Search results
-
Drupal 8 Theming- Layouts!
as the.html.twig template files. The template files can be very minimal. Looking at the sample layout above for the full width display, the template file may look ...
Casey - 05/05/2016 - 13:03
-
How to create a custom left navigation pane in WebCenter Sites Contributor UI (11.1.1.8)
a site. To create a new navigation pane, we will, first need to extend ...
Jesty - 10/18/2016 - 08:48
-
Implementing CKEditor Customizations in Oracle WebCenter Sites 12c
are simple: First of all, we need to extend the default CKEditor toolbar ...
Somen - 05/16/2017 - 10:57
-
Adhering to least privilege in Splunk
users the minimum permissions necessary to operate. It prevents users from ... where people move about and move on frequently. Removing privileges from ... from a list of users to be deleted. Example: #!/bin/sh #Splunk Bulk ...
kenneth - 12/13/2016 - 08:22
-
Packing Passwords
they are looking for. Have a password that you want to share with the group? Simply ...
Avani - 06/17/2014 - 08:42
-
To Engage or not to Engage
the data is stored and retrieved from the WCS database when performing any ... the Visitor Attributes in memory as opposed to querying them from the database. ... and counts and store the result in memory instead of reading them from ...
Aiiaz Khan - 10/27/2015 - 09:48
-
Content & Commerce: The Reese's Standard
decision based on their impression. At Function1, we're known ... to reach out to me at eric@function1.com if you have questions or if you ...
eric - 08/02/2017 - 12:57
-
Developing with Acquia's Dev Desktop
files to and from my desktop. Working on a mac I used VMware and vbox ... this option if you have the code, files and database from an external website ... Even better updating the database from the production environment ...
Casey - 03/10/2015 - 11:51
-
What We Practice
Enterprise 2.0 The social business. Function1's Enterprise 2.0 practice encompasses all aspects of middleware and collaborative platforms for the enterprise. We offer best-in-class consulting services, emphasize quality in all ...
admin - 11/15/2013 - 19:47
-
Cutting Risk in Half with Multi-Factor Authentication
We rely on usernames and passwords to access various systems throughout the technology world- from laptops to bank accounts, from cloud storage to blogs- our accounts are protected by these authentication ...
Rishi - 01/26/2017 - 09:53