ATTENTION: HP HELP ADMINISTRATORS

Since this forum has seemed to be ignored for some time now, I'm hoping a thread with caps will grab attention. Notice below all of these threads involving dv6700+ series with sound problems since HP updates? WHY are we not getting any answers for this? I've been directed over the phone by your own tech support to "install the latest drivers found at the HP website", and after sound randomly just coming on after multiple restarts, once I installed the new drivers, the Audio Device was ONCE AGAIN completely removed from the system. Why is this happening, and why do we have to pull teeth just to get a fix and/or attention about this? Is there ANYTHING going on as far as assistance in helping us recover from this? Or are we stuck to play the waiting game until something randomly happens on its own again. This company by far has the most slack customer support I've ever dealt with on multiple multiple occasions. HELP US.

I understand that it's a user support forum, but this is where I was told to come to by HPs phone tech support. If you browse through the past few pages, you'll see what the problem is. It's really hard to tell. I myself installed the latest HP update, and my sound started to cut off every 15 minutes or so, requiring a restart of the system, just for it to happen again. I was directed by HP tech support to install the latest drivers, which I did, and that ended up erasing the Audio device off of my system- thus making the situation worse. I can't really go into much more detail with it, because I don't know what happened--- it doesn't seem that anyone who's posted with the same problem (many many people, all since the latest update no less) can figure it out.

Similar Messages

  • 2 ATTENTION! HELP! All Photoshop Professionals.

    ATTENTION! HELP! All Photoshop Professionals.
    In regards to my last message of seeking Photoshop Professionals… I have then since been mocked due to I only wanted to have someone help me with a problem and also become my friend. My intentions were to have someone help me and then for me to not just leave and say bye, but to rather stay and perhaps also make a new friend.
    I feel that it is this lost world that is to blind to see someone’s true attentions, but instead look past truth and in fact not care about others. I on the other hand wanted to make some new friends in the process of asking for help. So I’ am here once again seeking help from those who hear my cry and would like to try to help me in a Photoshop helping situation.
    Hello World I' am issuing a challenge to any one who would like to become one of my top Photoshop editing friends, and hopefully even real friends as well
    I’ am simply searching for people who would (FREE Of Charge) like to volunteer there services by helping me with the more advanced Photoshop skills that I simply just do not posses…But all in time I pray that I may learn.
    My Photoshop challenge at this time would be to magically cut me precisely out of a JPEG image, leaving only a smooth edge around my whole body, with a transparent background so that I can then display a graphic behind the image of me.
    The person OR persons who do the most professional job will become my new Photoshop friends with chances of becoming my real friends as well (That is if you would also be interested in getting to know me
    I’ve attached the image within this message.
    Good luck everyone & I hope to see your talent.
    Please respond to this message Via My E-Mail
    Thank You and GOD Bless.
    Signed: Chris Riss
    <links removed>

    Thank you everyone who have sent me emails I would defiantly like to thank Ramón G Castañeda for being the first person to complete the task of cutting me out of my image  As some may have already seen, I have posted the new banner already on my website. For those who would like to see, feel free to have a look
    GOD Bless everyone and once again thank you all so much who have acutely looked into helping me and have wanted to become friends.
    Also to clarify a few things… No I was not on this website months ago. Yes I’ am a preacher/ holy/ positive hip hop artist, and once again thank you to those who cared enough to help me and look more into my life on the web
    GOD Bless In Jesus Name and I’ll be back soon
    Signed: Chris Riss
    <link removed>

  • Immediate attention please help

    please help me determine if i have to use bmp in this scenario,
    I am positive i have to use bpm in this case:
    Sender: r3<idoc> async
    Rcv: webservice sync
    I need to update the status of the idoc outbound from R3.
    Now i know that i can use the systat01 to map back the status of the idoc, But i am pretty sure i have to use a bpm for this, Correct me if i am mistaken:)
    Could some1 guide me with the steps involved for this bpm?
    also specify # of msg intf requrd for ths wt reasons..
    Thank you for your time, full points will be awarded,

    check this thread with similar requirement:
    Receive response from SOAP adapter without BPM.
    Thanks,
    Beena.

  • Testing general help

    Hi Gurus,
    I am soon going to start testing on an SAP upgrade project. Whats the best way to get myself prepared for the same? I am currently studying the client's Buiness processes, however there are just too many docs and these are getting me confused. Also I am concerned that all this time studying the docs is not wasted. If you have been in a similar situation before, please let me know how do you go about it. testing will be Functional + integration.

    hi dave,
    pls see the below matter i think it gives you a solution.
    SAP R/3
    Security Upgrades
                                                                                    1.             overview
    The purpose of this document is to provide additional information that could be helpful with SAP Security upgrades, especially pertaining to 4.6C.
    This document is not aimed at replacing the SAP Authorizations Made Easy guidebook’s procedures, but rather to complement these based on lessons learnt from previous upgrade projects. 
    It is focused mainly on upgrades from 3.1x to 4.6x and covers the following:
    ·        Evaluation of the Security Upgrade approaches;
    ·        “Gotchas” to watch out for with SAP’s SU25 utility;
    ·        Transactions and authorizations that require special attention; and
    ·        Helpful reports, transactions, hints and tables to know.
    It is highly recommended that you review the chapter on upgrades in the Authorizations Made Easy guide before attempting the security upgrade.
    See OSS note 39267 for information on obtaining the Guide, or visit SAPLabs’ website at: http://wwwtech.saplabs.com/guidebooks/
    2.             Security upgrade objectives, Process and approaches
    2.1.               Objectives
    There are a couple of objectives for having to upgrade the SAP Security infrastructure:
    ·   Converting manual profiles created via SU02 to activity groups, as SAP recommends the use of Profile Generator (PFCG) for the maintenance of profiles;
    ·   Adding new transactions representing additional functionality to the applicable activity groups;
    ·   Adding the replacement transactions that aim at substituting obsolete or old-version transactions, including the new Enjoy transactions;
    ·   Adjusting the new authorization objects that SAP added for the new release; and
    ·   Ensuring that all existing reports, transactions and authorizations still function as expected in the new release of SAP.
    2.2.               Overview of the Security upgrade process
    Once the Development system has been upgraded to 4.6, the security team will need to perform the following steps as part of the Security Upgrade:
    ·        Convert Report Trees to Area Menus;
    ·        Review users (via SU01) to check for any new or changed fields on the user masters;
    ·        Convert manual profiles created via SU02 to Activity Groups (See Approaches below);
    ·        Compare SU24 customer settings  to new SAP default settings (SU25 steps 2A-2C);
    ·        Determine which new / replacement transactions have to be added to which activity groups (SU25 step 2D);
    ·        Transport the newly-filled tables USOBT_C and USOBX_C that contain the SU24 settings you’ve made (SU25 step 3); and
    ·        Remove user assignments to the manual profiles.
    2.3.               Approaches to convert manual profiles to Activity Groups:
    2.3.1.      Approach #1: SAP’s standard utility SU25
    SAP provides an utility for converting Manual Profiles to Activity Groups and to identify the new and replacement transactions that need to be added to each activity group.
    You can access this utility by typing “SU25” in the command box.
    If you do decide to use SU25 Step 6 to convert the Manual profiles to activity groups, you will need to watch out for the following “gotchas”:
    Naming convention (T_500yyyyy_previous name)
    All activity groups created before SU25 is run, are renamed to T_500yyyyy_previous name. 
    See OSS note 156196 for additional information and procedures to rename the activity groups back to their original names using program ZPRGN_COPY_T_RY_ARGS.  Carefully review information regarding the loss of links between profiles and user master records.
    Transaction Ranges
    Ranges of transactions are not always added correctly to the newly-created activity groups. Some of the transactions in the middle of the range are occasionally left off.  E.g. you have a transaction range of VA01 – VA04 for a specific manual profile.  After SU25 conversion, the new Activity Group only contains VA01 and VA04.  Transactions VA02 and VA03 were not added.
    It is important that a complete download of table UST12 is done prior to running SU25.  Once SU25 has been run, a new download of UST12 can be done to identify which transactions have been dropped off.
    The missing transaction codes will need to be added manually to the relevant activity group via PFCG.
    Missed “new” transactions
    The output of one of the steps in SU25 is a list of the new replacement transactions (e.g. Enjoy transactions) that need to be added per activity group.  E.g. transaction ME21N replaces ME21.  The list will identify each activity group that has ME21 where ME21N needs to be added to.
    In some cases SU25 does not identify all new transactions to be added.
    2.3.2.      Approach #2: Manual reconstruction of Profiles as Roles (Activity Groups)
    An alternative approach to SU25 is to manually create an activity group for each manual profile that was created via SU02.
    The advantage of this approach is that you won’t have any missing transactions that were “dropped off” with the SU25 conversion.  
    3.      Items requiring special attention
    3.1.   Authorizations
    Several new authorization objects have been added with release 4.6. Care should be taken when adjusting authorizations – carefully review all new defaults that were brought in. These are indicated by a Yellow or Red traffic light in PFCG.
    It is highly recommended that you first check the previous settings where new defaults were brought in, before just accepting the new defaults.  You can either use the existing 3.1x Production system or the UST12 and/or USOBT_C tables as reference.
    3.2.   ‘*’ in S_TCODE
    It’s recommended that all activity groups containing an ‘*’ in authorization object s_tcode are recreated via PFCG by selecting only those transactions required for that role.  Also, if you did previously add transactions to an activity group by manipulating the s_tcode authorization entries, it is recommended that the transactions are pertinently selected/added on the Menu tab. The object s_tcode should be returned to its ‘Standard’ status.
    3.3.   Report Trees
    Report Trees need to be converted to Area Menus using transaction RTTREE_MIGRATION..
    3.4.   ABAP Query reports
    Reports created by ABAP Query need to be added either to the activity group (Menu tab) or to an Area menu to ensure an authorization check on s_tcode level.
    3.5.   S_RFC
    The use of an authorization object for Remote Function Calls (RFC) was introduced to provide authorization checks for BAPI calls, etc. Authorization object s_rfc provides access based on the Function Group (each RFC belongs to a Function Group). Due to the potential prevalent use of RFC’s within the R/3 system, SAP has provided the ability to change the checks for this object via parameter auth/rfc_authority_check. It is possible to deactivate the checking of this object completely. However it is recommended to rather set the values as required, which makes testing even more important! 
    3.6.   Custom tables and views
    Custom views and tables that are customarily maintained via SM30, SM31,etc. will need to be added to an authorization group.  This can be done via transaction SE54 or SUCU or by maintaining table TDDAT via SM31.
    3.7.   User menus versus SAP menu
    A decision needs to be made once the first system has been upgrade to 4.6x as to whether the user menus or the SAP menu, or both are to be used.
    Most users find the new user menus confusing and unfamiliar due to duplication of transactions, etc. (if a user has more than one activity group and the same transaction appears in several, the transaction will appear multiple times). The majority of upgrades from my experience have opted to use a modified copy of the SAP menu by adding their own area menus (converted report trees).
    3.8.   Re-linking of user master records to profiles
    If you do not maintain the user masters in the same client as the activity groups, you will need to establish a strategy for re-linking the users in the QA and Productive environments when transporting the activity groups as part of the upgrade cutover. This might also be necessary depending on whether you decided to rename the Activity groups per OSS note 156196.
    Remember to thoroughly test and document all procedures and CATT scripts prior to the Production cutover.
    3.9.   Dual-maintenance
    With most current upgrades, the upgrade process will be tested on a separate environment set aside from the existing landscape. In a lot of cases a dual-landscape will be implemented where the existing landscape is complemented with an additional 4.6x test client(s).   The new 4.6x clients usually become part of the permanent landscape once the Production system has been cut over and all changes are then sourced from these ‘new’ Development and/or QA systems.
    It is imperative that all interim security-related changes are applied to both sets of systems to ensure that the ‘new’ 4.6x development source system is current with all changes that were made as part of Production support in the ‘old’ version landscape.  If not, you will have changes that were taken to Production when it was still on the older release, but are now missing after the switch is made to the 4.6x systems.
    It is thus advisable to keep changes during the upgrade project to a minimum.
    3.10. Transport of activity groups
    Changes to activity groups are not automatically recorded in 4.6x. When an activity group needs to be transported, it needs to be explicitly assigned to a change request via PFCG.
    SAP recommends that you first complete all the changes to an activity group, before you assign it to a transport request.   Once you’ve assigned the activity group to a request, do not make any further changes to it.
    You can also do a mass transport of activity groups via PFCG > Environment > Mass Transport.
    If you want to transport the deletion of an activity group, you first have to assign the activity group to a transport request before performing the deletion via PFCG.
    3.11. Client copies
    The profiles used for creating client copies have been changed, especially profile SAP_USER from 4.5 onwards. Activity groups are seen as customizing and the SAP_USER profile copies both user masters and activity groups.
    It’s recommended that the client copy profiles are carefully reviewed before the copy is performed.
    See OSS note 24853 for additional information on client copies.
    3.12. SU24
    Changes to check indicators that were made via SU24 might have to be redone as part of the upgrade.  Ensure that any resulting transport requests are noted and included in the detailed cutover plan.
    Check indicator changes done via SU24 will need to be applied for any new and replacement transactions.
    3.13. Composite Activity Groups
    Composite activity groups can be built in release 4.6x using individual activity groups.  A composite activity group does not contain any authorizations, but is merely a collection of individual activity groups.
    3.14. Central User Administration
    Central User Administration (CUA) simplifies user administration, allowing security administrators to maintain users in a single central client only.  The user masters are then distributed to other clients using ALE.  It is recommended that CUA is implemented post-upgrade and once the systems have been stabilized.  Carefully review OSS notes and the impact on the existing landscape, client copy procedures, etc. prior to implementing CUA.  It is recommended that the upgrade is kept as simple as possible – there are going to be plenty of opportunities to test your problem-solving skills without complicating the setup with new utilities!
    See Authorizations Made Easy guide for information on setting up CUA.
    See OSS notes 333441 and 159885 for additional information.
    4.      additional tips
    4.1.               OSS and Release Notes
    Review all security-related OSS and Release notes related to upgrades and to the release you’ll be upgrading to, prior to the upgrade.  It’s useful to review these before you define your workplan, in case you have to cater for any unforeseen issues or changes.
    4.2.               Workplan
    Given the amount of work and number of steps involved in the security upgrade, it is recommended that a detailed Workplan is defined at the startup of the upgrade project.  Key milestones from the security workplan should be integrated and tracked as part of the overall Upgrade Plan.
    Clear ownership of activities, including conversion of Report Trees, needs to be established.  This function is often perform by the Development team.
    4.3.               Standards and Procedures
    Naming conventions and standard procedures should be established before the manual profiles are reconstructed as activity groups.  Each team member should know how the new activity groups should be named to ensure consistency. Other standard practices for the construction of the activity groups should include:
    ·        Transactions are added via the Menu tab and not by manipulating s_tcode.
    ·        Ideally, no end users should have access to SE38, SA38, SE16 nor SE17. 
    Remember to keep Internal Audit involved where decisions need to be made regarding the segregation of job functions or changes to current authorizations are requested or brought in with new authorization objects / defaults.
    4.4.               Testing
    4.4.1.      Resources for testing
    Enough resources should be allocated to the security upgrade process as each activity group and profile will require work to some degree or the other.  It is important that key users and functional resources are involved in testing the activity groups and that this effort is catered for in the Upgrade Project plan.  Clear ownership of each activity group should be established not only for testing purposes, but also for ongoing support and approval of changes.  Ideally, the ownership and approval of changes should reside with different resources (i.e. the person requesting the addition of a transaction or authorization should not be the same person responsible for approving the request).
    4.4.2.      Test Plan
    The security team should also establish testing objectives (whether each transaction being used in Production should be tested, whether each activity group should be tested with a representative ID, etc.). 
    A detailed test plan should then be established based on the approach, to ensure each person responsible for testing knows what s/he should be testing, what the objective(s) of the test is and how to report the status of each test.  Both positive (user can do his/her job functions) and negative (user can’t perform any unauthorized functions) testing should be performed.
    The Reverse Business Engineering (RBE) tool is very useful in identifying which transactions are actually being using in Production.  This can assist with focusing on which transactions to test.
    The importance of testing all used transactions individually and as part of role-testing cannot be stressed enough.  TEST,TEST,TEST!
    Every menu option, button, icon and available functions for all critical transactions need to be checked and tested.  There are some instances where icons are grayed out or don’t even appear for certain users, due to limited authorizations.  The only way these type of issues can be identified, is through thorough testing.
    4.5.               Issue Management (tracking and resolution)
    Due to the number of users potentially impacted by issues / changes to a single activity group, a perception can quickly be created that the security upgrade was unsuccessful or the cause of many post GoLive issues.
    It is therefore recommended that an issues log is established to track and ensure resolution of issues.  The log should ideally also contain a description of the resolution, to aid with similar problems on other activity groups. 
    This log will be helpful during the entire upgrade process, especially where more than one resource is working the same set of activity groups, so set it up at the beginning of upgrade project!  You can also use this for a ‘lessons learnt’ document for the next upgrade.
    4.6.               Status reporting
    The security upgrade forms an integral part of the overall upgrade given the sensitivity and frustration security issues could cause.  It is important that key milestones for the security upgrade are tracked and reported on to ensure a smooth and on-time cutover.
    4.7.               Detailed cutover plan
    The detailed cutover plan differs from the overall security workplan, in that the detailed plan outlines the exact steps to be taken during each system’s upgrade itself.  This should include:
    ·        Transport request numbers,
    ·        Download of security tables prior to the upgrade, especially UST12, USOBT_C and USOBX_C,
    ·        A backup and restore plan, (e.g. temporary group of activity groups for critical functions),
    ·        The relinking of user master records, with details on any CATT scripts, etc. that might be used,
    ·        User comparison, etc. 
    The security team needs to ensure that enough time is allocated for each action item and that this time is built into the overall cutover plan.   The project manager is usually expected to give an indication to end users and key stakeholders as to when the Productive system will be unavailable during its cutover to the new release.  This downtime should thus incorporate time required to perform user master comparisons, unlocking of ID’s and all other action items.
    4.8.               Project team access
    The SAP_NEW profile can temporarily be assigned to project team members to provide interim access to the new authorization objects. This provides the security team the opportunity to convert and adjust the IS team’s activity groups.  It also eliminates frustration on the functional team’s side when configuring and testing new transactions, etc.
    4.9.               Training and new functionality
    Some support team members (e.g. Help Desk members responsible for reset of user passwords, etc.) might require training and/or documentation on the changed screens of SU01, etc.
    It is recommended that a basic Navigation & Settings training module is created for all SAP users and should cover the use of Favorites, etc.
    The security team should also review Profile Generator in detail, as several new functions have been added (e.g. download/upload of activity groups, etc.).  Remember to review all the different icons, menu options and settings on the authorizations tab, etc.
    Lastly, if your company / project does use HR as related to security (activity groups and users assigned to positions / jobs), ensure that you become acquainted with the new enjoy transactions, e.g. PPOMW.
    4.10.           SU53
    A new function with SU53 is the ability to display another user’s SU53 results.   (Click on the ‘other user’ button and enter the person’s SAP ID).
    4.11.           Post Go-live
    Remember to establish a support roster, including after hours for critical batch processes, to ensure security-related issues are resolved in a timely fashion.
    Dumps should be checked regularly (Objects s_rfc and s_c_funct like making appearances in dumps) for any authorizations-related issues.  Transaction ST22 can be used to review dumps for that day and the previous day.
    Avoid transporting activity groups at peak times, as the generation of activity groups can cause momentarily loss of authorizations.  It’s recommended that a roster for activity group transport and mass user comparison be reviewed with the project manager prior to the upgrade.  Exceptions should be handled on an individual basis and the potential impact identified, based on number and type of users, batch jobs in progress, etc. 
    And, don’t forget to keep on tracking all issues and documenting the resolutions for future reference.
    5.      helpful reports, transactions and tables
    5.1.               Reports and Programs
    ·           RTTREE_MIGRATION: Conversion of Report Trees to Area Menus
    ·           PFCG_TIME_DEPENDENCY: user master comparison (background)
    ·           RSUSR* reports (use SE38 and do a possible-values list for RSUSR* to see all available security reports), including:
    v     RSUSR002 – display users according to complex search criteria
    v     RSUSR010 – Transactions that can be executed by users, with Profile or Authorization
    v     RSUSR070 – Activity groups by complex search criteria
    v     RSUSR100 – Changes made to user masters
    v     RSUSR101 – Changes made to Profiles
    v     RSUSR102 – Changes made to Authorizations
    v     RSUSR200 – Users according to logon date and password change, locked users.
    5.2.               Transactions
    ·           SUIM : various handy reports
    ·           SU10 : Mass user changes
    ·           PFCG: Profile Generator
    ·           PFUD: User master comparison
    ·           SU01: User master maintenance
    ·           ST01: System trace
    ·           ST22: ABAP dumps
    ·           SUCU / SE54: Maintain authorization groups for tables / views
    ·           PPOMW: Enjoy transaction to maintain the HR organizational plan
    ·           PO10: Expert maintenance of Organizational Units and related relationships
    ·           PO13: Expert maintenance of Positions and related relationships
    ·           STAT: System statistics, including which tcodes are being used by which users
    5.3.               Tables
    Table
    Use
    UST12
    Authorizations and Tcodes per Profile
    UST04
    Assignment of users to Profiles
    AGR_USERS
    Assignment of roles to users
    USOBT_C
    Authorizations associated with a transaction
    USR02
    Last logon date, locked ID’s
    AGR_TCODES
    Assignment of roles to Tcodes (4.6 tcodes)
    USH02
    Change history for users (e.g. who last changed users via SU01)
    USH04
    Display history of who made changes to which User Ids
    USR40
    Non-permitted passwords
    i am also providing the url of sap  upgrade guide. pls check it out ok.
    www.thespot4sap.com/upgrade_guide_v2.pdf
    reward me points if it helps you
    thanks
    karthik

  • Muse site won't open keeps crashing-please help

    my site wont open.  I have been working from an external because I have had to work on it on two different computers.  today when I came home and tried to open my site on my laptop this is the error message I got as Muse crashed: 
    Adobe Muse encountered an unexpected error and will have to be terminated.
    SQLS/internalExecute-SQLError: 'Error #3123: Database disk image is malformed.', details:'', operation:'execute'
    please someone give me some good news that I dont have to start all over...

    Yes other files open just fine.  I agree that somehow when doing the last save there was some sort of error that happened that corrupted the file.  I am hoping that either there is some sort of work around so I don't lose my whole website.
    Please let me know. 
    Also, I have seen in other threads that you guys have had people send you their file do that the development team could try and "repair" the file before sending it back.  Is that something you guys still do?  If so am I eligible? 
    Thanks for your attention and help. 

  • Help! My mac turns grey and i cannot sign in. It said "your start up disc is full".

    My child incidently put her itumes to my macbook air. It seems it the macbook is very full. When we turn it on, it stated " your start up disc is full". We cannot delete files / programs to make more spaces because i cannot even sign in. The monitor turns grey and freeze after I click "sign in". Help me, please.... Thank you very much for your kind attention and help.

    Step 1
    The first step in dealing with a startup failure is to secure the data. If you want to preserve the contents of the startup drive, and you don't already have at least one current backup, you must try to back up now, before you do anything else. It may or may not be possible. If you don't care about the data that has changed since the last backup, you can skip this step.   
    There are several ways to back up a Mac that is unable to start. You need an external hard drive to hold the backup data.
         a. Start up from the Recovery partition, or from a local Time Machine backup volume (option key at startup.) When the OS X Utilities screen appears, launch Disk Utility and follow the instructions in this support article, under “Instructions for backing up to an external hard disk via Disk Utility.” The article refers to starting up from a DVD, but the procedure in Recovery mode is the same. You don't need a DVD if you're running OS X 10.7 or later.
    b. If Step 1a fails because of disk errors, and no other Mac is available, then you may be able to salvage some of your files by copying them in the Finder. If you already have an external drive with OS X installed, start up from it. Otherwise, if you have Internet access, follow the instructions on this page to prepare the external drive and install OS X on it. You'll use the Recovery installer, rather than downloading it from the App Store.
    c. If you have access to a working Mac, and both it and the non-working Mac have FireWire or Thunderbolt ports, start the non-working Mac in target disk mode. Use the working Mac to copy the data to another drive. This technique won't work with USB, Ethernet, Wi-Fi, or Bluetooth.
    d. If the internal drive of the non-working Mac is user-replaceable, remove it and mount it in an external enclosure or drive dock. Use another Mac to copy the data.
    Step 2
    You might be able to start up in safe mode even though you can't start up normally. Otherwise, start up from an external drive, or else use the technique in Step 1b, 1c, or 1d to mount the internal drive and delete some files. According to Apple documentation, you need at least 9 GB of available space on the startup volume (as shown in the Finder Info window) for normal operation.

  • "Failed to load the CTDFMRES.DLL" Help, please!

    Hello,
    I asked how to fix the following error that occurs when trying to add artwork: 
    Failed to load the CTDMFRES.DLL
    Check that CTDMFRES.DLL is in the directory.
    Some information provided/gained while working with b noir to diagnose the problem:
    As far as I know, there are no third-party plug-ins for connecting to gadgets such as a MuVo or Creative Zen.
    The error persists in iTunes Safe Mode.
    The error persists if I add a new user account.
    Screenshots below to demonstrate how error occurs:
    Thank you for your attention and help.

    Okay ... perhaps let's check first to see if you can do the artwork add if you open iTunes in Safe mode. For instructions see:
    iTunes: Troubleshooting issues with third-party iTunes plug-ins

  • [915 Series] 915P Combo Problems.. Can anyone help Please?

    Hello everyone!
    I'm pleasured to be in contact with you, I'm from Portugal, so any errors in my english, please excuse me 
    I've bought an MSI Motherbnoard 915P Combo and there is some questions that I need your help.
    My system is:
    MSI 915P Combo 8latest 1.6 Bios version)
    Pentium 4 LGA775 3.0 GHZ
    Zalman 7700 Al-CU
    1GB Kingston PC3200 2x512 (Dual Channel, 3-3-3-7)
    XFX Geforce Nx 6200 PCI-Express (with direct power alimentation from the PSU.. is this normal?)
    Enermax 350w Noisetaker ATX 2.01 (with all stability since I've bought to my P4 Socket 478)
    160GB Seagate Barracuda SATA NCQw/8MB Cache
    Pioneer DVR-108 16x DVD+RW
    Thermaltake Shark Aluminium Case
    Integrated 5.1 Sound Solution (Azalia)
    Ok... the problem is... my computer doesn't shut Off! I've installed the Windows Xp and SP2 from new, bu when I'm choosing the option "Shut Down" win windows, the pc shutt down only 3 seconds!!!
    By the on/off button is everything ok...
    Can anyone help me?
    Thank's in advance.

    Quote from: NovJoe on 21-March-05, 20:30:51
    Check your power button connector to the mobo and see if it was fixed properly or you can try turning the connector 180 degrees around and fix it in and see if the same problem replicates.
    Next you can also try to clear CMOS.
    Check in your Power Management Options in Windows and check if there's any funny settings.
    Thank you very much NovJoe for your kind attention and help.
    Since I arrive home I'll try that.
    i've  tried the connector of the power in the board of the 2 possible way with no result.
    How can I clear the CMOS? nly with Jumpers isn't?
    And what do you mean to say with funny settings in windos? Can you be more specific please?
    Regards

  • Help with CLASSPATH variable please

    Hi everyone!!
    Please, help to set up my classpath variable. I know I know I have guidelines in API but I don't achieve it, I'm so clumsy.
    I've formated my hard disk and installed everything again, but the classpath is wrong because I can't compile my java files.
    I've tried with this:
    C:\Program Files\Java\jdk1.5.0_06\scr.zip;C:\Program Files\Java\jdk1.5.0_06\javac.exe;C:\Program Files\Java\jdk1.5.0_06\java.exe
    I've also tried with the same lines but unnaming files (finishing with '\')
    What am I doing wrong?
    Thank you very much for your attention and help.
    Merry Christmas and Happy New Year!!
    And I hope the Three Wise Men bring you everything!!

    Please post your exact problem and the exact error message. I think you are having a problem compiling, but I am not sure. What is not working? What is the error?
    You posted a path, but if that is your Classpath, you should not have javac or java in the Classpath.

  • Threads started by "Community Help"

    The Adobe Community Help pages (http://help.adobe.com/en_US/illustrator/cs/using/index.html) used to have a commenting system that was specific to the help files.
    Since many threads were questions, rather than additions and comments on the help files, it has been replaced by a mechanism that creates a thread in the corresponding product forum.
    The threads, started by "Community Help", are titled as and linked to the community help page where the question or comment originated from, and posts are mirrored between this forum and Community help. Comments can be corrections or additions to the help files, and could be links to tutorials relevant to the help page at hand, posted on third party websites, and should therefore not be treated as spam. To keep concise and pertaining information in the help files, these discussions might be curated more closely by the moderators.
    The advantages are the fact that one can now post images, videos, or links, or use advanced formatting, and the side effect is to draw on the combined expertise of all the forum posters.
    The drawback is that the previous comments disappeared, but most have been saved by the Community Help Administrators.
    This should be a great asset to the community, and there might be a few problems during the transition period.
    For example, a "blank post" might show up which is confusing. The moderators are doing their best to delete these posts while the tech staff seems to have fixed issue.
    If you have questions or remarks about these posts, please use this thread of the Forums Comments: http://forums.adobe.com/message/4172835#4172835
    Thank you for your patience and understanding as this change is implemented.

    Martin_Zich wrote:
    Hello,Hi,
    I have simple question. Does anybody know how to do following. I have one thread SwingWorker and this thread is listening on serverSocket. Swing questions should be asked in the Swing forum.
    When connection comes it makes new thread which looks after this connection and SwingWorker listens again. Fine, but now I want to interrupt all so I try call cancel() on SwingWorker. What happens to treads made by this SwingWorker which are still alive? Nothing
    When I call this cancel what will happen to the ServerSocket. Where I have to call ssocket.close()? Catch some exception or how?An interrupted exception will be raised.
    Kaj

  • BDC..help please I included the steps..

    Experts please help me..
    Theres something weird happening on my recording in FK02 particularly in communication section when recording the other communication window it stops there and wait till you click the window which is wrong because all i need to do when processing it is to click only the OK_CODE AND IT WILL automatically process.
    Please help me on whats going on in my recording...
    Step that I did:
    go to SHDB.
            FK02
           (ENTER VENDOR CODE)
           (ENTER COMPANY CODE)
    then tick all the check box there including the central address management.
    then record only the communication section
    click the 'OTHER COMMUNICATIONbutton' then choose URL then ok.
    then a window will appear the URL WINDOW. then after that ok. then save then process.you will see what Im talking about.
    Sorry guys Im doing my best to catch your attention to help and Im really having a hard to explain it.
    Please please am begging help me!!!!

    Hello Graffiti,
    I am not using a Mac I am using a Laptop with Window 7 OS, I have also tried to download from my PC which has Windows 7 OS I get the same message from both. I am however using Chrome browser, could that be the issue? 
    Ms. Norma D. Maddox

  • Server 2012 - Can't access external website from internal domain with same name. Tried everything.

    Hello All.
    I have read loads of forums and tried numerous fixes and configurations, but nothing seems to work and I am extremely frustrated at this point.
    I have a client where I setup Server 2012 Standard with Exchange 2013. After reading best practice documentation for DNS naming and reasons not to use ".LOCAL" I opted to use ".com.na" in which case the Internal Domain Name and Internet
    Website now has the same name.
    When attempting to open the extarnal website eg. "www.company.com.na" from a client PC within the internal "company.com.na" Domain, I keep getting error "403 - Forbidden: Access is denied. You do not have permission to view this
    directory or page using the credentials that you supplied."
    I should also mention, the website is hosted by an ISP and not locally.
    I added a "www" Host record in the Forward Lookup Zone, I have added the url and ip address to the Hosts file on a client pc (Windows 7) and even tried setting up Split-Brains DNS. Nothing seems to work.
    Running a Tracert takes me to the correct public ip address of the website, but I keep getting this 403 error.
    I am so sick and tired of this issue that iI am at the point of backing up the Exchange and re-rolling the entire server with the ".local" DNS domain name. I have a mirror setup in a VMWare environment and simply using "rendom" to rename
    the domain seems to cause new issues with Exchange connectivity.
    Any pointers and help will be greatly appreciated.
    Thanks in advance.
    Hentie Loots

    I opted to use ".com.na" in which case the Internal Domain Name and Internet Website
    now has the same name.
    This ends up with a split-DNS stup for internal and external resolution which requires extra administration tasks and attention from the administrators.
    When attempting to open the extarnal website eg. "www.company.com.na" from a client PC within the internal "company.com.na" Domain, I keep getting error "403 - Forbidden: Access is denied. You do not have permission to view
    this directory or page using the credentials that you supplied."
    I should also mention, the website is hosted by an ISP and not locally.
    I added a "www" Host record in the Forward Lookup Zone, I have added the url and ip address to the Hosts file on a client pc (Windows 7) and even tried setting up Split-Brains DNS. Nothing seems to work.
    Running a Tracert takes me to the correct public ip address of the website, but I keep getting this 403 error.
    This means that you are able to reach the Website but it is responding with the access denied error message. That should be checked on the middleware level so if this is IIS running then I would recommend asking them in IIS forum: http://forums.iis.net/
    If this is a Website that is completely managed by your ISP then I would recommend checking with them.
    This posting is provided AS IS with no warranties or guarantees , and confers no rights.
    Ahmed MALEK
    My Website Link
    My Linkedin Profile
    My MVP Profile

  • CM1015 on wireless print server; ToolboxFX Can't access

    (This is crossposted at the Business Support forum as well).
    I have the CM1015 connected via a Netgear WGPS606 wireless print server. Using the Netgear installation util, the IP connection and printing to it work fine. Success there.
    However, ToolboxFX can't access the printer, taking a v-e-r-y- long time to respond before throwing an error msg: The server could not find the request. (404) ...Please cycle power bla bla... Of course cycling power doesn't help.
    The topic at
    http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&taskId=115&prodSeriesId=1846080&prodTypeId=18972&prodSeriesId=1846080&objectID=c00785211
    seems almost relevant, but not really, as the only IP I have is for the print server, not the CM1015 itself. Needless to say, scan-to-remote computer does not work. Disabling the OS firewall does not solve the problem.
    Anybody run across a solution for what should be a common problem?
    The drift from other frustrated users here seems to be that using a CM1017 connected to a wireless router might get you there. But, like other midrange printers (eg certain Canons), the CM1015 was never really meant to be networked. HP seem mute on the subject...
    Message Edited by seacrow on 11-24-2008 12:19 PM
    Message Edited by seacrow on 11-24-2008 12:20 PM

    I opted to use ".com.na" in which case the Internal Domain Name and Internet Website
    now has the same name.
    This ends up with a split-DNS stup for internal and external resolution which requires extra administration tasks and attention from the administrators.
    When attempting to open the extarnal website eg. "www.company.com.na" from a client PC within the internal "company.com.na" Domain, I keep getting error "403 - Forbidden: Access is denied. You do not have permission to view
    this directory or page using the credentials that you supplied."
    I should also mention, the website is hosted by an ISP and not locally.
    I added a "www" Host record in the Forward Lookup Zone, I have added the url and ip address to the Hosts file on a client pc (Windows 7) and even tried setting up Split-Brains DNS. Nothing seems to work.
    Running a Tracert takes me to the correct public ip address of the website, but I keep getting this 403 error.
    This means that you are able to reach the Website but it is responding with the access denied error message. That should be checked on the middleware level so if this is IIS running then I would recommend asking them in IIS forum: http://forums.iis.net/
    If this is a Website that is completely managed by your ISP then I would recommend checking with them.
    This posting is provided AS IS with no warranties or guarantees , and confers no rights.
    Ahmed MALEK
    My Website Link
    My Linkedin Profile
    My MVP Profile

  • Error message with a script sending emails to multiple recipients.

    Hi all,
    I am very new with powershell scripting and I want to request your attention and help on this issue.
    I am getting this error message "Send-MailMessage: An invalid character was found in the mail header: ','" given by this script:
    Param (
    [string]$Path = "C:\Temp\",
    [string]$SMTPServer = "smtp.domain1.com",
    [string]$From = "[email protected]",
    [string[]]$To = "[email protected],[email protected]",
    [string]$Subject = "New backup file"
    $SMTPMessage = @{
    To = $To
    From = $From
    Subject = "$Subject at $Path"
    Smtpserver = $SMTPServer
    $File = Get-ChildItem $Path | Where { $_.LastWriteTime -ge [datetime]::Now.AddHours(-6) }
    If ($File)
    { $SMTPBody = "`nThe following files have recently been added/changed:`n`n"
    $File | ForEach { $SMTPBody += "$($_.FullName)`n" }
    Send-MailMessage @SMTPMessage -Body $SMTPBody
    I found the ForEach() approach but when I put it inside I get an infinite loop.
    Many thanks for any suggestions

    [string[]]$To = "[email protected],[email protected]",
    should be
    [string[]]$To = @("[email protected]","[email protected]")

  • How to I get Facebook games to recognize Flash 11?

    My computer advised me to update my Flash player, so I did and now I cannot get any Facebook games to load.  Well, most any games for that matter.  Alot of my kids games don't load either.  It's like my computer doesn't recognize that I have the player installed.  They all either stay blank or tell me to upgrade my flash and provide the link to Adobe.  I've tried everything on the Adobe website.  I've uninstalled and reinstalled multiple times.  It says enabled in my Manage Add-ons.  I'm not very advanced in computers, but can manage my way through things.  I have Windows 7 64-bit and IE9 version9.0.8112.16421 on my computer.  Everything was working fine until I upgraded to this new version 11.1.102.63 and now I can't go back to the old one!  Any help someone can give will be soooo helpful.

    Thank you.  I completed another uninstall and then deleted all the files, once again from my computer.  When I went to the website to reinstall Flash, it was a different version that came up.  This time your site loaded 11.2.202.228.  This seems to be working fine.  I don't know if there were some files that I deleted this time that I didn't catch all the other times or there is something with this new version number that works when the 11.1.102.63 didn't.  In any case, everything seems to be working.  Thanks so much from your prompt attention and help.

Maybe you are looking for