- Creating elements programmatically
... condition to propagate to the parent, you can use an algorithm to reduce the child out, or just remove the ORG relationship ...
Blog Entry - tisenberg - 8 Oct 2010 - 2:16pm - 0 comments - 0 attachments - 3 groups
- Global variables across server scripts
... this information for automation scripts, additional algorithm logic, etc. As always, be careful, while state variables ...
Blog Entry - tisenberg - 29 Sep 2010 - 7:53am - 0 comments - 0 attachments - 3 groups
- SSL Certificate expires on your SOAP driver
... Signature algorithm name: MD2withRSA Version: 1 From the certificate ... Inc.", L=San Francisco, ST=California, C=US Signature Algorithm: SHA1withRSA, OID = 1.2.840.1135184.108.40.206 Key: Sun RSA public key, ... CA:false PathLen: undefined ] ] Algorithm: [SHA1withRSA] Signature: 0000: 1A 99 BF 3F 63 67 68 F8 E7 FC 90 ...
Article - geoffc - 23 Sep 2010 - 10:19am - 1 comment - 1 attachment - 2 groups
- Migration from Novell NetWare to Novell Open Enterprise Server 2 Using SEP sesam
... and data availability. Using SEP sesam’s patented algorithm’s users can multiplex several data streams assuring fast, accurate ...
Article - c-gutierrez - 2 Sep 2010 - 3:05pm - 0 comments - 0 attachments - 2 groups
- Novell Localisation Workbench
... in NLWorkbench 2.6 are: Improved Fuzzy algorithm The fuzzy matching algorithm has been further improved. It provides around 20% more matches than ...
Tool - mrwebster - 20 Aug 2010 - 3:40pm - 3 comments - 2 attachments - 2 groups
- GroupWise 8.0.2 Public BETA is now available!
... It now works in 8.0.2, but not for SHA2-256 signature algorithm which is required by our customer. I've posted it to GroupWise 8 ...
Blog Entry - dlythgoe - 18 May 2010 - 5:51pm - 17 comments - 0 attachments - 6 groups
- IDM Toolbox: howto create missing OUs on the fly
... the bare minimum amount of processing - no brute-force algorithm that slows down processing and messes up traces too much. Here's ...
Article - lhaeger - 10 Apr 2010 - 12:38pm - 2 comments - 0 attachments - 2 groups
- Check out What's New in the Latest Release of M+Guardian
... failure that arises when spammers circumvent a given algorithm in the engine and offers a much higher level of resistance ...
Article - MessagingArchitects - 19 Mar 2010 - 10:26am - 0 comments - 0 attachments - 2 groups
- Release of M+Guardian 2007.3 Confirms Messaging Architects' Path as Technology Innovator in Messaging Security
... failure that arises when spammers circumvent a given algorithm in the engine. The autonomous work of multiple teams offers a ...
Article - MessagingArchitects - 19 Mar 2010 - 10:23am - 0 comments - 0 attachments - 2 groups
- Novell Identity Audit User Provisioning Driver
... notion of column position (DB2/AS400), a backup ordering algorithm must be employed. Sorting columns names by hexadecimal value ensures ...
Article - aburgemeister - 22 Sep 2009 - 3:15pm - 2 comments - 0 attachments - 2 groups