ACD 30 Users: What is the height of the display w/o base? viewable height?

Apple does not list the display height or measurements without the base -
1. Can someone tell me what the size of the display is, including the the case/bezel, and
2, What is the viewable height of the screen?
I'm trying to determine how close in size my NEC 2090UXi is if I rotate it to use as a 'menus, palettes and mail' monitor in portrait mode next to an ACD 30.
Thanks in advance!
Sarge

Thanks. That's interesting, and surprising - it makes that the 'densest' monitor I've ever seen with regard to how tightly the pixels are stacked.
My 20" NEC LCD2090UXi 1600x1200 is, when rotated to portrait mode (i.e. 1200x1600)about 17.5" tall, vs. the ACD 30's 15" for the same 1600 pixels.
I suppose a 19" monitor in 1600x1200 would be a better choice for a 'portrait mode' 'partner' to the ACD30...
Though I don't yet know if I can rotate the second display anyway, when running it from my yet-to arrive re-flashed GeForce 7800GTX video card.
Thanks for the answer, though!

Similar Messages

  • Form fields in LiveCycle. I want to allow users to add URLs to a form so that they can be clicked and opened on the web by form reviewers (users). what is the best way to achieve this?

    Form fields in LiveCycle. I want to allow users to add URLs to a form so that they can be clicked and opened on the web by form reviewers (users). what is the best way to achieve this?

    Once the user has entered the URL they want to add to the form. You can use the loadXML function to implement some special text in a label...
    var linkValue = "<?xml version=\"1.0\" encoding=\"UTF-8\"?><exData contentType=\"text/html\" xmlns=\"http://www.xfa.org/schema/xfa-template/2.8/\"><body xmlns=\"http://www.w3.org/1999/xhtml\" xmlns:xfa=\"http://www.xfa.org/schema/xfa-data/1.0/\" xfa:APIVersion=\"Acroform:2.7.0.0\" xfa:spec=\"2.1\"><p style=\"font-weight:bold;text-decoration:none;letter-spacing:0in\">The new link the user have entered is:<a href=\"" + textfield.rawValue + "\">textfield.rawValue</a></p></body></exData>";
      this.resolveNode("lblURL").value.exData.loadXML(linkValue, 1, 1);

  • How to check if the user has only the display authority of a message

    hi,
    How to check if the user has only the display authority of a message but does not have the change authority for a certain message?
    Best regards,

    hi blake
    though i am an application consultant and for authorisation u need to have help of BASIS person if u r not the one but still i can guide u regarding the same,
    Basically Authorization Management 
    Use
    You can use the following authorization objects to control the authorizations for maintaining business partner data:
    •        Authorization objects for the Business Partner:
    •     &#61601;        B_BUPA_GRP
    •     &#61601;        B_BUPA_ATT
    •     &#61601;        B_BUPA_FDG
    •     &#61601;        B_BUPA_RLT•       
    Authorization objects for relationships:
    •     &#61601;        B_BUPR_BZT
    •     &#61601;        B_BUPR_FDG
    In addition, you can assign an authorization group to a business partner in the dialog. The authorization group controls which users may maintain data for this business partner.
    You can also define authorizations for fields and field groups using the Business Data Toolset (BDT). Depending on the settings you have made, the system carries out the relevant authorization checks.
    In the dialog in the SAP GUI, you can display an overview of the authorizations assigned to you by pressing the button Settings.
    For more information on authorization management, see the Implementation Guide (IMG) of the Business Partner, as well as in the Developer’s Handbook for the BDT under  Authorizations.
    IntegrationAuthorization management for the Business Partner forms part of the  SAP authorization concept.
    Prerequisites
    You have made the necessary settings in Customizing of the Business Partner under Basic Settings--> -Address Management.
    Moving over
    AS ABAP Authorization Concept 
    The ABAP authorization concept protects transactions, programs, and services in SAP systems from unauthorized access. On the basis of the authorization concept, the administrator assigns authorizations to the users that determine which actions a user can execute in the SAP system, after he or she has logged on to the system and authenticated himself or herself.
    To access business objects or execute SAP transactions, a user requires corresponding authorizations, as business objects or transactions are protected by authorization objects. The authorizations represent instances of generic authorization objects and are defined depending on the activity and responsibilities of the employee. The authorizations are combined in an authorization profile that is associated with a role. The user administrators then assign the corresponding roles using the user master record, so that the user can use the appropriate transactions for his or her tasks.
    Authorization Checks 
    To ensure that a user has the appropriate authorizations when he or she performs an action, users are subject to authorization checks.
    The following actions are subject to authorization checks that are performed before the start of a program or table maintenance and which the SAP applications cannot avoid:
    •        Starting SAP transactions (authorization object S_TCODE)
    •        Starting reports (authorization object S_PROGRAM)
    •        Calling RFC function modules (authorization object S_RFC)
    •        Table maintenance with generic tools (S_TABU_DIS)
    Checking at Program Level with AUTHORITY-CHECK
    Applications use the ABAP statement AUTHORITY-CHECK, which is inserted in the source code of the program, to check whether users have the appropriate authorization and whether these authorizations are suitably defined; that is, whether the user administrator has assigned the values required for the fields by the programmer. In this way, you can also protect transactions that are called indirectly by other programs.
    AUTHORITY-CHECK searches profiles specified in the user master record to see whether the user has authorization for the authorization object specified in the AUTHORITY-CHECK. If one of the authorizations found matches the required values, the check is successful.
    Starting SAP Transactions
    When a user starts a transaction, the system performs the following checks:
    •        The system checks in table TSTC whether the transaction code is valid and whether the system administrator has locked the transaction.
    •        The system then checks whether the user has authorization to start the transaction.
    The SAP system performs the authorization checks every time a user starts a transaction from the menu or by entering a command. Indirectly called transactions are not included in this authorization check. For more complex transactions, which call other transactions, there are additional authorization checks.
    •     &#61601;        The authorization object S_TCODE (transaction start) contains the field TCD (transaction code). The user must have an authorization with a value for the selected transaction code.
    •     &#61601;        If an additional authorization is entered using transaction SE93 for the transaction to be started, the user also requires the suitable defined authorization object (TSTA, table TSTCA).
    If you create a transaction in transaction SE93, you can assign an additional authorization to this transaction. This is useful, if you want to be able to protect a transaction with a separate authorization. If this is not the case, you should consider using other methods to protect the transaction (such as AUTHORITY-CHECK at program level).
    •        The system checks whether the transaction code is assigned an authorization object. If so, a check is made that the user has authorization for this authorization object.
    The check is not performed in the following cases:
    You have deactivated the check of the authorization objects for the transaction (with transaction SU24) using check indicators, that is, you have removed an authorization object entered using transaction SE93. You cannot deactivate the check for objects from the SAP NetWeaver and HR areas.
    This can be useful, as a large number of authorization objects are often checked when transactions are executed, since the transaction calls other work areas in the background. In order for these checks to be executed successfully, the user in question must have the appropriate authorizations. This results in some users having more authorization than they strictly need. It also leads to an increased maintenance workload. You can therefore deactivate authorization checks of this type in a targeted manner using transaction SU24.
    •     &#61601;        You have globally deactivated authorization objects for all transactions with transaction SU24 or transaction SU25.
    •     &#61601;        So that the entries that you have made with transactions SU24 and SU25 become effective, you must set the profile parameter AUTH/NO_CHECK_IN_SOME_CASES to “Y” (using transaction RZ10).
    All of the above checks must be successful so that the user can start the transaction. Otherwise, the transaction is not called and the system displays an appropriate message.
    Starting Report Classes
    You can perform additional authorization checks by assigning reports to authorization classes (using report RSCSAUTH). You can, for example, assign all PA* reports to an authorization class for PA (such as PAxxx). If a user wants to start a PA report, he or she requires the appropriate authorization to execute reports in this class.
    We do not deliver any predefined report classes. You must decide yourself which reports you want to protect in this way. You can also enter the authorization classes for reports with the maintenance functions for report trees. This method provides a hierarchical approach for assigning authorizations for reports. You can, for example, assign an authorization class to a report node, meaning that all reports at this node automatically belong to this class. This means that you have a more transparent overview of the authorization classes to which the various reports are transported.
    You must consider the following:
    •     •         After you have assigned reports to authorization classes or have changed assignments, you may have to adjust objects in your authorization concept (such as roles (activity groups), profiles, or user master records).
    •     •         There are certain system reports that you cannot assign to any authorization class. These include:
    •     •         RSRZLLG0
    •     •         STARTMEN (as of SAP R/3 4.0)
    •     •         Reports that are called using SUBMIT in a customer exit at logon (such as SUSR0001, ZXUSRU01).
    •     •         Authorization assignments for reports are overwritten during an upgrade. After an upgrade, you must therefore restore your customer-specific report authorizations.
    Calling RFC Function Modules
    When RFC function modules are called by an RFC client program or another system, an authorization check is performed for the authorization object S_RFC in the called system. This check uses the name of the function group to which the function module belongs. You can deactivate this check with parameter auth/rfc_authority_check.
    Checking Assignment of Authorization Groups to Tables
    You can also assign authorization groups to tables to avoid users accessing tables using general access tools (such as transaction SE16). A user requires not only authorization to execute the tool, but must also have authorization to be permitted to access tables with the relevant group assignments. For this case, we deliver tables with predefined assignments to authorization groups. The assignments are defined in table TDDAT; the checked authorization object is S_TABU_DIS.
    You can assign a table to authorization group Z000. (Use transaction SM30 for table TDDAT) A user that wants to access this table must have authorization object S_TABU_DIS in his or her profile with the value Z000 in the field DICBERCLS (authorization group for ABAP Dictionary objects).
    please See also:
    •        SAP Notes 7642, 20534, 23342, 33154, and 67766
    guess this info will help you,there is one graphic which actually explain the hierarchy of authorisation,i will find some time out to let u know more info about the authorisation
    but if u sit with ur BASIS guy then u can learn lot of things in PFCG
    i guess u r a basis guy,then its not a problem
    best regards
    ashish

  • What are the basic element of Base configuration of an oracle Database ?

    What are the basic element of Base configuration of an oracle Database ?

    889543 wrote:
    What are the basic element of Base configuration of an oracle Database ?check this link
    http://www.dbnest.com/entry/194/
    and if you want to configure oracle installation click below link .
    http://download.oracle.com/docs/cd/B19306_01/server.102/b14196/install002.htm
    --neeraj                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                               

  • What causes the display to develop darkened areas?

    What causes the display to develop darkened areas?

    Have you dropped the iPad?
    Try this  - Reset the iPad by holding down on the Sleep and Home buttons at the same time for about 10-15 seconds until the Apple Logo appears - ignore the red slider - let go of the buttons. (This is equivalent to rebooting your computer.) No data/files will be erased. http://support.apple.com/kb/ht1430
     Cheers, Tom
    BTW - You don't need to double post.

  • What's the difference between XI basis and regular basis?

    I am an SAP basis admin for years.
    Now my corp starts to use XI.
    What is the difference between XI basis and regular basis if there is any?
    Thanks!

    Hi,
    No difference... Basis is Basis (Technical consultant)... According to me its just terminology changed. i.e. SAP Administrator instead of SAP basis.
    For XI you may need to additionally control the Java stack administartion along with ABAP stack.
    Please go thourgh the below link to know about SAP NetWeaver Administrator, then you may compare with regular Basis activities
    http://help.sap.com/saphelp_nw70/helpdata/en/7e/c82c42be6fde2ce10000000a1550b0/frameset.htm
    Also
    Refer - PI/XI administartion study material links
    PI Administration, monitoring document
    Thanks
    Swarup

  • What is the difference between data base objects and runtime objects

    What is the difference between data base objects and runtime objects

    Hi raja,
    data base objects means u can have the presence of these objects in the database.So the tables,searchhelps,structures,lockobjects comes under these ones.
    Runtime objects are created and destroyed after the program ends, any changes we make to them are temporary only.
    regards,
    nagaraj
    Message was edited by: nagaraj kumar nishtala

  • What is the Display Duplicates button?

    What is the Display Duplicates button?

    Very likely it is a duplicate.  Use Get Info to see the source details for both tracks and/or use "show in Finder" to see if they trace back to the same file.  If there's two files then it is a true duplicate. If they go back to the same file then iTunes has mistakenly added a second reference.
    If it is mistaken reference you can probably delete it but I am not sure how to do this in your case since I set iTunes to manage my music in a different way. You have to be careful because iTunes default is set up to sometimes delete the file when you delete a track reference. If it is two references to the same file you don't want to delete the file itself.
    If they are two different files then you can decide which one to keep (usually the better quality one).

  • CUC 8 - converting local users with VM's to LDAP users - what is the best method?

    Evening all
    We are running a new Unity Connect 8.0 environment. Initially the users were either manually imported and created individually. The standard naming convention for the Alias names are first initial + surname.
    I have integrated LDAP synch so now I can see all the users in the users OU. I want to be able to utilise the LDAP synch to its full potential. I want to create new users from LDAP. But my primary objective is to convert all local users to domain users. The only main issue which we identified is that domain users Alias length is set to 8 characters max in length whereas the local accounts are full length.
    What would be the best way to migrate the users to LDAP, preserve the voicemails and update Alias names to be the same length as domain users?
    I was thinking of the following:
    Backup up system using COBRAS
    Delete all local users from CUC
    Do a bulk import of all users from LDAP into CUC as fresh accounts
    Use COBRAS import tool to load backup
    Amend the alias names manually to the correct length (8 letters)
    Import all users and VM's back in
    Pray it works!
    Any more efficient suggestions welcome
    Thanks in advance
    Mus

    There is a far easier way to do this using the Bulk Administration Tool in Connection.
    Perform an export operation to get everything into a CSV file.
    Delete all the columns except Alias, EmailAddress, MailName, and LdapCcmUserId.
    Populate the LdapCcmUserId to match the user's sAMAccountName attribute from AD.
    NOTE: Spot-check to be sure that you can find this user's account using the Import Users section. The account must have a Last Name value populated, be within the search base, and satisfy any filters you have applied to the syncrhoization agreement.
    Update the MailName to match the LdapCcmUserId. If you are using VMO or Single Inbox also set the EmailAddress to match the user's real email address. When you do the Update operation the Alias should get corrected to match the LdapCcmUserId if memory serves [read: test this!].
    NOTE: If you are setting the EmailAddress you also want the CreateSmtpProxyFromCorp column to be set to 1. This will ensure that the value is copied to the SMTP Proxy Address and can be utilized by the Unified Messaging integration.
    Save your modified CSV file and run an update operation. I suggest starting with a batch of only a few accounts at first to get comfortable with the process. Be sure to specify a filename for failed objects; you almost always have a few and this will give you a little guidence on what failed.

  • Trouble with permission to open current PDF from one user to another user. what is the cure. i am running nthe current Server and updated Os 10.9.2

    Trouble with permission to open current PDF from one user to another  What is the cure ? I'm running the latest Server and OS 10.9.2.

    I had the same problem.
    Try this.
    https://igppwiki.ucsd.edu/groups/publichelpwiki/wiki/a1538/Howto_Disable_Acrobat _as_the_Safari_PDF_Viewer.html

  • I'm a new iPad user, what's the best looking case?

    Just got a iPad an
    D wanted to know what's the best case out there from my new apple fam n__n

    That is one loaded question. As with beauty, the best looking case is in the eye of the beholder, and the same for the best case. If there were only a few cases available from one or two case manufacturers only, maybe an easier question to answer, but there are a number of different types and styles of cases available from a significant numbed of case manufacturers.

  • System pref- what do the display numbers mean &other questions

    1. are they the choices that the mini (purchased 9/07) can "send to the display" or are they the monitor's only display choices built into the monitor (like 1024x 768)
    2. whats the advantage if any of a widescreen LCD display
    3. will any "cheap- ie $200-300 LCD viewsonic. samsung, HP monitor work with my new mini if the monitor has a dvi or vga plug?
    Its now running my old proview CRT I paid like $129 for .
    4. does the mini have a set / preferred resolution range, again like the 1024 x 768
    Thank you

    Great questions edwardh1. I'll tell you what I think are the answers.
    1) The mini does contain several pre-installed resolutions, so it is aware of several "standard" resolutions without any reliance on a display driver. However, whether or not the mini makes some or all of these resolutions available to the attached display will depend on how the mini "detects" the display.
    2) Widescreen is much better for modern digital media. For example, DVD playback on a widescreen is much nicer than on a conventional screen. It's also nice to have a little extra width when using certain programs that have tool palettes. You can stick the palettes off to the side where they don't interfere with your work area. And if you go really big, like a 24" monitor, you can put two pages side-by-side, which can result in a real boost in efficiency with certain tasks.
    3) As to whether any monitor will work with a mini, in theory the answer is yes. But if you hang out on these discussion boards long enough you will see that the road is full of potholes. Apple, as has been the case for a number of years, is always on the leading edge of new technologies, with Windows in a trailing position. If you want examples, think of USB, FIrewire, Bluetooth, DVI...the list goes on and on. Macs use a modern plug-and-play architecture for delivering the display driver to the host (Mac). Windows can perform this trick, but they also have a legacy system where the user installs the display driver (usually from a CD ROM) or else a wizard installs the driver from the internet. The problem with old habits on Windows is that they die hard. So even though modern displays for the most part correctly implement plug-and-play drivers, which in theory Windows does support, there are plenty of cases where the display manufacturers blow it and fail to do a good job of it. Instead they ship the Windows driver on a CD and call it a day. So you can be 90+% confident of a good result when buying a non-Apple monitor, but by no means is it guaranteed.
    4) This question is very similar to your first question. Yes, the mini will have pre-installed several standard timings. I am sure 1024 x 768 would be on that list.
    My final comment would be don't worry too much about buying a third-party display. Go for what you want with the confidence it will most likely work just fine.

  • What Decides the Display Order of Subscribed Address Books?

    I have asked this question before and received no help with it. The people who can help me are people who have at some time or other subscribed to 2 or more Address Books belonging to others.
    Can anyone tell me what decides the order in which the address books I am subscribed to appear in the Groups Column? Obviously they appear below all local groups, but when I subscribe to more than one, I can't work out what decides the order in which they appear in the Groups Column. Its not alphabetical and its not creation order (new ones can appear "anywhere" in the list in my experience) and its not based on what subscribed Address Book is selected at the time I subscribe to a new person's Address Book. Any ideas much appreciated.

    The box to the far right (Settings) provides only for sort by newest or by oldest.  Obviously, a designer who never listens to podcasts via iTunes was in charge.  Yet another demonstration of Apple's growing design sclerosis.
    I'm finding an old version of iTunes to which I can resort.  I use iTunes for podcasts more than commercial schlock -- obviously not in keeping with Apple's business plan -- and there's no advantage to staying with 11.1.  Here's an article from SF Chronicle how to do this (it's a popular article!):
    http://blog.sfgate.com/loaded/2013/05/17/how-to-get-the-old-itunes-back-in-10-ea sy-steps/

  • What is the display size ( without Stand )

    Hello,
    I want to put a Thunderbolt Display on a wall, with a VESA kit.
    What is the exact display size ? I'll remove the stand.
    Bye,
    Seb

    Very likely it is a duplicate.  Use Get Info to see the source details for both tracks and/or use "show in Finder" to see if they trace back to the same file.  If there's two files then it is a true duplicate. If they go back to the same file then iTunes has mistakenly added a second reference.
    If it is mistaken reference you can probably delete it but I am not sure how to do this in your case since I set iTunes to manage my music in a different way. You have to be careful because iTunes default is set up to sometimes delete the file when you delete a track reference. If it is two references to the same file you don't want to delete the file itself.
    If they are two different files then you can decide which one to keep (usually the better quality one).

  • HT1320 What if the display is nothing but white?

    I have a new Nano. The display is nothng but bright white. I the product defective?

    Dear Auxone,
    No issue 4 installin ths application on a phone tht does nt have a GPS support.
    Bt at least u must have Bluetooth enabled device 4 receiving d GPS data 4m
    external GPS receiver. When GPS receiver is connected to mobile device then only
    u can get latitude and longitude in DMS format.
    Permissions r used by devices to protect access to APIs / functions tht require
    authorization b4 being invoked. If u set location permission 4 ur application
    u must have d GPS supported device else it ll gives u "Authentication Failure"
    error.
    "MIDlet-Permissions-Opt" r optional permissions. No matter device is supported
    or nt 4 those permissions. It will just skip d process if API support is nt available
    on device n it will never give u d o/p 4 tht APIs / functions.
    -d.p.

Maybe you are looking for