How to determine which cell the user has just left?

I want to check the contents of a JTable cell just after the user has left that cell.
What is the most reliable way to determine which cell the user has just left?

Hi,
I use the cellRenderer for that... if the value is not correct, I call an editCellAt() method...
JRG

Similar Messages

  • Is it possible to create a variable that tells you which slides the user has visited?

    Hi there.
    I'm working on a project where I want a slide to show a continue button and hide 2 textboxes, but ONLY when the user has already visited 2 other slides. I can only find variables that tell you the slide the user previously visited.
    Is it possible to set up a variable that does this?
    I want to create the following advanced action:
    If the user has visited slides 62 AND 87, show image_536 and hide text_caption_243 and text_caption_242
    I don't want the action to happen if only 1 of the 2 slides have been visited - it has to happen when both have been visited.
    Hope that makes sense.
    I'm using Captivate 7.
    Thanks.

    You will need two variables, it can be booleans. I'll label them v_one and v_two with a default value of 0
    Since I don't know how the slides are formatted, do you use a Next button or are all the slide frames visited? You'll need to have an event on those two slides to trigger an action:
    Assign v_one with 1     on slide 62
    And a similar action on the other slide to toggle v_two (do not use the toggle command, if the user visits a slide twice, it would be toggled back to 0).
    You didn't specify where those text containers have to be (please, label your objects and slides)? But you'll need conditional advanced action triggered by another event somewhere:
       IF v_one is equal to 1   AND
           v_two is equal to 1
      Show text1
      Show text2

  • How to determine which AD server User Profiles is pulling from?

    I have a User Profile set up, and can't recall specifying an AD server.
    I've been asked to run multiple UP incrementals during the day. The SharePoint and SQL server seem capable of handling it, but I forgot to check performance of the AD server(s) during the nighly incremental.
    How would I determine which AD server is being used, so I can test CPU and memory?
    Thanks,
    Scott

    Go to:
    C:\Program Files\Microsoft Office Servers\14.0\Synchronization Service\UIShell\miisclient.exe
    On the Operations tab, if you look at any of the operations, there is a Connection Status box in the middle right. This contains the DC that it has connected to.
    Trevor Seward
    Follow or contact me at...
    &nbsp&nbsp
    This post is my own opinion and does not necessarily reflect the opinion or view of Microsoft, its employees, or other MVPs.

  • How to findout Which are the User Exist had been activated for T.Code

    Hi Everybody,
    -->I want to know, what are the user exits have been activated or used for a particular t.code.
    --> I will give a small example it will be give clear idea on my question.
    -->For my client, they used lot of user exist and screen exist in the sales order screen,how to find out them. Is their any easy way to find out which are user exist had been acitviated for a particular template.
    Regards,
    Madhan

    If you mean how to see a user list with the T-Code they are using.
    Then you can just use T-Code SM04.
    It will give all the information about those user.
    Or If you mean User Exists.
    then please use this link
    http://www.sap-img.com/abap/a-short-tutorial-on-user-exits.htm
    Thanks,
    Sugauli
    Edited by: Sugauli on Dec 11, 2008 9:20 PM

  • HRPAD00INFTY - How to determine what action the user took (IN_UPDATE)

    Greetings, Experts.
    I've been asked to modify an existing BAdI for infotype 0167. The existing code is in method IN_UPDATE.  FYI, we have to use this method (as opposed to, say, AFTER_INPUT) since we have to make sure the user completed the operation as we're modifying data in another infotype based on their action.
    As such, the  logic depends on what the user is doing, i.e., inserting, updating, delimiting or deleting a record. I was testing different scenarios in PA30 to see what the value of IPSPAR-ACTIO would be and got some puzzling results.
    For example, I used the Edit->Copy feature in PA30 to copy and then delimit an existing record and was expecting an ACTIO of "LIS9" (Delimit) but it was "MOD". Similarly, I used the trashcan to remove an existing record and got a "MOD" operation. Finally, I deleted another record the same way (trashcan icon) and this time it was "LIS1" which I found stupefying since that's not even a valid value according to the DDIC for data element ACTIO.
    I can't seem to get a consistent way to determine what the user is doing. What is the best practice?
    Thanks.

    Hi Steve,
    You can  try with IPSYST-IOPER Parameter Which is Showing the Right Values .
    Regards,
    Kishore.S

  • How to find which are the user exits that updating z table.

    There was a question posted by someone else which said:
    I have a z table. my requirement is to find the user exits that update the value to this table?
    but my requirement is to get only those user exits that update my z table.
    Before that question was rejected, it got 5 replies which made me think that this tip is worth sharing.
    So the steps are:
    Do a where-used list search from SE11
    Click on Search Range button at bottom
    Type UPDATE (you can also add Insert, Delete etc to select-option) to ABAP Key Words field
    Say No to the popup that asks whether to include Fields of the Table
    Result will show relevant programs with code snippets doing static Update on that custom table.

    EWK1 would be too performance heavy in this case. It scans the source code to get the result.
    You can however, download the list of programs given in where-used list, and give that as limiting condition in EWK1 or some other code scanning utility.
    Using my method, where-used list of table is taken from database tables, and then code scanning is done only on the that list, not on entire Z* programs.
    Try it yourself to notice the speed difference.

  • How to determine which is the Active Selection Tool?

    My plugin implements a Custom Tool (Selection Server). The problem is that currently, it is detecting the Control-A combination regardless of which of the tools (I-Beam/Arrow, Hand, Loupe, my own, etc.) is the active one.
    I would like to add code that checks:
    if (I_Am_The_Active_Tool)
        process_Ctrl_A();
    TIA

    So, all this time when you were talking about registering my handler, you actually meant:
    "Registering before the Adobe Registrar"
    as opposed to:
    "Registering before the Microsoft Registrar"??
    I had no idea that "using things like Microsoft" facilities was frowned upon!  :-)
    TIA

  • How to determine which of the Oracle security products have been installed

    Hello!
    I would like to determine whether or not the Oracle security products have been installed for an Oracle database.
    The Oracle security products are:
    * Oracle Database Vault
    * Oracle Audit Vault
    * Oracle Configuration Management
    * Oracle Total Recall
    * Oracle Advanced Security
    * Oracle Data Masking
    * Oracle Label Security
    * Oracle Secure Backup
    * Oracle Database Firewall
    So what I thought is to look at the "DBA_REGISTRY" table which displays information about the components loaded into the database.
    But on the other hand there also is the "V$OPTION" view which lists database options and features.
    Does anybody know, how I could correctly determine whether or not each of the product is installed?
    I guess for "Oracle Database Vault" I should query V$OPTION, but what should I do with the other ones? And in case DBA_REGISTRY would be the right table, how would the comp_ids look like for the products?
    SELECT 'Oracle Database Vault' , nvl( (SELECT VALUE FROM V$OPTION WHERE PARAMETER = 'Oracle Database Vault'),'FALSE') FROM sys.dual
    OR
    SELECT 'Oracle Database Vault' , nvl2( (SELECT 'valueFound' FROM DBA_REGISTRY WHERE comp_id = '??????' AND status NOT IN ('INVALID', 'REMOVING' , 'REMOVED')),'TRUE','FALSE') FROM sys.dual
    Thanks in advance
    Kai

    Hi kai;
    There are some script avaliable on net, first please check them and run it on test server first!
    http://www.google.com.tr/#hl=tr&biw=1259&bih=793&q=installed%2Bproducts%2Boracle&aq=f&aqi=&aql=&oq=&gs_rfai=&fp=71a534c4a5161590
    Secondly you can check oraInventory and also oratab file or you can run runInstaller and can check Installed product tab on installation screen
    Regard
    Helios

  • What's the best way to determine which row a user clicked on via a link?

    Hello. Probably simple question, but my googleing is failing me. I have a table, with a column that is a command link. How can I determine which row the user clicked on? I need to take that value, and pass it to a different page to bind it for a different query. I was thinking of setting the result in a session bean? Or is there a better way?
    Thanks!

    Hi,
    You have two options:
    1. (Complex) Have your ActionListener evaluate the event to get the source, then climb the component tree up to the table and get the current row data;
    2. (Simple) Add a setPropertyActionListener to the link with value="#{var}" target="#{destination}" where var is the table's var attribute value and destination is your managed bean that required the clicked row.
    Regards,
    ~ Simon

  • Hard problem. how to track which application a user opens next?

    Hello,
    When the user runs my program,
    then **with his permission**, I want to be able to track
    which application the user has opened.
    For example, if he opens resume.rtf in MSWord, then I
    should be able to record or store the full path of
    MSWord and also the document path (c:\my
    documents\resume.rtf).
    Do you know how to do it?
    I would appreciate any help.
    thanks,
    Anil Philip

    In this old link
    http://www.gamedev.net/community/forums/topic.asp?topic_id=313980
    Da Wanderer has posted code (in Visual Basic?) to open a folder. He says it is cross platform. I am stumped by the code for Linux. Does anyone know if it will work for Linux. ie. Can I use the same options to open a document in Linux?
    I plan to use Runtime.exec similarly in Java, to open a doc.
    if (vars.Contains("GNOME_DESKTOP_SESSION_ID"))
                   processes.Add( new ProcessAndArgs("nautilus", "--nodesktop --browser " + path) );
                   osFound = true;
              else if (vars.Contains("KDEDIR"))
                   processes.Add( new ProcessAndArgs("kfmclient", "exec " + path) );
                   osFound = true;
              }

  • How can a jsp page tell which Oracle Responsibility the user has selected?

    We have two responsibilities - Timecard Administrator and Timecard Viewer. Everything that they can access is the same, except for one particular jsp page which we want to present a slightly different view if the user's responsibility is Timecard Viewer (specifically, the edit link in the results page will be suppressed). Unfortunately in order to implement this, the jsp code needs to be able to distinguish which of those two responsibilities the user has selected. I have written jsp code to print all the environment variables and unfortunately the environment is essentially identical regardless of which of the two responsibilities the user selected.
    How do I pass in the active responsibility to that page/environment in a way that can be tested by the jsp code?
    Thank you,
    Graham Toal <[email protected]>

    Yes, I tried something like this (shortened to the basics for this post):
    <pre>
    sqlQuery="select responsibility_name from fnd_responsibility_vl where responsibility_id = FND_GLOBAL.RESP_ID";
    stmt=con.createStatement();
    rs=stmt.executeQuery(sqlQuery);
    int field_count=rs.getMetaData().getColumnCount();
    while (rs.next()) {
    for (int i=0; i<field_count; i++) {
    logger.write("Responsibility: "+rs.getObject(i+1),"JSP",objName,0,-1,1001);
    </pre>
    However it did not print any results at all.
    I'm trying a different approach at the moment - I've cloned the menus from the Administrator responsibility to the new Viewer responsibility, and have altered the top-level menu so that I can insert a new variable into the process state myself; that way by the time the user navigates to the changed page, there should be a variable there that can be tested.
    Unfortunately the top-level menu isn't just a simple menu, it's a piece of code that issues an HTML redirect depending on the parameter passed in - which is set in the Oracle function screen for the function attached to that menu.
    (was something like utpa_top_menu.jsp?ADMIN and I changed it to utpa_top_menu.jsp?VIEWER, with appropriate tests for the new module name:
    <tt>
    else if ("VIEWER".equals(moduleName))
    url = "/utpa/jsp/admin_reports-viewer.jsp";
    </tt>
    In admin_reports-viewer.jsp I've added <tt>session.putValue("REPVIEWER","y");</tt> and in the actual target main page I have:
    <pre>
    if (session.getValue("REPVIEWER") == "y") {
    // viewer
    out.println("<CENTER><B>You are using the Timecard Viewer responsibility</B></CENTER><BR>");
    } else {
    </pre>
    And although the URL bar at the top of the screen is displaying the correct (redirected) URL, the page that is displayed is blank. Completely empty. 0 bytes. The file is present on the filing system; has content; has the correct ownership and permissions; I've reloaded apache, even had the systems guys reboot completely. I'm at a loss :-/
    Graham

  • How to determine which drive has the most recent backup?

    I have a few drives that contain backups of files. What would be the easiest way to figure out which of the drives has the most recent backup? When I sort by date, the folder shows one date, though the files inside show a different date? Is there a way to quickly check the drives to find which is the most recent?
    Thanks.

    the folder modification date isn't reliable, as is only tells of changed in the folder, but not in subfolders. there is no efficient way. I however highly suggest Time capsule, it is WAY easier and you can ask it not to sync the System data and/or applications, so it would prevent this hassle.
    You could try this: go to the first drive, type different letters, like a for instance, and see which file is the most recent document/folder.
    do the same thing on the other drives and compare.

  • How to check if the user has only the display authority of a message

    hi,
    How to check if the user has only the display authority of a message but does not have the change authority for a certain message?
    Best regards,

    hi blake
    though i am an application consultant and for authorisation u need to have help of BASIS person if u r not the one but still i can guide u regarding the same,
    Basically Authorization Management 
    Use
    You can use the following authorization objects to control the authorizations for maintaining business partner data:
    •        Authorization objects for the Business Partner:
    •     &#61601;        B_BUPA_GRP
    •     &#61601;        B_BUPA_ATT
    •     &#61601;        B_BUPA_FDG
    •     &#61601;        B_BUPA_RLT•       
    Authorization objects for relationships:
    •     &#61601;        B_BUPR_BZT
    •     &#61601;        B_BUPR_FDG
    In addition, you can assign an authorization group to a business partner in the dialog. The authorization group controls which users may maintain data for this business partner.
    You can also define authorizations for fields and field groups using the Business Data Toolset (BDT). Depending on the settings you have made, the system carries out the relevant authorization checks.
    In the dialog in the SAP GUI, you can display an overview of the authorizations assigned to you by pressing the button Settings.
    For more information on authorization management, see the Implementation Guide (IMG) of the Business Partner, as well as in the Developer’s Handbook for the BDT under  Authorizations.
    IntegrationAuthorization management for the Business Partner forms part of the  SAP authorization concept.
    Prerequisites
    You have made the necessary settings in Customizing of the Business Partner under Basic Settings--> -Address Management.
    Moving over
    AS ABAP Authorization Concept 
    The ABAP authorization concept protects transactions, programs, and services in SAP systems from unauthorized access. On the basis of the authorization concept, the administrator assigns authorizations to the users that determine which actions a user can execute in the SAP system, after he or she has logged on to the system and authenticated himself or herself.
    To access business objects or execute SAP transactions, a user requires corresponding authorizations, as business objects or transactions are protected by authorization objects. The authorizations represent instances of generic authorization objects and are defined depending on the activity and responsibilities of the employee. The authorizations are combined in an authorization profile that is associated with a role. The user administrators then assign the corresponding roles using the user master record, so that the user can use the appropriate transactions for his or her tasks.
    Authorization Checks 
    To ensure that a user has the appropriate authorizations when he or she performs an action, users are subject to authorization checks.
    The following actions are subject to authorization checks that are performed before the start of a program or table maintenance and which the SAP applications cannot avoid:
    •        Starting SAP transactions (authorization object S_TCODE)
    •        Starting reports (authorization object S_PROGRAM)
    •        Calling RFC function modules (authorization object S_RFC)
    •        Table maintenance with generic tools (S_TABU_DIS)
    Checking at Program Level with AUTHORITY-CHECK
    Applications use the ABAP statement AUTHORITY-CHECK, which is inserted in the source code of the program, to check whether users have the appropriate authorization and whether these authorizations are suitably defined; that is, whether the user administrator has assigned the values required for the fields by the programmer. In this way, you can also protect transactions that are called indirectly by other programs.
    AUTHORITY-CHECK searches profiles specified in the user master record to see whether the user has authorization for the authorization object specified in the AUTHORITY-CHECK. If one of the authorizations found matches the required values, the check is successful.
    Starting SAP Transactions
    When a user starts a transaction, the system performs the following checks:
    •        The system checks in table TSTC whether the transaction code is valid and whether the system administrator has locked the transaction.
    •        The system then checks whether the user has authorization to start the transaction.
    The SAP system performs the authorization checks every time a user starts a transaction from the menu or by entering a command. Indirectly called transactions are not included in this authorization check. For more complex transactions, which call other transactions, there are additional authorization checks.
    •     &#61601;        The authorization object S_TCODE (transaction start) contains the field TCD (transaction code). The user must have an authorization with a value for the selected transaction code.
    •     &#61601;        If an additional authorization is entered using transaction SE93 for the transaction to be started, the user also requires the suitable defined authorization object (TSTA, table TSTCA).
    If you create a transaction in transaction SE93, you can assign an additional authorization to this transaction. This is useful, if you want to be able to protect a transaction with a separate authorization. If this is not the case, you should consider using other methods to protect the transaction (such as AUTHORITY-CHECK at program level).
    •        The system checks whether the transaction code is assigned an authorization object. If so, a check is made that the user has authorization for this authorization object.
    The check is not performed in the following cases:
    You have deactivated the check of the authorization objects for the transaction (with transaction SU24) using check indicators, that is, you have removed an authorization object entered using transaction SE93. You cannot deactivate the check for objects from the SAP NetWeaver and HR areas.
    This can be useful, as a large number of authorization objects are often checked when transactions are executed, since the transaction calls other work areas in the background. In order for these checks to be executed successfully, the user in question must have the appropriate authorizations. This results in some users having more authorization than they strictly need. It also leads to an increased maintenance workload. You can therefore deactivate authorization checks of this type in a targeted manner using transaction SU24.
    •     &#61601;        You have globally deactivated authorization objects for all transactions with transaction SU24 or transaction SU25.
    •     &#61601;        So that the entries that you have made with transactions SU24 and SU25 become effective, you must set the profile parameter AUTH/NO_CHECK_IN_SOME_CASES to “Y” (using transaction RZ10).
    All of the above checks must be successful so that the user can start the transaction. Otherwise, the transaction is not called and the system displays an appropriate message.
    Starting Report Classes
    You can perform additional authorization checks by assigning reports to authorization classes (using report RSCSAUTH). You can, for example, assign all PA* reports to an authorization class for PA (such as PAxxx). If a user wants to start a PA report, he or she requires the appropriate authorization to execute reports in this class.
    We do not deliver any predefined report classes. You must decide yourself which reports you want to protect in this way. You can also enter the authorization classes for reports with the maintenance functions for report trees. This method provides a hierarchical approach for assigning authorizations for reports. You can, for example, assign an authorization class to a report node, meaning that all reports at this node automatically belong to this class. This means that you have a more transparent overview of the authorization classes to which the various reports are transported.
    You must consider the following:
    •     •         After you have assigned reports to authorization classes or have changed assignments, you may have to adjust objects in your authorization concept (such as roles (activity groups), profiles, or user master records).
    •     •         There are certain system reports that you cannot assign to any authorization class. These include:
    •     •         RSRZLLG0
    •     •         STARTMEN (as of SAP R/3 4.0)
    •     •         Reports that are called using SUBMIT in a customer exit at logon (such as SUSR0001, ZXUSRU01).
    •     •         Authorization assignments for reports are overwritten during an upgrade. After an upgrade, you must therefore restore your customer-specific report authorizations.
    Calling RFC Function Modules
    When RFC function modules are called by an RFC client program or another system, an authorization check is performed for the authorization object S_RFC in the called system. This check uses the name of the function group to which the function module belongs. You can deactivate this check with parameter auth/rfc_authority_check.
    Checking Assignment of Authorization Groups to Tables
    You can also assign authorization groups to tables to avoid users accessing tables using general access tools (such as transaction SE16). A user requires not only authorization to execute the tool, but must also have authorization to be permitted to access tables with the relevant group assignments. For this case, we deliver tables with predefined assignments to authorization groups. The assignments are defined in table TDDAT; the checked authorization object is S_TABU_DIS.
    You can assign a table to authorization group Z000. (Use transaction SM30 for table TDDAT) A user that wants to access this table must have authorization object S_TABU_DIS in his or her profile with the value Z000 in the field DICBERCLS (authorization group for ABAP Dictionary objects).
    please See also:
    •        SAP Notes 7642, 20534, 23342, 33154, and 67766
    guess this info will help you,there is one graphic which actually explain the hierarchy of authorisation,i will find some time out to let u know more info about the authorisation
    but if u sit with ur BASIS guy then u can learn lot of things in PFCG
    i guess u r a basis guy,then its not a problem
    best regards
    ashish

  • How to determine which Aperature Library is the original?

    I purchased an Imac a couple of years ago and switched to Aperature to help eliminate duplicates.  I spent time bringing them in a little at a time as not to duplicate.  I have moved what I thought was the master copy to an external drive so that it would not take up all the space.  I show eight copies of Aperature when I click option & then Aperature.  Please help me determine which is the main copy as they all have different version and original numbers.  I am so confused and was just trying to break it down so that I could manage it in even years at a time so that I could organize faces.  Not even really sure what version means as opposed to original.  I hope with some guidence I can finally get this right.  Thank you in advance if you understand where I am coming from

    My short guide here may help you understand the parts of Aperture better, which in turn will help you ask specific questions.
    I advise all users of Aperture to read and understand the first seven chapters of the User Manual -- it's available on-line, as well as via "Help➞Aperture Help" -- as they provide a tour of the interface.
    You are going to have to do some work.  I can tell that you are confused -- Aperture, assuredly, is confusing at first -- but I can't tell what you are asking.  You need to distinguish, in your questions, between the files you imported (Aperture calls these "Originals" after you've imported them) and the Images in Aperture (Aperture refers to these as both Images and as Versions).  Every Image has an Original.  The Original (remember, it's a file) can be stored inside the Aperture Library package, or outside the Library package.  These distinctions are covered in both of the resources mentioned above.
    If nothing makes sense, post back and we'll see how we can help you.
    --Kirby.

  • How do I sign my VB / VS 2010 based shared COM add-in for Excel so it loads when the user has checked "Require application add-ins to be signed by a trusted publisher"?

    My COM add-in is developed using VS 2010 and VB. It's a shared COM add-in (not VSTO) and it works with Excel 2007 - 2013. My installer is signed with a code signing certificate but it would appear that my add-in's .dll should also be signed if the user has
    checked the "Require application add-ins to be signed by a trusted publisher" option.
    The "Sign the assembly" option is checked in my add-in's VB -> My Project -> Signing. I have a .snk file selected which I seem to recall generating 6 or 7 years ago when I ported the COM add-in from VB6 to .NET. 
    I have an up-to-date Comodo code signing certificate (a pfx file called MyCompanyCodeSigningCertificatePrivateKey.pfx) which I purchased to use with the installer and was wondering if and how I could use this.
    I tried selecting my pfx file in the My Project -> Signing -> "Choose a strong name key file" dialog. It made a copy of the pfx file in my project folder but when I tried to build the project, I got the following error:
    Error 1 Cannot import the following key file: MyCompanyCodeSigningCertificatePrivateKey.pfx. The key file may be password protected. To correct this, try to import the certificate again or manually install the certificate to the Strong Name CSP with the
    following key container name: VS_KEY_C0B6F251F0FB6016
    After a little research, I found out I might be able to use signtool to sign the dll in a post-build step.
    I added the following command to the post-build event, before the command I use to regasm the assembly.
    "path to signtool\signtool" sign /f "MyCompanyCodeSigningCertificatePrivateKey.pfx" /p "xxxx" /v "$(TargetPath)"
    When I built the project, the dll appeared to get signed (the output window showed a bunch of confirming text as well as "Successfully signed: c:\MyAddIn\bin\Release\MyAddIn.dll") but the next step in the post-build (regasm myaddin.dll /codebase)
    issued a warning RA0000 (see below) but reported "Types registered successfully".
    Here's the message I get from regasm, even though the output window says the dll was sucessfully signed:
    RegAsm : warning RA0000: Registering an unsigned assembly with /codebase can cause your assembly to interfere with other applications that may be installed on the same computer. The /codebase switch is intended to be used only with signed assemblies. Please give your assembly a strong name and re-register it.
    Types registered successfully
    I'm not using a shim if that makes a difference.
    How do I sign my add-in so it loads when the user has checked "Require application add-ins to be signed by a trusted publisher"?
    Any tips would be appreciated.

    Hello,
    Why do you need to use the regasm utility from the post-build action?
    There is a difference between signing the assembly with a strong name and digital signature. The
    How to: Sign an Assembly with a Strong Name article in MSDN explains how to sign an assembly with a strong name (.snk). See
    How to digitally sign a strong named assembly for adding a digital signature.
    You may also find the
    What's the Difference, Part Five: certificate signing vs strong naming article helpful.

Maybe you are looking for

  • Issue installing 1.4.2_08 on XP (error 1722 problem with Windows Installer)

    First time poster guys, so be gentle. I have installed this older package on 20+ PCs, but this one is kicking my arse. It makes it through the install and then at the very end puts up: Error 1722. There is a problem with this Windows Installer packag

  • Matrix report with group.

    dear all, can anyone guide me how to build a matrix report with group using scott schema. i can not be able to build a query. Thanks Muhammad Nadeem

  • Nested Region Error in Explorer 7 but not Firefox

    Can any of you tell me why the following code generates an error message when I attempt to view it in Explorer 7, while it processes correctly in Firefox? It claims that it "Found a nested spry:detailregion in the following markup." and points to the

  • SQL Dashed Line - Can It Be Omitted ?

    Is there any way to omit the dashed line under the heading when you run sql e.g example: select id,name from test; output: ID NAME 1000 Test1 14134243 Test2 I would just like to see ID NAME 1000 Test1 14134243 Test2 Thanks in Advance Jim

  • Problem in applicant no range

    Hi I have assigned internal no range for applicants in NUMAP feature. But in PB10-Initial data entry, SAP system does not assign a no from no. range automatically rather says no range is external, enter a personnel no. Please help me. It's urgent. Th