policy

Help to argue why to develop software on a physical computer rather than via a remote desktop

In my case we are required to be physically present at office when developing software. I am looking for help to argue for why software developers shall have a dedicated physical software development computer, to be productive and cost effective. As a business case we have argued that productivity will go down by 25%, however it's my fe...

Android Device Management

I'm looking at the possibility of using Android as a secure corporate mobile platform. One of the pre-requisites for this will be a way of managing multiple devices, security policies, software deployment, that sort of thing - essentially the things the BlackBerry Enterprise Server handles for BlackBerry or MDM (or something 3rd party l...

How would one enforce a strict non - "dynamic" - policy?

Possible Duplicate: C# - Disable Dynamic Keyword We are going to introduce .NET 4.0 and I'm VERY afraid of people using dynamic in the future, thereby destroying code quality, Intellisense capability and type safety. What would be the best way to enforce a strict non - "dynamic" - policy? Is there a way to turn off the "dynam...

How to modify local group policy setting programatically

I am looking for a way to programatically change the value of a group policy setting without having to reboot a machine or install any additional components on it Looking for a solution for Windows 2003, 2008, machines are part of the domain The value is under Administrative Templates\Network\QoS Packet Scheduler, Limit outstanding pac...

How to choose cache write policy on ppc

Hello ! I'm optimizing a Linux boot on PowerPC MPC83xx. I'm trying to optimize the kernel image copy, from nand to ram and trying to check or change the write policy of the cache. As a read in the reference manual, the processor uses the write-back policy by default. But I haven't found any register where to check/configure this. How ...

Applet signed throw: java.security.AccessControlException. How can I make it run?

After hours of work (I'm not a java programmer) I've managed to pack and put inside an applet wich make an ftp-upload to a remote server. The main file is "prova.class" inside "invia.jar"; I use a third-part library, placed in "edtftpj.jar". I have signed both file and included them in the page with the following code: Index.html <appl...

Are you responsible for deploying your code to a live environment?

...or do you have to go through someone else (a person who manages the servers) to get your code deployed? I understand the policy of not letting everyone log onto a live production server but I would like the ability to have access to my code, database and files once they are live. How is it for everyone else? ...

s3 Bucket Policy Malformed error

The following bucket policy is returning a malformed error: { "Version": "2008-10-17", "Id":"S3Policy", "Statement":[ { "Sid":"1", "Effect": "Allow", "Principal": { "AWS": ["AWSID"] }, "Action": ["s3:GetObject", "s3:PutObject"], "Resource": "arn:aws:s3:::BUCKETNAME/*" ] } } I'm trying to create a policy where all files within BUCKETNA...

No Field for Pre-shared Key in Group Policy

I am attempting to configure group polocy (Windows 2008 R2) to issues a WPA Pre shared Key on client login. Through Group Policy I can setup WPA and select PSK (Along with TKIP) But there's not field to enter my Pre Shared Key! Any help would be appricaited ...

Is "You break it, you buy it" the best policy?

There is a subtle reason why it might not be good: Sometimes, the blame for breaking something really should be placed on the individual who wrote fragile code without automated tests, not the one who broke their code by making a should-be-unrelated change somewhere else. One imaginable example is when someone programs against an interf...

AntiSamy is allowing An encoded Script alert to get by? How to block?

Hello, I'm using AntiSamy with the available antisamy-1.4.1.xml policy. The policy is working nicely to block most XSS attacked but the following below is not being blocked. Any suggestions on how to block the following below to prevent XSS attacks? 1234%27%2Balert%2873918%29%2B%27 Thanks ...

What technology does ie6 have that legacy system must require it?

Possible Duplicate: Why is IE6 still a corporate favorite in some organizations? As of July 2010, IE6 browser usage is still lingering at around 7%. (w3schools.com) It's well known that most installations of IE6 are coming from companies that have internal software systems that absolutely require the use of Internet Explorer 6...

visual studio 2010 static code analysis migration

I am updating my projects from visual studio 2008 to visual studio 2010, but I'm still using TFS 2008. I have a static code analysis in my TFS, and when I was using visual studio 2008 I was placing the rules from the server in my source code projects (right click on a solution->Code analysis for solution-> replace\merge with checkin pol...

Protect ourselves from ourselves - SVN Branching Policy for small development team.

Our small team (6) development team is comprised of individuals with varying skill levels and product knowledge. To protect ourselves from ourselves (or lack of experience) what branching policy should we use? ...

Query on imperius with CIM-SPL on Linux

Hi, I am a newbie to imperius. I am trying to use CIM-SPL to write new policies for a project. I went through the documentation but I am unclear as what steps to follow once I have downloaded the imperius CIM-SPL binary. In the below documentation link steps have been provided for JavaSPL. Will the same apply for the CIM SPL? http://i...

Flex crossdomain.xml not working correctly in Chrome/Firefox ??

Hi, I've spent quite a bit of time on this so here's where I'm stuck. I'm using the debug player 10.1 to get an XMLA request from: http://localhost/dir/blah.swf to: http://localhost/olapbin/msblah.dll This worked fine in the filesystem, but now its on an IIS7 web server. After a lot of fiddling with the crossdomain.xml file I se...

Is it possible to verify custom code/architecture rules inside vs2010 without having a tfs server?

We have TFS. We are moving to TFS soon, but I'd like to know if it's possible to check code against a policy that is not attached to TFS. Especially, if you can do so without having a TFS server attached to VS at all. I'd like to have the policy already TFS capable, or very easily migrated. We are all on VS2010 ultimate. ...

dynamic Information management policy

Is it possible to create custom Information Management Policy using code with Sharepoint 2010 and assign it to the existing documents? ...

Options to integrate Version Control Systems and Issue Management systems

Is there any other policy that any of you have implemented other than the ones given below? Valid Issue ID per commit. - To track changes made for a bug. Will help maintainability in the long run. Valid Issue status( Open or In-progress). - Why work on issue that are closed. Issue should be assigned to the user doing the commit. More u...

Java Policy-Based Design

Hi, I have a while loop, and the user should be able to decide when the loop stops. After x seconds, after x loops, ... This problem should be implemented according to policy-based design. I know how to do this in C++ but can't get it to work in Java. What I do now is the following. There is a class Auctioneer with the method "start()...