Setup security for Consumer

Hi experts,
I have a requirement in my project where as part of system readiness check it has been asked to "Setup security for Consumer".Does anyone know as to how to proceed with the requirement.Is this related to HR or CRM?.
Watever information you guys have please share it with me.
Usefull answers will be rewarded subsequently
thanks in advance,
Abhinav Mahul.

Hi Abhinav,
To perform Security check for Consumer means to assign proper rights to the user who gonna use consumer master data and who gonna access consumer master data. Thus to ensure that no data of consumer getting changed illegally and every things happens within the system.
Best Regards,
Pratik Patel
<b>Reward with Points!</b>

Similar Messages

  • How to setup security for Forms, Reports, and Discoverer11g on WLS 10.3.5

    I am trying to setup simple security on my WebLogic server (linux OS) using a Windows Active Directory Server. I have an LDAP authentication provider created that links to a central Active Directory server, but I am unclear on where to go next.
    I want the user to login to the network from their PC but not have to login again if they decide to run an application like Discoverer, all of the authentication would be handled by the Windows AD server. Has anyone else done this before on WebLogic?
    Are there white papers out there that would explain the steps required to accomplish this? Thanks for any help.

    Soooo...I need to install OID on top of my Forms, Reports, and Discoverer install? Would it be better to install the SSO and OID before installing any other middle ware products like Forms, Reports, and Discoverer? Then extend the domain to include Forms, Reports, and Discoverer?
    Can you point me to documentation that would help me get this issue worked out?
    Thanks.

  • How to setup security for new project type templates?

    Hi Folks,
    I created some new project type templates.
    But, as per management decision, i need to restrict this new project templates for all project users except only one super user.
    So, could anybody please help me out that how to make security in the above scenario?
    Thanks in advance,
    SPR

    Soooo...I need to install OID on top of my Forms, Reports, and Discoverer install? Would it be better to install the SSO and OID before installing any other middle ware products like Forms, Reports, and Discoverer? Then extend the domain to include Forms, Reports, and Discoverer?
    Can you point me to documentation that would help me get this issue worked out?
    Thanks.

  • Does the LabView support htaccess/htpasswd security for WebPages?

    There is a server with LabView's executable which makes reports on the server folder.
    Need to get access to the executable through RemotePanels and to html/txt/xls-reports through the same LabView WebServer.
    One solution is to use LabView WebServer + Apache or +GServer (has no advantages over Apache).
    But in this case we need to authentificate for 2 times: 1.Apache, 2.LabView WebServer.
    G-Server
    with cgi-scripts is not a solution because of there is a lot of text fields on panels and events
    (too many) and NI recommends to use LabView embedded WebServer for panels, not a G-Server.
    Has anybody a solution?

    Please forgive me but I am unclear on what it is you are looking for.  Can you please clarify?
    I did a quick search on ni.com for htaccess and found the following two pages.  Have you seen these yet and does this help at all?
    KnowledgeBase 3FNERTVB:  How to Setup Security for the G Server?
    KnowledgeBase 4J1DPELC: Can I Enable G Web Server Authentication for My LabVIEW Remote Front Panel?
    David_L | Certified LabVIEW Architect
    LabVIEW Tools Network | LabVIEW Tools Network Developer Center

  • Setup crypto for secure communication with other switches

    What kind of code can be used to setup crypto for secure communication with other switches.

    ok but is there any special code i need to write if i need to create a crypto secure communication between some particular switches.

  • How to setup security manager for applet at runtime?

    hello everyone,
    I am wonder if there is a way to setup security manager at runtime. This is what I am trying to do:
    1. Create a Applet GUI and allow users to specify in an input dialog box of the URL they like make connection to.
    I know there is two way of do this
    1. Is modify java.policy file and specify the URL SocketPermission to connect to.
    2. setup signed certificate applet.
    But, I would to try to see if there is a way to have applet make connection at runtime when users specify the URL.
    Anyone have any ideas.
    Thanks.

    Thanks, Peter
    Going over some articles you and references that you pointed out was very useful on how the java security model work and a little bit history too.
    So, I am assuming that I can make my own securitymanager class that defines the permission of the applet that I am working, using Permission, SecurityManager, ....etc class right? I just want to be clear on what I am going to be doing.
    If you have any other thoughts, Thanks,

  • Am being prompted to enter security questions when making a purchase on my new IPad.  I don't believe I have ever setup security questions on my apple id.  How to I create new security questions?

    I am being prompted to enter security questions when making a purchase on my new IPad.  I don't believe I have ever setup security questions on my apple id.  I have tried logging into my apple id and have chosen the security and priviacy settings to set up security questions.  However I am prompted to enter answers to security questions and am told they don't match.  How to I create new security questions or reset them? 

    You need to ask Apple to reset your security questions; ways of contacting them include phoning AppleCare and asking for the Account Security team, clicking here and picking a method for your country, and filling out and submitting this form.
    They wouldn't be security questions if they could be bypassed without Apple verifying your identity.
    (104011)

  • How to setup Security during installation

    Hi Experts,
       Please let me know how to achieve "Setting up security for service-level accounts (page 12 in SAP BPC 5.1 Master Install Guide)"... I have created 3 users in my windows server 2003:
                 1.Administrator (member of Administrators group in server 2003)
                 2.SysAdmin (member of Administrators group in server 2003)
                 3.student (member of Users group in server 2003)
    Please let me know whether\how the System Admin ID matches with the SystemAdmin role in the BPC 5.1 and how the Admin ID matches with the PrimaryAdmin role in the BPC 5.1.
    I am installing using SysAdmin ID which is a member of Administrators group on my machine.
    I have also got License file from Service Market Place for SAP BPC 5.1 where and how should I use this file ??
    Thank You,
    Sudhakar Kuricheti

    What I normally do during an installation, is to create one user whith which I do the complete installation.This user should pass the following requirements:
    u2022 The user must preferably be a domain user. It can be a local user on the server, but not in a production environment.
    u2022 The user must be a local administrator on the SAP BPC server and in the case of a multi-server installation on all the servers in the environment.
    u2022 This user will have to be part of the Remote Desktop users group as well because it is the only user that will be able to perform certain actions on the SAP BPC server through the SAP BPC Server Manager for example backups and restores of application sets.
    u2022 Please note, this user can be reset through the server manager but because it is normally also used to start the SAP BPC COM+ components, certain services and many tasks within the application, it is of utmost importance that this user must be configured carefully before the start of the installation.
    Then I instal SQL 2005 in mixed mode (so with a SA account). When finished installing SQL 2005 I run the SAP BPC setup, where I specify the same user as I used for the SQL 2005 installation for all 3 fields where usernames can be filled in.
    Regarding the license file, this can be located anywhere on your server where it does not get deleted. Mostly during my installations I make a folder on the C drive called something like C:/BPC License File and put it there. The license file should be specified in the third step (first select install BPC on SQL2005, then next on the first screen containing some warnings about closing all other windows applications).
    Edited by: Tim Vierhout on Sep 2, 2008 8:11 AM

  • RAID for Consumer PCs

    If you have an interest in using RAID, then the MS Word document attached to this post may be useful information.  Scroll all the way to the bottom for the attachment.
    RAID for Consumer PCs
    Table of Contents
    RAID
    RAID 0
    RAID 1
    RAID 5
    RAID 10 (0+1)
    INTEL Controller Support for Different RAID Configurations
    Background Information for Creating a RAID configuration.
    Considerations:
    Performance comparisons
    Creating a RAID 0 Array
    Creating a RAID 1 Array
    Creating a RAID 5 Array
    Creating a RAID 10 (0+1) Array
    Conversion from RAID 0 to RAID 5
    RAID 0 to RAID 5 Observations
    Other RAID Migrations
    *************DISCLAIMER***********
    RAID
    RAID is an acronym for Redundant Array of Inexpensive Disks and also commonly called Redundant Array of Independent Disks.  A RAID array is created when one or more hard disks or one or more solid state disks (SSD) are combined to form a logical volume using one of several different configurations.  Consumer level PCs typically use RAID 0, RAID 1, RAID 5 and occasionally RAID 10 (0+1).  The RAID configuration choice is dependent on the requirements for redundancy, speed and capacity.  The choice of a RAID configuration will be a compromise between speed, redundancy, capacity and cost.  The different RAID configuration options can be restricted by hardware limitations.
    RAID 0
    A RAID 0 volume is created when 2 hard disks are used and then data is spanned or striped across the different hard disks.  The process of spanning data across different hard disks is also called scatter loading.  By spreading data across multiple hard disks, a significant performance improvement can be gained.  However, should one of the hard disks fail, then the entire RAID 0 configuration becomes unusable.  A RAID 0 volume combines the capacity of the hard drives being used in the configuration.
    RAID 1
    A RAID 1 configuration is created when 2 hard disks are used and then data on hard drive 1 is replicated to hard drive 2.  The process is also called data mirroring.  This configuration provides for redundancy in the event of a single hard drive failure but at the expensive of a degradation to write performance as data has to be written to multiple hard drives.  Since the data is being replicated between two volumes the overall capacity is limited to that of one hard drive.
    RAID 5
    A RAID 5 configuration is similar to a RAID 0 array except RAID 5 deploys distributed parity also referred to as checksum data.  Blocks of data are stripped across three or more hard drives and each hard drive contains block level recreation data (parity).  In the event of a hard drive failure, parity will allow for the data to be accessed through a dynamic data creation process.  The downside to the dynamic data creation process is a reduction in performance until the failing hard drive can be replaced.  RAID 5 performs best for supporting read accesses as write operations will be slower while the parity blocks are being updated.  Parity data does consume disk space.  A three hard drive RAID 5 array will have about the same total data capacity as a two hard drive RAID 0 array.
    RAID 10 (0+1)
    A RAID 10 configuration also called RAID 0+1 can be implemented in two different methods depending on the hardware being used.  The below left configuration is a striped RAID 1 array being replicated and the below right configuration is a RAID 0 array being replicated.  A RAID 10 configuration can provide a RAID 0 performance level even with the loss of one hard disk.  The downside to RAID 10 is the reduced configuration capacity.
    INTEL Controller Support for Different RAID Configurations.
    The RAID configurations used in this document are based on the INTEL SATA controller.
    See the below table.
    NOTE: Even though your system board may have the appropriate Intel controller,
    not all system boards will provide RAID functionality.
    Background Information for Creating a RAID configuration.
    You can create a RAID configuration provided that:
    The PC cabinet can accommodate additional hard drive(s) if needed.
    The system board has the necessary open SATA port(s) if needed.
    A SATA controller that can support the desired RAID configuration.
    You can determine the status of your RAID configuration by using the Intel Rapid Storage Technology (IRST) software.  If you don’t have this software on your PC then you can download IRST from the Intel web site.  I recommend that you use the latest version available from Intel.  Background information can be obtained from the IRST User Guide.  When you launch IRST, the help topics are an excellent source of information.  You can access IRST by going into the Control Panel and select Intel Rapid Storage Technology. You can also access IRST from the lower right Task Bar location.  IRST should resemble a hard drive icon and normally it has a green check mark.  By default IRST is set as delayed startup so don’t expect to see it active right after boot up. The Intel images being used in this document are from IRST version 11.1.0.1006.
    If the SATA controller in your PC is not set to RAID then read this Microsoft article if you are running VISTA or Windows 7.  You need to run the MrFixIT script before you reboot your PC in the bios and make the SATA controller mode change to RAID.  The script will then allow Windows to choose the correct driver when you reboot your PC.  If you plan on using a boot drive image restore then be sure to run the script just prior to making taking your image backup.  That way your backup image is set to allow Windows to choose the correct SATA driver.
    Before creating any RAID configuration, always make backups of your data and image the boot hard disk to external media such as an USB drive.  Additionally, be sure that your imaging product boot disk is functional, particularly if the PC’s boot hard disk is part of the RAID configuration.  Its best to use a commercial hard disk imaging product as support and functionality is generally better than the “freebie” software.
    Be sure that your PC is running the latest available BIOS.  BIOS updates are used to update the Intel ROM firmware.  Additionally, check for hard drive and SSD firmware updates.
    Summary of preparation steps in priority order:
    Backup your data.
    Test out your recovery and restore procedures.
    Update the following: BIOS, hard drive firmware, SSD firmware
    Update IRST
    Execute the Microsoft MrFixIt if your PC is not set to RAID mode in the bios.
    Create an image of your boot hard drive.
    Considerations:
    After replacing a failed hard drive, don’t expect the rebuild process to be fast.  All of the data that existed on the failed hard drive must be either regenerated using parity data or replicated to the new hard drive.
    I recommend that you use an uninterruptable power supply (UPS) when using RAID 5. Cached write data needs to be written to hard drive in the event of a power failure to avoid the loss of data.  You might want to consider disabling write back cache if you are not using an UPS. There is a performance reduction by doing so at the expense of improving data integrity.
    If you need a RAID array over 2 TB then your PC needs: UEFI bios, 64 bit operating system, GPT formated hard drives.  Review this Microsoft article on Windows and GPT FAQs.
    Since a MBR formated array will limit the useable space to 2 TB it’s therefore best to use hard drives that are 1 TB or less for RAID 0, 5 and 10.
    Consider the data growth rate and the size of the array.  The Intel controller will limit the number of hard drives.  The size of the PC cabinet and available system board SATA ports will also be growth constraints.  It’s not uncommon for a business to experience an annual data growth rate of 20 percent.
    If you need a RAID solution beyond the typical consumer level RAID configurations, then you should review the RAID options available from HP.
    RAID technology in not infalible so you need to consider backups.  A voltage spike inside your PC could render the RAID unusable and unrecoverable.  Corrupted data or a virus are other reasons for keeping backups.  An external USB connected hard drive might be sufficient for backups.
    Throughly test your backup and restore software. Always keep more than one backup copy of your data.
    Performance comparisons:
    All of the hard drives benchmarked are Hitachi 1.5 TB SATA III hard drives connected as SATA II devices.  HD Tune was used to benchmark the seniaros using default settings.
    Configuration
    Average MB/s
    Maximum MB/s
    Single hard drive
    113
    152
    RAID 0
    222
    289
    RAID 1
    104
    142
    RAID 5
    221
    288
    RAID 10 (0+1)
    220
    274
    Creating a RAID 0 Array.
    If you are configuring the Windows boot drive into a RAID 0 array, then you need to use the Intel option ROM method for creating the array.  Tapping Cntl-i at boot up will get you into the Intel option ROM firmware setup utility.  Once the array has been created then boot up your image recovery disk and load the array from your image backup.
    If you are creating a RAID 0 data only array then you can use the IRST when running Windows to create the array.  You can also use the Intel option ROM firmware setup utility.  Even though this HP VISTA RAID setup article is dated, it does have some excellent information.
    Launch IRST.
    You can observe in the above image the status of the hard drives attached to the Intel SATA controller.  Now click on Create. Select Optimized Disk (RAID 0) then click on Next.
    Configure the RAID 0 array by selecting two hard drives of the same size and click on Next.
    Next click on Create Volume.
    A warning window will appear.  Click on OK.
    The new RAID volume is now created. However, you now need to use Windows Disk Management to ready the volume for use.
    Creating a RAID 1 Array.
    If you are configuring the Windows boot drive into a RAID 1 array, then you need to use the Intel option ROM method for creating the array.  Tapping Cntl-i at boot up will get you into the Intel option ROM firmware setup utility.  Once the array has been created then boot up your image recovery disk and load the array from your image backup.
    If you are creating a RAID 1 data only array then you can use the IRST when running Windows to create the array.  You can also use the Intel option ROM firmware setup utility.  Even though this HP VISTA RAID setup article is dated, it does have some excellent information.
    Launch IRST.
    You can observe the above status of the hard drives attached to the Intel SATA controller.  Now click on Create.
    Select Real-time data protection (RAID 1) and click NEXT.
    Configure the RAID 1 array by selecting two hard drives of the same size and click on Next.
    Next click on Create Volume.
    The new RAID volume is now created. However, you now need to use Windows Disk Management to ready the volume for use.
    Creating a RAID 5 Array.
    A RAID 5 array will require three to four hard drives. While it is possible to convert a RAID 0 to a RAID 5 array, I recommended that you consider building the RAID 5 array from scratch rather than use a conversion method.
    If you are configuring the Windows boot drive into the RAID 5 array, then you need to use the Intel option ROM method for creating the array.  Tapping Cntl-i at boot up will get you into the Intel option ROM firmware setup utility.  Once the array has been created then boot up your image recovery disk and load the array from your image backup.
    If you are creating a RAID 5 data only array then you can use the IRST when running Windows to create the array.  You can also use the Intel option ROM firmware setup utility.  Even though this HP VISTA RAID setup article is dated, it does have some excellent information.
    The following procedure will build the RAID 5 array with three hard drives using IRST.
    Launch IRST.
    During this create process, I will be using the last three hard drives
    listed in the above image under Storage System View.  Now click Create.
    Select Efficient data hosting and protection (RAID 5) and click
    On Next.
    Select the three hard drives for RAID 5 and click on Next.
    Review the volume creation selections then click on Create Volume.
    Review the final warning then click on OK.
    Now click on OK and review the final array status.
    Creating a RAID 10 (0+1) Array.
    A RAID 10 (0+1) array will require four hard drives.
    If you are configuring the Windows boot drive into the RAID 10 (0+1) array, then you need to use the Intel option ROM method for creating the array.  Tapping Cntl-i at boot up will get you into the Intel option ROM firmware setup utility.  Once the array has been created then boot up your image recovery disk and load the array from your image backup.
    If you are creating a RAID 10 (0+1) data only array then you can use the IRST when running Windows to create the array.  You can also use the Intel option ROM firmware setup utility.  Even though this HP VISTA RAID setup article is dated, it does have some excellent information.
    The following procedure will build the RAID 10 (0+1) array using four hard drives using IRST.
    Launch IRST.
    This create process will be using the last four hard drives listed in the above image under Storage System View.  Notice that the hard drives are not the same size.  Two of the hard drives are 1.5 TB and two hard drives are 2 TB.  While it’s recommended to use all hard drives of the same size, it’s not required. The RAID 10 creation progam will pick to two smallest hard drives for the striped pair and then the two largest hard drives for replication pair but not the opposite as the two largest hard drives if used as the striped pair would not fit on the two smaller hard drives for replication.  Now click Create.
    Select Balanced performance and data protection (RAID 10) and click
    on Next.
    Select the four hard drives for RAID 10 and click on Next.
    Notice that IRST is set to create a RAID 10 volume with the capacity of 2.7 TB.
    Review the volume creation selections then click on Create Volume.
    Review the final warning then click on OK.
    Now click on OK and review the final array status.
    Conversion from RAID 0 to RAID 5
    If you have a RAID 0 hard disk configuration and you are concerned that a hard drive failure will cause your PC to crash or results in data loss then you might have an option to use RAID 5.  A RAID 5 three drive configuration can survive a single hard drive failure but not two failing hard drives. While there are other RAID configurations possible, this document will only be addressing a three hard drive configuration using the Intel SATA controller.  Some of the newer HP PCs can accommodate three hard drives and can be configured when ordered with RAID 5.
    Observe the below image.  This PC has a RAID 0 2.7 TB array.  To build the RAID 5 array, you will need to add (configure) an additional hard drive into the array. Click on Manage and then add an eligible hard drive to the array.
    Note: all data on the hard drive to be added to the array will be lost since parity and data from the existing array needs to be written to the added hard drive to create the RAID 5 array.  Take backups of your existing array in case something goes wrong.
    Once you are on the Manage screen then click on Change type.
    The following screen will appear:
    Select the drive to be included into the array and click on OK.
    When the migration process begins, the Status is now indicating migrating and the Type is RAID 5.  The hard drive added was 2 TB which meets the minimum amount.  BE PATIENT!  The migration process will take a very long time for an in place migration to complete.
    It’s much faster to delete out the original RAID 0 volume, create the new RAID 5 volume and then reload the original RAID 0 image from your backups. I recommend that you consider
    this method verses the in place approach.
     Click on Status to show the migration progress.
    RAID 0 to RAID 5 Observations
    I was able to shut down and boot the RAID configuration before the migration process had completed.  The in place migration method was very slow, about 3% per hour and hence my recommendation to use a differnet method.  Booting up from different hard drive before the migration process has completed results in a BSOD on boot up.
    After completing the RAID 5 conversion, I did receive a message from IRST indicating that one or more volumes is protected against a hard drive failure.
    Other RAID Migrations
    While there are other RAID migrations options available, they can be platform (chipset) specific.   Review this Intel Chipset article on supported RAID migrations.  Even though the Intel RAID migration has a safety function built into the process in the event of a power loss or shutdown, it’s always best to have a complete set of up-to-date backups.
    The migration process can be painfully slow.  The migration time is largely dependent on the hard drive sizes and the number of hard drives involved in the overall migration.  In some cases it might be faster to build the RAID array from scratch and then load the data back to the array verses using an in place migration process.
    It is possible to increase the overall RAID array (volume) size with some RAID configurations by adding hard drives to the array.   The overall size of the array may be limited by how the array had been previously formatted by Windows.  Review the information under the Considerations topic in this document.
    *********updated August 21, 2013
    If you are using SSDs in a RAID 0 configuration then you will need to have the Intel 7 or 8 chipset plus Intel Rapid Storage Technology (IRST) version 11 or higher to get Windows TRIM support to function. The latest version of IRST as of 8/21/2013 that I have seen is 12.7.1036.
    *************DISCLAIMER***********
    There may be inaccuracies with the information contained in this document so please consider that when using RAID.
    *************DISCLAIMER***********
    HP DV9700, t9300, Nvidia 8600, 4GB, Crucial C300 128GB SSD
    HP Photosmart Premium C309G, HP Photosmart 6520
    HP Touchpad, HP Chromebook 11
    Custom i7-4770k,Z-87, 8GB, Vertex 3 SSD, Samsung EVO SSD, Corsair HX650,GTX 760
    Custom i7-4790k,Z-97, 16GB, Vertex 3 SSD, Plextor M.2 SSD, Samsung EVO SSD, Corsair HX650, GTX 660TI
    Windows 7/8 UEFI/Legacy mode, MBR/GPT
    Attachments:
    RAID for Consumer PCs.doc ‏3761 KB

    Great document
    I am a volunteer. I am not an HP employee.
    To say THANK YOU, press the "thumbs up symbol" to render a KUDO. Please click Accept as Solution, if your problem is solved. You can render both Solution and KUDO.
    The Law of Effect states that positive reinforcement increases the probability of a behavior being repeated. (B.F.Skinner). You toss me KUDO and/or Solution, and I perform better.
    (2) HP DV7t i7 3160QM 2.3Ghz 8GB
    HP m9200t E8400,Win7 Pro 32 bit. 4GB RAM, ASUS 550Ti 2GB, Rosewill 630W. 1T HD SATA 3Gb/s
    Custom Asus P8P67, I7-2600k, 16GB RAM, WIN7 Pro 64bit, EVGA GTX660 2GB, 750W OCZ, 1T HD SATA 6Gb/s
    Custom Asus P8Z77, I7-3770k, 16GB RAM, WIN7 Pro 64bit, EVGA GTX670 2GB, 750W OCZ, 1T HD SATA 6Gb/s
    Both Customs use Rosewill Blackhawk case.
    Printer -- HP OfficeJet Pro 8600 Plus

  • IMovie capture quality better than anything FCP can offer for consumer DV?

    As a newbie to FCP, I have not found Capture, sequence, and export settings that is equal to or better than what iMovie 08 can create. Prior to this, I've been using iMovie 08 which is extremely user friendly. Just plug in the fire wire connections and it auto detects only one setting for DV. I am not sure what format it captures in but it does a good job. When I export out of iMovie 08 I use "using Quicktime" and choose the Uncompressed 8-bit NTSC method. The result is a decent, non-interlaced looking .mov file.
    The first time I tried to capture with FCP I chose the easy setup, where I would capture in the NTSC DV, sequence would be NTSC DV and export using the current settings in quicktime. The result was an interlaced and lowered quality vid.
    I have also tried the following combinations with no success with quality comparisons w/ iMovie 08:
    capt: NTSC dv, seq: NTSC DV, progressive exp: Uncompressed 8-bit
    capt: Uncompressed 8-bit, seq: Uncompressed 8-Bit exp: Uncompressed 8-bit
    This last one came close, but still iMovie 08 was better.
    My assumption is that FCP would contain the settings to duplicate or even out perform iMovie's export quality for consumer video dv. I viewed iMovie as little brother and FCP as big brother. Shouldn't FCP produce equal to or better quality than iMovie 08? And what are the settings for this?
    Thanks

    Thank you for clearing up my confusion. How is my export from iMovie 08, using "Uncompressed 8-bit" coming out progressive (I see no interlaced, odd/even scan lines)? Is this export dropping lines/information? If so, uncompressed is not an appropriate name for the export.
    I understand what you are saying about "getting quality back" on export. My initial question was comparing the quality of an iMovie 08 export vs. FCP export and having the problem of a lowered output from the FCP export.
    If anyone has the time, would they try a short experiment:
    1. From your DV source, camera or deck connect to your computer
    Capture a short clip via iMovie 08 a short clip in standard 4:3.
    Export using Quicktime, Uncompressed 8-bit setting
    2. From your DV source, camera or deck, connect to your computer.
    Capture the same short clip to FCP using Easy set up for NTSC DV. Export with current settings.
    3. Compare the two.

  • Row level Security for BI Author Role

    Hi All,
    We are using OBIEE 11.1.1.5 in our project. We have a requirement where we need to configure row level security on certain column.
    We are currently using external table and session variable approach to configure this. This security works fine for the users with BI Consumer
    roles. But we are facing issue with configuring row level security for BI Author role.
    BI Author can create any analysis in BI Answers and suppose he/she creates a report which does not contain the column on which row level
    security is applied than he can see all the data. For eg.
    We have one dimension Products having two levels Product Division and Brand. I want to configure security based on Product Division column.
    But if BI Author create a report with only Brand and Measures than row level security is not working.
    Does anyone has face this issue before.
    Please let me know if you want any other information from my side.
    Regards,
    Vikas

    If you are using a multidimensional cube you can use the "permit" command to control access to dimension members or provide cell level security within the cube. The OLAP database documentation provides on how to use the PERMIT command.
    If you are using relational tables and/or views with additional CWM metadata mapped using OEM then you need to refer to the database documentation relating to Virtual Private Databases and Label Security
    Business Intelligence Beans Product Management Team
    Oracle Corporation

  • SQL Developer Feature Request :: Tool Security for DBAs

    TOAD has a feature that our DBAs like. It is called TOAD Security. In effect the tool looks at a table (on a per instance, per schema basis) to determine what menu options and features should be enabled/disabled. DBA's are provided with a GUI interface to manage the permissions, however once the table changes are noted, then the activity can be scripted for other schema/instances.
    If it is not already in the plans, then it would be an excellent feature to add to SQL Developer. With something like this in place, we could defintely consider moving to SQL Developer as our tool of choice.

    thats understandable. The expense of TOAD is small peanuts compared to the larger sums of monies being spent in IT, however, IMHO there is no sense spending it if a proper match can be found. I am just watching and waiting as the Oracle product continues to mature. Having the ability for tool to be controlled via an external security model, would be a plus.
    To give an idea, DBA's basically took away abilities that were too easy to accidentally do but had bad results..
    * Drop an object.... they prefer us to physically write the statement... no oops click the button accidentally. This applies to a test environment as well as production.
    * Kill a Session..... again, test (not in production) we can kill a process thread, but they didn't want it to be so easy as a click of a button.
    ... I could go on... but you get the idea. At first they went overboard, and essentially turned our TOAD tool into an expensive Notepad clone. After working with them, the permissions were readjusted and we have been fine since then. The feature makes a good companion to the database level security for things that the Database Security setup does not cover.

  • How to setup QoS for IP/Mac Address WRVS4400N

    I need some help setting up QoS for two Cisco/Linksys devivces on my network. 
    Network devices are Comcast SB6120 modem into WRVS4400n (v2.0.2.1 firmware) that divides into one 24 port gigabit Netgear unmanaged switch, 1 port into AT&T Cisco Microcell, 1 port to HP Officejet 7700 wired printer.  Unmanaged switch has approx 10 devices attached (including another 8 port unmanaged gigabit switch).  3 static leases are defined for the network for three devices (HP OJ 7700 printer, Cisco/Linksys PAP2 VOIP adapter, windows home server v1.  DHCP is handled by WRVS4400n.  Comcast service provides 12mbps of service upstream, 4mbps downstream.
    Need to setup QoS for AT&T Microcell and PAP2 VOIP adapter.  The real issue that I can't figure out how to configure is IP based priority access.  I can do rate control for an IP address but can't figure out how to specify priority control for an IP.
    Here are my the current config questions:
    1.  Bandwidth management page:  For the microcell device plugged into port 1, do i set the default CoS to 4 or 1?
    2.  Bandwidth management page:  Should the bandwidth management type be set to priority?  I assume yes since I need to define the UDP/TCP ports for priority.  The major issues here are
    a) one of the ports the Microcell uses is secure https (TCP 443) which is could also be used by any other internet device. 
    b) can't specify priority for the PAP2, since it's behind the unmanaged 24 port switch
    3.  QoS setup page:  Do I need just 2 queues (one for the port ID for the Microcell and one for the IP address of the Linksys adapter)?
    4.  QoS setup page:  I assume I need to define DSCP for the unmanaged switch but not sure how to tie a queue to an IP address
    4.  QoS setup page:  Shoud priority 0 be set for the most important queue (microcell) and the priority 1 CoS be for the VOIP adapter?  Again, not sure about how to define priority by IP address.
    5.  DSCP setup page:  As far as I can find, there's no documentation on how to setup this page.   

    That's what I do. I keep it simple, one calendar, one set of contacts.
    iCloud is really the simplest way to go, as it will sync your (eventual) single Contacts and Calendar across all your devices.
    I would:
    Figure out which single calendar (in Calendar.app) and contacts (in Contacts.app) that you want to keep.
    I'd make a backup of each one. For example,
    in Contacts, File > Export... > Contacts Archive...
    in Calendar, File > Export... > Calendar Archive...
    Make a backup of the other calendar events and contacts that you want to save.
    delete all the contacts and calendars from your phones and your iPad.
    add the contacts and events from the backups to the single calendar in Calendar.app and your contacts in Contacts.app on your iMac. There is probably some way to export the contacts and events you are adding, and then combine them, but you could also just add them manually.
    Then when you configure all your devices for iCloud, they will be all synced automatically.
    Message was edited by: arthur

  • Pros & Cons for consuming web services in ABAP using ABAP PROXY

    Hi,
    Other then performence  is there any other disadvantages like security,etc for consuming web services in ABAP using ABAP proxy?
    I really appreciate if some one provide the more details(Pros & Cons ) regarding cosuming web services and I also want to know is there any other way to consume web services in ABAP.
    Thanks.

    <i> is there any other way to consume web services in ABAP</i>
    you can use cl_http_client class to make your program to act as http client and post the soap message too webservice. This way you dont need to generate proxy, but you should know the soap message format.
    Regards
    Raja

  • Critical Errors Were Found in Setup. Please see the Setup Logs for Details

    Hello everyone. I have recently gotten Adobe Flash CS4 and i was really happy, until i kept getting the same error whenever i tried to install:
    "Critical Errors Were Found in Setup. Please see the Setup Logs for Details"
    I do not know what is the cause of the problem, but i have installed Adobe Photoshop CS3 succesfully without any problems. Please do help. I checked the setup logs, but i have no clue what it is saying, and its too long to post here.
    Thank you for your time and help.

    We've all been there with the frustration.
    And I'd really like to see you get back up and running. I'm a bit of an insomniac and tend to go back over the day while I'm pretending to sleep, and a couple of new things filtered back into my mind. There have been, I think, some problems reported about conflicts with some scanner drivers, and of course with firewalls, anti-virus programs, and the like. I think iTunes and instant messengers are also on that list.
    Make sure you turn off everything non-essential before trying to do your installation (and I'd probably do the same thing before running the scripts again). I do this by running MSConfig on XP and going to the startup tab. I uncheck everything I can't identify as being essential (which means I pretty much only leave the mouse driver checked. You may need to google some of the stuff to find out what it is) and then go to the services tab and hide all Microsoft services. From what's left I again uncheck everything that isn't required to run the system. Bonjour, if you see it, should be left active as it is used by the CS3 installer. Restart the computer.
    This should have turned off pretty much everything that could have been conflicting with the installer. Go to windows security center and make sure the windows firewall is also temporarily turned off, if you use it, and you should be ready to go. It can't hurt to try the add/remove programs again, but it probably won't show any adobe products anymore if you've run the scripts correctly (did you also run the MSI cleanup utility?).
    After you've finished, you can run MSConfig again and reset to standard startup.
    Peter

Maybe you are looking for

  • Time Machine Backup After HDD Upgrade

    I recently updated my drive on my MBP with a larger size where I successfully cloned the system from the old drive over the new one with Carbon Copy Cloner to safe me the hassle of the migration. The task was flawless and transparent to the system an

  • How does Apple identify the MB Air?

    Here is something I can't figure out. I was checking today on the Apple Recycle program where I could turn in my MB Air, first version, and get credit to use in purchase of a newer one. So I go through the steps until the last one when I get a list o

  • Hi! i am new to abap.Now i am having doubt in smart forms

    I am creating a table in smart form for that ztable i create a driver program.I am getting an output for driver program.But in smart while i am executing i am getting only header fields in the table. I am not getting body and also the table format al

  • Swing program execution flow

    Hi, I'm writing a Java program using Swing components. In a part of this program I call a method that opens a window. main codeA openWindowMethod(); codeB Is there a way to stop codeB until window opened with openWindowMethod has been closed? I don't

  • Pen input is not working in firefox only

    My wacom penpower tablet works on every application and browser except firefox (IE and chrome, mail and notepad all work fine) it's firefox alone. I can put the curser on any search box or form field and no inputs seem to get applied. any help would