How are user points calculated? I'm missing some.

Recently I noticed that my user points is at 0, which odd because I've been around for a bit, and I know I've made at least one contribution to the community. So I looked up a discussion I was on where I had given a correct answer. I also took a screenshot. Its pretty funny, because something just doesn't add up at all.

There is/was a known bug during the change-over from AD to ASC. Several of us actually LOST points! On the last day of AD, Friday April 15, 2011, I had 515 points. On Saturday night, April 16th, when ASC went live, I now had only 505 points! Anyway, I've earned a further 30 points in the last month, so I'm now at 530. There is a thread on this:  https://discussions.apple.com/thread/3002188
Since you answered the question while we were still under AD, the suggestion that you marked your own post as "Correct" is invalid as that was impossible to do under the AD system. That ability was added as part of ASC but it does not earn you points.
So what can you do? Well, hopefully a host will see this and correct it, but don't hold your breathe. I'm STILL waiting to hear back from them myself about my missing 10 points.

Similar Messages

  • How are shipping point and delivery note connected ?

    I wanted to understand how is shipping point connected to process of creating delivery notes....can we configure sap using SPRO such that the delivery note creation happens automatically for certain shipping point once the order is created and saved ....and for certain shipping point the delivery note is not automatically created ( assuming we are using the same order type) but the determination of automatic DN creation is done by the value of the shipping points ??

    Actually what is shipping point?
    Shipping point is an independent org.unit which is linked to the plant and represent the point of departure or receipt of materials.
    Normally lot of shipping points are assigned to the plant.
    Relation:
                   Actually a delivery is created from a single shipping point only.. That is the reason when u complete the sales order, at the time of creating the delivery note, u are forced to enter the shipping point, without that the system willn't proceed further.
    Determination:
    It is determined with the formula of shipping conditions + loading grp + deliv. plant
    Answering to ur 2nd query,
    when u are creating the delivery from the sales order screen (by going to menu bar and click delivery), the system automatically assumes the shipping pt is from the sales order.
    But if u enter the different shipping point in delivery note creation, the system will thro an error that delivery split due to diff. shipping points.
    Hope i clarify ur queries, ur further queries are welcomable.
    Reward points if useful...
    regards
    Kaleeswaran

  • Itunes charts- how are these charts calculated?

    how are music charts calculate?

    Thanks Robert, I thought it was something like that.
    On a further note, when you say 'new subscriptions', do episodes have to be fully downloaded to count?
    For instance, if a user subscribes to a podcast, but for whatever reason doesn't actually finish downloading a single epsiode, would this carry the same weight as a user who subscribes and downloads five episodes of another podcast?
    Further to that, do you know if users are identified from their iTunes ID, or their IP? For instance, if a three people with seperate music store accounts but on the same network were all subscribed to a podcast, would this only count once or would they each count?

  • How are user groups defined in Mac OS 10.x

    Thus far, my guess is that Mac OS determines which users are members of particular pre-defined groups.
    For example, if I want to give other users in my home network read and write permissions to a particular folder, I might add the pre-defined group 'netuser' to group in the get info window and give the group right and write permissions.
    I am correct in this?
    I used to administer a Windows NT server and workstations and could give permissions to domain users, as opposed to local users on the various machines.
    I imagine it might be pretty much the same if I had Macintosh server software installed or whatever.
    My chief concern is understanding permissions in relation to Qmaster distributed processing with a home network.
    Advice and clarifications are most welcome.
    --Cris

    Thanks for the link to the ars tecnica site article on permissions and acl's.
    Actually, I am quite happy with Unix group limitations. I am just still trying to understand how to create a group, and users to the group, and to control how new folders and files are given permissions inside their parent folders.
    Can you recommend an article that explains how to create new groups, and associate users with groups?
    I now have a case where I am trying to figure out how to use QMaster for distributed processing. I was observing problems writing to the second computer, a service node. Even when the first machine, client and cluster controller, was not listed in the upper pane of QAdmin as belonging to the cluster, cluster storage would default to the first machine. So, I made the second machine a cluster controller and service node as well, and sent a job from my first computer, the client, to a cluster that only had the second computer. This worked. Only problem, is that the new folders and file written in the cluster storage assigned to a folder on the second computer have ownership and group changed to the user which is my log in (admin) on the first computer. That in itself wouldn't necessarily be a problem save that I cannot delete the files from the first machine as my account doesn't have necessary permissions. Perhaps that is because earlier, in a botched effort to get Qmaster to work for me, I had created a local account on the second machine with the same name as my admin account on the first machine. That account is now deleted, and I have reset Qmaster preference many times since then, so this is may be a red herring.
    The Apple document "Distributed Processing Set-up" says:
    "All the computers in a cluster need Read and Write access to any computers (or storage devices) that will be specified as output destinations for files."
    I'm just not sure how to go about that.
    Thanks,
    Cris

  • How are users associated to service principals?

    Hello,
    I am trying to implement Kerberos authentication on a Windows machine and have trouble understanding how users are mapped to service principals.
    I understand that the ktpass or Setspn tools are used to associate a service principal to an Active Directory account because a service that is being secured by Kerberos needs to be mapped to an Active Directory account(e.g. account X). So, when executing a command from either one that account X only is mapped to the service principal.
    Now, say user user1 having account Y tries to access the service corresponding to the above service principal.
    My question is how does Kerberos know that account Y is allowed to access the secured application? How can I associate account Y with the above principal?
    Thank you,
    Savvas.

    savvas.andreas wrote:
    right..I think I see what you mean. So, it is true then that any user who has logged on to his/her windows account can access any application on the domain they've logged on to because they are authenticated against that domain?Yes, that is correct if no further action is taken.
    One thing that still confuses me though is why does that second phase in Kerberos authentication needs to be applied? What I mean is that from what I was able to read, at a very generic level, Kerberos employs a two-phase process:In the first phase the client authenticates itself through the "Authentication Service" of the "Key Distribution Centre" and receives back a Ticket Granting Ticket (TGT). But then, in the second phase the same client requests a "Service Ticket" from the "Ticket Granting Service" of the "Key Distribution Centre" by presenting the TGT acquired earlier. If any authenticated user is allowed to access any resource why is that second phase (specific to the service for which access is requested) necessary? wouldn't just the first authentication phase suffice?
    I appreciate your solution and it's something we also considered initially but we were hoping Kerberos would provide this process for us :)No it wouldn't. After the first phase the client is only known to the KDC. No service is aware of any client. With the creation of a specific service ticket the service knows that the user is seriously trustworthy. Kerberos is based on a shared secret which means only the KDC knows that the client and user are real. The KDC acts as a trusted 3rd party. That's why all import authn goes thru it. Read this artice for further clarification: [http://simple.wikipedia.org/wiki/Kerberos_%28protocol%29]

  • How are users getting the flashback virus

    I don't have a virus, but I sure don't want to expose my computer.  So how is the virus downloaded?  What do I watch out for?

    Mac OS X versions 10.6.7 and later have built-in detection of known Mac malware in downloaded files. The recognition database is automatically updated once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders. In most cases, there’s no benefit from any other automated protection against malware.
    The most effective defense against malware is your own intelligence. All known malware that affects an up-to-date Mac OS system takes the form of trojans that can only operate if the victim is duped into running them. If you're smarter than the malware attacker thinks you are, you won't be duped. That means, primarily, that you never install software from an untrustworthy source. How do you know a source is untrustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” or “certificate” that comes from that same site, or an unknown site, merely in order to use the site, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim.
    “Cracked” versions of commercial software downloaded from a bittorrent are likely to be infected.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. No intermediary is acceptable.
    Disable Java (not JavaScript) in your web browser(s). Few websites have Java content nowadays, so you won’t be missing much. This setting is mandatory in Mac OS X 10.5.8 or earlier, because Java in those versions has bugs that make it unsafe to use on the Internet. Those bugs will probably never be fixed.
    Follow these guidelines, and you’ll be as safe from malware as you can reasonably be.
    Never install any commercial "anti-virus" products for the Mac, as they all do more harm than good. If you need to be able to detect Windows malware in your files, use ClamXav — nothing else.

  • How are user-entered MIME applications defined to open certain file types. This used to be standard in browsers.

    In the not-terribly-recent past, browser Preferences allowed users to create associations between a file type (really, a file extension indicating its type) with an application used to run that type of file. Firefox seems to have buried this (on the Mac) in ~/Library/Application Support/Firefox/... ;in which seem to be an xml file.
    Is it possible to edit this xml file directly, and if so, where in the xml file should a new entry be placed, and what is the explicit syntax of an entry (other than obviously copying present entries)?
    These used to be called MIMEs.

    I am trying to use a rather older programming language called Mozart, an extension of OZ. I installed it as a binary, but instead of storing its component binaries in a place like /usr/local/oz/bin/. they are all enclosed inside the /Applications/Mozart.app/Contents/Resources/bin/. which cannot be opened nor can a soft link be made to it located outside the Mozart.app wrapper.
    The only alternative is to try to edit the mimeTypes.rdf files, and give it the full path name to the inside of Mozart.app were the program used for web applications is stored. It is stored in ~/Library/Application Support/Mozart/, which can only be accessed in more recent Mac OS X by going to finder and holding the Option key while opening the Go menu; this will make the ~/Library visible and accessible.

  • How are users provisioned?

    User's are provisioned through LDAP. In a standard configuration in which Sun ONE Messaging Server 5.X is the mail server, users would typically be provisioned using Sun ONE Delegated Admin (iDA). iDA creates users in LDAP. In a portal server deployment, the portal administrator would provision users with the Identity Server Console which uses an internal LDAP directory to provision users.

    Hi aapl.crox have a look at this pdf and use it as a guide, it is written for tiger but should be basically the same.
    http://www.wazmac.com/quickstarts/pdf/osxserver/tiger/090_clientsetup.pdf
    There is also some 10.5 documentation here http://www.wazmac.com/serversnetwork/fileservers/osxserver_setup/osxserver105setup.htm that is worth looking at too.
    Cheers.

  • Are points calculated correctly?

    It seems that either the point calculation is off (for some users?) or the point information is not displayed correctly in 'Your Reward Points'. For example, in one user's profile (the name can be disclosed, if requested by a moderator) I see the following information:
    Date range: 08/18/2007 - 9/17/2007
    Points of date range: 872
    But in the details only the following points are displayed:
    Forum points - 104 in total (only one page)
    Additional points - 20.
    Nothing in the Blog, Article or Code contributions.
    This is only 124 points. So where are the other 872 - 124 = 748 points are coming from? Is the point system rigged or is some information about how the points have been earned hidden?
    Just wondering...

    > So what should I do(nice things). Should I start
    > buying ice-creams for all the mentors??
    I don't like Ice-creams too much...so no thanks -:)
    What I mean with "nice things", it's write some interesting Junior Blogs or Blogs, participate actively in the forums, submit interesting suggestions or comments...and everything does needs to be done on SDN -;)
    Of course....we can't be everywhere...If you have done "nice things", sooner or later your going to get points... -;)
    Greetings,
    Blag.

  • How are APO/R3 dates calculated

    Hi All,
    In APO, for a PO, we have ' Requirement date', 'Availability date' and in R3, we have reqmnt/rect date and delivery date.
    How are these dates calculated from a reference?
    My understanding- System takes the requirement date( date on which there is a reqmnt for the material), subtracts a time equal to GR+GI time and arrives at Availability date. the same Availability date is transferred to R3 as 'Reqmnt/Rect date'. But how is the delivery date in R3 calculated?
    suppose I have a requirement date in APO, what are the details that I need to calculate successive dates?
    Regards
    Manotosh

    Hi,
    I have one confusion pls. clarify.
    Requirement date=Date of demand on which material is required.
    Delivery date= Date of demand- planned delivery time /transportation duration
    Availability date= Delivery date+GR process time.
    In product veiw in APO you will see as  availability date and receipt date.
    For more information follow the link
    http://help.sap.com/saphelp_scm50/helpdata/en/cd/6dec39554c7f58e10000000a11402f/frameset.htm
    Santosh

  • How are document elements getting populated.

    I'm trouble-shooting a new Oracle Apex application developed by my predecessor. I see that some variables are being populated by document elements, i.e. var method = document.getElementByID(tlineid).value;
    How are the document elements being populated?
    Some of the places I've looked on the page (Home>Application Builder > Application 147 > Page 4):
    The entire HTML Header;
    All of the regions;
    All of the items;
    The process
    The branch;
    The Lists of Values and
    the Templates.
    Where am I missing?

    Also check the buttons, report column links, application processes (shared components) etc...
    What actions trigger the elements to be populated? Start tracing the events from there.
    Is it a database procedure? Default value, function on the item being populated? or DML automatic fetch on a table database?

  • How to get real time information about how many user are logged in and thei

    I use tomcat as my server platform in Ubuntu for a war file.
    I know in order to get real time information about how many user are logged in, we can count how many active sessions exist by a SessionCounter code. However, I have to permit HttpSessionListener in web.xml of tomcat. From other users' experiences, the configuration is complexed and has some errors.
    Here's the link:http://www.stardeveloper.com/article...1112001&page=1
    In order to get users' ip, in jsp, use request.getremotehost() or
    request.getremoteaddress() by editing the jsp file.
    I wonder if there's some open source software to use for these two purposes.
    Thank you!

    That url is missing a few bits. The ... in the middle doesn't help.
    we can count how many active sessions exist by a SessionCounter code.
    However, I have to permit HttpSessionListener in web.xml of tomcat.
    From other users' experiences, the configuration is complexed and has some errors.And have you tried it? The configuration isn't that complex.
    What errors do you mean? Errors in tracking people, variance in the count? Probably related to internet issues and nothing you can do will alleviate them.

  • How many break points and watchpoints are allowed in ECC 6.0

    Hi,
    Can any one say how many break points and watchpoints are allowed in ECC 6.0

    Hi ,
    A breakpoint is a signal at a particular point in the program that tells the ABAP runtime processor to interrupt processing and start the Debugger. The Debugger is activated when the program reaches this point.Max 30 breakpoints we can use.
    There is a special kind of breakpoint called a watchpoint. When you use watchpoints, the Debugger is not activated until the contents of a particular field change ie...Watchpoints allow you the option of monitoring the content of individual variables.The Debugger stops as soon as the value of the monitored variable changes.You can use max of 5 watchpoints.
    Difference
    1. Break Point.
    At particular LINE of SOURCE CODE,
    the system will STOP there.
    2. Watch Point.
    If you want to interrupt a program when the contents of a field or structure change, use a watchpoint. You can set up to five watchpoints, including watchpoints for strings.
    (For this, we have to give some
    VARIABLE NAME & VARIABLE VALUE - with relational operator)
    When this CONDITION gets satisfied,
    (anywhere during the execution of the program),
    the system will AUTOMATICALLY STOP THERE.
    (EG when the value of matnr reaches the specified value)
    That is the purpose of WATCHPOINT
    (the system will WATCH it, like a dog)
    Please go through this link:
    Watchpoint Vs breakpoint
    http://help.sap.com/saphelp_nw04/helpdata/en/c6/617cdce68c11d2b2ab080009b43351/content.htm
    Like a breakpoint, a watchpoint is an indicator in a program that tells the ABAP runtime processor to interrupt the program at a particular point. Unlike breakpoints, however, watchpoints are not activated until the contents of a specified field change. Watchpoints, like dynamic breakpoints, are user-specific, and so do not affect other users running the same program. You can only define watchpoints in the Debugger. Watchpoints allow you the option of monitoring the content of individual variables.
    The Debugger stops as soon as the value of the monitored variable changes.
    In addition, conditions can be specified. The Debugger also checks whether such a condition is fulfilled.
    For more details...
    http://help.sap.com/saphelp_nw04/helpdata/en/c6/617cd9e68c11d2b2ab080009b43351/frameset.htm
    http://help.sap.com/saphelp_nw70/helpdata/en/f1/792442db42e22ce10000000a1550b0/frameset.htm
    If satisfied, rewards me..
    Kind Regards
    Yogesh

  • How the user credentials are transported using BusinessObjects SDK

    Hi, I would like to know in detail how the user credentials is passed with the java call (logon). Are they encrypted during the transport? Which mechanism (protocol, technology) does the sdk use to provide security for the user credentials?
    Thanks

    The BusinessObjects Enterprise SDK communicates with BusinessObjects Enterprise servers using a proprietary CORBA framework via TCP/IP. 
    This is so inter-server and server-client communication can be done transparently from the perspective of the API whether all services are on one or multiple machines.
    You can configure BusinessObjects Enterprise services to use SSL through this communication.  How you would do so is described in the Admin Guide.
    You'd configure the SDK as you would the servers in as described in the Admin Guide.
    For the BusinessObjects Enterprise Java SDK, that means specifying the four Java System Properties (as you would for Java InfoView) to point to the SSL configuration files.
    That takes care of the connection from the SDK to Enterprise.
    Set-up of secure communication from web browser to web app using the SDK is a separate matter.
    By the way, the BusinessObjects Enterprise SDK is fully tested an supported only when used in a web application.  Desktop and standalone apps using the Enterprise SDK are untested.
    Sincerely,
    Ted Ueda

  • How many users are there of Logic?

    does anyone know where I can find out how many users there are globally of Logic Pro. I'm doing an assignment on this and I can find sales figures for DAW software anywhere....

    You can or can't find sales figures?
    It is also rumoured that there are many non legitimate users out there too. Please note however, I am not one of those.
    Anyway, what is the assignment for? ie What's the gist, requirements and subject matter? Just interested.
    Regards,
    Matt

Maybe you are looking for