Can A synonym be used in Discover?

I am new to this tool and I have a schema with all objects that I need to develop my discover application, however, all these objects will have to be move to a different schema. I gave select,update, delete grant to the schema that I am going to use discover in, I then created a synonyms for all the objects in this Schema. When I go to discover to create a Business Area, all these synonyms were not visible.
Please Advice.

Hi,
Synonyms are not fully supported in Discoverer. If you include a synonym in the EUL you will find that it is replaced with the referenced table/view when the EUL folder is refreshed.
If you need to change the schema for the objects referenced in the EUL, then this can be done easily with Discoverer Administrator. Highlight all the folders and change the owner property of the folders.
Rod West

Similar Messages

  • Can an iMac be used for WD My Book Live safepoints?

    I have a Western Digitial My Book Live network drive.  All Mac's and PC's can read/write without a problem.  I would like to create a safepoint (WD term for backup) on an iMac but can't seem to get past correctly discovering the devices on the network.  The MBL can 'see' the shares on the XP PC but nothing on the Mac's.  Unfortunately the XP PC is not suitable for backups.
    Can a Mac be used for MBL safepoints?  If so, how is that accomplished? 
    Yes, I've posted this same question the WD Support and WD Communities but no responses.  Most MBL Mac users posting on WD forums are using them for Time Machine.  I thought maybe someone on the Apple forums might have solved this problem.
    Thanks in advance for any help.
    Mike

    I am having the same issue.  Did you ever find an answer?  I see no one ever responded to you.  I have a WD cust service Tech support question submitted but no answer yet there either.  Thanks for any info you have.
    I get the error
    30000 - Unknown error. Retry your last operation. If the error persists, contact WD Support for assistance.
    (share_discover_9)
    when I choose the iMac as the location I would like to use.

  • We can't create form using dblink  and synonim

    We have created a dblink pointing to a table in the remote database.
    When we create a form based on table or view using this dblink, we get the error "page not found".
    We read from
    Re: I can't create form using dblink
    that we must create a synonim, and this was done creating one in the same schema of the db-link using the "Database Objects" of oracle portal 10g (external db is an oracle 9.0.2).
    The new synonim work (tested with reports and pl/sql page)
    but if we click on "Grant Access" (of the synonim) we get the following error :
    Error: The underlying object of the synonym does not exist, is a remote object or is not of type function, procedure, package, sequence, synonym, table or view. (WWV-17076)
    Does form work only with table and view of the portal database (not external one)? or have we loose something in the creation of the synonim?
    Have someone succesfully created a form based on a db-link towards an external database?
    Thanks to all.

    Hei guys, has nobody created succesfully a data-driven forms based on a dblink towards an external database?
    I can't believe this!!!!

  • Can a nook be used with os7

    Can a Nook be used with Apple products?  I don't want network or virus problems.

    Android is the most malware-prone, insecure platform there is - but millions of users seem to survive without dropping like flies!
    I can't answer Q.1 but as for Q2:
    How safe is your smartphone? (Android is the top malware collector)
    A major source of malware, apart from sites like Facebook and Hotmail, is the Android Marketplace:
    More than 50 applications available via the official Android Marketplace were initially found to contain a virus.
    Analysis suggests that the booby-trapped apps may have been downloaded up to 200,000 times. The apps are also known to be available on unofficial Android stores too. Once a booby-trapped application is installed and run, the virus lurking within, known as DroidDream, sends sensitive data, such as a phone's unique ID number, to a remote server. It also checks to see if a phone has already been infected and, if not, uses known exploits to bypass security controls and give its creator access to the handset. This bestows the ability to install any code on a phone or steal any information from it.
    Remote removal of the booby-trapped apps may not solve all the security problems they pose. The remote kill switch will not remove any other code that may have been dropped onto the device as a result of the initial infection.
    Moreover, more than 99% of Android phones are potentially leaking data that, if stolen, could be used to get the information they store online.
    http://www.bbc.co.uk/news/technology-13422308
    The data being leaked is typically used to get at web-based services such as Google Calendar.
    The open nature of the Android platform was a boon and a danger, and as Facebook have already discovered it is also a very attractive criminal playground.
    http://www.bbc.co.uk/news/technology-12633923
    Smartphones and social networking sites are likely to become the next big target for cyber criminals, according to a security industry report.
    Symantec's annual threat analysis warns that the technologies are increasingly being used to spread malicious code
    Users of Facebook, Twitter and Google's mobile operating system, Android, are said to be particularly vulnerable.
    In several cases, the security holes were exploited and used to install harmful software on Android handsets - suggesting that criminals now view smartphone hacking as a potentially lucrative area, and Android is still in the firing line:
    http://www.bbc.co.uk/news/uk-15600697
    Android: it's getting worse: Juniper found a 400% increase in Android malware from 2009 to the summer of 2010.  We have since seen exponential grow in Android malware over the last several months. The Juniper Global Threat Center found that the months of October and November are shaping up to see the fastest growth in Android malware discovery in the history of the platform. The number of malware samples identified in September increased by 28% over the number of the known Android malware samples. October showed a 110% increase in malware sample collection over the previous month and a striking 171% increase from what had been collected up to July 2011.
    July 2012: Smartphones running Google's Android software have been hijacked by an illegal botnet, according to a Microsoft researcher.
    Botnets are large illegal networks of infected machines - usually desktop or laptop computers - typically used to send out masses of spam email.
    Researcher Terry Zink said there was evidence of spam being sent from Yahoo mail servers by Android devices:  http://www.bbc.co.uk/news/technology-18720565
    One question Juniper always get when discussing our research is if Apple’s iOS is more or less secure than Android? Maybe, but it’s not necessarily because of the security or lack of vulnerabilities in the platforms themselves. The main reason for the malware epidemic on Android is because of different approaches that Apple and Google take to police their application stores. Android’s open applications store model, which the lacks code signing and an application review process that Apple requires, makes it easy for attackers to distribute their malware. There is still no upfront review process in the official Android Market that offers even the hint of a challenge to malware writers that their investment in coding malware will be for naught.
    http://globalthreatcenter.com/?p=2492
    At least six different varieties of malware were discovered hidden in applications that were distributed through a Chinese download service.
    Several pieces of malware were also found on iPhones, however only devices that had been "jailbroken" to bypass Apple's security were affected.
    The company's process of pre-vetting all new applications is believed to have spared its devices from a major attack.
    (Apple closed out 2011 with a commanding 52.1 percent share of mobile devices tracked browsing the Web, while Google's Android had just 16.2 percent.)
    And most recently this:
    Millions of people are using Android apps that can be tricked into revealing personal data, research indicates.
    Scientists tested 13,500 Android apps and found almost 8% failed to protect bank account and social media logins.
    These apps failed to implement standard scrambling systems, allowing "man-in-the-middle" attacks to reveal data that passes back and forth when devices communicate with websites.
    http://www.bbc.co.uk/news/technology-20025973
    And this:
    Freezing an Android phone can help reveal its confidential contents, German security researchers have found.
    The team froze phones for an hour as a way to get around the encryption system that protects the data on a phone by scrambling it.
    Google introduced the data scrambling system with the latest version of Android called Ice Cream Sandwich.
    The attack allowed the researchers to get at contact lists, browsing histories and photos.
    http://www.bbc.co.uk/news/technology-21697704
    Update from May 2013:
    Malware targeting mobile devices is rapidly growing in both the number of variants found in the wild and in their complexity and sophistication, but the only platform being actively targeted is Google's Android, which researchers now say is resembling Windows on the desktop PC.
    http://appleinsider.com/articles/13/05/14/mobile-malware-exploding-but-only-for- android
    And in early June 2013 a highly toxic trojan began attacking the Android platform:
    According to reports:
    Obad.a exploits previously unknown Android bugs, uses Bluetooth and Wi-Fi connections to spread to near-by handsets, and allows attackers to issue malicious commands using standard SMS text messages.
    By exploiting this vulnerability, malicious applications can enjoy extended Device Administrator privileges without appearing on the list of applications which have such privileges," Unuchek said. "As a result of this, it is impossible to delete the malicious program from the smartphone after it gains extended privileges."
    More information here:
    http://arstechnica.com/security/2013/06/behold-the-worlds-most-sophisticated-and roid-trojan
    A recent study on smartphone malware has found that 92 percent of nefarious mobile software is targeted at Google's Android platform, and the amount of attacks are growing:
    The latest data released in June 2013 by Juniper Networks reveals that Android malware has grown at a "staggering rate" over the last three years. In 2010, it accounted for just 24 percent of all mobile malware, while as of this March the platform accounts for nearly all of it.
    In the last year alone, the total number of malicious apps has grown 614 percent to 276,259. The annual Mobile Threats support also identified more than 500 third-party Android application stores worldwide that are known to host mobile malware.
    http://newsroom.juniper.net/press-releases/juniper-networks-finds-mobile-threats -continue-ram-nyse-jnpr-1029552
    The far reaching vulnerability, discovered by San Francisco's Bluebox Security, involves "discrepancies in how Android applications are cryptographically verified & installed, allowing for APK code modification without breaking the cryptographic signature."
    Android apps (packaged as an "APK") are signed with an encryption key (just like iOS apps) to prevent a malicious party from changing the code. Signed apps are expressly designed to enable the system to detect any tampering or modification.
    However, due to the newly discovered Android flaw, a rogue developer can trick the system into thinking that a compromised app is still legitimate, giving it system wide access to do virtually anything.
    "A device affected by this exploit could do anything in the realm of computer malice, including become a part of a botnet, eavesdrop with the microphone, export your data to a third party, encrypt your data and hold it hostage, use your device as a stepping stone to another network, attack your connected PC, send premium SMS messages, perform a DDoS attack against a target, or wipe your device," a representative of the company wrote AppleInsider:
    http://appleinsider.com/articles/13/07/03/security-flaw-opens-all-modern-android -devices-to-zombie-botnet-takeover
    The problem (with Android) is: that committee design has failed to make Android a good platform for either users or for developers. By not making any hard choices and giving people what they said they wanted, Google simply abandoned the future to cling tenaciously to the past.
    Rather than conceptualizing and engineering really new solutions to historical computing problems as Apple did with iOS, Google has only attempted to wrest control away from iOS via volume shipments and has effectively sent mobile computing back in time into the 1990s, resulting in the same malware, spyware, viruses and usability issues of Windows.
    http://appleinsider.com/articles/13/07/14/editorial-googles-android-haunted-by-s teve-jobs-warnings-on-app-signing-security
    The Department of Homeland Security considers the malware threat from Android so serious that they issued a public warning on July 23, 2013:
    http://info.publicintelligence.net/DHS-FBI-AndroidThreats.pdf

  • How can I send email using two different email address that both link back to my one exchange account on my Ipad mini

    How can I send email using two different email address that both link back to my one exchange account on my Ipad mini? 
    On my PC I simply have a master return email address and use a POP for the secondary address.  Both are through the one exchange account without a problem.  I need to be able to do the same on my Ipad.

    Ah, I should have made that clear.  My domain didn't come from google.  It was purchased at and is hosted at dreamhost, but I haven't used their email servers in years - I just route everything through gmail.  I actually have a bunch of domains (with websites).
    Gmail has an option that lets someone with custom domains send (and receive) email through gmail using the custom domain once Google confirms proper ownership of the domain (to prevent spammers and such).  Gmail has a setting for "send email as" which allows gmail to be sent using a custom domain as the sender.  I'm pretty sure Apple's old mobileme had this feature too, but I didn't use it.

  • Can my MacBook Pro use boot camp with Windows 7 with BitLocker encryption?

    I'm at wit's end with this, and I'm hoping I can get some advice here.  I've read so many forum, posts and reviews that I'm not entirely sure what I can trust.
    I have an early 2011 MacBook Pro (MacBookPro8,3). I need to run Windows encrypted for work purposes. It needs to be real windows with full-disk encryption (FDE). The business tools run in boot camp, but not in Parallels, because Parallels doesn't support DirectX 11. I would also benefit greatly from an SSD.
    I do not want to do anything hacky like removing the Mac reocovery partition, because I've read that just loading Disk Utility in OS X might mess up your patrition boot tables as it tries to "fix" things. I don't want to have to manually reocover to fix stuff or chance losing data.
    I have read (and tried) installing BitLocker on Windows 7 Ultimate under boot camp, but ran into the partition limit on my internal HDD. A maximum of 4 partitions are allowed, and between OS X, its recovery, boot camp, and the Windows partition, all 4 are used.
    I have considered one of the following, which may work:
    Install OWC's Data Doubler Kit with an additional 240GB SSD (http://eshop.macsales.com/item/OWC/DDMBS6E240/). I would replace the internal SuperDrive with the HDD, and install the new SSD on the faster SATA 6G port. Windows would be installed on the SSD and OS X would stay on the HDD.
    Replace the internal HDD with a new SSD (keeping the SuperDrive). I would lose OS X altogether and just have Windows installed.
    Forget the entire thing and just buy a PC for work.
    My thoughts are that with option both options #1 and #2, I don't even know if these setups will allow BitLocker. In both cases, Windows will be the only partition on the drive, so I'm assuming that when BitLocker is installed, there will be room for the new partition it creates. With option #1, I'm pretty sure I'd still be using Boot Camp, but how would that would for option #2? Is boot camp used even though there is no Mac partition? Would I still need to keey the Mac Recovery partition for this to work? I'd probably need to use Boot Camp drivers under Windows, I think.
    I'd certainly be interested in using a self-encrypting drive (SED), especially a SSD, but I'm concerned that most of them appear to require TPM or BIOS functions that Mac's EFI does not provide. Such a drive would allow me to drop BitLocker, but I would need to be use the self-encryption actually works on this setup. From what I've read, most of the SED drives will work just fine under EFI, but you won't be able to set or access the encryption password, which pretty much makes these drives unencrypted.
    I've read that BitLocker can be configured to use a flash drive as a decryption key, but I haven't been able to test that yet. I'm tried creating bootable flash drives under Windows and OS X, and none of them seem to appear when I access the boot menu (hold option during boot chime). I don't even know if this system supports bootable USB flash drives, or whether they can be used as a BitLocker key under boot camp.
    For the record, I have attempted to use an external thunderbolt drive as my Windows partition, but Windows doesn't want to be installed on removable media, and even if it worked, I believe you can only boot OS X from thunderbolt. I do have a second OS X install booting from the thunderbolt drive, so I know that works. Also, FileVault 2 is installed on my OS X partition, and I read something about FV2 using the Recovery partition somehow so you can't remove the recovery partition to make room for BitLocker.
    So ... does anyone have any suggestions preferably based on personal experience as to whether options #1 or #2 should work for my needs?
    At this point, I'm really thinking I should just bite the bullet and purchase a PC that I will forever look down upon.

    Are you using a MacBook Pro? Is everything installed on the same drive?
    I would love to know how that install was performed. When I install Windows under boot camp, my MacBook Pro drive ends up with 4 partitions: Mac, Mac Recovery, Windows, and a small partition that I believe is used by boot camp.
    Installing BitLocker on Windows requires the creation of a new small partition that Windows will boot off. The small partition is unencrypted, while the primary Windows partition will get encrypted. The following post discusses the maximum partition issue: https://discussions.apple.com/message/22753791#22753791
    Has anyone installed Windows through boot camp on it's own drive, and if so, can BitLocker be installed on that without reaching any partition limit? I'm assuming that's possible, but would like to know before I spend hundreds on new hardware.

  • I have a game but it only for one apple id and one divece but someone i dont know id play that game and using my apple id and i want to know if u can block them from using ur apple id and also erase all the games they downlode with the apple id

    I have a game but it only for one apple id and one divece but someone i dont know id play that game and using my apple id and i want to know if u can block them from using ur apple id and also erase all the games they downlode with the apple id

    There probably is, but it requires that you be able to use punctuation and write in sentences so that we can understand exactly what you want.
    You can block others from using your Apple ID by changing your password.  There is no way to erase what was already downloaded on to someone else's device, for obvious reasons,

  • Why can't I just use my debit card for adding my child to family share?!

    I want to use my child on family share but can't because I don't need or want a credit card, my bank has fraud protection, who actually just called me about fraud because I purchased the newest iPhone! I don't like credit cards. Why can't I just use my debit card as usual? Kids can get credit cards just as easily as they can debit cards! This is ridiculous. Why isn't there another option to verify I am the parent?! I am so beyond angry right now. Like I am being punished for not owning a credit card!! Otherwise there will be another way to do this. A person should have the freedom to use their chosen form of payment without missing out on all the options available. Honestly even if I wanted a credit card I haven't enough credit because of past mistakes. So this is not making me happy at all.

    Mad Parent,
    I feel your pain. We refuse to have credit cards, too; yet it's required in order to create a child's apple id. I will most definitely be leaving feedback with Apple. This is absolutely ridiculous that we can't just use our debit cards! Mine is a VISA. I use it to make CREDIT CARD transactions everywhere else, why not be able to use it the same way here!?
    I just had to restore my sons phone because he forgot his 4-digit password and got it disabled. I didn't have it already on my itunes so my only option was to restore it. I wanted to create his own apple id so he didn't have to keep using mine. Because every time he downloads a new game it automatically ends up on MY device as well, not just his. Anyway, he needs his own apple id. But, apparently, that won't be happening until Apple gets their heads out of their butts and figures out how to serve ALL of their customers!
    Signed,
    Equally Mad Parent

  • All music gone, transferred to 'other', can't enable disk use on iTunes

    it seems like there are a lot of people with similar problems but nothing exact..here goes:
    -doing research on my macbook and i get a popup from itunes saying that my ipod was disconnected improperly (i didn't touch it and i wasn't even messing around on itunes)
    -ipod restarts and reconnects with itunes and i get another pop up saying that "itunes cannot read the contents of the ipod. go to ipod summery and preferences and restore.
    -i would just restore it and reload all the music butttttt like an idiot..i dont keep my music in my itunes cause it takes up way too much space and i never used any external hard drive or anything to back my music up (again..idiot..i know)
    -so i read though a ton of forums and posts and see that im not the only one that this has happened to and everyone is saying to put it in disc mode, go to removable disk, copy all the music back to my macbook, restore my ipod, and put all the music back on. i also read something about clicking on my ipod icon on my desktop and going under ipod controls and changing some names (i dont konw if that was jsut for windows or what) but i also dont have an option of ipod controls
    -the problem with that is that i can put my ipod into disk mode but that does me no good because i can't enable disk use on itunes because literally..my only option when i plug in my ipod is to restore it. under devices on the left hand menu, it just says ipod..not ipod with a bunch of sub categories like music and playlists and stuff..just ipod.
    -normally..i would just give up and restore it but when i go to the about section on my actual ipod, it says that i have 50GB of "other" so that means that stuff is definitely still on it.
    -so finally..my main question is:
    is there ANY way to enable disk use on my iTunes without doing it through my iPod?..like i explained..when i plug my iPod in..that is not an option. and also..would i benefit from just bringing my laptop and ipod into an apple store and asking for help there or will that just be a waste of time?

    The library on the iPod will have been damaged - hence the reason it appears empty, but the media files are still there taking up space and reported as "Other". Check out this post from Zevoneer for some iPod recovery options.
    http://discussions.apple.com/thread.jspa?messageID=6273675&#6273675
    Some of the tools mentioned will require a working library, but I know from experience that you can use the manual recovey method when the library is missing or damaged. If you're struggling for space you probably need to go & buy an external drive before you start. Stick the iPod in disk mode. Hold Menu+Select > 6 seconds (resets iPod) followed immediately by hold Previous & Select > 6 seconds. You can now drag the contents of iPod_Control\Music to your new hard drive. You may need to reveal hidden files & folders. Once they are on your hard drive you can create a new empty library on the drive, then import the files you have reovered and consolidate the imported library so that the files are in a standard artist\album\## track structure rather that the iPod's obscured names.
    tt2

  • I got a macbook pro 2008 and can not back up using time machine. it eject my external hard drive everytime. does someone has a fix???

    i got a macbook pro 2008 and can not back up using time machine. it eject my external hard drive everytime. does anybody has a fix???

    Does your external hard drive have it's own power supply?  It should.
    Is your external hard drive formatted with the NTFS file system?  It won't work.
    It needs to be formatted either with Mac OS Extended or FAT32.
    (There are drivers available to add NTFS support to OS X but their quality is unknown, especially the "free" ones.)

  • TS3276 I'm now having trouble getting mac mail to work on my mac. The mobile me account works great on iphone and ipad but it won't connect to my mail account. Password is correct. What else can I do? Using OS10.68

    I'm now having trouble getting mac mail to work on my mac. The mobile me account works great on iphone and ipad but it won't connect to my mail account. Password is correct. What else can I do? Using OS10.68

    HI,
    The Apple IDs from @mac.com and @me.com (Older MobileMe and more recent iCloud Names) are also Valid AIM Screen names.
    Any other sort of Apple ID is not a Valid AIM Name.
    A Google ID that is associated with Google Mail Account (And has "Talk" enable on your Google Settings) can be used in iChat as  Jabber Name/ID.  (Google Run  Jabber server).
    Jabber and AIM are different IM Services and it is not easy or straight forward to add Buddies from one Service to the Buddy List of another.  (As A Starting point consider it "impossible")
    iChat 4 and 5 have links to the registration page of @Mac.com here with a "Get an iChat Account" button in the add (Account) screen  (You select @mac.com or MobileMe and then press the Button - Choosing AIM and then pressing the button used to lead to the AIM registration page but AIM moved their page).
    Apple IDs can be any valid email (or an @mac.com or iCloud registration)
    Therefore you could make a Google ID into an Apple ID.
    However this will not be a valid AIM Screen Name the way @mac.com or MobileMe/iCloud ones are.
    Valid AIM Screen Names in Table (pic)
    7:46 PM      Monday; December 5, 2011
    Please, if posting Logs, do not post any Log info after the line "Binary Images for iChat"
      iMac 2.5Ghz 5i 2011 (Lion 10.7.2)
     G4/1GhzDual MDD (Leopard 10.5.8)
     MacBookPro 2Gb (Snow Leopard 10.6.8)
     Mac OS X (10.6.8),
    "Limit the Logs to the Bits above Binary Images."  No, Seriously

  • I can't print wirelessly using Airport Express.  I have my HP printer connected to a USB hub, and the hub to the Airport Express, but when I select the HP from the printer list, my MacBook says the printer is "off-line" - even when it is not.

    I can't print wirelessly using Airport Express.  I have my HP printer connected to a USB hub, and the hub to the Airport Express, but when I select the HP from the printer list, my MacBook says the printer is "off-line" - even when it is not.  I've tried several USB connectors, and several different ports on my USB hub; same result.  I need to have the HP connected to the hub 'cause from there it's connected to our desktop Mac.

    Hi,
    I am currently replying to this as it shows in the iChat Community.
    I have asked the Hosts to move it to Snow Leopard  (you should not lose contact with it through any email links you get)
    I also don't do Wirelss printing so I can't actaully help either.
    10:01 PM      Friday; July 29, 2011
    Please, if posting Logs, do not post any Log info after the line "Binary Images for iChat"
     G4/1GhzDual MDD (Leopard 10.5.8)
     MacBookPro 2Gb( 10.6.8)
     Mac OS X (10.6.8),
    "Limit the Logs to the Bits above Binary Images."  No, Seriously

  • Does anyone know how i can view PDF files using Galaxy Note 2?

    Does anyone know how i can view PDF files using Galaxy Note 2?
    This is what i have been doing;
    I click on the file i wish to view (via a portal)
    this file goes to notification widget (i drag down screen)
    notification/message says download complete
    i click on notification/message
    nows it says complete action using (here i only have 2 icon options 1= DB Text Editor 2 = HTML Viewer)
    I have installed Adobe Reader.

    Can you confirm if the downloaded file is a pdf file, that is it ends with .pdf?

  • Since the iOS7.0.2 update to my iPhone 4S, I can no longer choose use of my Bluetooth device if using the power cord to listen to MUSIC or answer my phone (choice of powercord as 'dock,' speaker,

    Since the iOS7.0.2 update to my iPhone 4S, I can no longer choose use of my Bluetooth device if using the power cord to listen to MUSIC or answer my phone (choice of powercord as 'dock,' speaker, & phone only).  Was this former-feature now an oversight??  I'd really appreciate having my Bluetooth once again listed as a choice of  audio option.  Especially considering the battery life is not what it was prior to this update, and requires recharging often.

    Sorry to tell you but unless you have a Retail Apple Store close by, they are the only ones I have found with all the adapters and accessories. I bought an extra lightning to usb adapter the other day to use in my truck. Good luck....

  • My iPhone 5s keeps randomly shutting off and restarting. It can either be in use or just sitting there and it will turn off. I can't figure out what is wrong.

    My phone randomly shuts off. I will be in the middle of using it and it will completely turn off. I can also not have used it all night and I will pick it up and click the home button and then it will flash the apple restart screen. I'm not sure what is causing this as I have only had the phone for about two weeks. It's a little concerning and just wanted to see if anyone knew what it could be without me having to go into the Apple store.
    Thanks!

    Try This...
    Close All Open Apps... Sign Out of your Account... Perform a Reset...
    Reset  ( No Data will be Lost )
    Press and hold the Sleep/Wake button and the Home button at the same time for at least ten seconds, until the Apple logo appears. Release the Buttons.
    http://support.apple.com/kb/ht1430
    If the issue persists...
    Connect to iTunes on the computer you usually Sync with and Restore
    http://support.apple.com/kb/HT1414
    Make sure you have the Latest Version of iTunes (v11) Installed on your computer
    iTunes free download from www.itunes.com/download

Maybe you are looking for

  • In QM view Inspection Setup data tab is not coming

    Hi Friends I want to assign inspection type to a material, plant combination but in QM view Inspection Setup data tab is not coming Thanks & Regards Gajendranath

  • Can I Copy a preference pane from one mac to another?

    Hi everyone. I regualrly work on a lot of different computers and to save time I've been keeping a usb with a few plists with me that i can drag and drop into the library to save time. I was wondering whether there were any issues with doing this wit

  • Actual cost not updating in Pm order

    Hi Experts,   We have a requirement from management for Having budget control based on department wise. For that we are trying out substitution rule by which Pm order is replaced with Internal order .we are having a budget profile and budget for inte

  • ODBC installation; test fails with IM004

    I'm having trouble getting an ODBC connection to a remote Oracle 8i databse. I have installed the Oracle8 ODBC Driver release 8.1.7.7.0. When I click "Test Connection" in the ODBC driver configuration window, I'm getting: Unable to Connect SQLState=I

  • How to use UNSPSC code in SRM MDM ?

    Hi, We are in migration from CCM 2.0 SRM MDM. In CCM , we are uploading the catalogs with UNSPSC and material group. Either any one is mandatory. If they give UNSPSC code in catalog, while uploading we are mapping to correspoding material group. But