Difference between Internet connection and ADSL co...

I hope this is the correct forum for this query.
I'm puzzled by the information I'm getting when I look at my Home Hub settings. Under Broadband:Internet I get the following:
Connection time
0 days, 3:32:44
Data transmitted/received (MB)
82.13 / 784.17
But under Broadband:ADSL I get this:
Line state
Connected
Connection time
0 days, 0:22:55
Can someone explain why the difference in connection time?
Solved!
Go to Solution.

I'm not sure I'm ever going to get to a stable connection of 3 days. Going back to my original query, which stat should I look at, Broadband:Internet (currently showing:
Connection time0 days, 1:16:05) or Broadband:ADSL which shows:
Connection time0 days, 0:08:18
Should it be possible to tell from the Event Logs if the hub itself is restarting, i.e. does Broadband:Internet connection time indicate just length of time the hub was connected to the exchange? When I did switch the hub off and on again and then looked at the logs the logs were cleared and started very briefly with a few entries dated 1 Jan. Is this the only way one can tell that the hub has actually restarted?
Also how long are logs kept for? Today my logs only went back as far as about midnight - just tried to confirm that, but lo and behold, logs are showing 1 Jan again, starting with:
00:00:28   1 Jan     WIRELESS interface turned on.
00:00:27   1 Jan    usbmgr: start 0.4.8
00:00:19   1 Jan    KERNEL Warm restart
 then after a number of other entries I get: (reading from the bottom of the list!)
11:36:15   3 Aug     FIREWALL event (1 of 3): created rules
11:36:14   3 Aug     FIREWALL event (1 of 3): deleted rules
11:36:14   3 Aug     xDSL linestate down
11:35:48   3 Aug     SNTP Synchronised to server: XXX.XXX.XXX.XXX
11:35:48   3 Aug     SNTP Systemtime update: time setting 01:03:58 > new time setting: 11:35:48
01:03:44   1 Jan     CONFIGURATION saved by TR69
01:03:17   1 Jan     CONFIGURATION saved by TR69
01:03:08   1 Jan     [CWMP] Connection Request NOT ALLOWED.
01:02:16   1 Jan     FIREWALL event (1 of 15): modified rules
01:02:16   1 Jan     xDSL linestate up (ITU-T G.992.1; downstream: 5344 kbit/s, upstream: 448 kbit/s; output Power Down: 19.8 dBm, Up: 12.1 dBm; line Attenuation Down: 22.0 dB, Up: 12.5 dB; snr Margin Down: 22.0 dB, Up: 14.9 dB)
The logs then continue as normal(ish). This happened while I was out shopping.
I am still wondering if my HH2 is the culprit for the very frequent disconnects, but don't know how to verify that. I did try looking for a replacement power supply online, but the one I need is no longer available in the BT shop - BT HH2 Type A 15v/1.2A, item code 044023. It also seems rather rare on other internet shopping sites, most offer a 12V one. I haven't as yet tried a different cable between hub and filter. Do I need something special there too?
Do I just hang on in the hope that things settle down or should I finally contact BT and aks for help? If the hub is indeed the culprit will I be charged? If so perhaps I should just shell out for a new hub and see if that sorts things out.
Like so many others on this forum and elsewhere getting more than a little cheesed off with a service I'm paying for but not getting.

Similar Messages

  • What is the difference between dropping-connection and reset?

    Hi, Im currently studying HTTP MPF (ASA feature) ,
    im just wondering about the difference between dropping-connection and reset (TCP)
    can you please tell me how it drop and how it reset ? ?? specific process of it ( eg, TCP handshake, etc)
    thanks in advance. !

    Reset sends a tcp response with the rst flag set. Drop sends no response.
    Sent from Cisco Technical Support iPad App

  • Any Difference between internet explorer and Mozilla browser?

    Hi All,
    I m using Jdeveloper 11.1.1.4.0.
    To run my ADF application in internet explorer,its working fine.Suppose i to run my application in Mozilla browser alignment changed.
    Why its coming in Mozilla ?What is that problem?.
    Please any one guide to me...
    Regards,
    Rengasamy.A

    Hi,
    see this links
    http://wiki.answers.com/Q/What_is_the_difference_between_Internet_Explorer_and_Mozilla_Firefox
    http://www.geekinterview.com/talk/7898-what-difference-between-internet-explorer-mozilla.html

  • Differences between jdbc connection and datasource connection

    Hi all
    What are the differences between javax.sql.datasource and java.sql.connection.
    Is the datasource needed on in distributed databases or ??
    In a distributed EJB enviornment, what happens if a component has a transctionattribute setting as SUPPORTS and tries to commit data - will the ejb container start a transaction though the setting is SUPPORTS.
    Thanks in advance.

    Hi all
    What are the differences between javax.sql.datasource
    and java.sql.connection.
    Both are database connections. A connection is a handle to database. When you are directly creating a connection by calling Drivermanager.getConnection(..) , you are creating a connection by yourself and when closing close() on it, the link to database is lost. On the other hand when you get a connection from a datasource, when you call the close() on it, it will not close the link to database, but will return to a connection pool where it can be reused by some other classes. It is always better to use a connection pool because creating connections are expensive
    Is the datasource needed on in distributed databases
    or ??
    >
    You can create datasource to any databse local or remote.
    In a distributed EJB enviornment, what happens if a
    component has a transctionattribute setting as
    SUPPORTS and tries to commit data - will the ejb
    container start a transaction though the setting is
    SUPPORTS.
    hmmm..i am not sure. I think the container sets the commit and rollback points for it . so container will override database settings.

  • Was doing the latest os update on my iphone 4 the update was interuptedby a bad internet connection and now the screen is stuck on an image of the itunes logo with a pic of the usb cord and an arrow in between HELP!!!n

    was doing the latest os update on my iphone 4 the update was interuptedby a bad internet connection and now the screen is stuck on an image of the itunes logo with a pic of the usb cord and an arrow in between HELP!!!n

    or you can try this
    http://www.iclarified.com/entry/index.php?enid=1034

  • What is difference between bex analyser and bex browser

    what is difference between bex analyser and bex browser . please explain what are use of both and what we do in both.

    hi
    Bex Browser
    The Business Explorer Browser (BEx Browser) makes it possible for you to access all document types of the Business Information Warehouse that are assigned to your role or that you have stored in your favorites. You can select and open documents assigned to you in the BEx Browser or store and manage new documents in the BEx Browser.
    Document types that you can work with in the BEx Browser are:
    · BW workbooks
    · Documents that are stored in the Business Document Service (BDS)
    · Links (references to file system, shortcuts)
    · Links to internet sites (URLs)
    · SAP transaction calls.
    · Web applications and Web templates
    · Crystal Reports
    Bex Analyser
    The Business Explorer Analyzer (BEx Analyzer) is the analysis and reporting tool of the Business Explorer that is embedded in Microsoft Excel.
    Features
    You can call up the BEx Query Designer in the BEx Analyzer, in order to define queries. Subsequently, you can analyze the selected InfoProvider data by navigation to the query created in the Query Designer and create different query views of the data. You can add the different query views for a query or for different queries to a work book and save them there. You can save the workbook in your favorites or in your role on the BW Server. You can also save the workbook locally on your computer.
    Beyond that, you can precalculate the workbook and distribute it by e-mail to recipeients or you can export it to the Enterprise Portal and make it accessible to other employees in the company.
    You can start queries in a standard view (with a Standard Web Template set up in Customizing) in the Web browser and forward the URL or continue to navigate on the Web. Similarly, you can export the Web query to MS Excel 2000.
    Overview of the Functional Area of the BEx Analyzer:
    ·        BEx toolbar
    You access the functions of the BEx Analyzer from the BEx toolbar, which takes you to the BEx Open dialog box where you can open existing queries, or to the BEx Query Designer where you can create new queries or change existing queries.
    ·        Evaluating Query Data
    The BEx Analyzer offers convenient functions for evaluating and presenting InfoProvider data interactively. In the BEx Analyzer, you can add queries to workbooks, navigate within them and refresh the data. You can also process the queries further in Microsoft Excel or display them in the Web browser in a default view.
    Navigation of a query allows you, for example, to filter characteristics on a single value, drilldown on all values for a characteristic, regroup characteristics and key figures in the rows and columns of the results area, or hide key figures. Navigation results in different views of the InfoProvider data. In addition, a range of further functions is available which allow you to edit a query interactively (for example, sorting, cumulated output, among others). In addition, you can use the editing functions in Microsoft Excel in order to set up individual format templates, to print results areas, or to create graphics.
    ·        Queries in Workbooks
    Queries are inserted into workbooks so you can display them. When you insert a query, a link is made between the cell areas of the worksheet and the data of the InfoProvider upon which the query is based. A link therefore exists between the Business Explorer and the Business Information Warehouse Server (BW Server).
    When inserting a query into the workbook, a VBA routine is automatically generated in the workbook. You can also connect the Business Explorer with your own VBA programs (Visual Basic for Applications).
    You can create workbook templates, into which you can insert your queries. Workbook templates can contain pre-determined items for the area of the query, formatting settings, logos, VBA macros, and so on.
    ·        Precalculating workbooks
    You can precalculate and distribute workbooks with the BEx Broadcaster, which is a Web application you get to form the BEx toolbar. The system generates MS Excel workbooks with historical data. You determine the time for precalculation yourself: You can have workbooks precalculated at a predefined time or they can be precalculated whenever data in the underlying InfoProvider changes. You can have the precalculated workbooks sent by e-mail or you can export them into the Enterprise Portal, where you can make them available to employees within your company.
    Activities
    To start the BEx Analyzer, choose Start ® Programs ® SAP Front-end Business Information Warehouse ® SAP Business Explorer Analyzer.
    You can also access the BEx Analyzer via SAP Easy Access ® SAP Business Information Warehouse ® SAP Menu ® Business Explorer ® Analyzer or in the Business Explorer Browser using the Business Explorer Analyzer symbol in the menu bar.
    Hope this will solve your issu
    nagarjuna

  • Difference between Seeburger FTP and OFTP adapters

    hi,
    Can anybody tell me the difference between Seeburger FTP and OFTP adapters?
    On what basis should one make a business decision as to which adapter to go for?
    Kindly help urgently.
    Regards,
    Loveena

    Hi ! Loveena
    Seeburger EDI Adapter provides an EDI solution on internet via HTTP or AS2 to replace the expensive VAN. It provides some pre-built mappings for IDOC to ANSI X12(810,850,855,856 etc.,) and Idoc to EDIFACT(ORDERS,DESADV,INVOIC etc.,) and has the ability to build your own. These pre-defined mappings transform the IDOC-XML to EDI-XML format.
    Seeburger Adapters are used to Connect the applications which are using Message protocol/Transport protocol as CrossIndustry(payment), VAN, OFTP, AS2(EDIINT), Generic and EDI based applications.
    Re: Seeburger Adapter
    Reg seeburger seeburger
    installation
    https://forums.sdn.sap.com/click.jspa?searchID=2268965&messageID=3210111
    OFTP ist a communication protocol. This has nothing to do with the format you have to transfer.
    regards the format you have to clear at which standard you have to transfer the messages. This can be any EDI format. At OFTP area the standard are often VDA or ODETTE.
    You can create this messages using different EDI adapters (of course also the mendelson adapter ).
    Regards OFTP you need additional software which handle the transfer based on the OFTP standard. Mostly you also need an ISDN card for using this protocol.
    We can support you with this software for OFTP transport too.
    More info also available at http://www.mendelson-e-c.com/.
    have a look at the ACTIS OFTP Adapter
    Ref: http://www.actis.atosorigin.de/solutions/en/ACTIS_solutions/SAPXI.php
    refer this thread also
    When we need Seeburger AS2 & FTP?
    XI Seeburger adapters
    Adapter for OFTP?!
    Thanks !!

  • Difference between CA-42 and CA-53

    Good Morning
    I want to ask what is the difference between CA-42 and CA-53, and can i use this two cable to connect to the internet.
    Thanks
    rodgen

    Don't think it will be possible due to hardware differences.

  • Difference between WEP, WPA, and WPA2 and better suggestion to use for shared family users

    What is the difference between WEP, WPA, and WPA2? My router is set up on my family PC and connected to a modem so I access Wi-fi through my laptop and my sister has a laptop too and uses our family network to get internet. I just set up a WPA today, so will we all be able to get internet (along with my family using the pc, and my sis on her laptop, even at the same time) protected? (like nobody else using our network)

    Wired Equivalent Privacy, commonly called WEP is 802.11's first hardware form of security where both the WAP and the user are configured with an encryption key of either 64 bits or 128 bits in HEX. So when the user attempts to authenticate, the AP issues a random challenge. The user then returns the challenge, encrypted with the key. The AP decrypts this challenge and if it matches the original the client is authenticated. The problem with WEP is that the key is static, which means with a little time and the right tool a hacker could use reverse-engineering to derive the encryption key. It is important to note that this process does affect the transmission speed.
    WPA builds upon WEP, making it more secure by adding extra security algorithms and mechanisms to fight intrusion.
    WiFi Protected Access (WPA) is the new security standard adopted by the WiFi Alliance consortium. WiFi compliance ensures interoperability between different manufacturer’s equipment.WPA delivers a level of security way beyond anything that WEP can offer, bridges the gap between WEP and 802.11i networks, and has the advantage that the firmware in older equipment may be upgradeable.
    WPA2 is based upon the Institute for Electrical and Electronics Engineers’ (IEEE) 802.11i amendment to the 802.11 standard, which was ratified on July 29, 2004. The primary difference between WPA and WPA2 is that WPA2 uses a more advanced encryption technique called AES (Advanced Encryption Standard), allowing for compliance with FIPS140-2 government security requirements. 

  • Can Anybody explain me the difference between  a Bapi and a webservice?

    Can Anybody explain me the difference between  a Bapi and a webservice?

    Hi Anil,
    <b>BAPI</b>
    BAPI is a library of functions that are released to the public
    as an interface into an existing SAP system from an external
    system.A BAPI function is a function module that
    can be called remotely using the RFC technology
    BAPI are RFC enabled function modules. the difference between RFc and BAPI are business objects. You create business objects and those are then registered in your BOR (Business Object Repository) which can be accessed outside the SAP system by using some other applications (Non-SAP) such as VB or JAVA.
    In this case you only specify the business object and its method from external system in BAPI there is no direct system call. while RFC are direct system call Some BAPIs provide basic functions and can be used for most SAP business object types. These BAPIs should be implemented the same for all business object types. Standardized BAPIs are easier to use and prevent users having to deal with a number of different BAPIs. Whenever possible, a standardized BAPI must be used in preference to an individual BAPI. It is not possible to connect SAP to Non-SAP systems to retrieve data using RFC alone. RFC can acces the SAP from outside only through BAPI and same is for vice versa access.
    <b>Webservice</b>
    In simpler terms, WebService is an application on the Web/Internet. Wheneever Service is requested by the user, it provides the service (i.e Request/Response)
    A web service is a collection of protocols and standards used for exchanging data between applications or systems
    In SAP world, we can expose an application into the Webservice. For e.g We can expose ABAP programs into Webservice.
    XI uses SOAP adapter to communicate with webservices see below...why only soap adpater???
    -> Some remote clients or Web services providers are only able to communicate by means of SOAP messages
    ->SOAP adapter enables you to exchange SOAP message between remote clients and Web Service Servers and the Integration Server.
    -> The SOAP Adapter provides a runtime environment that includes various SOAP components for the processing of SOAP message.
    -> You use the SOAP adapter to connect such systems to the Integration Server directly
    -> The SOAP adapter uses a helper class to instantiate and control these SOAP components
    ->The SOAP adapter receives a msg from the remote client or Web service provider, converts the SOAP protocol into XI msg protocol and then sends the msg to the Integration Server to be processed further.
    Basically  RFCs BAPI are all SAP oriented, Webservices are language / environement independent. So, all one has to do is publish a Webservice and any external system by providing the data in the correct format, can get the approopriate response back.
    see these links to know more abt webservices..
    http://www.webservices.org/
    http://www.w3.org/2002/ws/
    regards
    biplab

  • Difference between Master Idoc and Communication Idoc.

    Can anyone list out the difference between Master Idoc and Communication Idoc?

    IDoc (for intermediate document) is a standard data structure for electronic data interchange (EDI) between application programs written for the popular SAP business system or between an SAP application and an external program. IDocs serve as the vehicle for data transfer in SAP's Application Link Enabling (ALE) system. IDocs are used for asynchronous transactions: each IDoc generated exists as a self-contained text file that can then be transmitted to the requesting workstation without connecting to the central database. Another SAP mechanism, the Business Application Programming Interface (BAPI) is used for synchronous transactions.
    Form and content: IDoc terminology
    As is often the case with proprietary technologies, SAP assigns specific, object-oriented meanings to familiar terms. When referring to IDocs, the term document refers to a set of data comprising a functional group of records with a business identity. (For example, all the data in a purchase order, or all the profile information of a supplier in a supplier master record.)
    A message refers to the contents of a specific implementation of an IDoc; it’s a logical reference. This differs from a reference to the IDoc itself, which specifies the message’s physical representation. Think of it this way: If you’re watching a parade pass by, the mayor waving to the crowd from his limousine is the message, and the mayor’s limousine (which is specific to the mayor) is the IDoc. You’re building a logical object, and the IDoc is both its container and the vehicle that moves it.
    The IDoc control record
    Each IDoc has a single control record, always the first record in the set. The structure of this record describes the content of the data records that will follow and provides administrative information, such as the IDoc’s functional category (Message Type/IDoc Type), as well as its origin (Sender) and destination (Receiver) as in conventional EDI
    Layout of an IDoc control record
    This “cover slip” format informs the receiving system of the IDoc’s purpose, and the receiving system uses it to determine the correct processing algorithm for handling the arriving IDoc.
    Data records
    The data records following the control record are structured alike, including two sections: a segment information section and a data section.
    In the first part of a data record, the segment information section describes the structure of the data that follows, for the benefit of the IDoc processor. There is a segment name (like an EDI segment identifier) that corresponds to a data dictionary structure to which the IDoc processor has access. The remaining information is useful for foreign systems, such as a partner company’s Oracle system, which has no such data dictionary.
    The second part of the record is the data itself, a storage area of 1,000 characters.
    Status records
    If you’ve ever ordered a package from a faraway location and tracked its progress using the Internet-based tracking utilities now provided by most major parcel carriers, you’re familiar with the list of stops and transfer points through which a package passes on its way to you.
    This collection of records is exactly what you’ll see in an IDoc that has begun its work. Following the data records in an IDoc, status records accumulate as an IDoc makes its way from one point in a process to another.
    Typically, an IDoc will acquire several of these records as its does its job. They are simple records, consisting of a status code (there are more than 70 codes, covering a broad range of conditions and errors), a date/time stamp, and some additional status information fields for system audit purposes. In addition, as errors occur in the processing of an IDoc, status records are used to record these errors and the date/time of their occurrence.
    IDoc Base
    IDocs, as data formatting tools, enable the easy sharing of data between databases and applications within a company as well as being an efficient data courier between companies. Typically in SAP, a database of IDoc definitions exists, to which any application may have access.
    This “IDoc Base” gives all the applications and processes in your company domain the capacity to send, receive, and process a document in a contextually appropriate way, without doing anything to the data. For example, a purchase order IDoc can filter through every process it touches, passing from system to system, accumulating status records to track its progress.
    Every department using the data can use it appropriately without any cumbersome intermediate processes, because each department draws its key to interpreting the IDoc from the same source.
    Multiple messages
    One cumbersome feature of conventional EDI is the embedding of more than one functional record type in a document. The unwieldy X-12 888 Item Maintenance transaction set is an example: It purports to handle so many different configurations of product master data that it is horrifically difficult to integrate into an existing system.
    IDocs, on the other hand, handle multiple messages with ease. Given the centralized IDoc interpretation that SAP provides to all its parts, it’s no problem to define an IDoc that will contain more than one message, that is, more than one data record type.
    A customer master IDoc, for example, may contain customer profile information records for a customer with many locations. But it may also contain location-specific pricing information records for that customer in the same document. This is an incredibly efficient way of bundling related records, particularly when passing large amounts of complex information from system to system Records in a multiple-message IDoc

  • Difference between Airport Extreme and Airport Express

    What is the difference between Airport Extreme and Airport Express? My son is home from college and would like to use his Macbook for an online class. So I need a wireless router and I would also like to be able to play our iTunes over multiple speaker locations with my home stereo. Which one of these could accomplish this. Thanks in advance.

    If you can use just one device to both set up a WiFi network and connect to your stereo you have to use an Airport Express. If you have to use separate devices, for instance because your internet connection device and your stereo are not in the same location, you have to use an Express to stream to and you can use either an Express or an Extreme to set up the WiFi.
    By the way you have to use an Express for each stereo you would like to connect.

  • Differences between Sun JVM and Microsoft JVM.

    Differences between Sun JVM and Microsoft JVM.
    I have a very simple applet that I am trying to make compatible with both Microsoft�s JVM and Suns JVM in Internet Explorer.
    However, when I turn on the Sun JVM it works occasionally, but frustratingly on most occasions I get the following error messages:
    In the status bar: "Applet <name> notinited"
    And when I investigate further in the console I get the following output:
    load: class <name>.class not found.
    java.lang.ClassNotFoundException: <name>.class
         at sun.applet.AppletClassLoader.findClass(Unknown Source)
         at java.lang.ClassLoader.loadClass(Unknown Source)
         at sun.applet.AppletClassLoader.loadClass(Unknown Source)
         at java.lang.ClassLoader.loadClass(Unknown Source)
         at sun.applet.AppletClassLoader.loadCode(Unknown Source)
         at sun.applet.AppletPanel.createApplet(Unknown Source)
         at sun.plugin.AppletViewer.createApplet(Unknown Source)
         at sun.applet.AppletPanel.runLoader(Unknown Source)
         at sun.applet.AppletPanel.run(Unknown Source)
         at java.lang.Thread.run(Unknown Source)
    Caused by: java.net.SocketException: Malformed reply from SOCKS server
         at java.net.SocksSocketImpl.readSocksReply(Unknown Source)
         at java.net.SocksSocketImpl.connect(Unknown Source)
         at java.net.Socket.connect(Unknown Source)
         at sun.net.NetworkClient.doConnect(Unknown Source)
         at sun.plugin.net.protocol.http.HttpClient.doConnect(Unknown Source)
         at sun.net.www.http.HttpClient.openServer(Unknown Source)
         at sun.net.www.http.HttpClient$3.run(Unknown Source)
         at java.security.AccessController.doPrivileged(Native Method)
         at sun.net.www.http.HttpClient.privilegedOpenServer(Unknown Source)
         at sun.net.www.http.HttpClient.openServer(Unknown Source)
         at sun.net.www.http.HttpClient.<init>(Unknown Source)
         at sun.net.www.http.HttpClient.<init>(Unknown Source)
         at sun.plugin.net.protocol.http.HttpClient.<init>(Unknown Source)
         at sun.plugin.net.protocol.http.HttpClient.New(Unknown Source)
         at sun.plugin.net.protocol.http.HttpURLConnection.createConnection(Unknown Source)
         at sun.plugin.net.protocol.http.HttpURLConnection.connect(Unknown Source)
         at sun.plugin.net.protocol.http.HttpURLConnection.getInputStream(Unknown Source)
         at java.net.HttpURLConnection.getResponseCode(Unknown Source)
         at sun.applet.AppletClassLoader.getBytes(Unknown Source)
         at sun.applet.AppletClassLoader.access$100(Unknown Source)
         at sun.applet.AppletClassLoader$1.run(Unknown Source)
         at java.security.AccessController.doPrivileged(Native Method)
         ... 10 more
    It appears that the applet never gets loaded. I have no idea why?
    What is the Sun JVM doing here?
    Many thanks in advance for any help.

    Oh, one more thing. Here's the outpt of the VM log when I run the test above:
    Java(TM) Plug-in: Version 1.4.2_03
    Using JRE version 1.4.2 Java HotSpot(TM) Client VM
    User home directory = C:\Documents and Settings\Michael
    Proxy Configuration: No proxy
    c: clear console window
    f: finalize objects on finalization queue
    g: garbage collect
    h: display this help message
    l: dump classloader list
    m: print memory usage
    o: trigger logging
    p: reload proxy configuration
    q: hide console
    r: reload policy configuration
    s: dump system properties
    t: dump thread list
    v: dump thread stack
    x: clear classloader cache
    0-5: set trace level to <n>
    java.lang.NullPointerException
         at sun.plugin.cache.Cache.updateTable(Unknown Source)
         at sun.plugin.cache.FileCache.getMatchingFile(Unknown Source)
         at sun.plugin.cache.CachedFileLoader$2.run(Unknown Source)
         at java.security.AccessController.doPrivileged(Native Method)
         at sun.plugin.cache.CachedFileLoader.getCacheFile(Unknown Source)
         at sun.plugin.cache.CachedFileLoader.load(Unknown Source)
         at sun.plugin.cache.FileCache.get(Unknown Source)
         at sun.plugin.net.protocol.http.HttpURLConnection.connectWithCache(Unknown Source)
         at sun.plugin.net.protocol.http.HttpURLConnection.connect(Unknown Source)
         at sun.plugin.net.protocol.http.HttpURLConnection.getInputStream(Unknown Source)
         at sun.plugin.net.protocol.http.HttpURLConnection.getHeaderField(Unknown Source)
         at java.net.HttpURLConnection.getResponseCode(Unknown Source)
         at sun.applet.AppletClassLoader.getBytes(Unknown Source)
         at sun.applet.AppletClassLoader.access$100(Unknown Source)
         at sun.applet.AppletClassLoader$1.run(Unknown Source)
         at java.security.AccessController.doPrivileged(Native Method)
         at sun.applet.AppletClassLoader.findClass(Unknown Source)
         at java.lang.ClassLoader.loadClass(Unknown Source)
         at sun.applet.AppletClassLoader.loadClass(Unknown Source)
         at java.lang.ClassLoader.loadClass(Unknown Source)
         at sun.applet.AppletClassLoader.loadCode(Unknown Source)
         at sun.applet.AppletPanel.createApplet(Unknown Source)
         at sun.plugin.AppletViewer.createApplet(Unknown Source)
         at sun.applet.AppletPanel.runLoader(Unknown Source)
         at sun.applet.AppletPanel.run(Unknown Source)
         at java.lang.Thread.run(Unknown Source)
    v

  • The difference between an iphone and an ipod touch?

    i want to know if the difference between an iphone and an ipod touch is just that the iphone is like a phone that has internet and is a phone. or what else is it?

    The iPhone includes the same as an iPod Touch but also includes a phone, a camera, and a GPS radio.
    In addition to having internet access via wi-fi, the iPhone also has internet access via the cellular network, so as long as you have cellular reception with the iPhone, you have access to the internet in addition to having access via an available wi-fi network.

  • The difference between system restore and last good known configuration

    hi,
    what is the difference between system restore  and last good known configuration.
    in which situation you use system restore ,and in which situation you use last good known configuration.
    very short answer wil be enough.
    thanks
    johan
    h.david

    Last Known Good Configuration deals only with Starting Windows eg. a bad registry or incorrect driver is preventing Windows to start.It recovers the registry settings of HKEY_LOCAL_MACHINE\System\CurrentControlSet
    While System Restore uses restore points to return your system files and settings to an earlier point in time without affecting personal files. Restore points are created automatically every week, and just before significant system events, such as the installation
    of a program or device driver. You can also create a restore point manually.You can undone system restore but there is no such option in Last Known Good Configuration.
    Last Known Good Configuration is disabled in Windows 8 or,Windows 8.1 by default.
    Try using Last Known Good Configuration if you can't start Windows, but it started correctly the last time you turned on the computer.
    Try using System Restore to return the system to an earlier point in time when things worked correctly.
    S.Sengupta, Windows Entertainment and Connected Home MVP

Maybe you are looking for