Sunday, October 24, 2010

Telnet in RHEL 5 on the opening process



1, make sure your telnet service is not open:

[Root @ 111 ~] # chkconfig - list | grep telnet

ekrb5-telnet: off

krb5-telnet: off

[Root @ 111 ~] #

Note here that off test results

2, open the telnet service:

[Root @ 111 ~] # chkconfig krb5-telnet on

[Root @ 111 ~] # chkconfig - list | grep telnet

ekrb5-telnet: offv

krb5-telnet: on

[Root @ 111 ~] #

Inspection has been opened

3, modify the login files securetty, a major increase to the terminal point of landing

[Root @ 111 ~] # vi / etc / securetty

Add the following lines:

pts / 1

pts / 2

pts / 3

pts / 4

pts / 5

... ...

Save eject.

If chkconfig krb5-telnet on

Prompts Unencrypted connection refused. Goodbye.Connection closed by foreign host. See the error message seems to be saying for the encrypted connection is rejected, view his profile did not find any on the encryption option, and the configuration file is also correct, then go to google search a large circle, and finally find a foreigner to write a solution:

I really needed a bit of guidance and you provided it. / sbin / chkconfig - list | grep telnetThe above command told me I had both krb5-telnet and ekrb5-telnet, andalso the installed telnet all on. Initially I did not know what theywere all for. After turning them on and off and testing my telnetconnection from another box I realised that "ekrb5-telnet" was theencrypted telnet server that I needed to turn off to run "krb-telnet" which allowed non-encrypted telnet connections.eg / sbin / chkconfig ekrb5-telnet offThanks for your help.

Original ekrb5-telnet is a need to encrypt the telnet service to start on the course, this service requires encryption. Solutions: / etc/xinetd.d/ekrb5-telnet inside disable change = yes, then restart the xinetd service xinetd restart service to OK it!







Recommended links:



WMV To MOV



Taste of fresh raw BPM help CONCUBINE Yang Lai



Rising claims the former executives was leaked 2.31 million



FLASH to MPEG



Comment Terminal And Telnet Clients



MPEG4 To WMV



C # In The Transaction, Batch Submission, The Wording Of Rollback



When The Doctor Came To Their Computers For Health



[Journey] game Raiders: My opinion On the plus point guard



Evaluate Cartoons - Screen Savers



UML: the perfect combination with the Zachman



4 Promotion Practice Cheats



Picked Audio Recorders



pc repair tips on cleaning windows registry



Shop Music Composers



Monday, October 18, 2010

jusched.exe What process? How to disable?



jusched.exe What is the process? how to disable?

Many people close to open the task bar manager of a process or look in the end what is taking up a huge system resources will find a file named "jusched.exe" process, but in that it takes a lot of resources but also hesitant , and why this process is used in the end? energy can not just end?

In fact, jusched.exe is a process related to Java, Java whenever an update is detected, this process will appear in the task bar manager process list, but the good news generally only checked once a month, but the problem is This process will take up much CPU and memory, often causing the machine very card.

In fact, if you want to disable is also very simple, open Control Panel - Additional Options-Java-Update - uncheck "Automatically detect updates" button. But if learning Java or need to be updated, it can be regularly updated with the scheduled tasks, as long as other less frequently on the line.

* Start Menu - Search Task Scheduler

* Add Scheduled Task

* Enter jusched.exe

* Path should be the C: Program FilesJavajre1.6.0_01binjucheck.exe










Recommended links:



BT has been closed, we see what?



Evaluate Education



DB2 high availability Disaster recovery (HADR) in the limit



MKV to Zune



Getting Started with Corel Draw 10 (4) hands to create vector graphics (1)



Axis celebrate the 25th anniversary of the company



Basic Or VB Or VB DotNet Report



FLASH to MPEG



PowerBuilder set BREAKPOINTS



3G2 to WMV



Wave Of Mergers BI Have A Happy Life



lcd tv home Theater set up



Sony BMG U.S. Federal Court approved a settlement agreement with the consumer



Friday, October 8, 2010

LINQ advanced features brief



This article describes the advanced features of LINQ, which includes a concern for all usage and the use of dynamic query IQueryable expression trees based on the data source to construct a dynamic query.

Advanced features of the dynamic query LINQ

Such a scenario: the application may provide a user interface, users can specify the user interface one or more predicates to filter the data. This situation did not know at compile time check the details of dynamic query will be very useful.

In LINQ in, Lambda expressions are a number of the basis of standard query operators, the compiler creates lambda expression to capture the underlying query methods (such as Where, Select, Order By, Take While, and other methods) defined in the calculations. Expression tree structure of the data source used for the query, the data source to achieve IQueryable. For example, LINQ to SQL provider to implement the IQueryable interface, used to query relational data storage. C # and Visual Basic compiler will check for the compilation of such data sources for the code, the code will be generated at run time an expression tree. Then, the query provider can traverse an expression tree data structure and convert it to fit the data source query language.

LINQ expression tree is used in that type assigned to Lambda Expression of variable expression. Can also be used to create dynamic LINQ query.

System.Linq.Expressions namespace provides for manually generated expression tree API. Expression class contains a particular type of expression to create tree nodes static factory method, for example, ParameterExpression (that a named parameter expression) or MethodCallExpression (represents a method call). Compiler generates an expression tree is always the root of the node in the type of Expression, which TDelegate that contains up to five input parameters of any TDelegate commission; that is, its root is that a lambda expression.

The following examples describe how to use the expression tree to create a dynamic LINQ query.

Select advanced features of LINQ

The following example shows how to use IQueryable expression trees based on the data source to construct a dynamic query, the query of each customer's ContactName, and methods for their use GetCommand generated SQL statement.



/ / Based on the data source to construct a query IQueryable
IQueryable custs = db.Customers;
/ / Set up an expression tree to create a parameter
ParameterExpressionparam = Expression.Parameter (typeof (Customer), "c");
/ / Set expression tree
c.ContactNameExpressionselector = Expression.Property (param, typeof (Customer).
GetProperty ("ContactName"));
ExpressionExpressionpred = Expression.Lambda (selector, param);
/ / Set up the expression tree: Select (c => c.ContactName) ExpressionExpressionexpr = Expression.Call
(Typeof (Queryable), "Select", newType [] (typeof (Customer), typeof (string)),
Expression.Constant (custs), pred);
/ / Use the expression tree to generate dynamic query IQueryable query = db.Customers.AsQueryable ()
. Provider.CreateQuery (expr);
/ / Use method for SQL statements GetCommand
System.Data.Common.DbCommandcmd = db.GetCommand (query);
Console.WriteLine (cmd.CommandText);





Recommended links:



To prevent the most effective way to Trojan



Chemistry teachers and multimedia courseware



AVI to iPod



Report Basic Or VB Or VB DotNet



VBScript Length property



3GP to MPEG



for you ADVENTURE And Roleplay



"Want to" match "can do"



get Accurate data with data cleansing



MKV to VOB



Single-core Conroe Two Series Were Named Pentium, Celeron



Operators to remind: strange sounds for calls do not hang back On



Of C # (11) Enumeration (Enums)



New Vertical Market APPS



No trace of her it just so to find the ORIGINAL 1000 Baidu



Specialist Pager Tools



Saturday, September 25, 2010

Illustrator performance dimension and with smooth texture



This paper, we discuss how the basic three-dimensional objects Illustrator performance dimension and smooth texture.

For most objects, the light shines on the side of that bright light does not shine is the dark side, we need to focus on high-gloss painted bright step the brightness of the dark middle tone between the Department of bright and dark between the Department of the Ministry. Projection in the drawing is very important to the performance of three-dimensional shapes in the plane can be said to determine the shape of the object projection, also determine the location and status light.

Simplicity, the projection to the sphere as an example observation, the projection of the actual objects will be much more complex.



Figure 1


These do not need to use llustrator performance to a very sophisticated tools, mainly the gradual adjustment of color, projection, some of the usual mix of tools can be well expressed texture. Note:

1, light direction, intensity should be consistent;

2, clear high-light and shadow in the smooth, reflecting the strong performance of better material and texture;

3, light and accurate performance requires long-term observation, imitation;

4, the process is familiar with the tools to practice the process.

5. Color is the same color as far as possible, not too much difference.

Special attention to radiation gradient settings.



Figure 2




Figure 3






Recommended links:



DV To AVI



Easy to use Browsers



RM to MPEG4



Cloud storage model



Beijing: a comprehensive modernization of education promote capital



Who In The Sale Of National Sentiment!



Of! The Relationship between SEO and UCD



M2TS To MKV



What is digital TV renovation project?



WLAN parameter settings Xiangjie



EDI array of 42 disks to restore all 3 groups Raid5 Raiders



Wizard Computer EDUCATION



Stan Shih: I would like to share my EXPERIENCE



CAD selection of an error in the orientation: emphasis on three-dimensional modeling, two-dimensiona



Sunday, September 19, 2010

flash hand-painted butterflies (only six steps to complete)



Hello everybody, I'm Argus. No long hair thing, and today made a small tutorial flash painted butterfly, very simple, can be practicing the same hand. I was divided into six steps (do not know why always love in six steps, before the blink of the tutorial is six steps). Follow suit it, very simple.

1: First draw wings, you can use the pen. Adjusted gradually to about it ...






Figure 1

2: copy, flip. Adjust position.






Figure 2

3: art, body parts, as is the simple lines (the best time of the new layer of paint, because after do the animation)






Figure 3






Figure 4

4: Fill color. Irregular or simple graphics, border color is black, 2 pixels. Fill three or four color, orange color on it. Border thickness and color according to their size of the graph control.






Figure 5

5: The following wings, roughly the same way, only to be more careful.






Figure 6

6: basically completed, I felt a little something, observed that too few elements, modification of look, Figure:






Figure 7

Copy the same image look around and completed. I am here only to initiate a good future, how to do animation art, to apply where to go, you can play for free Oh!






Figure 8







Recommended links:



brief Teaching And Training Tools



WINDOWS media player m4v



About Groovy and Grails



Deutsche Post's revelation



Picked PRINTER



Input text input is also on the all-powerful plug



Youtube On Xbox 360



Essays on CMMI [1]



Divx for blackberry



MKV



Review Java And JavaScript



Change with the time



3 Accounting in a drama, colorful festival FOSHAN accounting



Specialist Management And Distribution



The SMTP user authentication based on QMail Setup Guide (Part Two)



Thursday, July 29, 2010

Do not let the knowledge base has become garbage



Souls of knowledge management is not a panacea, KM business without the right strategic objectives, if not properly resolve the human side face the dilemma of combining technology, KM may be thrown into the trash - this paper five cases are noteworthy.

Knowledge management for large enterprises now have the basic concepts are also able to realize that knowledge management is indeed a powerful tool to enhance the competitiveness of enterprises. Although many people have explicit knowledge, tacit knowledge, learning organizations, the letter catchy term, but fear the boss of the moment, or little knowledge of the promotion of KM; or not enter, or kept off their feet, to reduce the knowledge Management should value.
Some enterprises will want to be too simple knowledge management that build the Notes or the Exchange platform for employees to share Office document files, and then designate a Chief Knowledge Officer (CKO, Chief Knowledge Officer), and then run several knowledge management the book club, that is knowledge management.

Things, of course not so simple.

KM should not be taken lightly push

Many of the staff responsible for promoting the KM first encountered practical difficulties is that in the end only benefit any information into the Knowledge Base? Information filtering, sorting, classification, there is no principle can refer to? The second common problem is how to encourage employees to share and willing to contribute? What incentives can refer to? How the system integration and performance? In addition, when the company has been a part of e-knowledge is complete, access control should be how to prevent the outflow of the employees, to file the hands of competitors?

Knowledge-sharing or protection, has practice management needs and concerns. But most importantly, if there is no reason why the first companies to promote KM clearly defined strategic objectives, it is easy to mistake the next Fan "someone's pet" or "overkill" of problems, then we may all end up to the original Knowledge has become a pile of Garbage!

Someone's pet core competitiveness is not clear

"Someone's pet" of problems, mostly resulting from their core competencies (Core Competence) ill-defined, let us look at specific cases.

Case 1: Shanghai Yonghe King soymilk, has been successfully developed in China chain management system. Had to develop the chain system, the formula must be written into all kinds of flavors, "Standard Operating Manual", the owners are worried that once standardized, staff turnover will be taking its Know-how, and to train more potential competitors. Introducing the international financial resources in, a measure of its advantages and disadvantages, decided to take a more open strategy, entirely written Biaozhun Hua's operating procedures, complemented by intensive training programs for staff, Zhongyushiqi successful in quickly Fazhanchengwei covers Shanghai, Beijing's Daxing chain pathway.

Case 2: Taiwan's business network in a home shopping industry who have a variety of page specification, ordering process, feedback mechanisms such as the production of standard procedures into the web page, Bu Guoque Huaiyiziliao outflow to Jingzhengduishou may Yijing, Yin Wei seems Jing Zheng opponents to sneak into the company as employees recently, the standard procedure of its specification data acquisition upon completion of the separation, so that continued loss of competitiveness, operating performance deteriorating, so the industry plan to all of the standard operating procedures, adopt a strict reading them altogether restrictions and encryption measures to improve the competitiveness of the phenomenon of a gradual loss.

Many businesses have become accustomed to "hold back" approach to maintain a competitive advantage, but also to see things in the end retained on the right or wrong.

Shanghai Yonghe King milk taste is the core competitiveness? Internet companies a reason for poor performance, because the standard operating procedures and web design process due to the outflow of it?

By Tiffany King's case, the rapid development of chain systems and logistics systems, staff training mode, is the key to its success, taste loss formula, and the competitiveness of its core fundamentally no direct relationship, or McDonald's employees in the work-study students, not to have become a potential competitor of McDonald's?

Case of an Internet company, just let new employees to reach out to core competencies from that to information, is showing internal controls and contract law services staff side management measures, there is no comprehensive plan, sufficient seeds of future failure seed. And the Internet company's weak operating performance, I am afraid its business model and charging bias is the major reason for pride in the industry standard workflow procedures for loss of or not, in fact, sluggish business conditions and no direct relationship.

Overkill, do not understand human nature and technology area

"Overkill: it may be human nature, science and technology issues arising from surface and solving is not a correct understanding.

Case 3: a domestic electronics OEM manufacturers, to prevent the outflow of core R & D knowledge, build a complex information system, the various layers of encrypted files is not permitted without authorization store colleagues, modify, print, upload, download, The editing of any action, we need through the "File System Control Center" to sign the nuclear process "verified before publication, printed or circulated. But in a second Information Center Inventory were surprised to find that employees can file for E-mail folder files in the way, transmitted to servers outside the company, and a number of designs have been flight.

Although information technology can protect important files Buzhi Yu lost or copied, but still not 100% prevent theft and break caring people, spent a lot of money by the build layers of protection and centralized control of the inconvenience, but sometimes more caring people want to challenge and stimulate the ambition to break, only through the legal side of the norm, and for the conduct of the examination and long-term supplementary education in order to reduce the probability of outflow of the core knowledge content.

Between line to avoid diminishing marginal utility

The level of knowledge and information value, not in the rich or not, but that is timely, appropriate manner, too. Enterprises will build a rich knowledge base, to attract creative colleagues on the line or reading; or active form of electronic newspaper delivered to colleagues in the mailbox. Regardless of form, must be a clear understanding of the knowledge content of diminishing marginal utility, Knowledge and Garbage often the difference between a fine line between.

Case 4: A manufacturing industries across the Taiwan and mainland China have the Intranet system and build a complete Notes database, is the progressive implementation of KM plan database for KM colleagues, quite a lot of due diligence of the input database, but found in very low utilization rate of employees. The typhoon also makes the owner's good intentions to promote KM greatly reduced the staff there is no consensus on the KM, the work of colleagues enthusiasm gradually reduced, so that the hard build the KM system, the surface more and more like a formulaic effort.

Case 5: A business colleagues, knowledge management, there is a substantial interest in new knowledge, keen to play the role of communicators from time to time to the latest information, new knowledge industry, and personal experience feelings, to e-newspaper form sent to all company stationary colleagues, but they inadvertently discovered one day, its hard editor of the newsletter was identified as disturb the work of several colleagues spam (Junk Mail), readily Jiu threw "recycle bin" ; deleted, so that the peer disappointment.

A well-planned, KM rich knowledge base, but can not lead to colleagues interested in the use of information technology can no longer solve the problem. Only through community operation mechanism and performance appraisal system with the actual combination of enthusiastic participation is the key trigger colleagues. The enthusiastic colleagues to email colleagues in the various wealth of information, if not the correct form, not the right time, delivered to the hands do not need, it is likely to become another man's junk.

If the promotion of KM process, place the following types of signs, it can get special attention, because your Knowledge will most likely be in the near time Garbage.
Knowledge management become the seven signs of spam

First, knowledge of supply and demand imbalance, expectations vary.

Knowledge of the supply side and demand-side, have different perceptions of each other, excessive expectations, often disappointing start. For example, the source company just to continue to expand the knowledge base, I hope lots of learned new knowledge workers, do not ask why the demand for employees new knowledge; or lots of creative businesses want employees to share, but not allow employees to share knowledge, to lift the threat of flu, will make knowledge management encountered great obstacles to the promotion.

Second, the outdated and can not immediately convey knowledge.

Knowledge of the benefits are time-sensitive. But the "timeliness" in the definition, referring to the users need the time, rather than the time happened to the information, news and history Douyou its value, but users need to access the data under certain conditions Mouzhong, Que can not immediately respond to his complete information, knowledge transfer results will be significantly reduced.

Third, solve practical problems or effective.

Knowledge of the content on the workers in the work if you can not produce real help to solve a specific problem, or to assist decision-making support, even with more information, at most, only Bale played the role of the library.

Fourth, not the right situation, not the correct form.

R & D-based and marketing-oriented companies, need to collect information and knowledge development course to be different; the rapid development of the enterprise, and organized the burden of enterprises, the knowledge transfer methods should be used, is also different. Knowledge, newsletters, discussion boards, document libraries, e-Learning tools such as knowledge of different content are also different areas of application and application time.

Fifth, the transfer to the wrong person.

Production, marketing, human capital, R & D, financial and other business functional, or project members, the knowledge needs of different course, absolutely can not meet all the needs of specific knowledge should be limited scope, limited functionality, the provision of the most complete content. This is precisely why the recent enterprise portal (EIP, Enterprise Information Portal) and knowledge management system so closely related reasons.

Sixth, the use of low knowledge base.

No matter how you consider the fine, how deployment of the full, a bar to drink without user knowledge base, there is no value at all.

Seventh, no effective diffusion, dissemination and sharing.

E-business knowledge to the ultimate goal is to quickly spread, disseminate, share and enjoy their cost. Therefore, access control within a specific staff for specific knowledge sharing and distribution, should have full freedom, to protect the data encryption and related technologies, is another issue. If you just want to record and store documents and files in the past, then you really need document management functionality should only be just.

KM to create a knowledge-based enterprises

Knowledge-sharing or protection, representing the two extreme measures, to be in different situations, to play a different role. To share strategies, should the community (Community) started the business, whether actual or virtual community, need to create a well-coordinated groups (Collaboration) environment, to take protective strategies, information security technology should surface, then the legal contract with employees face in order to achieve concrete results.

In between sharing and protection, Knowledge, or the value of Garbage is often very subjective and different time, different objects may have different interpretations. In the process of e-business, first learn how to locate a good sense of proportion above, avoid Knowledge into Garbage; further, the eyes of others Garbage converted into their Knowledge, may qualify as a true "knowledge enterprise" ; right?







Recommended links:



Review Anti-Virus Tools



Top Ad Blockers



Samsung China President Pu Genxi: a second Samsung in China



Sneak Peek! VideoStudio 10 Plus the first to experience



Adobe GoLive Has Pushed For Dreamweaver Where To Go



Dealer How To Identify The Manufacturer With The Money Trap?



Some Live for BI to! But Mo take BI as "the Bible"



converter avi To 3gp



Liang Wang: Whitman's China troubles



Produced using Flash MX components Quiz



CLP Guangtong Proceedings To Recover 200 Million Loan Of China Cable



Converting mp4 to mp3



avi to MP4 converter free



Audio Video Tools Guide



Blackberry Video Formats



Tyson Foods To eliminate non-value-added production processes



Thursday, July 22, 2010

China will in the end of this year or early next year 3G license issuance



December 12 morning news, the Minister of Industry and Information Technology Li Yizhong at the "Address by the promotion of stable and healthy development of industrial situations such as press conference," revealed that reorganization of the basic operators have been completed, the Department of Industry and Information Technology under the Comprehensive consider some of the program through the end of this year or early next year release 3G licenses.
Li Yi said the license issued in the same way, in particular: China Mobile payment with independent intellectual property rights of TD-SCDMA license to China Unicom for the payment of the newly formed WCDMA licenses issued for China Telecom CDMA2000 license, followed by the two techniques is the international technology. This is the first time the Department of Industry and Information Technology on 3G license issuance clear way.

Li Yi in the morning, in answer to the foreign media on the issue, said issuing 3G licenses, China Mobile, China Unicom, China Telecom, China Netcom, the CRC also several smaller satellite communication company was restructured, and now this restructuring has basically completed, have held a general meeting of shareholders, and asset swap, asset sale, transfer work has been completed, and then, in accordance with the original commitment to society, to release 3G licenses.

3G license issuance clear way

Ministry of Industry and Information Technology, today the first clear the way on the issuance of 3G licenses, Li Yi said, "3G license has been done pre-commitment in the community, when the basic system in place, end of this year or early next year release 3G licenses, it is to issued on the China Mobile TD-SCDMA is China's independent intellectual property rights of this license. for the payment of the newly formed China Unicom WCDMA license, China Telecom for CDMA2000 licenses issued, followed by the two techniques is the international technology. "

He pointed out that, TD technology with independent intellectual property rights, China Mobile has now done a lot of work, we impressed during the Olympic Games launched a new service, now entered the business and the process of industrialization, follow-up to be done. Li Yizhong then said, "It goes without saying that we have independent intellectual property rights to support TD-SCDMA, which is our country a model for independent innovation, further implementation of the policy."

3G invest at least 200 billion next year

Speaking of the future construction of three major operators in the 3G issues on the investment, said Li Yi, in fact, China Mobile, China Unicom, China Telecom to get 3G licenses have been extended into the future, to strengthen technical innovation made more fully prepared. If 3G licenses are issued after the three companies have very strong own funds, we expect to invest in this area next year, at least 200 billion.

Li Yi stressed that "it for the financial crisis, investment-led economic development is also important. Therefore, according to comprehensive consideration, indeed, as my colleague Xi Guohua, vice minister said, we will adopt certain procedures in the end, the beginning of issuing 3G licenses . "

Li Yi of that, 3G license issuance, before the Ministry of Industry and the three operators have to do some preparation work. "The first work, the three companies to come up with 3G development planning, and in some way inform the community, increase the confidence of the community. The second work, we must invest to promote economic development and to avoid duplication. We SASAC has been issued a notice, now and in the other ministries would also like to engage in a specific rules and regulations, can not occur again in the past that duplication, waste of funds, waste of resources, increasing environmental burden and so on. The third work, not words The metaphor, we should support with independent intellectual property TD-SCDMA, which is our country a model for independent innovation, further implementation of the policy. "

The market regulatory issues, Li Yi answered said, "you mentioned the market for regulation, there is a term called non-symmetric Management, the world has also used this method on the telecommunications industry. Will be carefully listened to the views of departments and enterprises and strive to create a standardized and fair competition order, not a Robin Hood, but should be conducive to the development of the three communications companies. "







Recommended links:



flv to MOV



Hyper YouTube Movie Quick Converter



Swift M4V MP4 Convert



China's environmental satellite data



Audio Video Tools evaluation



M4a to mp3



Picked Games Card



Do not let PEOPLE think you are a liar



Apen APE Ripper



F4v converter



Convert .mp4 To .avi



Strategy And War Games Expert



Do Not Ping My Computer



UFC Wins Platinum authorized agent UGS



For you Personal Interest