Desk Access 6.2 Pue

Because I updated my laptop and got Windows Vista, I had to upgrade to 6.2.  It is, as one of the other posters noted ... a step backward.  I enjoyed the different colors of categories and made it easier for me to read my calendar.  Next edition, please bring back the colors.   Secondly, I tried to print out "one Category" from my overall calendar.  I could not do it as I did with 4.2.  I put the "wedding" category up [I'm a clergy] to list my weddings for the year.  When I tried to print it, it would only print the full calendar.  What a disappointment.  If I didn't have Vista, I'd go back to 4.2.  Palm, if you are listening, send these suggestions to Desk Access.  I am very disappointed with this version.  I would send this to them myself, but I'm like one of the other bloggers who searched and searched for somewhere to send this.  No luck.   Looks like everyone likes to hide when the product hits the shelf!!!!!!!!!!!!!!!
Post relates to: Treo 650 (Unlocked GSM)

If synchronizing media is not a concern for you then you should uninstall palm desktop 6.2 and reinstall palm desktop 4.1.4e. Although you lose some functionality (e.g. media sync). You gain all the features you lost with your 6.2 upgrade.
Do note that you will still be able to do a drag and drop through windows with a card reader and your SD card to get media onto your device.
Post relates to: Centro (Sprint)

Similar Messages

  • Granting Help Desk access to view Knowledge Articles

    When our Help Desk techs open the Service Manager Console, they cannot view the Library node and hence cannot view the Knowledge node underneath and the Knowledge Articles. Is there a way to grant them access so they only see the Knowledge node and "All
    Knowledge Articles" below that? I took a look at the pre-canned roles and could not find anything that gives that specific a right.

    Hi
    Because Knowledge articles are Configuration Items you can create some own views in the Configuration Item section and give special privileges to those new views. For more information you can also have a look at http://social.technet.microsoft.com/Forums/systemcenter/en-US/9077a6c6-decf-45e1-b523-8697041d8cc8/how-to-give-createedit-privileges-only-for-knowledge-articles-announcements?forum=administration
    Best regards,
    Jochen

  • AD ACCOUNT GETTING DISABLED ALL THE TIME

    Hi all,
    Helpdesk has reported that user account get's disabled all the time & they have to enable it.
    What could be the cause of this & how to troubleshoot.

    Hi all,
    Helpdesk has reported that user account get's disabled all the time & they have to enable it.
    What could be the cause of this & how to troubleshoot.
    Remove the help-desk access to user objects and see if it gets disabled again or not. :) 
    If you have third party tools which manage user accounts, review their configuration. FIM for example is one of the tools that has authority to disable/enable the accounts. Also If I had no clue what is going one I would enable auditing on user objects and
    filter my security event viewer for user changes to see who is disabling them. 
    AD DS Auditing Step-by-Step Guide
    Mahdi Tehrani   |  
      |  
    www.mahditehrani.ir
    Please click on Propose As Answer or to mark this post as
    and helpful for other people.
    This posting is provided AS-IS with no warranties, and confers no rights.
    How to query members of 'Local Administrators' group in all computers?

  • Questions on Authentication, Security, and APEX_PUBLIC_USER

    Hello,
    I’m evaluating APEX and my DBA’s have some questions about authentication and database connections. I have audit tables in my schema (created using Oracle Designer) and I’ve noticed that APEX_PUBLIC_USER is the user recorded in my created_by and modified_by columns. I’ve read several posts about this expected behavior and its solution - (UPPER(NVL(V('APP_USER'),USER)). See:
    Re: User in journal
    Re: DB connection by apex_public_user or by registered schema name?
    How can I store the user name, not APEX_PUBLIC_USER
    I’m ok making the changes in my triggers, but my question is what is the consequence from the DBA’s perspective? If there are 100 users in my application and the DBA’s look at current database connections it will show 100 APEX_PUBLIC_USERs correct? What about any internal Oracle auditing? This is really my first true venture into web style programming. Maybe this is expected behavior.
    I also noticed that there are 157 PUBLIC grants to objects in the FLOWS_030000 schema. This means that any DB account has access to these objects by default. Is this a security risk? I would have expected the objects to be granted directly to APEX_PUBLIC_USER. My company is heavily audited in both in an internal and a Sarbanes-Oxley (Sox) sense. This may not be a concern to everyone, but it may be a concern to us. How do other people explain/justify this?
    Are we expected to not make DB accounts and only create users inside of APEX? I know APEX supports the DB authentication, but I haven’t seen any definitive “best practice” recommendations on this. I have looked at all the documentation here:
    http://download-west.oracle.com/docs/cd/B32472_01/doc/nav/portal_booklist.htm
    Is there more documentation with a better explanation than this?
    Can anyone explain how APEX_PUBLIC_USER has no direct privilege on tables in my schema, yet it is the user recorded for DML changes?
    I know this is alot of questions; we're just trying to get a better understanding of APEX before we make the commitment to begin using it.
    Thanks for the help.
    Message was edited by:
    jabolen

    This FLOWS_xxxxxx schema has enough privilege to do DML in my schema (probably why FLOWS_xxxxxx is locked). Is that about right?
    Sort of. It has privilege to dynamically execute your DML (and other code) using your schema, so it is your schema that parses the code. (search: sys.dbms_sys_sql)
    ...enterprise-level identity management solutions...Is one example of that creating DB accounts? I assume others are SSO, LDAP, etc. Where can I read about the pro’s and con’s of these choices?
    Good topic for another thread: Best tools for managing user populations (tens, hundreds, thousands, internal company vs. internet/public, etc.) One key factor is who's going to do the work and how does that fit with your business, e.g., user forgets password -> user calls help desk (24/7?) -> help desk accesses admin account and resets password...Will help desk admin use EM, Application Express admin app, SQL*Plus, OID admin, ...?
    About authorization and roles, be aware that roles are useful in an Application Express environment only if you have a database user account for each application user (presumably named the same as the account the application user uses to authenticate, regardless of how the username/password lookup is performed, i.e., using the database account's password, LDAP, or something else) and your authorization code has enough privileges to check the current user's default roles, again the roles assigned to the database user account that corresponds to the application user name. This precludes the use of dynamically enabled roles. It also requires your application parsing schema to be able to access global views like dba_tab_privs. So, IMO, it's not the most streamlined approach unless you already have (or don't mind maintaining) a database user account for every named application user, a provision that may be unnecessary to support your authentication (vs.authorization) requirements.
    About ref cursors, there wouldn't be any privileges problems - your application's parsing schema must have the privilege to execute whatever definer's rights packages are to be called and these packages, as you said, would do the DML.. As to other issues involving the use of ref cursors, we'd need to know more about your approach and how you want to define reports. I suggest you build a small prototype app and try it out.
    Scott

  • Adding objects to an object package

    I am using DESKi XI and I am trying to add a .rep report to the CMC so I can schedule it every day in InfoView.
    On page 189 of the BO Enterprise Administrator's Guide it says to open the object package in the CMC, click the New Object button and a list of object tabs will appear. It says to click on the appropriate tab, REPORT or PROGRAM.
    I see icons on the left side of the window for Program, Microsoft Excel and Word, Adobe, Text, Rich Text, Power Point and hyperlink. Nothing for "Report". If I select Program or any of the other choices a browse window comes up so you can identify the location of the object. When I identify the .rep file I get an error warning that it did not expect a .rep extension, do you want to continue? I have said yes, but when scheduling the object it never runs.
    There are other DESKi objects that came with this copy of our CMC, so I know you can load a .rep object...Please help...

    Thank you for getting me on track...I just searched for every reference to EXPORT in that Admin guide and didn't see this anywhere in the document.  I just went to the Deski Access and Analysis guide and found the instructions you referenced.
    I have successfully exported the files and successfully scheduled them from InfoView.  I have a follow-on problem, but I will put it in a new thread so you get credit for solving another problem if you want to...
    Thank you very much!

  • LMS PRIME 4.2 integrating with ACS 4.2

    Hello,
    i would like to integrate new lms prime 4.2 with acs.4.2 . .. !!
    is there document or user guide for this version of lms?
    Thanks in advance.
    Marwan

    IN LMS 4.2 there is nothing which is known as Integration (like LMS 3.x), since it added feature RBAC.
    Now ACS can just be used as PAM to have ciscoworks authenticated for Tacacs+ or Radius. After the auth is done, you should have a authorization set in LMS locally for user, else it will be given a default HELP DESK access.
    For more details check :
    Authentication Using Login Modules - Overview
    -Thanks

  • Service Desk User access

    Hi Experts,
    I want my service desk users login on Solman and they can update Msg status and ther remarks.
    so what are auth. object needs on there profile, please suggest.
    Can we block users access in such a way , they are not able to do add change on other users issue msg.
    bcoz , if i give access on crm_dno_monitor to any user, he may access and process all issue tickets.
    Thanks
    Andrew

    Andree,
    Actually we provide variants for crm_dno_monitor.
    so they have option of seeing only tickets belonging to themselves only
    For e.g create a variant of crm_dno_monitor by choosing mine and then save it and create a ztcode in se93 for the same.
    assign this tcode for the user menu to the respective role of the user.
    So whn this user logs in and click on the link he sees only mine tickets or tickets belonging to him..he doesnt hav access to crm_dno_monitor.
    Pls assign pts.

  • Accessing the service desk message from satellite system

    gurus  ,
    after creating a creating a service desk message to solution manager system via HELP->CREATE SUPPORT MESSAGE ,
    how does the message creator from satellite system will view/change the message created by them at late point of time ?

    Susin,
    the problem is a commonly asked one that I get when I present the Solution Manager to customers. There is always the question: How can the user see the status of the ticket?
    From my point of view you can give them access to the worklist but I guess it is really a pain for the user to log on to SolMan and to access the information from there through a complex transaction.
    Alternatively to provide the user with access to the ticket system, you could consider sending out an email on (all or only critical) status changes from the system bei assigning an activity to the status change. That might be much easier for the user (and for you).
    After looking at and working with work centres I think it would be worth to install the neccesary patch level. It is really beneficial, for the user reporting a problem, as well as for your help desk monitoring their issues.
    Since it is a very common question, and Ruediger seems to be close to the source, can you (Ruediger) maybe provide some information how SAP is going to handle that in the future? Is SAP purely focussing on the work centers in Solution Manager, or is SAP planning on a track & trace possibility within the satellite system for the users?
    I guess there is no easy solution to your problem, but maybe I was able to provide some ideas how to provide more funtionality.
    Cheers
    Markus

  • Grant access to help desk users to add members to distribution and security groups

    Hello,
    I am trying to create a set of help desk users that has full access to add or remove members from distribution and security groups as well as update users.  We want it to bypass owner approval and essentially allow this group to add or remove members
    in the FIM Portal and flow it down to ADS.
    This obviously works fine if one is a member of the Administrators set, but we want a second tier of power users with limitied rights compared to FIM Admins.  We have added the help desk team to the  Security Group Users and Group Users set as
    well as MPR "Security group management: Users can read selected attributes of group resources".
    The help desk users can update users in the Portal with no issue.  The can search groups with no issue but when they try to add members to a group they get the error "Access Denied".
    Any help is greatly appreciated.
    Thanks!

    I'm having very similar problem - I have users with delegated right to modify group membership only. User can add someone to group and it works fine, but when the same user is trying to remove and user from a group (even if this is the same user
    which was added a minute ago) he gets Access Denied:
    The
    request included members which the requestor is not authorized
    to add and/or remove from this group."
    It is caused by default MPR:
    Group management workflow: Validate requestor on remove member
    Question is how this activity validates this request - any insight?

  • "access restrictions" did not work sometimes when using 3-tier DeskI.

    My customer found that "access restrictions" did not work sometimes when using 3-tier DeskI.
    But this issue can be solved by logging on from another machine, or restarting the DeskI.
    For I can reproduce this issue, so I just want to know that:
    1.What is it probably related to?
    2.If this issue happens again, what can I suggest my customer for tracking it?
      For example, get some log files from servers etc.
    Thanks!

    Hi Sarah,
    Also you can try the following solution.
    1. Import the universe.
    2. Go to manage access restrictions
    3. Remove the restriction .
    4. Again create the rescrition and unchecked the " limit size of result set to"
    5. Now assign it to the unlimited results group ( this is the name of
    the group we have given to those users who should be able to retrieve
    more than X rows)
    6. Now we save the universe. (Dont export the universe).
    I hope this will help you.
    Regards,
    Sarbhjeet Kaur

  • When I access the CC desk, the message "You've been signed out" ... WHY ???

    When I access the CC desk, the message "You've been signed out" ... WHY ???

    Andreaunidea please make sure your Creative Cloud Desktop application is up to date.  I would recommend reviewing You are no longer signed into your Creative Cloud applications.

  • Hi i have lost access to my broadband WIFI ( i have BT home hub) and despite trying everything inc turnin everything off, reinstalling onto ipad nothing is working I do have access on my desk top so i dont think its a broadband issue any ideas? miss my Ip

    Hi Twice recently I have lost access to my BT homehub broadband wifi have tried all sorts inc turning everything off from router through tried also to disconnect my Ipad accedd and then reinstall but again no joy Im not very tech savvy so basic instructions please
    I stll have access to broadband on my desk top so i dont think the problem is with provider or router more like the connection between my router and my Ipad
    please can anyone help really lost without my IPad have using my desktop now
    Thanks Ann

    Do you have other mobile devices that can connect to your wifi with out issue?
    Try this:
    Reboot ipad by pressing and holding both the home and sleep/wake buttons at the same time until the apple logo appears on the screen, then let go. Then try to connect to network.
    Go to settings, Toggle airplane mode on/off. Make sure bluetooth is off. Turn on wif (airplane mode off). Try to connect.
    Reset Network Settings
    Go to settings/general/reset/reset network settings. Then try to connect to network.
    If its your home router, then reboot router by unplugging for 5-10min. (do this while you're resetting network settings).
    If problem persists, then check for firmware updates on your router.(you check router manufacturer support website for downloads and instructions).

  • Desk Top Access

    all of my desk top icons are gone and when i tyr to access, error message say that i do not have permission to access desk top??

    Hello Eddie.
    That's a shame, I thought repairing permissions would be sufficient. It could well be a faulty desktop preference file that's causing all the bother.
    Go to Finder and open a new window, then click on the home icon (your name) in the column on the left, click on Library, then Preferences and approx a third of the way down will be: com.apple.desktop.plist
    Drag it onto the desktop and see if everything is hunky dory, if so drag it to the trash and wave it goodbye. If that hasn't fixed it, yikes! I'm stumped. There's some really knowledgeable people on these forums though, so if it doesn't solve the problem I'm confident they'll know what to do.
    Good luck,
    Lou.

  • I have an iMac desk top, iPad, and two iPhones. Someone (a family relative) has somehow copied text messages, and possibly emails from our iPhones, and sent them to other people. He has had access to my wife's iPhone numerous times. Can I check our iPhone

    I have an iMac desk top, iPad, and two iPhones. Someone (a family relative) has somehow copied text messages, and possibly emails from our iPhones, and sent them to other people. He has had access to my wife's iPhone numerous times. Can I check our iPhones to detect any surveillance apps(bugs) on them?

    Whose Apple ID are you using? It sounds like whoever co-opted the account may have changed the security questions as well.
    Follow the instructions here: http://support.apple.com/kb/HT5665
    What should I do if I don't remember the answers to my Apple ID security questions?
    Try answering them at least once to see if you can get them right, even if you are not sure you remember the answers to your security questions.
    If you are confident you can't remember them, try one of the following:
    If you have three security questions and a rescue email address
    sign in to My Apple ID and select the Password and Security tab to send an email to your rescue email address to reset your security questions and answers. 
    If you have one security question and you know your Apple ID passwordsign in to My Apple ID and select the Password and Security tab to reset your security question.
    If you have one security question, but don't remember your Apple ID password
    contact Apple Support for assistance. Learn more about creating a temporary support PIN to help Apple confirm your identity when you contact Apple Support.
    Note: If you have forgotten your password and answer your security questions incorrectly too many times in a row, you will be unable to try to answer your security questions for a period of time. During that time you will not be able to reset your password and will not have access to your account.

  • I have created another user on our iMac but cannot figure out how to access aperture, excel and other purchased applications on the new desk top

    I have created an additional user on our iMac and have tried to set up file share but nothing happens.  I have an empty desktop and only the applications that came with the computer appear.  I'd like to have access to the others that we've purchased... Aperture, excel, etc.  I've followed the instructions for file sharing but I must be missing something. 
    Thanks for any assistance.

    Rebecca1952,
    You are over complicating things.  File sharing has nothing to do with what applications that each user has access to.
    To me it sounds like you just need some basic help getting the applications that you need onto your dock.
    Try this:
    Login to you new user account
    Click on an empty part of your desktop
    Click on the "Go" menu and select "Applications"
    A Finder window should open showing ALL of the applications on the Mac.
    Double-click one of them that you will use frequently (e.g. Excel)
    Once it is up and running you should see it's icon down on your dock.
    Right-click that icon on the dock, then select "Options", and "Keep in Dock"
    Once you have added each application to the dock in this manner, then it will remain there even after you quit the application.
    For one more expert way to launch any application on your mac quickly, try this:
    Hold the [command] key and hit the [spacebar] (this will start a Spotlight search)
    Start typing the name of the application you want to run (e.g. "Aperture")
    Once you see "Aperture" selected, simply hit the [return] key and Aperture will launch
    Hope this solves you problem.

Maybe you are looking for

  • Setting up site-to-site and remote vpn on isa570w

    Hi folks... I have 2 new isa570w's.... I'm setting up two offices with dedicated site-to-site VPN. Have that working great, but the office needs remote access as well to either of the offices. I have been unsuccessful so far in getting this to work.

  • Photoshop Elements 8 quits with OS Lion

    I am having trouble running Photoshop Elements 8 with OSX Lion. Any time I ask for "help" of any kind, the program quits. Anyone know a fix?

  • Trying to View PDF Doc from IE

    Hi.....recently a couple of machines i administer keep getting the following errors when they click on a link to a pdf doc, Object label badly formatted that is what happens when i try to view the pdf through IE......if i turn that of so it actually

  • Allright, this seems a bit silly.

    Hi, I'm currently in the process of getting Java to run on my computer. However(like everyone), Java seems to have trouble finding the .jar files I'm trying to import. Those .jar files ARE in the jblahblah\lib\bin\ext\ directory. The environment vari

  • Does use of mask layer require re-estab of functions

    Am I missing something/doing something wrong, or is this the way Flash works? I have 2 buttons in a movieclip which is on the main timeline. The buttons are on a layer with a mask layer above it. On the main timeline I define 2 functions clip_mc.butt