BPF: Run Specific Package vs Run Specific Package for PackageExecution

Simple question:what is the difference?
I used Run Specific Package in the BPF setup, but the package does not launch upon testing
When I use Run Specific Package for PackageExecution it works...

Hi Nilanjan,
Can you through some more details or the difference between Run Specific Package & Run Specific Package for PackageExecution.
Thanks in advance.
Raghu B.S.

Similar Messages

  • Running Permission Scripts for App-V packages in VDI environment

    Hi
    We use App-V 5.0 SP1 in VDI environment.
    We have a major problem with packages' permissions
    Our users don't have administrative privileges on their machines.
    As the option for "Security Descriptors" is discontinued, the only way to give permissions to a folder in a package is to use the VFSCACLS.vbs as a startup script of a package.
    This way the first time users launch an application they're prompt to reopen it, and the second time they can use the application with the needed permissions.
    The problem:
    The script saves those permission changes under LOCALAPPDATA\AppV...
    Therefore, everytime the users logoff the folder is deleted (VDI...) and again, they must run the script for the first  again to get the permissions back after logon!
    We cannot roam the LOCALAPPDATA\AppV folder as its size can be dozens of GBs...
    Folder permissions with group policy is also not a solution, as the folder name changes everytime we upgrade a package and it's impossible to follow with hundreds of packages.
    So it's either we're missing something critical in the architecture with VDI environment or there's a normal solution for these situations.
    Would love to get some help
    Thanks
    Tamir Levy

    Hi Nicke
    that's what I did! the problem is that I find my self over and over again want to sequence packages in App-V 5.0 and forced to sequence it in App-V 4.6.
    I really hope that it wasn't App-V team's goal. announcing App-V 5.0 and tell us it doesn't support many things so we will still need App-V 4.6 forever.
    I have to maintain 2 different App-V environments with 4 different servers , 4 different sequencers and 2 clients on each computer. it doesn't make any sense for me to forced to stay with both of the versions forever.
    correct me if I'm wrong but App-V 4.6 is a legacy application. the new versions cover only support on newer operating systems and nothing more. I won't be surprised if in the next version of MDOP won't come with App-V 4.6 anymore and Microsoft will announced
    it's unsupported very soon.
    Every time I open a ticket with MS Support the best thing I get is "It's a known issue, we can't tell when it will be fixed"
    can you help me more ? move it forward to other people from the inside? at least agree with me that something is not as expected in App-V 5.0... :(
    I love the technology, I believe in it, I'm kinda depend on it and I only want it to be better
    Tamir Levy

  • Business packages support packages for specific languages?

    Hi all,
         If i have one business package and i want to implement it in a language which is not mentioned in the languages list given in  the documentation for that business package.
      Are there in anyn support packages of business packages for specific languages?
    If yes where i can get these information?
      Regards
      Rajendra

    Hi
    You can find the information regarding business packages and its support packages in Service market place.
    Also you can find some documents in contentportfolio in sdn.
    https://websmp201.sap-ag.de/swdc
    https://www.sdn.sap.com/irj/sdn/developerareas/contentportfolio
    Regards
    Yoga

  • Upgraded from LabVIEW 8 to 2013 and now VI asks to find the installati​on package for Run-Time Engine 7.0

    I recently installed LabVIEW 2013 on a computer (running Windows XP 32-bit).  The machine also has LabVIEW 8 installed, which is what I was using prior to upgrading.  I opened a VI that was created in LV8 and then saved it and all its subVIs in LV2013.  Now when I open the VI in LV2013 and try to run it, a window pops up asking me to find the "lvruntimeeng.msi" installation package for LabVIEW Run-Time Engine 7.0.  If I cancel that dialog box and the subsequent message stating that the installion files were not found, the VI appears (at least from intial inspection) to run normally.
    I closed LabVIEW, downloaded Run-Time Engine 7.0 from the NI website, and tried to install it, but I received a message saying that it is already installed (as I had suspected).  How can I determine what part of the VI and/or its subVIs is trying to make use of Run-Time Engine 7.0?  Alternatively, how can I get LabVIEW to instead use the Run-Time Engine 2013 that was installed when I upgraded to LabVIEW 2013?
    Solved!
    Go to Solution.

    Bob_Schor wrote:
    Are you running your VI from a Project?  If so, you can look at Dependencies and get an idea what "dependent" VIs you might have.  There may be "something old" in your LabVIEW 8 code that has been superceded in 2013, but still "hangs around" -- if you can identify it, you can probably replace it with its "more modern" equivalent.
    If you do not have the VI in a Project, you can simply open LabVIEW, create a new blank project, and add your top level VI to it.  If all of your relevant VIs are in a single folder, add the entire folder.  Now look in Dependencies.
    BS
    Yes I am running the VI from within a LV Project.  After some more searching in the NI Knowledgebase I was able to fix the problem by using the following procedure:
    1.  Use the Measurement and Automation Explorer to uninstall Run-Time Engine 7.0
    2.  Restart the PC
    3.  Open the project, close the project choosing to "save all"
    4.  Restart the PC
    5.  Re-install Run-Time Engine 7.0 using a file downloaded from ni.com
    6.  Restart the PC
    7.  Open the project, close the project choosing to "save all"
    8.  Open the project and run the VI.  No more messages about LabVIEW trying to find Run-Time Engine 7.0.

  • Can you ask for a specific time for your package to be delivered

    can you ask for a specific time for your package to be delivered

    You can only arrange that with the shipper after your package is shipped (and before it is deliverd.) When the package is shipped Apple usually emails the tracking information.

  • Possible to run 2 different Business Packages for ECC 5.0 and 6.0 ?

    Hi there,
    anybody knows a solution, to support a Busienss Package for ECC5.0 and 6.0 on one NW7.0 Portal?
    We build a concernportal as mainportal with different companies in one portal. These companies have their own SAP-Systems.
    It´s a complex systemlandscape:
    Company ABC have a SAP HR System with ECC5.0 with one client 401.
    Company XYZ have a SAP HR System with ECC6.0 with TWO clients 020 and 050.
    These both companies wants to get the Business Package for ECC5.0 and ECC6.0
    Our solution is to implement the Federated Portal Network, thats works very fine. (Okay, Sessionproblem with ECC5.0)
    For company ABC we installed a Javastack on host to install the WebDynpros directly to targetsystem ECC5.0
    For company XYZ we have a problem with FPN, because the two clients in the targetsystem.
    We installed a Javastack with portal on this machine, import BP for ECC6.0, customize portal and ABAP and pick the roles vis FPN from mainportal. But only for ONE client (020).
    Now we can´t connect these Jco´s to the other client, because the users, tehre are in client 050 are not in 020 for logon to the portal. The portal supports only one client as UME on a doublestack-installation.
    On Mainportal we don´t install any business packages, because there are only for one Targetrelease.
    SAP Help have a solution for mapping the Jco´s, but don´t help us:
    http://help.sap.com/saphelp_nw70/helpdata/DE/af/84a34098022a54e10000000a1550b0/content.htm
    Does anyone have same problems?
    Must we install a Javaonly-system, to connect the other Client for company XYZ (050) ?
    Best regards
    Christian

    There are two approaches (that I'm aware of):
    - install external authentication (such as an LDAP which can be populated from the R/3 backends)
    - install an additional Java instance
    I would go for both of them because
    - it will make things easier if you implement other functionality that is in the portal (non-ESS)
    - it will avoid patching one portal and to keep the SPs of both backend systems in sync with the portal
    Markus

  • Do I need to import any package for running exit(0)

    i m using exit(0) but error is given on compilation.......do i need to import any package for exit() fucntion

    Do you mean System.exit?

  • Language Packages for SAP ERP 6.0 EHP 4 (NW 7.01)

    Hello,
    I have installed EHP4 + NW 7.01 on a running ERP 6.0 system with SAPEhpI.
    Now I am not really sure if the implemented languages are also "upgraded" successfully.
    The following languages are implemented additionally:
    Serbian (latin)
    Slovakian
    Ukrainien
    Romanian
    Hungarian
    1st question:
    When I execute SMLT, there I can see the languages with a green traffic light.
    But when I look in the "Detail Information" I can see some warnings (screenshot: http://img175.imageshack.us/img175/2291/ehp4system.jpg) for example:
    "System component: EA-APPL 604 <- 600".
    Is the language-part of this component still on release 600?
    In cause of that I have to implement the specific packages?
    2nd question:
    I also execute the report "RSTLAN_IMPORT_OCS" in SE38.
    Here it displays some "red marked" components which I must implement and some "yellow marked" components which I could import for this language.
    The red marked components are sometimes old releases for example ST-PI 2005 but 2008 is already installed.
    Is it needed that I reimplement all of this displayed packages for the language?
    Thank you for your help.
    Michele

    Hi,
    Please kindly check the SAP note 1402868.  
    This note refers to language on EHP4.   
    After the EHP, some packages are delivered, and for those packages, the    
    Language Supplementation is required.                                                                               
    Please refer to the sap attached note 330104.                              
    This note explains about the packages that need supplementation after      
    the EHP.                                                                   
    Regards,
    Paul

  • Packager for Symbian / Redistributable player ?

    Hi,
    I am doing mixed development on Nokia/Symbain S60 3rd ed. it seems like the "Adoble Packager" has been discontinued.
    However, my understanding was that, only this "Packager" was allowing to run FL3.1 apps, as the distributable 3.1 player cannot
    be invoked directly. Reason i definitely want the 3.1 is because my app does require both "network" (for XMLSockets) and "local file" access,which has finally been made possible by 3.1.
    So my question is: now Packager is not there any longer, what is the solution to use 3.1 Player (and overcome the security ?).
    Thanks,
    Jacques,

    Hi,
    The latest devices from Nokia come with FL3.1. So you don't need to specifically look for FL-DP.
    You can also do a firmware update to get FL3.1, like I did for my Nokia 5800XM.
    You can use SWF2Go, its a commercial product and support all versions of FL. It allows you to install your SWF in /private folder of the stub application (or any other location), which is marked trusted on S60 devices. Visit www.swf2go.com for more.
    Please note there are still some bugs in implementation, both by Nokia and Adobe. The path /Others/Trusted is still hardcoded, due to this some functions don't work until you install the SWF in that specific folder.
    Hope it helps,
    // chall3ng3r //

  • What is the best security package for an imac using yosimity

    What is the best security package for an imac using Yosimity

    Mac users often ask whether they should install "anti-virus" software. The answer usually given on ASC is "no." The answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There  is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to take control of it remotely. That threat is in a different category, and there's no easy way to defend against it.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has taken far too long to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. Those lapses don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, not machine behavior, and no technological fix alone is going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're better informed than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software. A genuine alert that Flash is outdated and blocked is shown on this support page. Follow the instructions on the support page in that case. Otherwise, assume that the alert is fake and someone is trying to scam you into installing malware. If you see such alerts on more than one website, ask for instructions.
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Rogue websites such as Softonic, Soft32, and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission. All "YouTube downloaders" are in this category, though not all are necessarily malicious.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a padlock icon in the address bar when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It can be as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • Business package for Learning ?

    Hi All,
    We are using Portal 7.0. Upgraded 4.6c to ECC 6.0. We are implementing ESS/MSS portal. Deployed the mySAPERP 2005 Business package.
    But, still we are unable to find the iview, pages worksets related to Career and training (like - pre booking the training events, cancel the events, providing feedback on training activity etc.,)
    I heard there is seperate bussiness packge for Career and training which we need to deploy it from portal side ?
    Can any body explain me how to deploy this Bussiness package for learning ?
    What all this bussiness package can it do after deployment from portal sides ?
    Also, since we are using ECC 6.0 (LSo installed) which provides the BSP applications to run it on the web for training events (through ITS). How to call these BSP's into Portal 7.0 ?
    Little confused how to proceed with this activity.  Please, shade some info regarding the same.
    Any help in this regards would be highly appreciated. points assured.
    Thanks for all your inputs in advance.
    Regards,
    Rama Krishna.

    There is a seprate learning content in availble for download. That conatains the learner's role.
    SAP advises to upload this package and assing the role.
    But if you want to know about the bsp application then the name of the application is hcm_learning and you will need a lot of config for the same in R/3 if you want to modify the BSP application then it can be done very easily throught BSP and R/3 config.
    you need to provide specific requirements with reference to modifications.
    Message was edited by:
            Barin Desai

  • PetStore running in Forte for Java 4 - Part 1

    I am hoping to get the PetStore (1.3.1_01) running under Forte for Java 4 EE. If I succeed I will be posting this up to the web-site so that it is publicly available. However I am very new to Forte for Java (FFJ) [I ran it for the first time six days ago]. As a concequence I may not understand the best way of configuring projects or web modules etc, associating the J2EE, implementing ANT files etc etc etc. So what I thought I would do is (briefly) explain what I am doing so that if I am doing stupid things or there are better ways of doing things you guys can shout (ie get some peer review as I proceed).
    The overall approach I am taking is:
    + The project is stored in the standard \forte4j-userdir\system\Projects directory.
    + the source currently is stored separately (ie the directory I unzipped the perstore to).
    + I am building the project in the same sequence that the main build.xml files specifies (ie components / waf / apps).
    + I expose parts of the PetStore project to FFJ by mounting local directories from the unzipped PetStore directory.
    + As long as the j2ee.home is defined in build.properties the ANT build processes work. However a compile under FFJ will not work as it does not know where the j2ee.jar file is. Therefore I have mounted the j2ee.jar and added this to the project. [IS THERE A BETTER WAY OF DOING THIS?]
    Each of the COMPONENTS (asyncsender, encodingfilter, purchaseorder etc) are held in separate java packages. Each of these have been mounted separately and then arranged in the same order as they appear in components/build.xml. Each of these can then be compiled, or, built using the ANT files successfully. Finally for the COMPONENTS I wanted to make the components/build.xml known to FFJ. Unfortunately you can't just mount the components directory (see problem below). So I have created a new directory at the petstore/src level called build and mounted this directory. The components build.xml file has been copied into this directory and renamed to components.xml. Finally the base directory in components.xml has been changed from (.) to (../components). Double clicking on this now builds all of the COMPONENTS without errors.
    I have taken this approach rather than just mounting the components directory as when you do a build you get the following error:
    "java.lang.ClassNotFoundException: Mount/org-openide-filesystems-LocalFileSystem_1.settings: missing 'class' attribute in 'instance' element". [WHAT IS THIS AND IS THERE A SOLUTION?]
    Hopefully I will get some more time tomorrow to start work on the waf part of PetStore.
    Cheers
    Paul

    Before starting on the waf import to Forte for Java (FFJ) I did a quick review. And found an issue. FFJ was not recognising the EJB components as EJBs.
    When creating a new EJB FFJ will store the following "special" files:
    + <ejb name>.ejbdd containing the <ejb-jar> definition
    + <ejb name>.ejbj2eeri containing the <j2ee-ri-specific-information> [AM I CORRECT IN SAYING THIS IS THE CONTAINER SPECIFC DEPLOYMENT INFORMATION? ]
    + <ejb name>.sesejb or .entejb or .mesejb - depending on whether the bean is an session / entity / message bean
    The PetStore project contains <ejb-jar> definitions in ejb-jar.xml files. These files were therefore copied out to the appropriate location for FFJ and renamed to <ejb name>.ejbdd. On opening the project FFJ now recognises the EJBs correctly (signified by the FFJ bean icon). The build.xml files were then changed to copy the new <ejb name>.ejbdd files to the META-INF directory. The project both compiles and can be built from the ANT files successfully.
    So far I have not done anything about the ejbj2eeri files [CAN ANYONE PROVIDE ME WITH ANY INFO ABOUT THESE? FOR EXAMPLE DOES FFJ HAVE ANY SPECIFIC VALUES STORED IN HERE OR WILL THE CURRENT VALUES DEFINED FOR THE J2EE REFERENCE IMPLEMENTATION BE OK].
    Neither have I done anything about the .sesejb / .entejb / .mesejb files. They contain the following information:
    <?xml version="1.0" encoding="UTF-8"?>
    <fjee-ejb>
    <file-version>1.0</file-version>
    <ejb-version>2.0</ejb-version>
    </fjee-ejb>
    [AGAIN CAN ANYONE PROVIDE ANY INFORMATION ABOUT THESE? ARE THEY NECESSARY OR IMPORANT]
    Thanks for any help that can be provided.
    Paul

  • Acrobat XI Pro Install via CCP Packager for Enterprise unuseable - tips for the unitiated

    Well, after at least six weeks of trying to script and package Acrobat XI via the CCP packager for enterprise (Windows 7 X64) I have learnt many home truths which I thought I would share with the unitiated. This process, from the point of view of an IT admin who has to mass deploy this application to 680 PC's as part of an updated SOE has been the most painful scripting process I have ever found of any package (we successfully deploy Office, and Autodesk apps!). Not only that, but our entire State technical colleges have all purchased the same version. This will be affecting IT staff across a huge area, perhaps worldwide. Below are some some facts relating to this that I will share so others do not have to trawl the minefiled of dead-ends and confusion that is Adobe forums/official documentation. Apologies for not finding direct links to all of the below just yet but I've run out of time as we now have MANUALLY install Acrobat XI on all of these machines. When I get time I will post some of the links:
    Facts:
    Acrobat XI and Lightroom are NOT "CC" packages. Therefore they rely on a spearate serial numbers to install standalone without another major Adobe product (eg Photoshop) to be installed and then run first. Otherwise they will run in trial mode. If your organistaion is wanting to install these products I highly recommend seeing if Adobe can provide you with these.
    Without the use of serial number for Acrobat XI this almost renders the Customisation Wizard effectively useless, none of the silent install switch will work with "Offline Exception"
    Yes, one Adobe employee notes that you must install a major package before Acrobat but as the aoplogies for not fixing this were posted last August, we are still in the quandry of not having any useable fix except for the ridiculous "Exceptions" file and Exceptions installer.
    If you run the Build and/or execeptions msi's it installs Acrobat twice, gold Adobe, gold.
    http://forums.adobe.com/message/6039529#6039529 - look at this for a working script for Photoshop etc, it's great.Thanks to http://forums.adobe.com/people/PetriRiihikallio for posting this. However, alas, it cannot silently install Acrobat correctly (thus far).
    It appears that the msi builder for CCP for enterprise is fatally flawed. I have never had as much problem with installing msi's -  ever. For example, I have had to re-package the msi multiples times and many times simply running the msi will fail.
    The idea that all major installs have to install the 32 bit version AND the 64 bit version is riduclous, enough said.
    http://blogs.adobe.com/acrolaw/2013/02/acrobat-xi-deployment-guide-for-large-firms/ this guide may be useful for people who have been given a separate serial number.
    http://helpx.adobe.com/acrobat/kb/known-issues-acrobat-xi-reader.html another useful link
    I think for the time being I have now wasted enough time trying to tear my hair out with this. I will be waiting for Adobe to announce Acrobat and Lightroom CC. this will enable the correct deployment of a single app without having the bloat my SOE with unnecessary applications that most staff rarely use. Ahhh, I love a good manual install via VNC/RDP, don't you?

    Hi Waltpenner and others, yes it can be very confusing and writing script after script got me even more confused.
    Now, the story continues, after 6+ hours on the phone with Adobe Support...
    When you install Adobe Acrobat XI it asks you to install the C++ Redistributable package and this is where the msi will STOP INSTALLING. even though the MSI says "complete"
    Now you think to yourself, OK, I'll write a script to install this msi package no problems, solved.
    Nope, the msi for Acrobat Pro XI will Still Halt even if you write this into the script along with halt no err or something similar in your code.
    So what do you do?
    When you create your msi in Cloud Packager, even though this feels completely against your better judgement tick the box under conflicting Process entitled "Ignore Conflicts and Continue installations" This will (finally) allow you to run the msi. Please see the wonderful deployment script above, which you may still need to edit to your needs (I did) - which I post once it's working perfectly.
    You could then install the C++ redist from Microsoft at a later date ----> On that note however (thanks Microsoft for this gem) the Visual C++ redist is an msi for download, but it's actually a zip file calling an exe inside it. I suggest using the App Deploy Repackager  to help you change registry entries if you need to install this, but choose your favourite tool (and no I'm not talking about that work colleague you don't like
    Note: You will need to install this for certain features of Acro Pro XI to function, most of which relates to sever functions of Acrobat. I will post the exact reasons when I find them. Under pressure to get this deployed, I have not deployed this pckage as yet. Also, I'm unsure how Visual C++ will affect other major apps across my enterprise just yet.
    Things to still consider
    Acrobat still installs twice in the program directory (1.7GB nd 1.8GB respectively)
    As all of the other CC packages are quite easy to install, Adobe needs to provide better service to it's enterprise customers by creating a proper version of Acrobat and Lightroom which is Acrobat CC and Lightroom CC, not version numbers tacked onto their new Cloud Service.
    As for the above point I would still recommend creating the smallest msi packages you can, as large msi's that install a number of Apps (eg all of the web/image editing apps) take forever and quite often exhibit install errors
    The amount of time I've spent on this is ridiculous, and we've had to package everything from Office to Autocad.
    The amount of bandwidth I've chewed up is excessive, with package re-creation (download) of all the products probably about 100GB - however the ability to edit these packages with updates with the CCP is a good step forward.
    Using the CCP through a proxy is horrendous, and complicated with the amount of exception through the servers you have to prvide (even then it rarely works).
    The MSI packager still needs quite alot of work. As Petri states why he had to write a script like this when Adobe could have done the same thing is beyond him.
    Adobe needs to trawl it's forum posts and take out the many false leads and dead ends provided by it's experts.
    When I Think of anything else, or wite more scipts I'll let you all know.
    Cheers,

  • When i try to download the newest version of itunes it says "the feature you are trying to use is on a network resource that is unavailable" and then it gives me an alternate path to a folder containing the installation package for itunes64.mis, help

    when i try to download the newest version of itunes it says "the feature you are trying to use is on a network resource that is unavailable" and then it gives me an alternate path to a folder containing the installation package for itunes64.mis, help

    (1) Download the Windows Installer CleanUp utility installer file (msicuu2.exe) from the following Major Geeks page (use one of the links under the "DOWNLOAD LOCATIONS" thingy on the Major Geeks page):
    http://majorgeeks.com/download.php?det=4459
    (2) Doubleclick the msicuu2.exe file and follow the prompts to install the Windows Installer CleanUp utility. (If you're on a Windows Vista or Windows 7 system and you get a Code 800A0046 error message when doubleclicking the msicuu2.exe file, try instead right-clicking on the msicuu2.exe file and selecting "Run as administrator".)
    (3) In your Start menu click All Programs and then click Windows Install Clean Up. The Windows Installer CleanUp utility window appears, listing software that is currently installed on your computer.
    (4) In the list of programs that appears in CleanUp, select any iTunes entries and click "Remove", as per the following screenshot:
    (5) Quit out of CleanUp, restart the PC and try another iTunes install. Does it go through properly this time?

  • How to create a dynamic SSIS package for multiple flat file destinations

    Hi,
    I have to create a ssis package which has single data flow task and inside that I have 23 source (sql- select * from - statements)- destination (flat files, 23 distinct) connection.
    Now for each product I have to create separate SSIS package (i.e. if prod=abc then these read select * from abc_tables and 23 abc_ txt files)
    I want to do it dynamically, means only single package and inside that variables will take select * values for each source-dest connection (so i believe 23 variables) and same for destination flat files.
    Let me know. :)
    ANK HIT - if reply helps, please mark it as ANSWER or helpful post

    Sorry It seems you're contradicting yourself. you say I know my source and dest structure and the you're
    asking all I want is to have a dynamic structure
    what does that mean?
    and reading your next sentence
    I want to run a package for 5 products, instead of creating 5 ssis packages with 23 source- dest connection, I would
    like to have one with only 23 source- dest connections 
    What I feel is what you're looking for is to  have a looping structure to loop through each of the 5
    products.
    In that case what you could do is this
    1. Create a object variable in SSIS 
    2. Use a Execute SQL Task to populate the variable with all available products (I think you'll have a master table for that). Set ResultSet property to Full ResultSet and then in ResultSet tab map Object variable to 0 th index
    3. use a ForEachLoop container with ADO .NET recordset enumerator and map to object variable. Create a variable of datatype same as that of Product identifier field to get individual values out
    4. Inside loop create your data flow task with 23 source destination connection. In the query part use a parameter for product field and map it to the variable containing product value to get only data for the product.
    Please Mark This As Answer if it helps to solve the issue Visakh ---------------------------- http://visakhm.blogspot.com/ https://www.facebook.com/VmBlogs

Maybe you are looking for

  • How do i share itunes on all my devices?

    I have an ipod touch and I got some itunes credits loaded there and so is my ipad, now i got an iphone and i wanted to buy something using that itunes credits, what can i do to use that?

  • Monthly wise Sales report - Help me

    Dear SDN mates Is there any standard reports for Monthly wise sales report ...the SAP1 , SAP2 reports were not helpful....Does this can be solved by standard reports or it needs to be customized???? kindly help me?

  • Agent determination problem

    I have a workflow that has been in production for almost a year.  We are in the middle of integration testing for another rollout and I'm getting agent determination errors in this workflow.  There are three steps involved.  The first two use the exa

  • Can't import CDs into i tunes, unknown error -48

    Help.... All of a sudden I can't import CDs. I keep getting the same error message. I've tried changing my preferences but with no luck. Does anyone know how to fix this?

  • Audio Motion Menu Limit

    Hello! I am at a stage in my project that i need to add a voice over to the dvd. The dvd consists of 110 static menus - which up until now has worked fine. I have an audio file that needs to be cut up for each section, and the file is 460mb - so each