- Novell Storage Manager 3.1.1 Released
... Categorization Options for Target Paths: The Leveling Algorithm setting of a policy 's Target Paths page now lets you ...
Blog Entry - buckgashler - 12 Jun 2013 - 4:07pm - 0 comments - 0 attachments - 2 groups
- Novell Client 2 SP3 for Windows: Registry Settings
... security includes the use of a message digest algorithm and a per connection/per request session state. Possible values ...
Article - ewells - 25 Apr 2013 - 12:33pm - 0 comments - 0 attachments - 2 groups
- Password Tunneling Model in Identity Manager
... wire, and so far no one has broken the RSA key pair algorithm as far as I know. (RSA tokens yes, key pairs no). However they ...
Article - geoffc - 16 Feb 2012 - 11:19am - 0 comments - 1 attachment - 2 groups
- Matching Users Between Systems
... Method used The method is using the Levenshtein algorithm to calculate the distance between two strings. This distance is ... is 2 as you need to delete two letters. Here is the algorithm in pseudo-code: int LevenshteinDistance(char s[1..m], char ...
Article - rkalfane - 13 Nov 2008 - 7:37am - 3 comments - 1 attachment - 2 groups
- Novell Localisation Workbench
... in NLWorkbench 2.6 are: Improved Fuzzy algorithm The fuzzy matching algorithm has been further improved. It provides around 20% more matches than ...
Tool - mrwebster - 20 Aug 2010 - 3:40pm - 3 comments - 2 attachments - 2 groups
- Customize Your Layout Views In Novell Operations Center
... is picked for display in the layout view, a simple algorithm is used to determine the specific graphic to show for a given ... set each of three customized settings listed in the above algorithm. Before we begin, let’s clarify what a customized graphic is ...
Blog Entry - jcalleniii - 12 Jan 2011 - 11:05am - 0 comments - 0 attachments - 3 groups
- Guest Post: Novell Pulse and Google Wave: Demonstrating Inter-company Collaboration
... by integrating Google Wave's operational transformation algorithm and the federation parts of the FedOne implementation into ...
Blog Entry - iroughley - 6 Oct 2011 - 11:36am - 1 comment - 0 attachments - 2 groups
- Automatic Tree Reports for IDM Projects
... Algorithm to build the tree ... "sn", "description" ] Algorithm to build the tree Once the data is loaded in memory (in an ...
Article - rkalfane - 27 Feb 2008 - 11:00am - 0 comments - 4 attachments - 2 groups
- Automatic Role Matrix
... Algorithm to build the matrix ... details on using LDAP calls in your scripts. Algorithm for Building the Matrix Once the data is loaded in memory (in ...
Article - rkalfane - 13 Feb 2008 - 8:25am - 2 comments - 3 attachments - 2 groups
- GroupWise 8.0.2 Public BETA is now available!
... It now works in 8.0.2, but not for SHA2-256 signature algorithm which is required by our customer. I've posted it to GroupWise 8 ...
Blog Entry - dlythgoe - 18 May 2010 - 5:51pm - 17 comments - 0 attachments - 6 groups