Recently, I got my Apple TV back from repair. After setting up the wireless network connection and trying to connect it to the shared iTunes library on my Mac I was expecting it to show up in iTunes so I could enter the key to pair both devices. Apple TV usually shows up within seconds in iTunes. Not this time! Continue reading “Apple TV not showing up in iTunes”
My iPhone now runs the new version 1.1.4. IPSF still works! Here’s what I did:
- Downloaded ZiPhone 2.5.
- If you’re runningVista, make sure you run the executable with administrator permissions
- Downloaded iTunes 7.6.1 and the 1.1.4 update.
- Made a backup of all my iPhone settings using iTunes. Continue reading “1.1.4 IPSF iPhone with 04.04.05_G – it works!”
You’re looking for a way to consume Web services in SAP NetWeaver 2004s (and SAP Composition Environment aka NetWeaver 7.1) from BEA WebLogic Server 8.1 (and newer versions) using Single Sign On (SSO)?
You may have figured out already that SAML is not an option here because the SAP side is just a SAML consumer and not a provider (as of today). The only way left is to use the proprietary SAP Logon Tickets. Proprietary authentication mechanisms always require some extra work. In this blog article I’ll fill you in on what you need to SSO-connect those two J2EE platforms. Continue reading “SSO between BEA WebLogic Server and SAP Enterprise Portal (Web Dynpro) using Web services”
Added 2008-7-13: See here for a complete geotagging workflow on the Mac!
Manual geotagging is a slow and boring process – provided you remember the locations the photos were taken at. I’m convinced that it won’t take long until almost every cheapo digital camera comes with its own GPS receiver that automatically stamps the coordinates into the EXIF header but unfortunately, we’re not quite there yet. So the main question is: how do I get the GPS readings into the EXIF header of the photos in my Nikon D80? Continue reading “GPS Geotagging with my Nikon D80”
It’s not a secret that these days most server hacking attempts originate from chinese IP addresses. A lot of attempts originate from other countries like South Korea and Indonesia as well. It seems that in those countries (cyber-)law-enforcement and technological advancement don’t correlate. I agree that a server has to be able to sustain non-flooding attacks just by using a proper and secure server configuration. But what if almost all traffic from those countries are automated vulnerability scans? Continue reading “Banning “problem countries” from your Linux server”