Basic questation about collation

HI all,
I have basic questation about create colletion . I want read and compare value from enviromnemt variables . But in the query i find "select *  from  SMS_R_System inner join SMS_G_System_ENVIRONMENT on SMS_G_System_ENVIRONMENT.ResourceId =
SMS_R_System.ResourceId where SMS_G_System_ENVIRONMENT.VariableValue = xzy " But where is the name for this value . I want etc. variable name PUBLIC value = "c:\public"
thanx
Falcon

OK, I think I follow now:
SELECT SMS_G_System_ENVIRONMENT.ResourceId
FROM SMS_G_System_ENVIRONMENT
WHERE SMS_G_System_ENVIRONMENT.Name = "FP_NO_HOST_CHECK"
AND SMS_G_System_ENVIRONMENT.VariableValue = "Yes"
Jason | http://blog.configmgrftw.com

Similar Messages

  • Basic questation about backup SQL database

    Hi I have basic questation about backup database . If I set DPM to backup database and the database have full model and another application truncate log. Detect this dpm and create full backup or create error ?
    Falcon

    Hi,
    If you want another backup process to truncate the logs instead of DPM, you can just configure DPM to synchronize
    just before a recovery point.  That basically tells DPM to just perform express full backups which will not truncate logs.
    Please remember to click “Mark as Answer” on the post that helps you, and to click “Unmark as Answer” if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread. Regards, Mike J. [MSFT]
    This posting is provided "AS IS" with no warranties, and confers no rights.

  • Basic questation about VSS and windows backup

    hi all, basic questation about backup and VSS
    Environment:
    windows 2008r2,NAS backup disk connected with iSCSI
    If i create in the windows backup server job , where i backup disk D , target is NAS disk and start it . Windows backup is requester and is created shadow copy . This shadow copy is created in the disk D or in the NAS disk ? If in the disk D is created for
    everyone application snapshot ? After created snapshot the windows backup copy data from snapshot to windowsimagebackup ? And If windows backup create different snapshot how detect which files is changed ? 
    thank you
    Falcon

    Hi,
    Windows Server Backup stores backup versions in volume shadow copies. After the data write is complete, Windows Server Backup creates a shadow copy of the volume where the backup is stored using Volume Shadow Copy Service (VSS). This shadow copy retains the
    state of the storage volume as a “backup version” or “point-in-time” of the backup and must restore using this backup version.
    You could refer to the article below to know the steps of a back up operation performs: 
    Backup Version and Space Management in Windows Server Backup
    http://blogs.technet.com/b/filecab/archive/2009/06/22/backup-version-and-space-management-in-windows-server-backup.aspx
    Windows Server Backup uses Volume Shadow Copy Service (VSS) and block-level backup technology to back up and recover your operating system, files and folders, and volumes. The Volume Shadow Copy Service is used to differentiate between backup sets, and to track
    where the various blocks are being written to within the shadow copy storage.
    For more information about the incremental backup technology, please see:
    Learn more about system image backup
    http://blogs.technet.com/b/filecab/archive/2009/10/31/learn-more-about-system-image-backup.aspx
    Backup and Recovery Issues with Windows Server 2008 (Part 2)
    http://www.windowsnetworking.com/articles-tutorials/windows-server-2008/Backup-Recovery-Issues-Windows-Server-2008-Part2.html
    Please Note: Since the website is not hosted by Microsoft, the link may change without notice. Microsoft does not guarantee the accuracy of this information.
    Best Regards,
    Mandy 
    We
    are trying to better understand customer views on social support experience, so your participation in this
    interview project would be greatly appreciated if you have time.
    Thanks for helping make community forums a great place.

  • Basic questation about MBAM

    HI all , sorry for basic questation .
    I try set with gpo mbam client in the windows 7 . I set requerid encrypt os drive and fixed drivers .and questtaion :
    in the error log is write :
    detect OS volume encryption policies conflict . check bitlocker anb MBAM policies related OS drive protectors . 
    I set MBAM only in MBAM GPO .
    an second quetstaion . 
    I cannot enable bitlocker only with GPO ? I must enable manualy ? 
    thanx
    Falcon

    Recovery key and the PIN are two different protectors. PIN is something you set to unlock your machine at boot. It provides an additional protection. You can always change the PIN choosing option, bitlocker drive encryption option from control panel.
    Recovery key is to log in the machine if your machine goes into the recovery mode. If you will not be able to access your OS Drive how you will be able to boot. TPM string is called as the Ownership Hash password which is different from the recovery string
    of the OS Drive which is a 48 digit numerical password.
    Gaurav Ranjan

  • Some basic questation about mbam and bitlocker

    Sorry for questation . What doing options Auto-unlock ?
    allow auto-unlock and require auto-unlock .
    and exist some construction betwen setting fixed drive and os drive . If I disable encrypting fixed drive or set only read fixed drive it mean that os drive is set to ?
    and about bitocker:
    exist solution how i enforce encrypting ? 
    thank you
    Falcon

    Recovery key and the PIN are two different protectors. PIN is something you set to unlock your machine at boot. It provides an additional protection. You can always change the PIN choosing option, bitlocker drive encryption option from control panel.
    Recovery key is to log in the machine if your machine goes into the recovery mode. If you will not be able to access your OS Drive how you will be able to boot. TPM string is called as the Ownership Hash password which is different from the recovery string
    of the OS Drive which is a 48 digit numerical password.
    Gaurav Ranjan

  • Basic questation about sql backup

    HI all, sorry for my englisch . I have quetstaion about DPM and SQL 2012 database recovery model .
    If I select recovery model simple , that DPM always backup full backup ... This create with vss providera ?
    If I select full backup what work synchranization ? Every log files is copy to replica , and after copy truncate log ? 
    thanx
    Falcon

    For application data that support incremental backups (exchange, SQL Db's in full recovery mode) there are two job types.
    A) Synchronization - This is equivalent of an incremental backup and only brings over log changes.  Each incremental synchronization is equivalent to a recovery point.  Each incremental synchronization results in application log truncation which
    is performed by the application (SQL / Exchange)
     B) Express full - This is equivalent to FULL backup, however only brings over Database changed blocks and applies them to the replica volume then makes a snapshot  Each express full backup is recoverable.  Express full backups do not result
    in log truncation by the application.  There is a 512 snapshot limit for express full backups.
    For applications that do not support incremental backups (SharePoint, SQL Db's in simple recovery mode, Hyper-V VMs)  always use express full backups.
    http://social.technet.microsoft.com/Forums/en-US/b767a3fb-ce59-4599-a92e-2e5e7e1c8b98/help-to-understand-the-difference?forum=dpmfilebackup
    Backing up SQL with DPM
    SCDPM: Backup SQL and Truncate SQL Logs
    Does DPM Clear transaction Log when Backup?
    Have a nice day !!!

  • Basic questation about how works DPM

    HI all,
    sorry how DPM detect which files is changed I must copy to replika ? Or how is created replika . DPM also reguester create full backup and then use incremental backup copy-and-write method ? 
    thanx
    Falcon

    Closing for housekeeping.
    DPM uses a file system filter driver (DPMFilter) to track block level changes between backup times and only transmits changed file blocks during synhronizations for file data.  DPM never transfers the whole file except for initial replica
    creation.  
    Please remember to click “Mark as Answer” on the post that helps you, and to click “Unmark as Answer” if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread. Regards, Mike J. [MSFT]
    This posting is provided "AS IS" with no warranties, and confers no rights.

  • Basic questation

    HI ,
    I have 2 basic questation about adobe premiere element 7 . Can I intergarte 2 clips to one clips ? And can I cahnge speed of the clip with the keyframe ? I wan in the begin clip slow and accelerate .....
    thanx

    Marek,
    To elaborate on what Steve says in Post 10, what you have on your Timeline is a pair "virtual" Clips. They appear as separate on the Timeline only, but Premiere is referencing back to your original Clip, which is in your Project Panel. It has not been physically cut, but has just had references added to it for editing.
    When you Delete the second Clip, the one you "created," and drag the end of the first Clip back out, you are just erasing those references. Your Clip is essentially now unchanged.
    The Undo (Ctrl-z) works while you are editing. If you Save your Project and close it, you cannot use the Undo. You can also use your History Palette (Window>History) to have multiple Undo's. These also disappear when you Save and Close, then reopen PE.
    Hunt

  • Basic questions about Infocube

    Hi, everyone.
    I got very basic questions about infocube data handling.
    With infopackage, I extracted all the data about employees from R/3.
    But there were some mistakes during inputting employee data, like positions,
    so I just extracted those employees data once more.
    Now I have two requests in infocube, where the first one has some wrong data.
    Is there any solutions about this?
    I might got it all wrong, so as beginner, any suggestions and explanations will
    be grateful.

    Hi,
    You can manually delete the earlier request by going in the Manage option of the cube. select the request and click on delete icon at the bottom.
    Other option is to make setting in the Infopackage to delete similar or overlapping request.
    Data target tab --> 6th column Automatic loading / deletion of similar request. --> click on the blank icon --> you will get a pop-up --> select the radio button - "delete existing request" --> Select Conditions --> Infosource are same, datasource are same and source system are same, --> selections are "Same or  More Comprehensive "
    Assign points if useful
    Regards
    Venkata Devaraj !!!

  • Basic Questions About Compiling Source

    Hi!
    I have some very basic questions about compiling source on 10.6. BTW, if the unix discussions still exist, they've hidden them pretty well, so I hope I'm in the right place for this!
    First off, you simply cd to the source dir, wherever it may be - in my case ~/Downloads/source/  - and during the install process, everything will be installed in its proper dir, right?
    How do you know which compiler to use? There seem to be several: make, gmake, gcc, g++, etc...
    Once you do figure out which compiler to run, the process is supposed to go like this, right?
    ./configure
    make (or whatever)
    make install
    But this doesn't always work for me. For instance, I'm trying to compile 'arm', but it doesn't seem to have a 'configure' script.
    $ ls ~/Downloads/arm
    ChangeLog
    README
    armrc.sample
    setup.py
    LICENSE
    arm
    install
    /src
    Maybe it's that 'setup.py' file? What are you supposed to do?
    Of course, it's not only this one that's given me trouble. Sometimes the readme will say I have to edit a certain file for my system. Are there just a few standard changes you always make? Or is it...how can I put it...complicated? How do you find out what's needed in those cases?
    OS 10.6.8
    Xcode 3.2.4
    Python 2.7

    sudont wrote:
    I have some very basic questions about compiling source on 10.6. BTW, if the unix discussions still exist, they've hidden them pretty well, so I hope I'm in the right place for this!
    This is the place for UNIX discussions. If you have developer-related questions, there is a forum dedicated to that as well: Developer Forums
    First off, you simply cd to the source dir, wherever it may be - in my case ~/Downloads/source/  - and during the install process, everything will be installed in its proper dir, right?
    Yes. Hopefully the project you want to install follows standard conventions. If so, you can do "./configure", then "make", and finally "sudo make install" to install the software into "/usr/local".
    How do you know which compiler to use? There seem to be several: make, gmake, gcc, g++, etc...
    The make file will figure that stuff out.
    Once you do figure out which compiler to run, the process is supposed to go like this, right?
    ./configure
    make (or whatever)
    make install
    Yes, with the addition of "sudo" before "make install" because "/usr/local" is owned by root.
    But this doesn't always work for me. For instance, I'm trying to compile 'arm', but it doesn't seem to have a 'configure' script.
    $ ls ~/Downloads/arm
    ChangeLog
    README
    armrc.sample
    setup.py
    LICENSE
    arm
    install
    /src
    arm? You mean "arm (anonymizing relay monitor) - Terminal status monitor for Tor relays." You really don't want to be messing with that stuff. The only people involved with Tor that are trustworthy are US Navy intelligence who have their own uses for it. If you don't understand it as well as they do, best stay away.

  • Basic questions about macbook pro + external monitor

    Hi,
    I have some very basic questions about using a Macbook Pro + external display. I don't actually have them but need to know how things works.
    So, here they are:
    1) Can I use the external display as the main display?
    2) Will the external display run with its resolution or with that of the mbook pro?
    3) Somewhere I read that you cannot keep the macbook pro open and get the full resolution of the external display. Is that true ?
    4) Is it dangerous to keep the mbook closed while using the external display?
    5) Does the usage of the external display impact on mbook performance?
    I know...a lot of questions , but would be nice if someone could help me.
    Thanks.

    Hi - I am presently using an external display.
    To answer your questions in sequence:
    1. Yes you can use the external display as your main display. The way to enable that mode is to put your MacBook Pro to sleep, attach the external display. Wake up your MBPro with the lid closed and you will see the external display as you main display. You can alternatively set the external to "Mirror" your notebook by using preferences/display.
    2. The external display will run at its resolution although you can adjust and calibrate it using Preferences/Display.
    3. Not true. You get max resolution on both displays. Of course you may have to tweak as mentioned above.
    4. Not at all. I use this mode all the time. Just make sure you initially set up as mentioned above and your LCD on the MBPro will stay off.
    5. I have not seen any performance degradation whatsoever.
    Hope this helps.

  • Basic question about Flash video. Please Help

    Hello,
    Sorry for the noob question but I'm struggling with the basic
    understanding about the Flash video.
    I just need to reduce a large video file to a small size with
    a nice quality and the Flash Video Encoder does very god job with
    that. But when I double click the compressed .flv file it opens as
    a blank screen in the stand alone player without playing any video.
    I can use Dreamweaver to produce a web page playing the file, but I
    don't need this file for posting it on a web page, I just want the
    file smaller and to simply play it on my computer or send it to
    others.
    What is the way to do this?
    I appreciate your help.

    It sounds like you're not having problems with the actual
    compression of the videos, just the playback, correct? All you need
    is a standalone player that plays FLVs. Like Quicktime Player plays
    MOVs, and Windows Media Player plays WMVs, you need something to
    play the FLV files. There are many free options available. On a
    mac, I use something called, strangely enough, SWF & FLV
    Player. You can find it here:
    http://mac.eltima.com/freeflashplayer.html
    Just do a search for FLV players and you should find
    something appropriate. The only downside is you'll need to make
    sure anyone you're distributing the videos to also has an FLV
    player. If you're sending your files to just a few people, no big
    deal. If this is for the public in general, you would want to embed
    a Flash video player in an HTML page and send it like that.
    Hope that helps.

  • Basic questions about CISCO IOS

    Hi everybody, Jack here,
    I have some basic questions about the Cisco IOS, could someone help me addressing some of them please? Any feedback would be greatly appreciated.
    Basically, I have two IP addresses assigned by our Cable ISP. From what I understood you can configure a Cisco router for multiple IP addresses using the IOS, thereby allowing someone like myself to take advantage of having multiple IP addresses. This may seem unnecessary to some, but I've always wanted to put the 2nd IP address to use, since after all, I've been paying for it.
    I was just wondering if someone could confirm that what I'm hoping to accomplish is indeed within the capability of the Cisco IOS (i.e. Fully utilize my 2 IP addresses). As well, if someone could kindly suggest a decent CISCO router for online gaming home use that would be super awesome!
    Thank you all so much for reading through the wall of text:)
    Jack

    Jack
    Certainly using multiple IP addresses is in the capability of Cisco IOS routers. How they can be used depends on the relationship of the IP addresses. I am assuming that we are talking about IP addresses assigned for the user to use and that the IP address for the ISP connection is not one of these that we are talking about.
    If both of the IP addresses that you have been assigned are within the same subnet then you would assign one of the addresses to the router interface to establish IP communication between the router and the ISP and to enable Internet connectivity for the devices inside your network that will use the router as their gateway to the Internet. The other address that is assigned can be used for address translation and in particular for static address translation which would make one of your devices inside to be reachable for connections initiated from the Internet (if that is something that you might want to do).
    If the addresses that are assigned to you are in different subnets then you could assign one address to the outside router interface and assign the other address to the router inside interface. Or you could use the second address for address translation.
    I do not have much expertise with online gaming, but I would think that either the Cisco 881 router or the 890 router might be appropriate for you. If 100 Mb connection is sufficient then probably the 881 would be the one to look at. If you need Gig connection then look at the 890.
    HTH
    Rick

  • Basic questions about JAAS capabilities

    I've never used JAAS for authentication or authorization in a Java app before. Can somebody that has (or at least has some experience and knowledge about JAAS) please answer the following couple of basic questions about it? (I know I could probably answer these myself with a few hours of reading.)
    1. Can I use JAAS to restrict the users that can execute specific methods of my code?
    2. If the answer to #1 is yes, is there a way to programmatically determine if a JAAS login user has the permissions to run a method before actually calling that method. In other words, can I ask something like canUserExecute(method) or do I have to just put the call to the method in a try/catch and catch a security exception of some type?
    3. Is it fairly simple to have JAAS authenticate against a Windows Domain or a LDAP server?
    4. Are there programmatic ways to add or edit user information in JAAS?
    Answer to any of these questions are greatly appreciated. I'll even toss a couple of Dukes to the people that answer each question. Thanks in advance.

    You might look at the AfterthoughtSoft-Secure product at http://www.advancedmodelingconcepts.com. It is designed to do just that and will easily allow you to connect to users/group repositories that are in anything from a simple text file all the way up to Kerberos V.
    You can contact the author of the product (me) at bart dot jenkins at gd-ais dot com.
    bart

  • Basic Questions about Package Installation

    I have one basic question about installing packages.
    How can I find out if needed software is already installed without knowing the name of the package?
    For e.g. I want to know, if the MYSQL Server is already installed but I don't know the Package name.
    How can I find out the package name of needed software?

    Difficult.
    Assuming the string "MYSQL" appears somewhere in the package
    name or the package description, you can grep the output from
    "pkginfo". That is "pkginfo | grep -i sql" would list all installed
    packages that contain the substring "sql" with either upper- or
    lowercase letters.

Maybe you are looking for

  • DVDSP - End Jump to Menu 1 and Chapters Markers from Final Cut Pro 5.0.4

    I went to the Final Cut Forum and they sent me here: Final Cut 5.0.4 DVD Studio Pro 4 I got to the point where I set the end jump back to Menu 1 for each of the two films listed with buttons on Menu 1 of my DVD. One film has no chapter markers and th

  • Execute bat file with cfexecute

    Hello, this is a newbie question but I'm stuck. I have a .bat that runs fine through the command prompt but won't run with <cfexecute>, it merely seems to read the .bat but not execute it. The .bat reads: java -classpath ".;C:\CFusionMX7\wwwroot\i-re

  • Issue with popup

    Hi I'm kind of new to Java put hopeful I can project my problem enough for someone to help me on the nature of my problem. My problem is i have created two class Wellcome class and MainApp Class. What i want to do is when a user clicks on a button fr

  • Negative values in textfield

    Hello, I would like to know if it's possible to check the value of a textfield when it is used for numeric values. I have a form and it should not be possible to enter negative values in the textfields... Regards, Sofie

  • Renaming View

    Hi, I have created a view in r/3 . Now i want to rename the same view without creating a new one. Can any one suggest how to rename a view? regards, Harish.