
thx in advances
V.
Moderator: Double-postDear all,
no unfortunately you can not set up this in field status.
It is possible as a workaround to use 'Bank Details' as mandatory in
OBD3.
This is possibly because IBAN can not be entered alone without the
traditional Bank Details. However, once you have entered the
traditional bank information, it is not possible to set the IBAN as a
mandatory field.
If I were you I'd have a look at user exit and SAPMF02K to
check the vendor master data.
You have also BTEs:
00001440 VENDOR MASTER DATA: Final checks
I hope it helps You.
mauri
Maybe you are looking for
-
I am interested in buying a macbook laptop. I am confused however in which one I should buy for the type of work that I will be doing. I either am looking into getting a macbook pro or the macbook air. I am leaning more towards the air.
-
ITunes not working; cannot fully uninstall or reinstall
iTunes has been running VERY slowly on our computer and we have been unable to load the latest update. I decided to uninstall iTunes - but I was unable to completely uninstall it and I have not been able to successfully run the Microsoft Uninstaller
-
HT4914 my ipod mini to music on my home MAC
I can't seem to put music from my home MAC backed up to the cloud to my office PC to place on a i-pod nano. It looks like I have to take it home to sync directly with my MAC but I thought with i-tunes store and the cloud I should be able to do it fr
-
Hi All, Hope you all are doing well. I have a small query. I did all the configuration of packing..Packing is coming automatically during delivery.. But my query is how to see and configure the handlimg unit output. Kindly sugeest me and send some
-
Problems about create guest vm using office template in vm manager 3
in vm manager 2.2, we may pass "ip address, os root's password, vnc console password"\ But we can't pass them in vm manager 3.0. after creating guest vm ,how login to guest os via console or vncviewer without password?