Have your mac announce who has sent you an e-mail

Hi Guys,
I am not sure if I am asking this correctly, but I am wondering is there a way for me to make my iMac announce WHO has sent me an e-mail? Like I can have it announce the time.. can I have it say "you've received an e-mail from dad" just to give you an example, is there a way to do this? With the built in software, or does there exist a 3rd party software for this, does anyone know? Much appreciated.

Check out this hint: http://www.macosxhints.com/article.php?story=20030304111345916
Scroll down a bit as the script was refined a bit. You basically need to write an AppleScript and then create a rule that runs the script on all new messages.
Hope this helps.

Similar Messages

  • I have found a person who has a driver software to connect Labview with PCI card. But he says that i need to download a freeware software to configure the PCI card. But you have mentioned that freeware is for GPIB boards. Is it correct ??

    I have found a person who has a driver software to connect Labview with a general PCI card. But he says that i need to download a freeware software from NI website to configure the PCI card. But you have mentioned that freeware is for GPIB boards. Is it correct ?? Is there any other way out ??

    I would ask the person who told you about the freeware software to help you find exactly where it is. I am not aware of any freeware software for configuring motion PCI cards but maybe the person you know might be able to help you locate it.

  • How to stop //ANDROID:${from} has sent you a Sprint Voice Message. Call ${callbackno} to listen.?

    I keep getting this text message on my ipone4s every hour.
    //ANDROID:${from} has sent you a Sprint Voice Message. Call ${callbackno} to listen. CFGs1840.0=0fb15457cd82d2573628IAkhiRv//CM
    Does anyone know how to stop this. Sprint has no idea and it's really annoying.

    They have an auto-SMS sending program running that has your phone number in the list. Talk to your carrier about it. - ÇÇÇ

  • Mavericks is installed and runs well, but how long should I keep the small windows "Optimizing Your Mac" ? It has been now one month!!!

    Small window "Optimizing your Mac" (see below) has been on my Desktop for over a month now.
    How long should I keep it (... without "impacting the performance or the battery life")?

    Closing it when it first appeared wouldn't have stopped the 'optimization' so you could have closed it any time and can do so now - in any case optimization will have long since completed.

  • After updating to mavericks on my MacBook, the screen keeps saying "setting up your mac." It has been like this for hours! How can I make it go faster?

    After updating to mavericks on my MacBook, the screen keeps saying "setting up your mac." It has been like this for hours! How can I make it go faster? It's has been like this for 4 hrs.

    I don't think your mac is setting up. It's stuck.
    I would:
    hold the power button until it shuts down
    unplug all peripherals
    do a safe boot (restart and hold down the shift key until you see the apple logo).
    If it starts up in a safe boot, then you can try restarting with a normal boot.
    If it does not start with a normal boot, then you probably have some incompatible third party software. Likely culprits are:
    MacKeeper
    CleanMyMac
    third-party antivirus software
    any other "cleaning" or "optimizing" or similar third party "utilities".
    A good place to start would be to uninstall any of those (while in safe mode) and then restart.

  • This program has been blocked for your protection/ An Administrator has blocked you from running this program/ Return code: 1625

    This program has been blocked for your protection/ An Administrator has blocked you from running this program/ Return code: 1625
    If you get a message saying, “Publisher: Not trusted,” the printing functionality you are attempting to use may become blocked while downloading, installing or attempting to run.
    You may also see messages such as:
    MSIExec installation error (Return code:1625)
    The recommended software listed below could not be installed
    “Do you want to allow the following the program from an unknown publisher to make changes to this program”
    “This program has been blocked for your protection”
    “Blocked”
    “Not trusted”
    The Windows User Account Control message may look like this.
    You may get this message when installing, uninstalling, or updating HP software for Windows from the product CD, from software previously downloaded from www.hp.com, or from running HP Smart Install by connecting a printer via USB cable.
    The solution will vary depending on the products that you are using. Here is a helpful document for HP printers that will walk you through what you can do.
    John
    I work on behalf of HP.

    Hey @kat54 ,
    Welcome to the HP Forums!
    I understand you're receiving an error stating "This program has been blocked for your protection."
    You can read about this error here: "Blocked", "User Account Control", "Not trusted", or "Return code: 1625" message in Windows.
    You will find a link for Printers here which directs you to the HP Update Software Utility to resolve the problem. When you install this utility ensure you select version 5.005.002.002 or later.
    Make sure the utility you've downloaded is for your exact product and operating system.
    If this does not resolve the issue please call our technical support at 800-474-6836. If you live outside the US/Canada Region, please click the following link to get the support number for your region: Phone Assist Worldwide.
    Thanks!
    Please click the "Kudos, Thumbs Up" at the bottom of this post if you want to say "Thanks" for helping!
    Please click "Accept as Solution" if you feel my post solved your issue, it will help others find the solution.
    The Great Deku Tree
    I work on behalf of HP.

  • I currently have a MAC Mini, which has 1 Firewire 800 port.  I have a 1TB external hard disk that runs at Firewire 400.  Can I insert another external hard drive that runs at Firewire 800?

    Here's the deal.  Currently running SL 10.6.8 on a MAC Mini.  Planning for eventual upgrade to ML.  Have a 1TB external hard drive partitioned into two volumes, one volume for Time Machine and one volume for SL which I periodically update using Superduper.  Thus I always have a point-in-time bootable backup on the external hard drive.
    The MAC Mini supports Firewire 800.  However, booting from my current external hard disk is pretty slow, since it only supports Firewire 400.  I am considering buying an Iomega MiniMax which supports Firewire 800.  Then, I would use the MiniMax as my bootable backup volume, and relegate the older hard drive to Time Machine. 
    So, question #1 is, can I daisychain the new MiniMax between the MAC Mini and my existing external hard drive?  My expectation is that the new Mini Max would run using Firewire 800 and that the existing hard drive would run at Firewire 400 speed as it does today.  If it doesn't (e.g., daisychaining in the Firewire 400 external disk with the MiniMax Firewire 800 external disk ends up running the whole leg at 400), my resolution will be to run the existing hard disk off an available USB port and have just the MiniMax running at Firewire 800.
    Why am I going to all this trouble?  That's question #2.  I don't trust upgrades; they always break something.  When I upgraded from 10.5.x to 10.6.x, the web directories got renamed, and all of my web apps 403'd until I figured out what happened.  Plus, I have accounts for other family members, and in order to ensure their ability to use the computer during my upgrade process, I need to have the ability to fall-back quickly to a known-stable version of OSX.  So what I'm trying to do is insulate myself from problems by partitioning the MiniMax into two volumes, taking a Superduper image of my current installation on the Mac Mini to MiniMax external drive volume 1, then upgrading to ML on the MAC Mini, and take a SuperDuper image of that to MiniMax external drive volume 2.  Then, if the upgrade results in problems I can't resolve immediately, I can simply reimage the MAC Mini from MiniMax volume 1.  BUT ...
    ... I've read that the ML installation creates a "service and support" partition that is different than the startup disk.  I'm concerned that I won't be able to reimage the hard disk in the MAC Mini once I upgrade it to ML because of the partitioning changes it introduces on the startup disk.  Theoretically, I +should+ be able to use the disk utility on my SL system to repartition the disk in the MAC Mini prior to reimaging it from my backup, but I'm considering the possibility that the new partition may be of a type that the SL disk utility cannot identify, and might therefore be unable to delete or even detect.  So I'm hoping someone else has been down this road and can advise me.  Even at Firewire 800 speeds, booting from an external disk is still going to be slow, so I want to be able to restore my SL image to the MAC Mini hard disk.
    A little background on me.  I work for a major disaster recovery provider.  I used to have a Mac PRO G5, which I got used, and the first thing I did with it was install a second hard disk, SuperDupe an image from the first disk to the second, and made sure I could boot from the second.  THEN I started using and customizing the MAC.  I really feel vulnerable with the MAC Mini, since it only has the single internal hard drive - sort of like going out in public dressed only in a long T-shirt.  So my whole thing is, I ABSOLUTELY MUST BE ABLE TO PUT THINGS BACK THE WAY THEY WERE before I do the migration to ML.
    Obsessive-cumpulsive?  Yep.  Anal?  You got it.  That's why I'm in the DR business.

    You may have overloaded the port, following the instructions below it should reset:
    +1. Shut down the computer.+
    +2. Disconnect all devices and all other cables, except the keyboard and mouse cable(s).+
    +3. Disconnect the computer from the power outlet and wait for 3 to 5 minutes.+
    +4. Plug the computer back in and turn it on.+
    +5. Reconnect the device(s) (one at a time if there is more than one) and test. Test with each port if you have more than one.+
    http://support.apple.com/kb/HT1317?viewlocale=en_US

  • Recieving a 'Your Apple ID password has been reset.' e-mail every few days

    Greetings!
    I have an inactive Apple ID that has been dormant for over two years. A few months ago I began receiving Your Apple ID password has been reset.
    e-mails every few weeks. Changing my password resolved the problem...for a couple of weeks. About two weeks ago I started recieving the 'password reset' e-mail every second or third day. I change my password and a day or two later...same e-mail. I looked for a 'delete account' option in the Apple ID section of the Apple website but could not find one.
    My main Apple ID (the one I am currently using) is safe but I don't like the fact that my old account is being accessed regularly. There must be a way to delete the old account permanently. Thanks in advance to anyone who can point in the right direction.
    Cheers!
    jj

    You'll have to contact apple support and see if they can delete the apple ID for you

  • Who is the person who has inspired you the most?

    Hi,
    The person really inspired me is Mother Teresa.
    Who founded the Missionaries of Charity in Kolkata (Calcutta), India in 1950. For over 45 years she ministered to the poor, sick, orphaned, and dying, while guiding the Missionaries of Charity's expansion, first throughout India and then in other countries.At the time of her death it was operating 610 missions in 123 countries. She won the Nobel Peace Prize in 1979 .
    Here I would to like share two quotes of Teresa, with my SCN freinds..,
    Everytime you smile at someone, it is an action of love, a gift to that person, a beautiful thing.
    I am a little pencil in the hand of a writing God who is sending a love letter to the world.
    Thanks,
    Naveen Inuganti.

    My DAD..
    I want to give a word of Thankfulness to my Dad.Who Inspired me by his way of Trust,Belief,Confidence,Love,Care and Generosity..I never thought in my life that i will become a SAP consultant or even a some position in IT.I was just strolling without any scope or Goal after my degree..I just learnt everything from 3D Studio Max to Mainframe to SAP ..& he gave me all the support from money to words..never asked me a question like why you are doing ?? where is the money?? and that is the trust & belief he had in his son..he asked me to go & stay away from home he thought only then i can concentrate..he was supporting me all through my hard days without any fuss..whatever thing i needed..he gave me without any question even during his hard days.And i think even i didnt have that confidence on myself as my dad had on me.The place now i stand is purely because of my DAD(next to my God).
    Thank You DAD..
    Cheers
    Andrew

  • After Boot Camp erases your Mac OS partition, how do you re-install the OS?

    Boot Camp not only erased my Mac pertition but created one big Windows partition. Now when I go to re-install the Mac OS it does not recognize any hard drive and will not install.
    According to another post, it will not allow you erase erase the HD and reformat. Does anyone have any solutions for this???

    Use the install disc. Once the MacOS installer loads up, go to the (I believe) utilities menu and launch disk utilities. You should be able to erase the disk and repartition it at that point. Make sure you to to the options tab and select GUID partition scheme.
    Glor

  • I need to have your help movung my bookkmarks.Can you call me so I can explain the problem?

    I have paid " OBOWL " to clean -up my computer and reset it,but they could not restore my old bookmarks list like I had before. I told them in the past that I would go to a restore point to get them, but as I suspected, they told me this would mess up all the work that they had done. They said these files were from Firefox and I would have to see if you could help me. Please give me a call at xxx-xxx-xxxx. Wayne Overby I would like to know if you are receiving this message.

    Firefox keep everything in firefox profile, if you didn't delete that folder, you can able to restore your bookmarks, password etc.
    Try these
    *http://kb.mozillazine.org/Lost_bookmarks
    *http://kb.mozillazine.org/Backing_up_and_restoring_bookmarks_-_Firefox

  • I have a mac mini that has os 5.8, can i update to snow lepord?

    I have an old mac mini with on OS 5.8, c I update to snow lepord?  Bought a new printer and it needs 6.0 as a minimum.

    Choose About this Mac from the Apple menu and check the processor.
    If it's a PowerPC Mac, it's already running the newest OS it can.
    If it's an Intel Mac, click here, buy the DVD, back up your system, install it, and run Software Update.
    (102940)

  • In chat I am unable to reply to someone who has sent me a message, it does this on facebook, and other sites that I use? I can send messages until they reply and then I need to refresh the page before I can reply. Any idea what is wrong?

    When I am on facebook or any form of live chat I am able to send messages only until I get a reply. One my friend replies I cannot send another message back until I refresh the page. Any ideas why this is happenig? I usually use explorer and have never had this problem there.
    == This happened ==
    Every time Firefox opened
    == I started using firefox as my browser

    "Yahoo Application State Plugin version 1.0.0.7" might be bad; But it could also be that you have an old version of FF(sometimes old versions don't have good Javascript handling), try downloading the [http://www.mozilla.com/en-US/firefox/firefox.html newest] one.

  • Do you need avg on your mac

    just need to know if there is really a need for an anti virus on a macbook pro using mavericks... and if so, is avg a good one. thanks

    1. This is a comment on what you should and should not do to protect yourself from malicious software ("malware") that circulates on the Internet. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to your computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
       3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandboxing security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some red flags that indicate danger.
    Software from an untrustworthy source
    Software of any kind is distributed via BitTorrent or Usenet.
    Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website.
    Rogue websites such as Softonic and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    The software is advertised by means of spam or intrusive web popups.
    Software that is plainly illegal or does something illegal
    Software that you would otherwise have to pay for is "cracked" or "free."
    An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission.
    Conditional or unsolicited offers from strangers
    A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    You win a prize in a contest you never entered.
    Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    Unexpected events
    You open what looks like a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file or message.
    An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
       6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. New threats are emerging on a daily basis. Research has shown that most successful attacks are "zero-day" — that is, previously unknown. Recognition-based malware scanners do not defend against such attacks.
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware, and even for that use it's not completely effective. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular trojan it is, but do you really care? In practice, there's seldom a reason to use the software unless an institutional policy requires it. Windows malware is so widespread that you should assume it's in every unknown email attachment until proven otherwise.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither should you assume that you will always be safe from exploitation, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. "Hmmmm, this torrent is a crack of that new game I want. I think I'll download it. It could be a trojan, but the antivirus will warn me if it is." Then they wonder why their Mac is so slow all of a sudden. It's slow because it's running flat out mining bitcoins for a hacker who has already sold their credit card number and banking passwords to a criminal gang. Maybe a week later the antivirus does warn them, but what good does that do?
    Nothing can lessen the need for safe computing practices.

  • Error Message: Your mac osx startup disk has no more space available for application memory.

    Hi everyone:
    I have a 2010 27" imac.  Dual Core i3, 3.2 GHz and 8GB of 1333MHz DDR3 RAM, and a 90% empty 500 GB Hard Drive.  Running Snow Leopard 10.6.6
    I have received a message intermittently since I got the iMac.  The Force Quit menu comes up and says "Your mac osx startupdisk has no more space available for application memory".  Sometimes there are a few applications open.  Sometimes none.  Whenever I look in the Activity Monitor Utility I see 2 or 3 gigs of RAM still available for use, and lots of hard drive space. 
    Im not sure why I'm getting the message, nor what to do to rectify it.  Quitting applications, like it suggests doesn't seem to help.
    I am grateful for any advice.
    Lauren

    Hey Lauren.
    First of all you do have some software updates you should be doing. 10.6.7 came out a few weeks ago. Sometimes doing all of your software updates resolve issues such as this.
    To check for software updates click the Apple and then Software updates.
    As this issue is someone broad, I would test one of the articles below to narrow down your issue.
    http://support.apple.com/kb/HT1199?viewlocale=en_US
    http://support.apple.com/kb/TS1388?viewlocale=en_US
    Let me know if you need extra ideas.
    Regards,
    Britt.

Maybe you are looking for

  • Please check the code for me

    DATA :Begin of itab_reqid occurs 0,       objid like hrp1001-objid,        end of itab_reqid,       Begin of itab_postid occurs 0,        postid like hrp1001-objid,        end of itab_postid. Select distinct objid from hrp5125 into table itab_reqid  

  • Freeze, freeze, freeze  HELP

    My cursor moves but doesn't affect anything. I click on the icons and nothing happens, i can't gtet anything to work. I've restarted a few times, but still nothing. Anybody???? Help??????

  • IDVD 5 - Burning a NTSC version using PAL content

    HELP! I want to create an NTSC DVD in IDVD 5. I selected NTSC in the preferences also under Project Info. I then imported Quicktime files and burnt a disc - The problem is I'm in a PAL region and when I play it on my DVD player - it plays! whereas it

  • Assistance in getting chrome google for iMac 2010

    How to get google chrome from Apps Store for mac 2010?

  • Microsoft Azure Site Recovery VM Metadate Replication

    Hello, We are in a process of investigating azure site recovery for On-Premise to azure replication, but we have seen strange behavior with our VM's after the initial replication. We installed a new VM with single disk .vhdx (containing the operating