Technical Notes of Ehi Kioya

Technical Notes of Ehi Kioya

VNC For Ubuntu On Amazon EC2 – A GUI To Your Server

VNC For Ubuntu On Amazon EC2 - A GUI To Your Server

So you want to access your Ubuntu Server like you would a regular desktop – with a graphical front end instead of just a terminal. This tutorial explains how you can do this using Virtual Network Computing (VNC). Since I’m a big fan of Amazon Web Services (AWS), I will be explaining how to set up VNC for Ubuntu on Amazon EC2. However, the general procedure described here will work for any normal Ubuntu server setup.

Read more

Unlock SharePoint Workflow Tasks With C# Or PowerShell

Unlock SharePoint Workflow Tasks With C# Or PowerShell

A while ago, I noticed a peculiar behavior with one of my custom SharePoint workflows. Tasks were getting locked out after the first edit. The first edit proceeds fine but when we attempt to edit the task a second time, we get an error like this:

This task is currently locked by a running workflow and cannot be edited.

Read more

Moving A VirtualBox VM With Snapshots

Moving A VirtualBox VM With Snapshots

VirtualBox allows us to copy a virtual machine from one host to another easily. You just copy the hard disk file (usually .vdi or .vhd) to the new host. Then you use the transferred hard disk file to start up a new virtual machine on the new host. That’s it! However, I have found that if you use this method on a VM containing snapshots, you only get an old machine state of the original virtual machine. All saved snapshots are lost. In this tutorial, I explain how to move a VirtualBox VM to a different host and still retain the snapshots on the original host.

Read more

An Introduction To Two-Factor Authentication

An Introduction To Two-Factor Authentication

Hackers continue to think of new ways to get around security blocks on websites. Their goal is to bypass your user authentication process and gain access to sensitive data. Two-factor authentication (also known as 2FA or two-step verification) is one way to stop them in their tracks. This article explains two-factor authentication, the security process, and highlights what you need in order to implement it on your site.

Read more

High Level Tips For Developing Apps For Wearables

High Level Tips For Developing Apps For Wearables

Wearable technology can still be considered new technology today. Wearables include new smart watches, smart fitness bands, etc. Programming apps for wearables is different from development for mobile devices or desktops. This article highlights some basic concerns for programmers who want to embrace the new world of developing apps for wearable devices.

Read more
Page 1 of 3912
My Pic

I'm a Software Engineer and Technology Blogger. My primary line of work is with Microsoft products. However, I'm also a huge fan of open source technologies. You'll find my professional details on LinkedIn. You can also find me on Facebook (Profile and Page), Twitter, and Google+.  - I welcome new connections.

To provide feedback or to contact me directly, send me an email at email [at] ehikioya [dot] com. Or use my contact form.

Subscribe via Email