A system error occurred that prevented connecting to the database. Users are instructed to notify the administrator if the problem persists or create a support issue with details of the error if it does not.
The Solr core tracker jobs failed to update the Solr index for the Alfresco repositories (alfresco and archive) multiple times between 16:11 and 16:18. Each failure was caused by the GetModelsDiff API call returning a 404 status code, indicating the models could not be retrieved from Alfresco. Error logs provide the stack traces showing where the exception occurred during the core tracking process.
Things Your Mother Didnt Tell You About Bundle Configurations - Symfony Live…D
This document discusses best practices for organizing configuration files in Symfony applications. It recommends structuring configuration with bundles, validating configuration with trees, and using configuration to customize services and parameters.
Things Your Mother Didn't Tell You About Bundle Configurations - Symfony Live...D
This document discusses best practices for configuring bundles in Symfony applications. It recommends structuring configuration with bundles, parameters, and options in a YAML file. It also emphasizes validating configuration types, values, and required fields. The document explains how to build a configuration tree and load configuration to inject dependencies and configure services.
The document appears to be a stack trace from an error occurring during the startup of the Eclipse IDE. It indicates that an java.io.EOFException was thrown while trying to read data from a data stream, likely corrupting the reading of configuration files needed for Eclipse to initialize properly. As a result, various initialization and loading steps failed, preventing the Eclipse workspace from opening.
This document contains XML configuration files for a Maven project that defines dependencies and plugins. It also contains a Spring configuration file that defines data sources, transaction management, and other beans for connecting to a database using Hibernate.
This script is used to start and stop the Apache Tomcat application server. It checks environment variables and Java installation locations. It then executes the specified command, such as "start", "stop", "debug" passing in JVM options and system properties. The script handles tasks like setting up the classpath, checking for required files, and running Java in the background for startup.
Metrics-driven engineering is practiced at Etsy. [1] Engineers build applications and also manage monitoring tools like Graphite and Ganglia to track metrics and visualize logs and events. [2] Over 16,000 metrics are tracked in Graphite along with logs to provide visibility into application health and correlate it with deployments and other events. [3] Dashboards are used to mix and match metrics and provide a high-level view of site performance and validation.
The Solr core tracker jobs failed to update the Solr index for the Alfresco repositories (alfresco and archive) multiple times between 16:11 and 16:18. Each failure was caused by the GetModelsDiff API call returning a 404 status code, indicating the models could not be retrieved from Alfresco. Error logs provide the stack traces showing where the exception occurred during the core tracking process.
Things Your Mother Didnt Tell You About Bundle Configurations - Symfony Live…D
This document discusses best practices for organizing configuration files in Symfony applications. It recommends structuring configuration with bundles, validating configuration with trees, and using configuration to customize services and parameters.
Things Your Mother Didn't Tell You About Bundle Configurations - Symfony Live...D
This document discusses best practices for configuring bundles in Symfony applications. It recommends structuring configuration with bundles, parameters, and options in a YAML file. It also emphasizes validating configuration types, values, and required fields. The document explains how to build a configuration tree and load configuration to inject dependencies and configure services.
The document appears to be a stack trace from an error occurring during the startup of the Eclipse IDE. It indicates that an java.io.EOFException was thrown while trying to read data from a data stream, likely corrupting the reading of configuration files needed for Eclipse to initialize properly. As a result, various initialization and loading steps failed, preventing the Eclipse workspace from opening.
This document contains XML configuration files for a Maven project that defines dependencies and plugins. It also contains a Spring configuration file that defines data sources, transaction management, and other beans for connecting to a database using Hibernate.
This script is used to start and stop the Apache Tomcat application server. It checks environment variables and Java installation locations. It then executes the specified command, such as "start", "stop", "debug" passing in JVM options and system properties. The script handles tasks like setting up the classpath, checking for required files, and running Java in the background for startup.
Metrics-driven engineering is practiced at Etsy. [1] Engineers build applications and also manage monitoring tools like Graphite and Ganglia to track metrics and visualize logs and events. [2] Over 16,000 metrics are tracked in Graphite along with logs to provide visibility into application health and correlate it with deployments and other events. [3] Dashboards are used to mix and match metrics and provide a high-level view of site performance and validation.
Burn down the silos! Helping dev and ops gel on high availability websitesLindsay Holmwood
HA websites are where the rubber meets the road - at 200km/h. Traditional separation of dev and ops just doesn't cut it.
Everything is related to everything. Code relies on performant and resilient infrastructure, but highly performant infrastructure will only get a poorly written application so far. Worse still, root cause analysis in HA sites will more often than not identify problems that don't clearly belong to either devs or ops.
The two options are collaborate or die.
This talk will introduce 3 core principles for improving collaboration between operations and development teams: consistency, repeatability, and visibility. These principles will be investigated with real world case studies and associated technologies audience members can start using now. In particular, there will be a focus on:
- fast provisioning of test environments with configuration management
- reliable and repeatable automated deployments
- application and infrastructure visibility with statistics collection, logging, and visualisation
Dave gives a presentation about Puppet at Bazaarvoice. He discusses how Puppet is used in different teams at the company:
1) In legacy infrastructure, Puppet used a traditional client/server model with complex inheritance and DNS-based node definitions, which became difficult to manage over time.
2) In the data infrastructure teams, Puppet uses a "Mothership" model with role-based definitions and Hiera to parameterize classes for reuse. Puppet environments are used for change control.
3) In data services teams, a "masterless" approach is used where each application team maintains their own Puppet code without impacting others. Data is passed in via tags, Hiera,
The document discusses how to create a logger interceptor in Spring to log information before, after, and around request handling. It shows how to create an interceptor class that extends HandlerInterceptorAdapter and overrides its callback methods. It also demonstrates how to associate the interceptor with handler mappings to enable interceptor functionality. When executed, log messages from the interceptor will be displayed in the console. The document further explains how to configure the interceptor for use with annotated Spring controllers using DefaultAnnotationHandlerMapping instead of a regular handler mapping.
This document provides instructions and code samples for automating common CyberArk password vault tasks using PowerShell, including onboarding accounts, retrieving credentials, managing sessions, and creating a safe with role-based access groups. It demonstrates how to connect to the CyberArk PAS API, create a new safe, generate Active Directory security groups for admin, auditor and user roles, assign permissions to the groups, and add them as members to the safe. The script handles validation and skips steps if objects already exist, and provides examples of credential retrieval from vault using different SDKs.
Securing Java EE apps using WildFly ElytronJan Kalina
1) Elytron is WildFly's new security subsystem that replaces legacy security configurations.
2) Elytron provides authentication mechanisms like BASIC and DIGEST and security realms like LDAP and JDBC to verify credentials.
3) Security domains in Elytron integrate authentication, authorization, and principal transformation using concepts like authentication factories, permission mappers, and realm mappers.
The document discusses persisting runtime data using Apache Java Caching System (JCS) and Javassist. JCS is used to cache and persist objects to disk. Javassist dynamically sets values for transient fields that are not persisted. The runtime data is cached, persisted to disk, and reloaded to replay in new JVM instances. Javassist injects transient data by dynamically adding setter methods before replaying cached objects.
This document provides an overview of Action Controllers in Ruby on Rails. It discusses controllers acting as a middle layer between models and views, RESTful routing, parameters, sessions, filters, request and response objects, authentication, streaming files, parameter filtering, exception handling, and forcing HTTPS. Key points include controllers conducting an orchestra, handling REST actions, accessing session data, applying filters, and interacting with requests and responses.
- The document provides an overview of the Apollo ecosystem for building GraphQL applications, including setup examples, tooling, security practices, performance optimization techniques, and testing React components.
- It discusses Apollo Client, Server, and Engine and their usage, as well as concepts like schema design, state management, pagination, file uploads, versioning, and server-side rendering.
- Finally, it briefly mentions new features in Apollo 2.1 and compares Apollo to the Relay framework.
The document discusses various approaches to generating reports from entity data in JPA, including some anti-patterns to avoid. It provides examples of calculating salary sums by country using the entity model directly and by using projections, joins, and aggregation at the database level. The preferred approach is to leverage database aggregation functions through native SQL queries for reporting rather than heavy object processing in Java.
Head First Zend Framework - Part 1 Project & ApplicationJace Ju
Zend Framework provides tools for creating PHP web applications. The zf script is used to generate a project skeleton and configure resources. The Zend_Application loads configuration from application.ini, initializes the bootstrap class, and runs the application. The bootstrap class initializes custom resources. Common resources like the front controller, database, and view are initialized through Zend_Application_Resource classes, which get configuration options from application.ini. This allows flexible configuration and initialization of an MVC application in Zend Framework.
Reusable bootstrap resources zend con 2010Hector Virgen
ZendCon 2010
This session demonstrates how to build configurable and reusable bootstrap resources powered entirely by application.ini. Covers basic and advanced bootstrapping techniques, sharing bootstrap resources between applications, and accessing resources from within your applications.
Rails 3 provides a concise overview of changes in Rails 3 including maintaining MVC structure and RESTful routing while improving areas like file structure, block helpers, routing and constraints, ActiveRecord querying, resources routing, and ActionMailer delivery. Key changes include a more Rack-like implementation, chainable ActiveRecord scopes, and pagination and layout support in ActionMailer.
This document provides an overview of several features in the Project Wonder framework called "ERExtensions". It describes utilities for type-safe page naming, version management of static resources, direct action debugging, application rewriting, redirects, batch navigation, hyperlinking with objects, inline templates, lorem ipsum generation, captchas, RSS feeds, caching of enterprise objects, formatting numbers by unit, mutable URLs, thread storage, and more. Many of these features aim to improve functionality, security, performance, and usability compared to standard WebObjects components.
- The document discusses various rendering methods and layouts in Rails, including default rendering, using the 'render' method, options for render like :content_type and :layout, and using redirect_to versus render. It also covers finding and structuring layouts, asset tag helpers, and head-only responses.
This is a short introduction to SQL Injection. It was presented to students in the SMU Computer Security Club. It was meant to be an introduction, but it is here for posterity and for any future students who need a very quick primer.
This document contains notes from a meeting on web application security. It discusses several common vulnerabilities like SQL injection, cross-site scripting (XSS), and clickjacking. It provides examples of how these vulnerabilities can occur and ways to prevent them, such as sanitizing user input, enabling CSRF protection middleware, and using the X-Frame-Options header. Keywords discussed include MySQL, Docker, Kubernetes, Ansible, and various attack vectors like CSRF, XSS, SQL injection, and clickjacking. The document aims to educate on security best practices for Python and Django web applications.
Edge Side Include Injection: Abusing Caching Servers into SSRF and Transparen...Priyanka Aash
When caching servers and load balancers became an integral part of the Internet's infrastructure, vendors introduced what is called "Edge Side Includes" (ESI), a technology allowing malleability in caching systems. This legacy technology, still implemented in nearly all popular HTTP surrogates (caching/load balancing services), is dangerous by design and brings a yet unexplored vector for web-based attacks.
The ESI language consists of a small set of instructions represented by XML tags, served by the backend application server, which are processed on the Edge servers (load balancers, reverse proxies). Due to the upstream-trusting nature of Edge servers, the ESI engine tasked to parse and execute these instructions are not able to distinguish between ESI instructions legitimately provided by the application server, and malicious instructions injected by a malicious party. Through our research, we explored the risks that may be encountered through ESI injection: We identified that ESI can be used to perform SSRF, bypass reflected XSS filters (Chrome), and silently extract cookies. Because this attack vector leverages flaws on Edge servers and not on the client-side, the ESI engine can be reliably exploited to steal all cookies, including those protected by the HttpOnly mitigation flag, allowing JavaScript-less session hijacking.
Identified affected vendors include Akamai, Varnish Cache, Squid Proxy, Fastly, IBM WebSphere, Oracle WebLogic, F5, and countless language-specific solutions (NodeJS, Ruby, etc.). This presentation will start by defining ESI and visiting typical infrastructures leveraging this model. We will then delve into to the good stuff; identification and exploitation of popular ESI engines, and mitigation recommendations.
Dethroning Grunt: Simple and Effective Builds with gulp.jsJay Harris
Grunt is king. It is the ubiquitous task runner used for most nodejs projects and has quickly expanded to conquer other software ecosystems. However, its kingdom is vulnerable. Grunt does not align well with many nodejs paradigms and is notorious for its harsh learning curve. Meet Gulp, the challenger in the taskrunner revolution. Gulp’s easy configuration produces an easy learning curve, and its alignment with nodejs paradigms eliminates the friction. Grab your ticket, your foam finger, and your team-colored face paint and witness the battle, the revolution, and the crowning of Gulp.
La Unión Europea ha acordado un paquete de sanciones contra Rusia por su invasión de Ucrania. Las sanciones incluyen restricciones a las importaciones de productos rusos clave como el acero y la madera, así como medidas contra bancos y funcionarios rusos. Los líderes de la UE esperan que las sanciones aumenten la presión económica sobre Rusia y la disuadan de continuar su agresión contra Ucrania.
2.a OPTIMIZATION CHARACTERIZATION OF JEC ABSORBED COMPOUNDS IN LACTATING RATS...Norhafilda Ismail
This document summarizes a study that characterized compounds from Jamu Ratus, a traditional Malaysian herbal remedy, absorbed in the milk of lactating rats and tissues of suckling neonates. Lactating rats were orally administered Jamu Ratus ethanolic extract (JEC) at different dosages and their milk and neonate tissues were analyzed. Thin layer chromatography, high performance liquid chromatography, and liquid chromatography-mass spectrometry identified flavonoid compounds in neonatal tissues, even at low dosages, indicating bioavailability and persistence over time. While herbal remedies are traditionally claimed to benefit postpartum recovery, this study found the absorbed JEC compounds bioaccumulated in neonatal liver and brain tissues, implicating potential
Burn down the silos! Helping dev and ops gel on high availability websitesLindsay Holmwood
HA websites are where the rubber meets the road - at 200km/h. Traditional separation of dev and ops just doesn't cut it.
Everything is related to everything. Code relies on performant and resilient infrastructure, but highly performant infrastructure will only get a poorly written application so far. Worse still, root cause analysis in HA sites will more often than not identify problems that don't clearly belong to either devs or ops.
The two options are collaborate or die.
This talk will introduce 3 core principles for improving collaboration between operations and development teams: consistency, repeatability, and visibility. These principles will be investigated with real world case studies and associated technologies audience members can start using now. In particular, there will be a focus on:
- fast provisioning of test environments with configuration management
- reliable and repeatable automated deployments
- application and infrastructure visibility with statistics collection, logging, and visualisation
Dave gives a presentation about Puppet at Bazaarvoice. He discusses how Puppet is used in different teams at the company:
1) In legacy infrastructure, Puppet used a traditional client/server model with complex inheritance and DNS-based node definitions, which became difficult to manage over time.
2) In the data infrastructure teams, Puppet uses a "Mothership" model with role-based definitions and Hiera to parameterize classes for reuse. Puppet environments are used for change control.
3) In data services teams, a "masterless" approach is used where each application team maintains their own Puppet code without impacting others. Data is passed in via tags, Hiera,
The document discusses how to create a logger interceptor in Spring to log information before, after, and around request handling. It shows how to create an interceptor class that extends HandlerInterceptorAdapter and overrides its callback methods. It also demonstrates how to associate the interceptor with handler mappings to enable interceptor functionality. When executed, log messages from the interceptor will be displayed in the console. The document further explains how to configure the interceptor for use with annotated Spring controllers using DefaultAnnotationHandlerMapping instead of a regular handler mapping.
This document provides instructions and code samples for automating common CyberArk password vault tasks using PowerShell, including onboarding accounts, retrieving credentials, managing sessions, and creating a safe with role-based access groups. It demonstrates how to connect to the CyberArk PAS API, create a new safe, generate Active Directory security groups for admin, auditor and user roles, assign permissions to the groups, and add them as members to the safe. The script handles validation and skips steps if objects already exist, and provides examples of credential retrieval from vault using different SDKs.
Securing Java EE apps using WildFly ElytronJan Kalina
1) Elytron is WildFly's new security subsystem that replaces legacy security configurations.
2) Elytron provides authentication mechanisms like BASIC and DIGEST and security realms like LDAP and JDBC to verify credentials.
3) Security domains in Elytron integrate authentication, authorization, and principal transformation using concepts like authentication factories, permission mappers, and realm mappers.
The document discusses persisting runtime data using Apache Java Caching System (JCS) and Javassist. JCS is used to cache and persist objects to disk. Javassist dynamically sets values for transient fields that are not persisted. The runtime data is cached, persisted to disk, and reloaded to replay in new JVM instances. Javassist injects transient data by dynamically adding setter methods before replaying cached objects.
This document provides an overview of Action Controllers in Ruby on Rails. It discusses controllers acting as a middle layer between models and views, RESTful routing, parameters, sessions, filters, request and response objects, authentication, streaming files, parameter filtering, exception handling, and forcing HTTPS. Key points include controllers conducting an orchestra, handling REST actions, accessing session data, applying filters, and interacting with requests and responses.
- The document provides an overview of the Apollo ecosystem for building GraphQL applications, including setup examples, tooling, security practices, performance optimization techniques, and testing React components.
- It discusses Apollo Client, Server, and Engine and their usage, as well as concepts like schema design, state management, pagination, file uploads, versioning, and server-side rendering.
- Finally, it briefly mentions new features in Apollo 2.1 and compares Apollo to the Relay framework.
The document discusses various approaches to generating reports from entity data in JPA, including some anti-patterns to avoid. It provides examples of calculating salary sums by country using the entity model directly and by using projections, joins, and aggregation at the database level. The preferred approach is to leverage database aggregation functions through native SQL queries for reporting rather than heavy object processing in Java.
Head First Zend Framework - Part 1 Project & ApplicationJace Ju
Zend Framework provides tools for creating PHP web applications. The zf script is used to generate a project skeleton and configure resources. The Zend_Application loads configuration from application.ini, initializes the bootstrap class, and runs the application. The bootstrap class initializes custom resources. Common resources like the front controller, database, and view are initialized through Zend_Application_Resource classes, which get configuration options from application.ini. This allows flexible configuration and initialization of an MVC application in Zend Framework.
Reusable bootstrap resources zend con 2010Hector Virgen
ZendCon 2010
This session demonstrates how to build configurable and reusable bootstrap resources powered entirely by application.ini. Covers basic and advanced bootstrapping techniques, sharing bootstrap resources between applications, and accessing resources from within your applications.
Rails 3 provides a concise overview of changes in Rails 3 including maintaining MVC structure and RESTful routing while improving areas like file structure, block helpers, routing and constraints, ActiveRecord querying, resources routing, and ActionMailer delivery. Key changes include a more Rack-like implementation, chainable ActiveRecord scopes, and pagination and layout support in ActionMailer.
This document provides an overview of several features in the Project Wonder framework called "ERExtensions". It describes utilities for type-safe page naming, version management of static resources, direct action debugging, application rewriting, redirects, batch navigation, hyperlinking with objects, inline templates, lorem ipsum generation, captchas, RSS feeds, caching of enterprise objects, formatting numbers by unit, mutable URLs, thread storage, and more. Many of these features aim to improve functionality, security, performance, and usability compared to standard WebObjects components.
- The document discusses various rendering methods and layouts in Rails, including default rendering, using the 'render' method, options for render like :content_type and :layout, and using redirect_to versus render. It also covers finding and structuring layouts, asset tag helpers, and head-only responses.
This is a short introduction to SQL Injection. It was presented to students in the SMU Computer Security Club. It was meant to be an introduction, but it is here for posterity and for any future students who need a very quick primer.
This document contains notes from a meeting on web application security. It discusses several common vulnerabilities like SQL injection, cross-site scripting (XSS), and clickjacking. It provides examples of how these vulnerabilities can occur and ways to prevent them, such as sanitizing user input, enabling CSRF protection middleware, and using the X-Frame-Options header. Keywords discussed include MySQL, Docker, Kubernetes, Ansible, and various attack vectors like CSRF, XSS, SQL injection, and clickjacking. The document aims to educate on security best practices for Python and Django web applications.
Edge Side Include Injection: Abusing Caching Servers into SSRF and Transparen...Priyanka Aash
When caching servers and load balancers became an integral part of the Internet's infrastructure, vendors introduced what is called "Edge Side Includes" (ESI), a technology allowing malleability in caching systems. This legacy technology, still implemented in nearly all popular HTTP surrogates (caching/load balancing services), is dangerous by design and brings a yet unexplored vector for web-based attacks.
The ESI language consists of a small set of instructions represented by XML tags, served by the backend application server, which are processed on the Edge servers (load balancers, reverse proxies). Due to the upstream-trusting nature of Edge servers, the ESI engine tasked to parse and execute these instructions are not able to distinguish between ESI instructions legitimately provided by the application server, and malicious instructions injected by a malicious party. Through our research, we explored the risks that may be encountered through ESI injection: We identified that ESI can be used to perform SSRF, bypass reflected XSS filters (Chrome), and silently extract cookies. Because this attack vector leverages flaws on Edge servers and not on the client-side, the ESI engine can be reliably exploited to steal all cookies, including those protected by the HttpOnly mitigation flag, allowing JavaScript-less session hijacking.
Identified affected vendors include Akamai, Varnish Cache, Squid Proxy, Fastly, IBM WebSphere, Oracle WebLogic, F5, and countless language-specific solutions (NodeJS, Ruby, etc.). This presentation will start by defining ESI and visiting typical infrastructures leveraging this model. We will then delve into to the good stuff; identification and exploitation of popular ESI engines, and mitigation recommendations.
Dethroning Grunt: Simple and Effective Builds with gulp.jsJay Harris
Grunt is king. It is the ubiquitous task runner used for most nodejs projects and has quickly expanded to conquer other software ecosystems. However, its kingdom is vulnerable. Grunt does not align well with many nodejs paradigms and is notorious for its harsh learning curve. Meet Gulp, the challenger in the taskrunner revolution. Gulp’s easy configuration produces an easy learning curve, and its alignment with nodejs paradigms eliminates the friction. Grab your ticket, your foam finger, and your team-colored face paint and witness the battle, the revolution, and the crowning of Gulp.
La Unión Europea ha acordado un paquete de sanciones contra Rusia por su invasión de Ucrania. Las sanciones incluyen restricciones a las importaciones de productos rusos clave como el acero y la madera, así como medidas contra bancos y funcionarios rusos. Los líderes de la UE esperan que las sanciones aumenten la presión económica sobre Rusia y la disuadan de continuar su agresión contra Ucrania.
2.a OPTIMIZATION CHARACTERIZATION OF JEC ABSORBED COMPOUNDS IN LACTATING RATS...Norhafilda Ismail
This document summarizes a study that characterized compounds from Jamu Ratus, a traditional Malaysian herbal remedy, absorbed in the milk of lactating rats and tissues of suckling neonates. Lactating rats were orally administered Jamu Ratus ethanolic extract (JEC) at different dosages and their milk and neonate tissues were analyzed. Thin layer chromatography, high performance liquid chromatography, and liquid chromatography-mass spectrometry identified flavonoid compounds in neonatal tissues, even at low dosages, indicating bioavailability and persistence over time. While herbal remedies are traditionally claimed to benefit postpartum recovery, this study found the absorbed JEC compounds bioaccumulated in neonatal liver and brain tissues, implicating potential
This poem reassures the reader to lay their head down without worry as they sleep. It encourages them to chase dreams across the Milky Way and rest in the nest that has been made for them, where they will be cared for and blessed throughout the night, never feeling alone. It repeats that tomorrow will be a brand new day and not to weep as they sleep.
Metaphors are an essential part of how we think and communicate. They structure our perceptions and understandings. George Lakoff and Mark Johnson argue in their book "Metaphors We Live By" that metaphors are pervasive in everyday language and thought, not just in poetic language. The documents provides numerous examples of metaphors used in various contexts like love, politics, business, medicine, and literature to illustrate how metaphors shape our views and expectations. It also discusses different types of metaphors and techniques for developing creative metaphors.
The document summarizes various online video services, including their business models, target demographics, and average daily traffic. YouTube is the dominant service with over 150 million daily views and a shared revenue model targeting younger audiences of all genders. Vimeo focuses on quality and original content with advertising and targets middle-aged males. Myspace uses video on its large social network mainly targeting extra young males.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
Engaging Teens through Sprite Digital Campaign - Teen Till I DieNitin Karkara
A User Generated Content Challenge to Teens in India to bring alive the Sprite Tagline of Chalo Apni Chaal / Make Your Own Move
The Challenge – Get Indian Teens to integrate Sprite Brand Philosophy via their Videos across the verticals of Music – Art – Comedy & Dance.
Drug abuse has been a problem in Karachi, Pakistan. According to a 2005 survey, there are about 3.5 million drug abusers in Pakistan, with an annual growth rate of 7%. The research found that peer pressure is the main influencing factor for drug abuse. Charas (cannabis) and cocaine are the most commonly abused substances. Drugs are easily available for purchase across the city. The research recommends increasing drug education and prevention programs, treatment options, media awareness campaigns, stronger law enforcement, and greater parental involvement to help address the problem of drug abuse in Karachi.
Profit from the cloud TM Parallels Dynamic Infrastructure And OpenStack.OpenVZ
This document discusses how Parallels Dynamic Infrastructure and OpenStack can help companies profit from the cloud. It provides an overview of Parallels Cloud Storage, virtualization technologies like containers and hypervisors, automation and orchestration tools, and how these can improve efficiency. Benchmark results show Parallels Containers and Hypervisor outperform competitors like KVM and Xen. The document also outlines how Parallels integrates with OpenStack to provide additional capabilities around billing, packaging, storage, and containers.
This document outlines the syllabus for the Engineering Mathematics 1 module taught at Politeknik Tuanku Sultanah Bahiyah in December 2011. The module is worth 2 credits over 15 weeks and covers topics including basic algebra, standard form, indices, logarithms, trigonometry, geometry, measurement, and coordinate geometry. Students will be evaluated through quizzes, tests, practical exercises, group discussions, and an end of chapter exam, with a minimum 80% attendance required to pass.
A história trata de uma bota e um sapato que pertencem a crianças diferentes. Embora as palavras estejam incompletas, fica claro que cada item de calçado pertence a uma criança e que elas brincam juntas.
ePortfolio@LaGuardia Community College:What, Why and Howpstadlerctl
Developing an ePortfolio helps LaGuardia Community College students collect their work, select sample course work , reflect on their learning, and connect between their academic and professional lives.
This document provides details on Intel 6th generation Core mobile and desktop processors including specifications such as core count, base frequency, graphics specifications, memory support, and pricing. It covers Y-series, U-series, H-series, and S-series mobile processors as well as desktop S-series processors. The document shows Intel is focusing on improved performance through increased core counts and enhanced Intel Turbo Boost Technology while maintaining competitive pricing and integration of security and manageability features.
Cultural Strength makes the difference between the really great companies and those that are merely good. Culture may seem like an intangible force but it can be measured, analysed and strengthened. For your free Cultural Strength score copy and paste this link into your browser: http://goo.gl/aPpLJi
Two clever students, a girl and a boy, figured out how to solve their problem after thinking about their sack of potatoes and their classmates. Rather than focus on past wrongs, they remembered the many times their classmates had been good friends to both of them.
The document summarizes the common law duties of company directors in the Cayman Islands as presented by Peter McMaster Q.C. to the CBA on September 9, 2015. It outlines that directors have a fiduciary duty to act in the best interests of the company. This includes managing the company's affairs, avoiding conflicts of interest, exercising independent judgment, and not profiting personally from their position. While directors can delegate tasks, they must still reasonably oversee the management of the company.
This document provides an overview of the Compass Treasury system. It describes the system's comprehensive coverage of financial products across multiple currencies and locations. It also highlights key features like user-defined business rules, integrated accounting and risk management modules, hierarchical consolidation, compliance monitoring, audit trails, and segregation of duties. The system architecture is designed for flexibility across different deployment environments and uses common programming languages and database platforms.
The log file documents the startup of Tomcat and the deployment of various web applications, including Alfresco. There were errors encountered when deploying the Alfresco web application WAR file, due to access denied errors when trying to expand files from the WAR. Other applications like Share deployed successfully.
The document contains log messages from starting up an Apache Tomcat server. It records loading libraries, initializing protocols, deploying web applications, and starting services. There was an error deploying the Alfresco web application due to access denied when trying to expand files, but other applications like Share deployed successfully and the server started up.
The Pentaho BI Platform reported an error while executing an action sequence called "PovoarDWdoZero.xaction". The error was caused by a failed activity with error code "RuntimeContext.ERROR_0017 - [pt_18]". The stack trace provides details on the error occurring during the execution of a Kettle transformation component.
This document summarizes common Java errors and their possible causes. Some examples include:
1. Missing identifier error caused by code not being inside a function.
2. Invalid expression error possibly caused by missing parentheses.
3. No data found error possibly caused by a value like 100 not existing in a call like setInt(1,100).
4. Class not found errors possibly caused by missing import statements or JAR files.
It then provides possible causes and solutions for other errors like null pointer exceptions, database connection errors, missing dependencies, and more. The document aims to help developers troubleshoot common Java and database issues.
This document provides an overview of Oracle Coherence, an in-memory data grid product. It defines a data grid, describes Coherence clustering and data management options including partitioned caching, fault tolerance, and data affinity. It also outlines data processing options such as events, parallel queries, continuous query caches, and invocable maps. The document concludes by introducing the Coherence Incubator project.
This document provides an overview of Oracle Coherence, an in-memory distributed computing platform. It defines a data grid, describes Coherence clustering and data management options like partitioned caching. It also covers data processing options in Coherence like events, parallel queries, continuous query caches, and invocable maps. The document concludes with an overview of the Coherence Incubator project.
This document provides an overview of Oracle Coherence, an in-memory data grid product. It defines a data grid, describes Coherence clustering and data management options including partitioned caching, fault tolerance, and data affinity. It also outlines data processing options such as events, parallel queries, continuous query caches, and invocable maps. The document concludes by introducing the Coherence Incubator project.
This document provides guidance for extension developers updating extensions for TYPO3 6.2. It includes a checklist of things to address like removing includes and using autoloading. It also lists "Do's" such as using signals/slots and old hook names staying the same. "Don'ts" are outlined like preventing database connections in autoloading and disabling backported property mapping. Overall the document offers best practices for updating extensions for TYPO3 6.2.
The document discusses various Hibernate concepts and configuration options. It contains answers to frequently asked Hibernate interview questions organized in a question and answer format. The questions cover core Hibernate interfaces, the difference between various session methods like save(), saveOrUpdate(), and persist(), lazy fetching and its configuration, the advantages of Hibernate over JDBC, what C3P0 is and how to configure it, dirty checking in Hibernate, and the different fetch strategies in Hibernate.
The document discusses building testable PHP applications. It covers topics like testing code, testable architecture, dependency injection, and static code analysis tools like PHP Code Sniffer, PHP Mess Detector, and PHP Copy Paster Detector. The document emphasizes that writing tests and designing for testability leads to fewer bugs and more maintainable code. It provides examples of unit testing and recommends test-driven development practices.
The document appears to be a log of exceptions encountered during the execution of Java code. It traces the stack trace of a NullPointerException thrown when loading dialog settings. The exception occurs at the initialization of the PackageExplorerPart class in Eclipse.
Real-time streaming and data pipelines with Apache KafkaJoe Stein
Get up and running quickly with Apache Kafka http://kafka.apache.org/
* Fast * A single Kafka broker can handle hundreds of megabytes of reads and writes per second from thousands of clients.
* Scalable * Kafka is designed to allow a single cluster to serve as the central data backbone for a large organization. It can be elastically and transparently expanded without downtime. Data streams are partitioned and spread over a cluster of machines to allow data streams larger than the capability of any single machine and to allow clusters of co-ordinated consumers
* Durable * Messages are persisted on disk and replicated within the cluster to prevent data loss. Each broker can handle terabytes of messages without performance impact.
* Distributed by Design * Kafka has a modern cluster-centric design that offers strong durability and fault-tolerance guarantees.
Java Web Programming [5/9] : EL, JSTL and Custom TagsIMC Institute
This document provides an overview of Expression Language (EL), JSTL (JSP Standard Tag Library) 1.1, and custom tags. It describes EL expressions, implicit objects, and attributes. It explains core JSTL tags for looping, conditionals, and URL manipulation. It also discusses using JSTL tags to connect to a database and format output. Finally, it outlines how to create a custom tag library with a TLD file, tag handler class, and JSP file to implement a simple tag.
Best Practices in Plugin Development (WordCamp Seattle)andrewnacin
My talk -- officially named "Y U NO CODE WELL" -- at WordCamp Seattle 2011 on best practices during plugin development. Find the video, as it provides some good context and conversation.
CLASSINDEX - SZYBKA ALTERNATYWA DLA SKANOWANIA KLAS
W Javie częstym problemem jest potrzeba znalezienia klas oznaczonych daną adnotacją. Choć oficjalnie Java nie wspiera takiej funkcjonalności, de facto standardowym rozwiązaniem tego problemu jest skanowanie klas. W tej prezentacji chciałbym przedstawić dużo szybszą alternatywę - autorski projekt oparty na mechanizmach procesowania adnotacji.
The document discusses Spring Framework and annotations-based configuration in Spring. It covers:
- Enabling annotation-based configuration by adding <context:annotation-config/> to the XML file.
- Common annotations like @Autowired, @Component, @Value that can be used for dependency injection and configuration.
- How to implement autowiring by type, name and constructor.
- Other annotations like @PostConstruct, @PreDestroy for lifecycle callbacks.
- Stereotype annotations @Controller, @Service, @Repository that can be used instead of defining beans explicitly.
- Spring validation support using Validator interface, validation annotations and implementing custom validators.
- Spring
With Grails 3, the plugin development experience changes a little bit compared to that of Grails 2. In this talk, Álvaro (member of the Grails team at OCI, Grails committer and author of several plugins) will cover several topics to understand how plugins work in Grails 3, focusing on best practices.
The session is structured as a set of tips and tricks with code samples in the following areas: modularisation, build system, testing and publishing.
The document discusses refreshing a Mule cache using Oracle Database Change Notification. It describes registering a SQL query with the database for change notifications, defining a listener class to handle notification events, and using the events to refresh the cache. A Java client application is implemented to receive notifications and send payload data to a Mule flow that processes the changes and refreshes the cache accordingly.
AssertJ is a library that simplifies writing assertions in tests by providing a fluent API that focuses on readability. It can be added to a Maven project as a dependency. AssertJ makes assertions more readable by providing descriptive error messages. It supports filtering collections and arrays, extracting values, assertions on optional values, and other features like soft assertions and string assertions on file contents.
The document discusses setting up authentication for a Rails application using Devise, implementing the asset pipeline to concatenate and compress CSS and JavaScript assets, adding AJAX functionality through remote links and JavaScript responses, handling orphaned dependent objects, and creating a view helper to display Gravatar images for user emails. It provides an overview of key aspects of building a Rails application with user authentication, assets, and AJAX interactions.
The document contains credentials for connecting a QA platform to various social media channels, including Facebook, Twitter, LinkedIn, and YouTube. It lists the app name, site domain, URLs, consumer/api keys, secrets, developer keys, and support contact for each channel. The credentials will enable the QA platform to integrate with and retrieve information from these social media channels.
The test plan document outlines test cases for the Campain Commander Social Edition platform to validate functionality across various features like campaign configuration, content management, channels, streams, reports, and administration. Specific test cases validate editing campaign goals and values, archiving and renaming campaigns, and managing content like distribution lists, media, landing pages, and posts. Execution of the test cases is manual.
This document provides a form for requesting software changes. The form collects information such as the change request originator, affected system and version, type of change requested, reason for the change, priority level, a description of the change, and time and cost estimates for implementing the change. It also provides fields to track the status of the change request as it moves through the approval and implementation process.
The Everyone dropdown will include a customize link that opens a dialog similar to Facebook's for customizing audience settings, with the differences being that location and language options will allow multiple selections instead of single selections via typeahead boxes, and country and language options will be sorted alphabetically by name.
The Everyone dropdown will include a customize link that opens a dialog similar to Facebook's for customizing audience settings, with the differences being that location and language options will allow multiple selections instead of single text inputs. Country and language options in the dialog will also be sorted alphabetically by name.
1. Oops - an error has occurred
System Error
A system error has occurred.
If this problem persists - please notify your JIRA administrator of this
problem.
Otherwise, please create a support issue on our support system at
http://support.atlassian.com with the following information:
a description of your problem
cut & paste the error and system information found below
Cause:
com.atlassian.crowd.embedded.ofbiz.db.DataAccessException:
org.ofbiz.core.entity.GenericDataSourceException: Generic Entity Exception
occurred in deleteByAnd (Unable to esablish a connection with the database.
(null, message from server: "Host 'FRSE-JIRA-PROD.Emailvision.com' is blocked
because of many connection errors; unblock with 'mysqladmin flush-hosts'"))
Stack Trace: [hide]
com.atlassian.crowd.embedded.ofbiz.db.DataAccessException:
org.ofbiz.core.entity.GenericDataSourceException: Generic Entity Exception
occurred in deleteByAnd (Unable to esablish a connection with the database.
(null, message from server: "Host 'FRSE-JIRA-PROD.Emailvision.com' is blocked
because of many connection errors; unblock with 'mysqladmin flush-hosts'"))
at
com.atlassian.crowd.embedded.ofbiz.db.OfBizHelper.removeByAnd(OfBizHelper.java:1
30)
at
com.atlassian.crowd.embedded.ofbiz.OfBizUserDao.removeAttribute(OfBizUserDao.jav
a:327)
at
com.atlassian.crowd.embedded.ofbiz.OfBizUserDao.storeAttributes(OfBizUserDao.jav
a:240)
at
com.atlassian.crowd.directory.AbstractInternalDirectory.processAuthentication(Ab
stractInternalDirectory.java:193)
at
com.atlassian.crowd.directory.AbstractInternalDirectory.authenticate(AbstractInt
ernalDirectory.java:147)
at
com.atlassian.crowd.manager.directory.DirectoryManagerGeneric.authenticateUser(D
irectoryManagerGeneric.java:276)
at
com.atlassian.crowd.manager.application.ApplicationServiceGeneric.authenticateUs
er(ApplicationServiceGeneric.java:102)
at
com.atlassian.crowd.embedded.core.CrowdServiceImpl.authenticate(CrowdServiceImpl
.java:67)
at
com.atlassian.crowd.embedded.core.DelegatingCrowdService.authenticate(Delegating
CrowdService.java:35)
at
com.atlassian.crowd.embedded.core.FilteredCrowdServiceImpl.authenticate(Filtered
CrowdServiceImpl.java:43)
at
com.atlassian.jira.security.login.JiraSeraphAuthenticator.authenticate(JiraSerap
hAuthenticator.java:43)
at
com.atlassian.seraph.auth.DefaultAuthenticator.login(DefaultAuthenticator.java:9
2. 4)
at
com.atlassian.seraph.filter.PasswordBasedLoginFilter.runAuthentication(PasswordB
asedLoginFilter.java:127)
at
com.atlassian.seraph.filter.PasswordBasedLoginFilter.login(PasswordBasedLoginFil
ter.java:72)
at
com.atlassian.seraph.filter.BaseLoginFilter.doFilter(BaseLoginFilter.java:130)
at
com.atlassian.jira.web.filters.JiraLoginFilter.doFilter(JiraLoginFilter.java:70)
at
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilt
erChain.java:235)
at
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.
java:206)
at
com.atlassian.plugin.servlet.filter.IteratingFilterChain.doFilter(IteratingFilte
rChain.java:46)
at
com.atlassian.plugin.servlet.filter.DelegatingPluginFilter$1.doFilter(Delegating
PluginFilter.java:66)
at
com.atlassian.oauth.serviceprovider.internal.servlet.OAuthFilter.doFilter(OAuthF
ilter.java:71)
at
com.atlassian.plugin.servlet.filter.DelegatingPluginFilter.doFilter(DelegatingPl
uginFilter.java:74)
at
com.atlassian.plugin.servlet.filter.IteratingFilterChain.doFilter(IteratingFilte
rChain.java:42)
at
com.atlassian.plugin.servlet.filter.ServletFilterModuleContainerFilter.doFilter(
ServletFilterModuleContainerFilter.java:77)
at
com.atlassian.plugin.servlet.filter.ServletFilterModuleContainerFilter.doFilter(
ServletFilterModuleContainerFilter.java:63)
at
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilt
erChain.java:235)
at
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.
java:206)
at
com.atlassian.util.profiling.filters.ProfilingFilter.doFilter(ProfilingFilter.ja
va:99)
at
com.atlassian.jira.web.filters.JIRAProfilingFilter.doFilter(JIRAProfilingFilter.
java:16)
at
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilt
erChain.java:235)
at
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.
java:206)
at
com.atlassian.jira.web.filters.ActionCleanupDelayFilter.doFilter(ActionCleanupDe
layFilter.java:59)
at
com.atlassian.core.filters.AbstractHttpFilter.doFilter(AbstractHttpFilter.java:3
1)
at
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilt
3. erChain.java:235)
at
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.
java:206)
at
com.atlassian.jira.web.filters.RequestCleanupFilter.doFilter(RequestCleanupFilte
r.java:53)
at
com.atlassian.core.filters.AbstractHttpFilter.doFilter(AbstractHttpFilter.java:3
1)
at
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilt
erChain.java:235)
at
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.
java:206)
at
com.atlassian.johnson.filters.AbstractJohnsonFilter.doFilter(AbstractJohnsonFilt
er.java:71)
at
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilt
erChain.java:235)
at
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.
java:206)
at
org.tuckey.web.filters.urlrewrite.UrlRewriteFilter.doFilter(UrlRewriteFilter.jav
a:350)
at
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilt
erChain.java:235)
at
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.
java:206)
at
com.atlassian.gzipfilter.GzipFilter.doFilterInternal(GzipFilter.java:81)
at com.atlassian.gzipfilter.GzipFilter.doFilter(GzipFilter.java:51)
at
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilt
erChain.java:235)
at
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.
java:206)
at
com.atlassian.plugin.servlet.filter.IteratingFilterChain.doFilter(IteratingFilte
rChain.java:46)
at
com.atlassian.plugin.servlet.filter.ServletFilterModuleContainerFilter.doFilter(
ServletFilterModuleContainerFilter.java:77)
at
com.atlassian.plugin.servlet.filter.ServletFilterModuleContainerFilter.doFilter(
ServletFilterModuleContainerFilter.java:63)
at
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilt
erChain.java:235)
at
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.
java:206)
at
com.atlassian.core.filters.cache.AbstractCachingFilter.doFilter(AbstractCachingF
ilter.java:33)
at
com.atlassian.core.filters.AbstractHttpFilter.doFilter(AbstractHttpFilter.java:3
1)
4. at
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilt
erChain.java:235)
at
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.
java:206)
at
com.atlassian.core.filters.encoding.AbstractEncodingFilter.doFilter(AbstractEnco
dingFilter.java:41)
at
com.atlassian.core.filters.AbstractHttpFilter.doFilter(AbstractHttpFilter.java:3
1)
at
com.atlassian.jira.web.filters.PathMatchingEncodingFilter.doFilter(PathMatchingE
ncodingFilter.java:49)
at
com.atlassian.core.filters.AbstractHttpFilter.doFilter(AbstractHttpFilter.java:3
1)
at
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilt
erChain.java:235)
at
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.
java:206)
at
com.atlassian.jira.web.monitor.ActiveRequestsFilter$PassToChainFilterFunc.doFilt
er(ActiveRequestsFilter.java:346)
at
com.atlassian.jira.web.monitor.ActiveRequestsFilter$DebugLogFilterFunc.doFilter(
ActiveRequestsFilter.java:463)
at
com.atlassian.jira.web.monitor.ActiveRequestsFilter.doFilter(ActiveRequestsFilte
r.java:173)
at
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilt
erChain.java:235)
at
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.
java:206)
at
com.atlassian.jira.startup.JiraStartupChecklistFilter.doFilter(JiraStartupCheckl
istFilter.java:76)
at
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilt
erChain.java:235)
at
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.
java:206)
at
com.atlassian.multitenant.servlet.MultiTenantServletFilter.doFilter(MultiTenantS
ervletFilter.java:91)
at
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilt
erChain.java:235)
at
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.
java:206)
at
com.atlassian.jira.web.filters.JiraFirstFilter.doFilter(JiraFirstFilter.java:67)
at
org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilt
erChain.java:235)
at
org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.
5. java:206)
at
org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:2
33)
at
org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:1
91)
at
org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:127)
at
org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:102)
at
org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:109
)
at
org.apache.catalina.valves.AccessLogValve.invoke(AccessLogValve.java:554)
at
org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:298)
at org.apache.coyote.ajp.AjpAprProcessor.process(AjpAprProcessor.java:429)
at
org.apache.coyote.ajp.AjpAprProtocol$AjpConnectionHandler.process(AjpAprProtocol
.java:384)
at
org.apache.tomcat.util.net.AprEndpoint$Worker.run(AprEndpoint.java:1665)
at java.lang.Thread.run(Thread.java:662)
Caused by: org.ofbiz.core.entity.GenericDataSourceException: Generic Entity
Exception occurred in deleteByAnd (Unable to esablish a connection with the
database. (null, message from server: "Host 'FRSE-JIRA-PROD.Emailvision.com' is
blocked because of many connection errors; unblock with 'mysqladmin flush-
hosts'"))
at org.ofbiz.core.entity.GenericDAO.deleteByAnd(GenericDAO.java:1249)
at
org.ofbiz.core.entity.GenericHelperDAO.removeByAnd(GenericHelperDAO.java:196)
at
org.ofbiz.core.entity.GenericDelegator.removeByAnd(GenericDelegator.java:1116)
at
org.ofbiz.core.entity.GenericDelegator.removeByAnd(GenericDelegator.java:1091)
at sun.reflect.GeneratedMethodAccessor244.invoke(Unknown Source)
at
sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.jav
a:25)
at java.lang.reflect.Method.invoke(Method.java:597)
at
com.atlassian.multitenant.impl.MultiTenantComponentFactoryImpl$AbstractMultiTena
ntAwareInvocationHandler.invokeInternal(MultiTenantComponentFactoryImpl.java:181
)
at
com.atlassian.multitenant.impl.MultiTenantComponentFactoryImpl$MultiTenantAwareM
ethodInterceptor.intercept(MultiTenantComponentFactoryImpl.java:230)
at org.ofbiz.core.entity.GenericDelegator$$EnhancerByCGLIB$
$8f571b45.removeByAnd(<generated>)
at
com.atlassian.crowd.embedded.ofbiz.db.OfBizHelper.removeByAnd(OfBizHelper.java:1
26)
... 88 more
Referer URL: https://172.24.36.44/login.jsp?
permissionViolation=true&os_destination=%2Fbrowse%2FSE-190
Build Information:
Uptime : N/A
Edition : enterprise
Version : 4.3.4
Build Number : 620
6. Build Date : Fri May 20 00:00:00 CEST 2011
Atlassian Partner : null
Installation Type : Standalone
Server ID : Contact your Administrator to discover this property value.
Last Upgrade : 10/Aug/11 7:54 AM (v4.2.3-b590#590)
Server Information:
Application Server: Apache Tomcat/6.0.32
Servlet Version: 2.5
File Paths:
Contact your System Administrator to discover file path information.
Memory Information:
Total Memory: 455 MB
Free Memory: 58 MB
Used Memory: 397 MB
Total PermGen Memory: 256 MB
Free PermGen Memory: 146 MB
Used PermGen Memory: 109 MB
System Information:
System Date : lundi, 27 août 2012
System Time : 07:07:24 +0200
Current Working Directory : Contact your System Administrator to discover this
property value.
Java Version : 1.6.0_22
Java Vendor : Sun Microsystems Inc.
JVM Version : 1.0
JVM Vendor : Sun Microsystems Inc.
JVM Implementation Version : 17.1-b03
Java Runtime : Java(TM) SE Runtime Environment
Java VM : Java HotSpot(TM) Server VM
User Name : FRSE-JIRA-PROD$
User Timezone : Europe/Paris
User Locale : français (France)
System Encoding : Cp1252
Operating System : Windows Server 2008 R2 6.1
OS Architecture : x86
Application Server Container :
Database type : mysql
Database JNDI address : java:comp/env/jdbc/JiraDS
Database URL : Hidden
Database version : 5.5.13
Database driver : MySQL-AB JDBC Driver mysql-connector-java-5.1.10 ( Revision: $
{svn.Revision} )
External user management : OFF
Crowd integration : ON
JVM Input Arguments : Contact your System Administrator to discover this
property value.
Language Info:
Installed languages: German (Germany)
German (Switzerland)
English (United States)
English (UK)
Catalan (Spain)
Chinese (China)
Chinese (Taiwan)
Danish (Denmark)
Spanish (Spain)
French (France)
Hungarian (Hungary)
Italian (Italy)