Contacting a moderator about personal information in older posts?

Is there a  way to contact moderators about personal information posted in older posts I have created? I would also like to change my username on the disccussion board but I'm not sure if that is possible.

You cannot change your username on ASC. You can, of course, make a new one. The old one's posts will gradually go to the archives.
Barry

Similar Messages

  • Personal Information and Deleting Posting

    Instructions needed on how to delete a thread that has not been replied to. Instructions and capability need to change name that shows up in posting.

    444/2890
    Hi!
    - delete a thread that has not been replied to:
    Sorry, this ability has been removed from the New Discussions software.
    Also: if you go back to the thread and decide to "mark it as answered", as a result it will be taken back to the top of the page,
    so,
    if you want it to be just forgotten, the best you can do is: leave it alone.
    - change name:
    The only way I heard about, is to go change your settings in the general Apple registration pages.
    You might prefer to create another account in some cases?
    Good luck!
    Axl

  • I have an iMac for work and I am leaving the company. How do I clear the computer so that my soon to be former company is unable to see my personal information Ie. - internet, contacts, etc...

    I have an iMac for work and I am leaving the company. How do I clear the computer so that my soon to be former company is unable to see my personal information Ie. - internet, contacts, etc...

    Follow these instructions step by step to prepare a Mac for sale:
    Step One - Back up your data:
           A. If you have any Virtual PCs shut them down. They cannot be in their "fast saved" state. They must be shut down from inside Windows.
           B. Clone to an external drive using using Carbon Copy Cloner.
              1. Open Carbon Copy Cloner.
              2. Select the Source volume from the Select a source drop down menu on the left side.
              3. Select the Destination volume from the Select a destination drop down menu on the right
                  side.
              4. Click on the Clone button. If you are prompted about creating a clone of the Recovery HD be
                  sure to opt for that.
                   Destination means a freshly erased external backup drive. Source means the internal
                   startup drive.
    Step Two - Prepare the machine for the new buyer:
              1. De-authorize the computer in iTunes! De-authorize both iTunes and Audible accounts.
              2, Remove any Open Firmware passwords or Firmware passwords.
              3. Turn the brightness full up and volume nearly so.
              4. Turn off File Vault, if enabled.
              5. Disable iCloud, if enabled: See.What to do with iCloud before selling your computer
    Step Three - Install a fresh OS:
         A. Snow Leopard and earlier versions of OS X
              1. Insert the original OS X install CD/DVD that came with your computer.
              2. Restart the computer while holding down the C key to boot from the CD/DVD.
              3. Select Disk Utility from the Utilities menu; repartition and reformat the internal hard drive.
                  Optionally, click on the Security button and set the Zero Data option to one-pass.
              4. Install OS X.
              5. Upon completion DO NOT restart the computer.
              6. Shutdown the computer.
         B. Lion and Mountain Lion (if pre-installed on the computer at purchase*)
             Note: You will need an active Internet connection. I suggest using Ethernet if possible because
                       it is three times faster than wireless.
              1. Restart the computer while holding down the COMMAND and R keys until the Mac OS X
                  Utilities window appears.
              2. Select Disk Utility from the Mac OS X Utilities window and click on the Continue button.
              3. After DU loads select your startup volume (usually Macintosh HD) from the left side list. Click
                  on the Erase tab in the DU main window.
              4. Set the format type to Mac OS Extended (Journaled.) Optionally, click on the Security button
                  and set the Zero Data option to one-pass.
              5. Click on the Erase button and wait until the process has completed.
              6. Quit DU and return to the Mac OS X Utilities window.
              7. Select Reinstall Lion/Mountain Lion and click on the Install button.
              8. Upon completion shutdown the computer.
    *If your computer came with Lion or Mountain Lion pre-installed then you are entitled to transfer your license once. If you purchased Lion or Mountain Lion from the App Store then you cannot transfer your license to another party. In the case of the latter you should install the original version of OS X that came with your computer. You need to repartition the hard drive as well as reformat it; this will assure that the Recovery HD partition is removed. See Step Three above. You may verify these requirements by reviewing your OS X Software License.

  • About the PIM(Personal Information Manager)

    Hi
    Hello friends
    i will get very important information about the PIM(personal Information Manager)
    that manages the personal database in Handheld devices such as PDA,Mobiles,Cells etc
    also i heard that it (PIM) should be downloaded seperately i search many times on sun's product web but i don't get the PIM
    please tell me where i can get downloaded it the PIM?

    Well directly from the J2ME PIM website ( [http://developers.sun.com/mobility/apis/articles/pim/index.html|http://developers.sun.com/mobility/apis/articles/pim/index.html] ) is this statement:
    "Personal information management (PIM) refers to the ability to manage in electronic form the kinds of personal data that broad classes of users want handy, such as appointment books, contact directories, and to-do lists."
    We're talking about accessing the actual PIM applications on the device (i.e. the Calendar, Contact List, etc. native to the specific phone/pda/device).
    the javax.microedition.pim package is an optional package, meaning it is not part of the core MIDP/CLDC APIs. So, yes, you have to download a separate package and place the library in your classpath in order to compile on your system.
    Now the next problem you're going to run into is "does your target device support this optional package". There is a reference implementation for PocketPC OS from IBM that you can find here: [http://www-106.ibm.com/developerworks/library/j-pda-op|http://www-106.ibm.com/developerworks/library/j-pda-op] . However if you're trying to perform this on a cellphone (for example) the phone's J2ME implementation is going to have to have support for JSR 75 for this to work at all. I don't know where there is a definitive list of phones that support JSR 75, but I believe BlackBerry's with version 4.2 or newer (for example) do support this package. I believe some Motorla, Erickson, Nokia and other phones support this optional package.
    I read somewhere that the following line of code should tell you whether a device supports JSR 75 or not:
    System.getProperty("microedition.io.file.FileConnection.version"); If this returns null then the system does not. If it returns a non-null string, then it does at some level.
    HTH

  • To remove all personal information from an iPhone I am about to dispose of, is it sufficient to use the "erase and reset" command in Settings, or should I do something more?

    I am about to replace an iPhone 4.  I want to make sure that it contains no recoverable personal information, such a contacts, photos, e-mail, etc.  If I use the erase and reset function in Settings will that be sufficient?  Or is there a way to write over the old information in a manner similar to a "secure empty trash?"

    Try What to do before selling or giving away your iPhone, iPad, or iPod touch

  • I need information about personal experience with DFS-R: shortcomings and limitaions of DFS-R

    Hello,
    We plan to install DFS-R in our organization.
    I need information about personal experience with DFS-R: shortcomings and limitations of DFS-R.
    Thank you for any info. 

    Hi,
    You could refer to the articles below to see some limits about DFSR and some DFSR configuration mistakes which will cause DFSR problems:
    Understanding DFS Replication "limits"
    http://blogs.technet.com/b/filecab/archive/2005/12/12/understanding-dfs-replication-_2200_limits_2200_.aspx
    Common DFSR Configuration Mistakes and Oversights
    http://blogs.technet.com/b/askds/archive/2010/11/01/common-dfsr-configuration-mistakes-and-oversights.aspx
    Regards,
    Mandy
    We
    are trying to better understand customer views on social support experience, so your participation in this
    interview project would be greatly appreciated if you have time.
    Thanks for helping make community forums a great place.

  • Please help .. when entering billing information  its saying i need to contact itunes support about payment review transaction . where can i do this . much appreciated

    please help .. when entering billing information  its saying i need to contact itunes support about payment review transaction . where can i do this . much appreciated

    Contact iTunes using the link provided. Or, use the contact information found on the Contact Us page, the link to which is at the bottom right of every page.

  • I'm about to sell my desktop, how can I make sure that all my personal information is removed beforehand?

    I have a Mac os x and am about to sell it to update.  I want to be sure that all my personal information, photographs, music, bank info etc is totally deleted and unrecoverable.  How can I clean my hard drive ?

    Simply erasing and reinstalling is not adequate.  As others have suggested, you should use Disk Utility to do a secure erase before reinstalling.  You also need to do some other things, like making sure to deauthorize the machine in iTunes and include the original Mac OS X install disk that shipped with the machine.  For all the details, see:
    http://www.tuaw.com/2010/09/24/mac-101-preparing-your-old-mac-for-sale-or-recycl ing/
    BTW, people should not be pushing you to mark an answer as correct.  When you determine that an answer is correct, you should mark it as such, but only when you decide.

  • I had my personal information given to the public thanks to a verizon employee

    I went to the verizon store in Arcade, NY on Tuesday August 27 to get a used cell phone. An employee by the name of >>removed<< assisted me. They had a used I phone that I had agreed to get. He transferred all of my contacts and pictures, etc. into the I phone and plugged it into a charger to charge it up before he could activate it for me. The phone was not charging and then he informed me that a piece on the phone was broken and that is why it wasn't charging. He told me that he couldn't let me get that phone because he knew it was broken and I would return with it in a few days because it wouldn't charge. I thanked him for his honesty and left the store with my original phone.
    On September 9 my son gets a call from one of his friends (all of whom are in my contacts) stating that a man called him inquiring about an Iphone that he purchased on craigslist for $150.00. I call the man and he tells me that he purchased the Iphone on craigslist from a man named >>removed<<. He just so happens to work at the verizon store in Arcade, Ny. He tells me that the phone is broken..but we already knew that. also he wasnt able to activate the phone because it was reported lost or stolen. He tells me that he was able to get in touch with us because ALL of my information is still on the phone. ALL of my contacts! ALL of my pictures...EVERYTHING!!!!! I had pictures of my grandson on that phone and for all I know the person or people that have seen this could be pedifiles! I am absolutely aphauled that a verizon employee would do something so serious. I thought personal safety was supposed to be a high priority. I have no clue how many people have had access to my information thanks to him.
    I returned to the verizon store on September 18 and spoke with an employee by the name of >>removed<<. I explained the situation to him. He informed me that he would speak to his manager when he came in later that day and would have the manager contact me that day. I am STILL waiting for a call from the manager.
    On Thursday Sept 19 I contacted Verizon customer support on my phone. I spoke with a representative by the name of >>removed<<. I told her everything and she told me to go to verizon wireless.com and under the contact us link, file a complaint. Well I did exactly as she instructed and there is nowhere to file a complaint. I don't know what to do now. This is a complete outrage! How can a verizon store and employee be allowed to sell a phone that they knew to be broken ,and above, that lost or stolen. And worst of all, how can they just hand over all of my personal information to who only knows who?
    There has to be something that can be done...I just don't know what. I keep getting a run around from everyone. They stole my information!!! Please help!!
    >>Edited to comply with the Verizon Wireless Terms of Service <<
    Message was edited by: Verizon Moderator

    Also file a complaint with the Federal Trade Commission
    >>Post edited to remove discussion of moderation.  Please send a Direct Message to moderator or admin_moderator if you have concerns about moderation.<<
    Message was edited by: Verizon Moderator

  • My email was deleted and I have long since forgotten the password - plus I must have typed personal information in incorrectly... I can't reset my password (email goes to deceased email account) and I have $$$$ left! What do I do?

    My email was deleted and I have long since forgotten the password - plus I must have typed personal information in incorrectly... I can't reset my password (email goes to deceased email account) and I have $$$$ left! What do I do to get access to the remaining dollars?

    You do realize that there are many, many email providers and without knowing which one you are talking about, there is no way to answer your question?
    Which then leads to this ..... Have you contacted your email provider about this? That's probably the best place to start. See what they recommend.

  • False Advertising: Selling Used Tablet as New and Personal Information to the Public

    So last week I purchased an LG G Pad 7.0 for my wife. It was on sale for $126.99. I purchased this tablet as I bought one for myself months back and have been very happy with it. This past Monday it was delivered. My wife called me at work and told me it arrived. I told her that she should open it up and plug it in as most manufacturers say you should give it a full charge before use. I told her that I would get her started on it when I came home.
    Later that evening, I came home and checked to make sure it had a full charge. It did. I then powered up the tablet only to find a message on the lock screen saying, "Contact 865-XXX-XXXX if you find this". Immediately I was puzzled. When I first bought my tablet, it took me through a basic set up of the tablet. Not to a lock screen. I then opened the tablet up to the home screen. Numerous user downloaded apps were installed on the tablet. Ebay, Amazon, Yahoo mail, Home Depot, Holy Bible, etc. After paging through the tablet for a few minutes it was clear that this tablet belonged to someone prior to me purchasing it.
    I'm assuming that "Jeffrey XXXXXX" purchased this tablet and returned it for whatever reason. Needless to say, if I were ever to return a tablet that had personal information on it, I would make sure I did a factory reset on it and make sure all my personal data was removed before returning it. Not to mention if I was the business that planned on reselling this tablet, I would make sure all devices were "clean" of any personal information prior to reselling it to avoid liability issues. This tablet not only has personal information on it but also has this man's private business information on it. The "Quick Start Guide" also has sensitive info written on the back of it.
    Now I purchased this item as "NEW". Not used, not refurbished, not from a "Marketplace" seller. From BestBuy.com themselves. Not at any given point did it state that it was used. In fact, after I realized it was used, I went back to BestBuy.com to see if any changes were made. NONE. I took screenshots of the page. Now it did have options to buy it as "Open-Box" for $117.99 but I never selected it. I then checked my paper invoice and my order details online. Not anywhere was it listed as some type of used product.
    This is now the second time in about a month that I have had issues with BestBuy.com. See below link:
    http://forums.bestbuy.com/t5/Delivery-Installation/Won-t-Deliver-Front-Loading-Washing-Machine-But-I...
    I have spent about $2000 in the past few months at Best Buy. And apperently they want me to take my money elsewhere. I expect to get the new tablet that I purchased and would appreciate a response as soon as possible.

    Dear User123727,
    I find a lot of joy in opening a new product; breaking the seals on the box, taking the protective plastic off the screen and seeing the first setup screen. If I had been in your situation, I am sure I would have shared your distaste in discovering the tablet was previously used. I am sorry for any inconvenience and doubt your recent experiences have caused you.
    Using your email address you provided here on the forums, I was able to pull up the order in question. It appears this item shipped from one of our stores. There is a chance all the steps were not followed if this item was previously returned to that store location and was later shipped to you. When a customer returns any product, a thorough inspection should be done by the Best Buy associate that is performing the return transaction. They should be checking for things like accessories, physical condition and functionality, to name a few. However, if the packaging appeared to be sealed and unopened, an employee would not typically open the product as it would then have to be sold as such. Even if you had purchased an open item version of this particular tablet, it still should have been tested, reset by to the default factory settings, and wiped of any existing data before being resold.
    In an effort to look into this situation for you more, I have sent you a private message to acquire some more information from you.
    Sincerely,
    JD|Social Media Specialist | Best Buy® Corporate
     Private Message

  • What is PIM(Personal Information Manager)

    Hi Friends.......
    i want to know about PIM(Personal Information manager)in J2ME.
    the only thing i know abt it is it's a specific type of API
    but what it exactly?
    also i doing a simple code snipet from Complete Reference Book
    while executing that code on j2me wireless tolkit 2.5.2
    it shows error on it's very first statement;
    import javax.microedition.pim.*
    it is necessary to seperately downloaded the API similar to that of CLDC & MIDP.
    please reply....

    Well directly from the J2ME PIM website ( [http://developers.sun.com/mobility/apis/articles/pim/index.html|http://developers.sun.com/mobility/apis/articles/pim/index.html] ) is this statement:
    "Personal information management (PIM) refers to the ability to manage in electronic form the kinds of personal data that broad classes of users want handy, such as appointment books, contact directories, and to-do lists."
    We're talking about accessing the actual PIM applications on the device (i.e. the Calendar, Contact List, etc. native to the specific phone/pda/device).
    the javax.microedition.pim package is an optional package, meaning it is not part of the core MIDP/CLDC APIs. So, yes, you have to download a separate package and place the library in your classpath in order to compile on your system.
    Now the next problem you're going to run into is "does your target device support this optional package". There is a reference implementation for PocketPC OS from IBM that you can find here: [http://www-106.ibm.com/developerworks/library/j-pda-op|http://www-106.ibm.com/developerworks/library/j-pda-op] . However if you're trying to perform this on a cellphone (for example) the phone's J2ME implementation is going to have to have support for JSR 75 for this to work at all. I don't know where there is a definitive list of phones that support JSR 75, but I believe BlackBerry's with version 4.2 or newer (for example) do support this package. I believe some Motorla, Erickson, Nokia and other phones support this optional package.
    I read somewhere that the following line of code should tell you whether a device supports JSR 75 or not:
    System.getProperty("microedition.io.file.FileConnection.version"); If this returns null then the system does not. If it returns a non-null string, then it does at some level.
    HTH

  • RFC Call Error - from Portal End - For ESS Personal Information service

    Hi,
    I am getting "Syntax error in program SAPLHRXSS_PER_MAC                       ., error key: RFC_ERROR_SYSTEM_FAILURE  " error Message on the portal (ESS--->Personal Information Screen).
    When I did RFC trace analysis (using ST 22) this is what i get.
    Can you let me know what could be the issue.
    We are running HR Backend(Support Pack 15,ecc 5.0).
    Portal (EP 6.0 SP19, ESS 100 (SP 10)).
    Could you please let me know what could be the issue ?
    Syntax error in program "SAPLHRXSS_PER_MAC ".
         What happened?
              Error in ABAP application program.
              The current ABAP program "SAPMSSY1" had to be terminated because one of the
              statements could not be executed.
              This is probably due to an error in the ABAP program.
              In program "SAPLHRXSS_PER_MAC ", the following syntax error occurred
              in the Include "IF_HRPA_PERNR_INFTY_XSS=======IU " in line 114:
              "The type "HRXSS_PER_SUPPLD_SUBTY_INFO_T" is unknown."
              Author and last person to change the Include are:
              Author "SAP "
              Last changed by "C5069405 "
         What can you do?
              Please eliminate the error by performing a syntax check
              (or an extended program check) on the program "SAPLHRXSS_PER_MAC ".
              You can also perform the syntax check from the ABAP/4 Editor.
              If the problem persists, proceed as follows:
              Print out the error message (using the "Print" function)
              and make a note of the actions and input that caused the
              error.
              To resolve the problem, contact your SAP system administrator.
              You can use transaction ST22 (ABAP Dump Analysis) to view and administer
               termination messages, especially those beyond their normal deletion
              date.
              is especially useful if you want to keep a particular message.
         Error analysis
              In program "SAPLHRXSS_PER_MAC ", the following syntax error occurred:
              "The type "HRXSS_PER_SUPPLD_SUBTY_INFO_T" is unknown."
         How to correct the error
              Probably the only way to eliminate the error is to correct the program.
              If you cannot solve the problem yourself and you wish to send
              an error message to SAP, include the following documents:
              1. A printout of the problem description (short dump)
                 To obtain this, select in the current display "System->List->
                 Save->Local File (unconverted)".
              2. A suitable printout of the system log
                 To obtain this, call the system log through transaction SM21.
                 Limit the time interval to 10 minutes before and 5 minutes
                 after the short dump. In the display, then select the function
                 "System->List->Save->Local File (unconverted)".
              3. If the programs are your own programs or modified SAP programs,
                 supply the source code.
                 To do this, select the Editor function "Further Utilities->
                 Upload/Download->Download".
              4. Details regarding the conditions under which the error occurred
                 or which actions and input led to the error.
         System environment
              SAP Release.............. "640"
              Application server....... "srv006"
              Network address.......... "167.116.230.56"
              Operating system......... "HP-UX"
              Release.................. "B.11.11"
              Hardware type............ "9000/800"
              Character length......... 8 Bits
              Pointer length........... 64 Bits
              Work process number...... 1
              Short dump setting....... "full"
              Database server.......... "srv006"
              Database type............ "ORACLE"
              Database name............ "H81"
              Database owner........... "SAPR3"
              Character set............ "en_US.iso88591"
              SAP kernel............... "640"
              Created on............... "May 21 2006 20:29:01"
              Created in............... "HP-UX B.11.00 A 9000/800"
              Database version......... "OCI_920 "
              Patch level.............. "129"
              Patch text............... " "
              Supported environment....
              Database................. "ORACLE 9.2.0.., ORACLE 10.1.0.., ORACLE
               10.2.0.."
              SAP database version..... "640"
              Operating system......... "HP-UX B.11"
              Memory usage.............
              Roll..................... 16128
              EM....................... 4189928
              Heap..................... 0
              Page..................... 0
              MM Used.................. 629192
              MM Free.................. 3558216
              SAP Release.............. "640"
         User and Transaction
         Information on where terminated
              The termination occurred in the ABAP program "SAPMSSY1" in
               "REMOTE_FUNCTION_CALL".
              The main program was "SAPMSSY1 ".
              The termination occurred in line 68 of the source code of the (Include)
               program "SAPMSSY1"
              of the source code of program "SAPMSSY1" (when calling the editor 680).
         Source Code Extract
         Line     SourceCde
            38     
            39     module %_rfcdia_call output.
            40         "Do not display screen !
            41         call 'DY_INVISIBLE_SCREEN'.
            42         perform remote_function_diacall.
            43     endmodule.
            44     
            45     module %_cpic_start.
            46       if sy-xprog(4) = '%RFC'.
            47         perform remote_function_call using rfctype_external_cpic.
            48       else.
            49         call 'APPC_HD' id 'HEADER' field header id 'CONVID' field convid.
            50         perform cpic_call using convid.
            51       endif.
            52     endmodule.
            53     
            54     
            55     form cpic_call using convid type c.
            56       communication send id convid buffer header.
            57       if sy-subrc eq 0.
            58         perform (sy-xform) in program (sy-xprog).
            59       else.
            60         message a800.
            61       endif.
            62     endform.
            63     
            64     form remote_function_call using value(type).
            65       do.
            66     *   test if sy-xprog and sy-xform are set
            67     *   sy-xform = 'quatsch'. sy-xprog = 'quatsch'.
         >>>>>         call 'RfcImport' id 'Type' field type.
            69         perform (sy-xform) in program (sy-xprog).
            70         rsyn >scont sysc 00011111 0.
            71       enddo.
            72     endform.
            73     
            74     form remote_function_diastart.
            75       do.
            76         call 'RfcImport' id 'Type' field rfctype_rfcdia.
            77         perform (sy-xform) in program (sy-xprog).
            78         "Parking position for next request
            79         rsyn >scont sysc 00011111 10.
            80         "ALternativ : Free mode
            81         "COMMIT WORK.
            82         "SYSTEM-CALL FREE MODE 0.
            83       enddo.
            84     endform.
            85     
            86     form remote_function_diacall.
            87         sy-xcode = '%_@no@'.
         Contents of system fields
         Name     Val.
         SY-SUBRC     0
         SY-INDEX     2
         SY-TABIX     0
         SY-DBCNT     0
         SY-FDPOS     0
         SY-LSIND     0
         SY-PAGNO     0
         SY-LINNO     1
         SY-COLNO     1
         SY-PFKEY     
         SY-UCOMM     
         SY-TITLE     CPIC and RFC Control
         SY-MSGTY     
         SY-MSGID     
         SY-MSGNO     000
         SY-MSGV1     
         SY-MSGV2     
         SY-MSGV3     
         SY-MSGV4     
         Active Calls/Events
         No.   Ty.          Program                             Include                             Line
               Name
             2 FORM         SAPMSSY1                            SAPMSSY1                               68
               REMOTE_FUNCTION_CALL
             1 MODULE (PBO) SAPMSSY1                            SAPMSSY1                               30
               %_RFC_START
         Chosen variables
         Name
             Val.
         No.          2     Ty.      FORM
         Name      REMOTE_FUNCTION_CALL
         %_DUMMY$$
                 2222
                 0000
         SY-REPID
              SAPMSSY1
                 5454555322222222222222222222222222222222
                 310D339100000000000000000000000000000000
         SYST-REPID
              SAPMSSY1
                 5454555322222222222222222222222222222222
                 310D339100000000000000000000000000000000
         %_ARCHIVE
                 2222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222222
                 0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
         TYPE
              3
                 0000
                 0003
         SY-XPROG
              SAPLSYST
                 5454555522222222222222222222222222222222
                 310C393400000000000000000000000000000000
         SY-XFORM
              HRXSS_PER_CLEANUP
                 455555545544444552222222222222
                 82833F052F3C51E500000000000000
         %_SPACE
                 2
                 0
         No.          1     Ty.      MODULE (PBO)
         Name      %_RFC_START
         %_PRINT
                  000                                                                                0 ##
                 2222333222222222222222222222222222222222222222222222222222222222222222222222222222222222223200
                 0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
         RFCTYPE_INTERNAL
              3
                 0000
                 0003
         Internal notes
              The termination occurred in the function "ab_genprog" of the SAP
              Basis System, specifically in line 1374 of the module
               "//bas/640_REL/src/krn/runt/abgen.c#10".
              The internal operation just processed is "CALY".
              The internal session was started at 20070502223335.
              Program name.........: "SAPLHRXSS_PER_MAC ".
              Error message........: "The type "HRXSS_PER_SUPPLD_SUBTY_INFO_T" is unknown.".
         Active Calls in SAP Kernel
         Lines of C Stack in Kernel (Structure Differs on Each Platform)
         ( 0)  0x40000000016d6a8c   CTrcStack2 + 0x2bc  [dw.sapH81_DVEBMGS33]
         ( 1)  0x40000000016d67c0   CTrcStack + 0x18  [dw.sapH81_DVEBMGS33]
         ( 2)  0x4000000001d41438   rabax_CStackSave__Fv + 0x100  [dw.sapH81_DVEBMGS33]
         ( 3)  0x4000000001d4dbf8   ab_rabax + 0x1f68  [dw.sapH81_DVEBMGS33]
         ( 4)  0x40000000018cc09c   ab_genprog__FPcPvUii + 0xdbc  [dw.sapH81_DVEBMGS33]
         ( 5)  0x4000000000d3b4cc   newload__FPcP13TmpSubpoolDirUi + 0x29c  [dw.sapH81_DVEBMGS33]
         ( 6)  0x40000000016a7324   ab_LoadProg__FPcUi + 0xec  [dw.sapH81_DVEBMGS33]
         ( 7)  0x40000000016831fc   ab_link + 0x334  [dw.sapH81_DVEBMGS33]
         ( 8)  0x40000000015694d4   ab_rfcimport + 0xccc  [dw.sapH81_DVEBMGS33]
         ( 9)  0x40000000018cff98   ab_jcaly__Fv + 0x598  [dw.sapH81_DVEBMGS33]
         (10)  0x4000000000f98df8   ab_extri__Fv + 0x17a0  [dw.sapH81_DVEBMGS33]
         (11)  0x40000000016ab2d8   ab_xevent__FPCc + 0x38  [dw.sapH81_DVEBMGS33]
         (12)  0x400000000189c9a8   ab_dstep + 0x120  [dw.sapH81_DVEBMGS33]
         (13)  0x4000000000ed4c00   dynpmcal + 0xd0  [dw.sapH81_DVEBMGS33]
         (14)  0x4000000000ed1554   dynppbo0 + 0x1e4  [dw.sapH81_DVEBMGS33]
         (15)  0x4000000000ed0af4   dynprctl + 0x43c  [dw.sapH81_DVEBMGS33]
         (16)  0x4000000000ecb7a0   dynpen00 + 0x2118  [dw.sapH81_DVEBMGS33]
         (17)  0x4000000000fa598c   Thdynpen00 + 0x6a4  [dw.sapH81_DVEBMGS33]
         (18)  0x4000000000fa49b8   TskhLoop + 0x50d8  [dw.sapH81_DVEBMGS33]
         (19)  0x4000000000f999f8   tskhstart + 0x1e0  [dw.sapH81_DVEBMGS33]
         (20)  0x4000000000d42194   DpMain + 0x484  [dw.sapH81_DVEBMGS33]
         (21)  0x400000000220d41c   nlsui_main + 0x14  [dw.sapH81_DVEBMGS33]
         (22)  0x4000000000992794   main + 0x14  [dw.sapH81_DVEBMGS33]
         (23)  0xc000000000020ab0   $START$ + 0xa0  [/usr/lib/pa20_64/dld.sl]
         List of ABAP programs affected
         Index     Ty.     Program     Group     Date     Time     Size     Lang.
              0     Prg     SAPMSSY1          0     06.11.2003     20:53:07         18432     E
              1     Prg     SAPLSYST          1     10.05.2006     09:57:38         30720     E
              2     Typ     SYST          0     04.12.2000     14:54:51         27648     
         Directory of Application Tables
         Name                                     Date       Time       Lngth
             Val.
         Program      SAPMSSY1
         SYST            .  .            :  :          00002404
         ABAP Control Blocks (CONT)
         Index     Name     Fl     PAR0     PAR1     PAR2     PAR3     PAR4     PAR5     PAR6     SourceCde
           118     CLEA     00     0035                                   SAPMSSY1
           119     CLEA     00     0036                                   SAPMSSY1
           120     CLEA     00     0037                                   SAPMSSY1
           121     MESS     00     001C                                   SAPMSSY1
           122     ENDF     00     0000                                   SAPMSSY1
           123     -
         00     0000                                   SAPMSSY1
           124     PERP     00     0001                                   SAPMSSY1
           125     PERP     02     0000                                   SAPMSSY1
           126     WHIL     00     0002     0000     0000     0000     0000     0000     0000     SAPMSSY1
           130     WHIL     00     0003     0000     0000     0000     0000     0000     0000     SAPMSSY1
           134     BRAN     05     000E                                   SAPMSSY1
           135     CALY     00     0003     0038     002A     0005     002B     0000     0000     SAPMSSY1
         >>>>>     CALY     02     0000     0039     8000     0000     0000     0000     0000     SAPMSSY1
           143     xper     02     0000     0010     0011                         SAPMSSY1
           145     PERP     80     0000                                   SAPMSSY1
           146     SYSC     1F     0000                                   SAPMSSY1
           147     BRAX     00     FFEF                                   SAPMSSY1
           148     WHIL     00     0004     0000     0000     0000     0000     0000     0000     SAPMSSY1
           152     ENDF     00     0000                                   SAPMSSY1
           153     -
         00     0000                                   SAPMSSY1

    Hi,
    The error is occuring in the program file SAPLHRXSS_PER_MAC.
    In program "SAPLHRXSS_PER_MAC ", the following syntax error occurred 
    in the Include "IF_HRPA_PERNR_INFTY_XSS=======IU " in line 114:      
    "The type "HRXSS_PER_SUPPLD_SUBTY_INFO_T" is unknown."    
    Information on where terminated                                              
        The termination occurred in the ABAP program "SAPMSSY1" in               
         "REMOTE_FUNCTION_CALL".                                                 
        The main program was "SAPMSSY1 ".
    This place  where it has terminated is highlighted in bold letters.                                       
    form remote_function_call using value(type).   
      do.                                          
      test if sy-xprog and sy-xform are set      
      sy-xform = 'quatsch'. sy-xprog = 'quatsch'.
    <b>    call 'RfcImport' id 'Type' field type.     </b>
        perform (sy-xform) in program (sy-xprog).  
        rsyn >scont sysc 00011111 0.               
      enddo.                                       
    endform.                                       
    Thanks,
    Manoj

  • I unfortunately just got my IPhone 4s stolen.I thought I had the find my iPhone enabled but I didn't because I cannot locate the phone when I sign in ICloud.How can I erase all data on the phone so the thief can't access my personal information.

    I unfortunately just got my IPhone 4s stolen.I thought I had the find my iPhone enabled but I didn't because I cannot locate the phone when I sign in ICloud.I have a password on the phone but i'm not sure if I turned on the option where the phone resets if you incorrectly put the password more than ten time. I immediately called my phone company (Verizon) and reported the phone stolen.So I know whoever took the phone cannot place calls or use the phone. But can they still access my data on the phone if they manage to unlock the phone?  If so how can I erase all data on the phone so the thief can't access my personal information? is there any other way other than Find my IPhone to wipe off the data on the phone? I really don't want my personal information such as pictures, text messages, notes and social networks profile available to a stranger!!? Help please!!!

        Hello thewrongway,
    I'm sorry to hear about your phone!  I understand the need for an active device. You are able to activate an old device and process an insurance claim for your iPhone 4s within 60days from the incident date.  Keep in mind if the old phone is not a smartphone and you currently have unlimited data that feature will fall off.  If you have a tier data plan no changes will be made.  Please let me know if you have any additional questions.  Thank you.   
    TominqueBo
    VZW Support
    Follow us on Twitter at @VZWSupport

  • HT204053 How can I delete my iCloud account which I do not remember anything about the information that I entered about 4 years ago. It always asks my birth date but it seems I did not enter my correct date how can I bypass this question???

    How can I delete my iCloud account which I do not remember anything about the information that I entered about 4 years ago. It always asks my birth date but it seems I did not enter my correct date how can I bypass this question???

    You cannot delete the account from the server (partly to prevent the username from becoming available again and some-one else using it to pretend to be you).. Having disengaged your devices from it, go to http://icloud.com and delete any data in there such as contacts and calendars. Then just ignore it.

Maybe you are looking for

  • Mac os 10.5.6.  vs.  digidesign mbox mini---Garageband wont detect mbox

    I have my Motif ES6 pluged into my mbox mini which is plugged into my macbook....garageband does not detect my interface. i used to upload tracks like this on a older model mac,,,,,it worked just fine....now that i just got this new one...i can't do

  • Quick time for ipod

    somehow, my itunes is frozen due to an error message regarding something about quicktime, which the help line suggested I delete and then reinstall quicktime download specific software for ipod/itunes..I need help...

  • Network Boot (Rescue Mode)

    I need to rescue a OL5 VM guest the other day and discovered you can Network boot into rescue mode by using the following arguments in the boot string. --args rescue http://server/pathtodistribution Just thought I would share. You could always just m

  • No sound with Flash Player (on line only) on Vista

    No sound with Flash Player on both IE and Firefox online only, on Vista. On local hard disk, all is OK. The firefox "about:cache" command on the mp3 file info says : Data size: 0 and in IE it's the same Thanks

  • Monitor MTE Class "CCMS_DB_mcmtc"

    I have one question regarding monitoring of the SAP Systems and the MTE Class CCMS_DB_mcmtc from Solution Manager. In the satellite systems, that are monitored from another Solution Manager, I have the monitor "SAP DB" (Tcode RZ20 --> SAP CCMS Monito