How do you clear system and application logs in a server?

Hello all,
How do you clear system and application logs in a server?
thanks,
mike

go to start button,all programs,assosories, System tools T event viewer. now select application & rt click & clear & do not save.similarly do for sytem too.

Similar Messages

  • How do you clear call log

    How do you clear call log without deleting contacts of people you called or you called? On the Droid 2 it says clear but now I have Fasinate and I only saw delete so I clicked delete and it deleted the contacts.Is there a way to clear history of calls with out deleting the person?

    roachman55 wrote:
    Thanks I will look for that as like I said the Droid 2 gave option of clearing call log but what I see on Fasinate is just delete and it deleted contacts that I had called or called me. Thanks again and will check the preferences
    fascinate got option delete, and yeah it deletes but not contacts... only your logs... your contacts are there intact in your contacts...

  • How do you "pause" an open application, like Mac automatically does when the memory is full?

    How do you "pause" an open application, like Mac automatically does when the memory is full?
    I would like to do so proactively when I am not using a certain program but need to keep it open, and I want to free up computer resources.
    In other words, I want to keep a given program open, but stop it from "thinking".

    There is an application that I can only open a set number of times before it expires.  Every time the program closes, you get one less use out of it.  I want to use it as long as possible, so I thought I would just keep it open all the time.  However, it consistently turns on the fan on the computer, so I imagine it uses a lot of resources.  I got the idea after the Force Quit program "paused" it once after getting overloaded with all the apps I had open.  It stopped the fan, and I was able to open it and run it again later with no problems.  The tricky thing with trying to intentionally overload the system is that it's a hit or miss on which open program the OS will pause (to my knowledge).

  • How do you find out what application is generating a plist file in your preference folder?

    I have had two similar warnings come up in Drive Genius 3, a program that I use to manage my drives.  The warnings occur during a daily verification of preferences on my main drive, a 256GB SSD. 
    They state:
    "The preference file at '/Users/me/Library/Preferences/com.analogsolutions.Football.plist' may be corrupted."
    "The preference file at '/Users/me/Library/Preferences/org.machinedevelop.National.plist' may be corrupted."
    Per Drive Genius' advisement, "Corrupted files can cause appplication crashes and should be moved to the Trash." I delete the files, however they are regenerated each day. 
    Q: How do you figure out what application is generating a preference file?  And is there a way to tell if this is a OS generated preference file? 
    I have searched online and cannot find any information about either Analog Solutions or Machine Develop nor am I able to discern what these particular .plist files are for... 
    Q: Are these two .plist files truly potentially harmful?
    Thanks for the Help!
    iMac
    model iMac12,2
    3.4 GHz Intel Core i7
    8 GB 1333 MHz DDR3

    Hi Everyone, sorry for the late response.  I have been monitoring my Preferences Folder; every moment I am on my computer trying to catch what application/process generates these files.  I was hoping to try your suggestions, but oddly enough the offensive .plist files have not returned since the last time I deleted them about a week ago.... strange...
    In any case, I have responded to some of your suggestions and questions that I have information on:
    X423424X wrote: Ok, can you double click the .plist file?  If so it should attempt to launch the Property List Editor (in your Utilities folder).  That way you can look at stuff in the plist.  Maybe (hopefully) there's something in there that can shed some light on who is creating it.   If Property List Editor cannot open the file (some apps create files that have the .plist extension but don't actually create the proper XML format -- probably what ProSoft was alluding to) then try opening it with a text editor.
    The .plist file when opened in text editor contains a string of (what to me seems to be) an arbitrary list of numbers.
    Linc Davis wrote: Those files have been given obfuscated names so you won't know what created them. They must contain encrypted registration data for some third-party commercial software that you use.
    Yes, seems likely...
    Linc Davis wrote: It should be fairly easy to find out what application is creating them, if you really care. Move the files to the Desktop, then log out. Log back in while holding the shift key as you click the "Log In" button. That will prevent your login items from loading, among other things. Open your account preferences and launch the login items one at a time by double-clicking them in the list. After each one, check to see whether the files have been recreated.
    Ran through login, one by one, no luck in identifying the application(s). 
    X423424X wrote: Another thought, lock the plists on the hope that whatever is using them will "choke" and complain about it (no guarantee that will work but worth a try).
    Thanks, the lock idea is the one I will try next if they ever reappear...
    X423424X wrote: Also, I don't recall if I asked this but if those plists are deleted while logged in will they be recreated during that same login session.  Or do they only appear after you deleted them and then and then logged out and back in?  Or do you have to reboot to recreate them?
    Unfortunately I do not know for certain.  Though from all my login/startup/reboot tests I believe that they are not directly linked to starting up the machine or loging in either.
    I'm not really certain why the .plist have not returned.  I haven't uninstalled any programs, though I did run a couple updates for some widgets within the last week; however that was about 3 days after I deleted the last set of .plist files and usually they reappered everyday.  In any case, given that they have not been regenerated I guess my problem is solved per se, at least I am no longer getting that annoying warning everyday.   Still, it's a bit of a mystery  
    Thanks again for all the help!

  • Control the size of Essbase.log and application log

    Understand that there are many message were written to the Essbase.log and application log. Is there any method to control what kind of message to be written to the log file so as to reduce the IO frequency of the server disk folders?
    Thanks for your help!

    CL wrote:
    You might want to think about forcing your BSO/ASO PAG & IND/DAT files to go onto a separate drive volume from your base Essbase binaries. This can be tough to do in a SAN environment as it is difficult to know what is truly where.
    Another option would be to use CLEARLOGFILE to reset the logs (this will delete them every time you stop/restart Essbase, so make sure you archive them if you need log history).
    See: http://download.oracle.com/docs/cd/E10530_01/doc/epm.931/html_esb_techref/config/clearlogfile.htm
    Yet another would be to set SSLOGUNKNWON to false to cut down on the log.
    See: http://download.oracle.com/docs/cd/E10530_01/doc/epm.931/html_esb_techref/config/sslogunknown.htm
    Regards,
    Cameron LackpourThanks! We already separate the log files from the data files but they still in the same hardware server. Yes, in SAN environment we really don't know where it the physical drive.
    Essbase do not have log rotate option like Apache and maybe we should archive the essbase log regularly and clear it up.
    We don't have much unknown member case in our log. Anyway we will investigate the option SSLOGUNKNOWN
    Thanks again!

  • How do you unblock an untrusted application?

    How do you unblock an untrusted application?

    Open the Java pane in System Preferences. A separate application will launch. In the Security tab, check the box marked
    Enable Java content in the browser
    If necessary, adjust the Security Level slider, but if you must reduce the level, do so only temporarily and only if you are absolutely sure of what you're doing. Don't do this to play a game or because a stranger on the Internet asked you to. Java can be dangerous.
    If your browser is Safari, you may also need to make changes to the plugin settings in the Security tab of its preferences window.

  • How do you differentiate PCK and adapter engine

    how do you differentiate PCK and adapter engine?????

    HI Gabriel,
    the PCK is used,if you want to exchange Messages from or to XI. That means for that,you need on the sender or receiver Side a XI System. The one way is,that a XI sends the Native XML SOAP Messages via XI Adapter to the PCK.Then the message can be converted in some other formats,because the PCK has its own Adapter Engine. But there is no IDOC adapter.
    The second way ist,that for example you pick up XML Files with the PCK and transfer it to an XI system in the Native XML Format. With the PCK you can't do a File-to-File Transfer.
    The PCK is a standalone Application,which has its own Monitoring,Configuration and User Management.Instead of that, a decentral Adapter Engine is directly connected to an XI System and is configured centrally in the XI System
    PCK is a mini version of XI. It is used by smaller business partner (who cannot afford to install a full blown version XI) to exchange XI messages with large companies (having an XI installation).
    PCK has its own local Adapter engine.
    Check the following links:
    https://www.sdn.sap.com/irj/sdn/go/portal/prtroot/docs/library/uuid/3f9fc190-0201-0010-0cbd-87f50e404d91
    https://www.sdn.sap.com/irj/sdn/go/portal/prtroot/docs/library/uuid/34a1e590-0201-0010-2c82-9b6229cf4a41
    https://www.sdn.sap.com/irj/sdn/go/portal/prtroot/docs/library/uuid/6f83d790-0201-0010-629d-ab5bf10c94e4
    http://help.sap.com/saphelp_nw04/helpdata/en/8f/d906d01f77fa40a4c84683c3f8326f/content.htm
    http://help.sap.com/saphelp_glossary/en/6d/9c44b95c168e4cb500bb430ec193cc/content.htm
    http://help.sap.com/saphelp_nw04/helpdata/en/99/115281baba404890d2561617a78409/content.htm
    /people/siva.maranani/blog/2005/08/30/pck-cross-sectional-analysis-part-1
    /people/siva.maranani/blog/2005/08/30/pck-cross-sectional-analysis-part-2
    Hope this helps.
    Cheers...
    Vasu
    <b>** REward Points if found useful **</b>

  • How do you return System Time of the local box in FTP command

    How do you return System Time of the local box in FTP command... since I want to output the system time of my local box copying to the FTP server...

    Its asking me to enter a new date... I actually want to return it into a log file since I am using ws_ftp.... but the log files dont have any date time being returned... i just want to be able to echo that date time into the log file... but it doesnt do that... I also tried
    SHELL ECHO %DATE% %TIME%
    but it returns this in the log file
    Processing Line 10 [SHELL ECHO %DATE% %TIME]
    I also tried in my ws_ftp script and it says:
    Processing Line 15 [!Date]
    Sending command [!Date] with parameter []
    !Date
    500 '!DATE': command not understood
    Failure in command [!Date]

  • I bought the iPad and got it home and when I turned it on, all I see is the iTunes logo w/ a usb connector and arrow. How do I clear that and go to the home screen??? HELP!

    i bought the iPad and got it home and when I turned it on, all I see is the iTunes logo w/ a usb connector and arrow. How do I clear that and go to the home screen??? HELP!

    You need to Set Up the iPad... Connect it to iTunes...
    See here for Getting Started...
    http://www.apple.com/support/ipad/
    and here...
    iPad User Guide iOS 5
    http://manuals.info.apple.com/en_US/ipad_user_guide.pdf

  • MVC model in Web systems and applications

    MVC model in Web systems and applications
    Object-oriented design model is experience, MVC idea is a user interface for the original. This article discusses how the major application areas in the new Web design patterns and the use of MVC framework. The article first introduced the concept of design patterns and characteristics, and MVC architecture design concepts and analysis of the MVC framework contains several key models. Based on the characteristics of Web applications on how to use patterns and MVC framework made some design ideas.??
    1. Introduction
    1.1 design model
    Object-oriented technology and the emergence of software applications has greatly enhanced the trusted and software quality. Object-oriented programming than previous models to various programming simple and efficient, but the object-oriented design methodology than the previous design methods to complex and much more skill, a good design should be both on the issue of gender, but also to take full account of the problems and needs sufficient interoperability. In the past 10 years, people in the object-oriented technology and the practical application of research to explore certain issues in relation to the creation of a number of good solutions, the so-called object-oriented design patterns. Object-oriented technology is one of the purposes of enhancing the software trusted, and to design model, design programmes in important positions from a deeper sense of meaning and essence embodies trusted. There are many people in the design model definition, which cited Christopher Alexander is the largest design model definition : Each design model is a tripartite rule, which expresses a contextual environment (Context), a problem and a solution. Design models generally following basic elements : model name, the purpose solution effect 1995-1998 code and related design models. There are several classifications design patterns can be divided into a model based on the purpose (Creational), structural type (Structural) and the type of behaviour (Behavioral) three. It is mainly used in the creation of a model-based object model-based structure to deal primarily with the category or combination of objects, used to describe behavior-based model is the main target for the category or how stress and how to allocate responsibilities. Design patterns can be divided into categories based on the scope and target mode model type model dealing with the relationship between the categories and sub-categories, these relations through the establishment of succession in Translation moment to be finalized, are static. Model is targeted at addressing the relationship between the moment of change these relations in the operation, more dynamic. Model features : through the experience acquired in a structured format to write down, avoid encountering the same problems on the first design, exist in different abstract level, in continuous improvement, can be trusted artificial product for the design and best practice in the world to be combined to address larger issues.
    1.2 MVC framework
    MVC was first used in a user interface Smalltalk-80 China. M representative models Model, representatives maps View V, C representatives controller Controller. MVC trusted code with the aim of increasing the rate of data reduction expressed, the data describing the operation and application coupled degrees. Also makes software Keweihuxing, restorative, expansionary, flexibility and packaging of greatly enhanced. Single-user applications are usually incident-driven user interface to the organizational structure. Staff development tool with an interface painting of a user interface interface code based on user input and then prepare to implement the corresponding moves, many interactive development environment encouraged to do so, because it emphasizes first and then a functional interface. Some software design model is the strategy that will be fixed before the code into the regular system of the final. Result is that the procedures and organizations around the user interface elements in the user interface elements of those moves, data storage, applications and functions of the code is used to indicate the way intertwined. In single-user system code structure can be so, because the system will not demand frequent changes. But for a large system such as large Web systems, or e-commerce systems to be applied. Model by incorporating data from a variety of access and control data can be separated to improve distributed system design. MVC design pattern is composed of three parts. Model is the application object, no user interface. Type in the screen showing that it represents the flow of data users. Controller user interface definition response to user input, the users responsible for the action against the Model into operation. Model View data updated to reflect the adoption of data changes.
    2. MVC design pattern,
    An MVC framework for the design of the system includes many models, but with MVC is most closely related to the following three models : Observer, Cambridge and Strategy.
    2.1 Observer models
    MVC through the use of purchase / notification form and the separation of the Model View. View to ensure that their content accurately reflected Model and state. Once Model content changes, there must be a mechanism to allow notification to the relevant Model View, View can be made relevant at the appropriate time updating of data. This design is also more general problems can be solved, the target separation, making a change to the target audience affect others, which targets those who do not know the details of the object being affected. This is described as Observer in the design model. Model type : Observer model is the object-oriented model, it is behaviour-based model. Model purposes : definition of hierarchical dependence relations between objects, or when a target value of the state change, all its dependent relationship with the object are notified and automatically updated. There are a variety of data may show a way, in different ways and may also show. When a way through a changed data, then the other should be able to show immediately that the data change and do accordingly.
    Effect :
    1. Abstract coupling. I only know that it has a target audience of some observers, the observers met each abstract Observer category simple interface, does not know their specific affiliation categories. This makes the coupling between goals and observers smallest and abstract.
    2. Support radio communications. Needless to notify designated observers goals, how to deal with the observer informed decisions.
    3. Possible accidents updated. We update logic, avoiding mistakes updated.
    2.2 Faculty model
    MVC is an important feature of View can nest. Nest can be used for any type of combination of local maps available, but also management of type nest. This thinking reflects the type and mix of components will be equal treatment design. This object-oriented design ideas in the area of Cambridge has been described as a design model. Model types : Cambridge model is the object-oriented model, it is also the structure type model. Model purpose : to target portfolio into tree structures to express "part-whole" level structure. Prepared for the use and combination of individual target audiences with the use of consistency.
    Effect :
    1. Definition of a target portfolio includes simple objects and the structure of the category level. Simple objects may be complex combinations of objects, and can be targeted portfolio mix. This customer-code used in the target areas can use simple combinations target.
    2. Simplify customer-code. Needless to know their customers - a mix of target audiences is a simple target or can use these items in a consistent manner.
    3. Easier to add new types of components. New components can easily be changed to a combination of customer-targeted codes.
    2.3 Strategy model
    Another important characteristic is the MVC can not change the View of changes View response to user input. This often requires a change in response to the logic of the system is very important. MVC to respond to the logic involved in the Controller. Controller of a category level structure could easily change to the original Controller appropriate, a new Controller. View Controller son used to achieve a specific example of such a response strategy. To achieve different response strategy, as long as examples of the use of different types of replacement will Controller. Also in the running time by changing the View Controller for users to change View of response strategies. This View-Controller relationship was described as an example of Strategy design pattern. Model types : Strategy model is the object-oriented model, it is behaviour-based model. Model purposes : definition of a series of algorithms, and their packaging, and ensure that they can replace each other, making algorithms can independently use its customer-change.
    Effect :
    1. Strategy category levels for Context definition of the relevant algorithms can be trusted or behaviour.
    2. Alternative methods of succession. If the direct successor Context, with different acts will be added Context act, the realization of which would algorithm mixed up with Context, Context hard to preserve and expand, but can not dynamically changing algorithms. Will be enclosed in a separate Strategy category algorithms to enable algorithm independent Context change easily cut over expansion.
    3. Can provide the same acts different date.
    4. Strategy-must understand what customers between different.
    5. Context and Strategy communications between costs.
    6. An increase in the number of targets.
    3. MVC in Web application system
    Now some of the distributed systems such as Web-based B2B e-commerce system, suitable for use MVC framework. Through analysis from the perspective of high-level applications can be a target divided into three categories. Category is shown for the target audience consists of a group of commercial rules and data, there is a category that is receiving requests to control commercial target to complete the request. These applications often need to change is shown, such as web style, color, but also need to demonstrate the contents of the display. And the business rules and data to be relatively stable. Therefore, said that the frequent need to change the View objects that the business rules and data model to be relatively stable target, and that the control of the Controller is the most stable. When the system is usually issued after the View objects by artists, designers or HTML/JSP system managers to manage. Controller target applications development personnel from the development and implementation of rules for commercial and business development personnel from the target data, database managers and experts in the field of common completed. Show in Web?? or customers - control logic can be Servlet or JSP, dynamically generated Html. Generally used Servlet better than using JSP. JSP will be better with the Html code of separate codes for page designers and developers of separation efficiency. Servlet and JSP can complete all complete functions, actually JSP eventually converted into a Servlet. And control of the target system exists in every level, the coordination of cross-layer moves. Contain business rules and data objects exist in the EJB layer (EJB-centred model) or Web?? (Web-centred model).
    3.1 View in the Web application system
    View of the system shows that it fully exist in Web??. General by JSP, Java Bean and Custom Tag. JSP can generate dynamic web content using Java Custom Tag easier Bean, but it can show the logic of packaging, and more conducive to modular trusted. Some well-designed in a number of JSP Custom Tag can even be used in different system duplication. Model for control of JSP and Java Bean objects. JSP through Java Bean objects to retrieve the data model, the Model and Controller object is responsible for updating the data on Java Bean. In general, can we devise all possible screen that users can see all the elements of the system. Based on these elements, to identify the public part of passive components and dynamics. Can consider the use of templates means to separate the content generated JSP public, also need to change their generation Html or JSP from a JSP templates to dynamically introduce these different parts (include methods). Another issue to consider is screen option, when dealing with End users request template automatically available to show that the concern that users must know what is the screen components. So can consider all screens on the definition of a centralized document, such as a document or text document java. Taking into account the possibility of changes in future document definition screens, the best use of text documents such as a XML document, so future changes to the recompilation. According to the URL and user input parameters to shine upon the results of a screen, of course, likely to be made on the basis of the outcome of the implementation of actions to choose different results screen. Therefore, the need for a request for matching resources with document (XML), if a URL request several different results, it must specify in the document need to control the flow (a controller object), as well as the corresponding screen different flows.
    3.2 Model in the Web application system
    Model objects represent business rules and business data exist in EJB layer and Web??. In J2EE norms, the system needs some data stored in the database, such as user account information (account model), the company's data (company model), some not recorded in the database. If a user browsing the current catalogue (catalog model), the contents of his shopping (shopping cart model). Which one of these models exist in the data according to their life cycle and scope to decide. In Web?? a HttpSession and ServletContext and Java Bean objects to store data in the EJB layer is a data storage and logic EJB to. Web?? the Java Bean objects stored in the model layer model of the EJB object data copy. Because there are many different EJB tier model targets, so Web?? through a ModelManager to control the EJB layer object model in ModelManger background model can be used for packaging methods. In the EJB layer and the rules have all the data into EJB model is inappropriate. If the database can visit the Dao object model into objects. Dao can be encapsulated and the specific details of the database in the world, if we can write a different table, a number of databases, or even multiple databases. If the orders can be a model for OrderDAO, it may have to deal with Order table, table and OrderItemLines OrderStatus table. Value can also consider the use of targets. Value can be a target of securing long-range targets, because every time the remote object attributes could be a long-range redeployment process will consume network resources. EJB objects in the distance can be used instead target. In the distance, one-time items to be targeted instead of the value of all attributes.
    3.3 Controller in Web application system
    Coordination with the Model View Controller object to the request of users into the system to identify incidents. In Web?? generally a MainServlet (or Main.jsp), and receiving all requests, it can use screen flow management devices (ScreenFlowManger) decided next screen. There is a general request processors RequestProcessor contains all requests are needed to be done to deal with logic, such as the request translated into system events (RequestToEvent). Acting processors usually also includes a request for ClientControlWebImpl, it is logical to deal with the EJB layer in Web?? Acting. In EJB layer, a layer for EJB tier Web ClientController provide the CD visit. Another StateMachine used to create and delete ejb handle Web?? sent to the incident. Controller Another important function is synchronous View and Model data. ModelManger contained in a ModelUpdateManger, it puts events into a Model System assembly that all the needs of synchronous Model, and then notify Listeners do synchronous operation.
    4. Concluding remarks
    In recent years, with the Internet technology development and the emergence of new business models, the Web is based on a large number of applications. On how to design these systems architecture, and gradually there has been some convergence of opinion, the most important point is that its structure should be rational in the open. Demand than ever faster development of technology and design concepts, systems for the future, the cost of upgrading the smallest, research software systems architecture still very useful and necessary.

    Bravo. And your point is?

  • How do you clear google search history

    How do you clear google search history. I tried the clear history in settings and all the old searches are still there

    In Safari, use the open book symbol to go to bookmarks. At the top of the list is "History", tap history and then tap the clear button on the bottom left of the screen.  That clears the search history as well.

  • After updating to iOS 8 the number 1 appears on the settings icon. My software is updated but the 1 will not go off. How do you clear this?

    How do you clear the notification 1 on the settings icon?

    Double click your Home key and swipe up on the Settings screen to close it. Also, you can try going to the Update screen and clicking "Check for Updates" again to see if that will turn it off. I know this happened to me once, and it is annoying, to say the least! I don't remember exactly what I did to fix it but it was one of the options I provided....I may have had to do it several times. Sorry - it was awhile ago, and I don't remember which one worked!
    GB

  • Why are system and application sound files appearing in itunes?

    Suddenly, over 900 system and application sound files, each about a second or 2 long, have appeared in my iPhone 4S music player. They've also appeared in my iTunes on my desktop iMac. Not sure whether they appeared on the computer first or on the phone first. I can't figure out why they appeared there or how to get rid of them (without also removing them from the system and applications which, of course, I don't want to do).
    I searched through the discussions here and found several other people complaining about the same thing, going back a couple of years, but no solutions offered. I hope someone can offer a clue.

    Thanks for the suggestions and help. While the cause of this problem is still obscure, we've managed, with an Apple tech's help, to remove the system/application sound files from both the iPhone and iTunes. We used Time Machine to backtrack to the point at which the sound files first appeared in the iTunes folder, then moved back one more day and restored the iTunes Media folder (where all the music was stored) and 2 iTunes files: iTunes Library.itl and iTunes Music Library.xml (we could also have simply restored the entire iTunes folder with the same effect). Then we synced the iPhone.
    As for the cause, that's still a puzzle. From Time Machine, we were able to determine that the files were added between midnight and 12:47 AM on a particular day, but that computer was not in use at that time (the user was asleep in bed, and the only other person in the house at the time was me -- and I don't touch that computer).

  • For the iPad, using OS  7.02, how do you now close an application?

    For the iPad, using OS  7.02, how do you now close an application?  When I double click, go to the task bar and touch on the icon, it no longer gives me the option to close the application.  Do you no longer need to quite an application?

    Double tap the home button and swipe upwards on the preview of the App (not the App Icon)

  • I just installed Yosemite, now I can't clear history without clearing cookies. how do I clear history and keep cookies?

    I just installed Yosemite, now I can't clear history without clearing cookies. How do I clear  history and keep cookies?

    I think you guys make a great point, I too don't like how my cookies are erased when I clear history and have to use the go around. Just a reminder and I'm sure you all know, this is a user to user forum and Apple may or may not get to see your opinion. I think you should let them know. You can leave them feedback at the following url. https://www.apple.com/feedback/safari.html
    Hope that helps,
    Weston

Maybe you are looking for

  • Report generation toolkit conditional format - how to?

    Hi We are using the Report generation toolkit (2010 version), and have a question regarding this tool. I see functions for setting the number format, but not a conditional format. Does this not exist? http://zone.ni.com/reference/en-XX/help/372120A-0

  • Problems combining 2 pages into 1

    OK, we have our department letterhead as a .pdf file (created in MS Office and saved as .pdf) and we have a fillable fax coversheet form created in Adobe Acrobat 9.0 and LiveCycle Designer and saved as a .pdf.  We need to combine these two into one d

  • Oracle taking 100% CPU usage

    Hi, I have a situation. I am trying to execute a big query by involving 3 tables (joins). The query is taking about 20 minutes time to execute. While the query is executing the CPU usage for ORACLE is 100%. Please put somelight on this as of to why t

  • WRT350N Storage Password Access in Vista

    This might be a known problem 'cause I saw at least one other thread where this was mentioned. I have a USB drive connected to my WRT350N and a share setup on the router. I can mount the drive locally via "Map Network Drive" and \\192.168.1.1\MyDrive

  • O My God! Can somebody Please Help Me!

    Right, for day's now I've been trying to get my email form in flash CS3 to work. And it just isn't doing it for me. I'm not getting it sent to my email. Can some one please just spell it out for! My server uses php4, my email address is correct in th