How to stop a CANCELLATION REQUESTED?

Hi, I was trying to get a desktop tower and thought I brought the wrong one at first and canceled it, finding out it was the right one I had 2nd thoughts about buying it so I tried to get a cancellation on it but I realized I actually want the item, So can I get someone to help me stop the cancellation? Thank you.

Hi 917LANG,
I'm sorry you didn't learn you had the correct item until after you had canceled your order. There is no way to reinstate a canceled order; the only option is to place a new one.
Thanks for your post,
Elizabeth|Social Media Supervisor|Best Buy® Corporate
 Private Message

Similar Messages

  • How to stop random friends request???

    I am getting pretty sick of random people sending me friends request..I am getting 2/3 everyday..If i wanted to add people i don't know i would add them myself.
    How can you stop random friends request????

    Dear Readers,
    Hence, the dark side of "social media."  Would you consider adding your support for this idea on the Skype for Windows Idea Board?
    http://community.skype.com/t5/Windows-desktop-client-Ideas/Implement-an-option-to-be-quot-unfindable...
    Regards,
    Elaine
    Was your question answered? Please click on the Accept as a Solution link so everyone can quickly find what works! Like a post or want to say, "Thank You" - ?? Click on the Kudos button!
    Trustworthy information: Brian Krebs: 3 Basic Rules for Online Safety and Consumer Reports: Guide to Internet Security Online Safety Tip: Change your passwords often!

  • How to stop and cancel physical standby database (ORACLE 10g)

    Dear All,
    I have physical standby setup and I want stopped for the time being that to use the database as an normal DB (standalone inestance).
    Kindly advise and show me how do I do that.
    Regards,

    executing below query on primary db stops log shipping to standby.......i think this is sufficient for disabling your physical standby setup temporary
    alter system set log_archive_dest_state_2=defer scope=both;
    In future if you want your dataguard setup back..............you can rebuild the standby and enable the log_archive_dest_state_2 parameter.
    Edited by: Veeresh.S on Nov 14, 2012 5:45 PM

  • How to stop request for admin password when sending files to trash?

    I am requested the admin password when ever sending a file to trash using the mouse or the context menu.
    How to stop this annoying request?
    It was not like this before.
    I am working on a non admin account for security reasons. I got admin details here of cause.
    Thanks for you help!
         Till Kopper

    I gave my working account admin abilities in the system preferences. logged out and back in. Run the command line "sudo rm -rf ~/.Trash" as Topher Kessler suggested. Now my own password was accepted (before this ine and the admins accounts one failed). No there is no annoying request for the admin passowrd when sending a file to trash. changed my work account for no admintrative in the system prefs and logged out and in.
    Problem solved.
    THanks to Topher Kessler!
    (how to give you now the 10 point you deserve?)

  • How to stop the Flex application when user clicks on Cancel button from JS-confirm message?

    Hi All,
    I use the next code when a user clicks on a link:
    private function clickHandler():void
          ExternalInterface.call('confirm', 'Of course you want to go to the Adobe forums!');
          navigateToURL(new URLRequest('http://forums.adobe.com'), '_self');
    This will show up the javascript confimation box. But when the cancel-button is clicked, the user goes straightly to http://forums.adobe.com...
    How to stop Flex performing the next code when a user clicks on the Cancel button?
    Or, how to catch which button is clicked by a user in Flex?
    Thanks!

    I agree with Mr. Hall that using mx.controls.Alert in Flex may be a better route.
    Show the Alert like this:
    // show an alert with a question and yes and no choices
    Alert.show( "Would you like to go to the Adobe Forums?", "Question",
         Alert.YES | Alert.NO, this, closeHandler, null, Alert.YES );
    Then handle the response in the closeHandler() function:
    protected function closeHandler( closeEvent:CloseEvent ):void
    if( event.detail == Alert.YES )
         navigateToURL( new URLRequest('http://forums.adobe.com'), '_self' );
    else if( event.detail == Alert.NO )
         // they chose no
    The following documentation on Alerts may be helpful:
    http://www.flexafterdark.com/docs/ActionScript-Alert
    Let me know if that helps...
    Ben Edwards

  • How to stop/cancel Process Chain in BI 7.0

    Hi,
    Could you tell me how to stop/cancel a process chain that hangs with status yellow or green in BI 7.0? There was an easy option to do it in 3.x, but I cannot find a similar option in 7.0.
    What happens is that at random our process chains hang at a certain variant with either yellow or even green status and do not proceed further. What happens is that in a couple of hours another pchain run occurs and it executes fine. Then again at random (might be the same day or the next day) the process chain hangs again. I think that all those "hanged" pchains pile up in the queue, so that it cause other future pchains to hang as well at some point. So, is there anyway to stop/cancel these zombie process chains when it stops at a particular event RSPROCESS in BI 7?
    Thank you,
    AG
    Message was edited by:
            AG

    Hi Frank,
    Thanks for your reply. I have a few questions.
    1)SM37 -->Kill Job
    We cannot do that because the job has already finished.
    2)SM50/sm66- ->Kill process
    There are no hanged processes to kill
    3)RSPC>Job Log>Make the process RED forecefully
    How do you do that exactly?
    4)RSPC>Process chain> main Menu"Remove from Scheduling"  OR
    5)se37-->RSPC_API_CHAIN_INTERRUPT
    give RFC BW system name(technical) and process chain name(technical) - we can do this,  but what exactly would it accomplish. Would it remove the process chain from any runs in the future or also any hanged ones in the past? An how is this step different from #4?
    Thank you,
    AG

  • I have an 8gb ipod touch and I downloaded 3 movies from itunes on to my ipod. I dont have enough available space for all three movies. How do I stop or cancel a download after it has already began? And what will happen if I cannot cancel download.

    Im trying to stop or cancel a movie download from itunes on my ipod. Does anyone know how to do this???

    On your syncing cmputer go to iTunesStore>Check for available downloads.  They shoud go there if problems dowloading them to yur iPod.

  • How do you instantly 'stop' or 'cancel' a long save?

    I made the mistake of creating a new project from an old HUGE project. I forgot to kill all the audio tracks I didn't want from the OLD project. So now I'm sitting here watching Logic transfer God knows how many audio tracks.
    I just want to kill the save ... WITHOUT doing a Force Quit. I may not have saved the work I'd done before starting the 'save as'.
    I can't seem to find a way to 'cancel' the 'save as' ... and still keep the project open.
    all ears
    Ben

    I'll do a test when I get back this evening. The long save had completed itself before I got the answer as to how to stop the beast. And I was too busy thereafter to run a test.
    I'll run a test tonight ... though I'm sure it works ... so I will mark 'solved'.

  • Hello I have just updated my iphone 5 and it keeps requesting 2 old email addresses from I quests my old laptop any idea how to stop this ? Thanks

    Hello I have just updated my iphone 5 and it keeps requesting 2 old email addresses from I quests my old laptop any idea how to stop this ? Thanks

    Log out of the old ID, then login using the new one with the correct pw.

  • TS4006 how can i cancel request for erasing iPhone?? i pressed erase an iphone instead of lost mode or display message =( i want to cancel this operation

    how can i cancel request for erasing iPhone?? i pressed erase an iphone instead of lost mode or display message =( i want to cancel this operation
    my lost iphone is still offline and erasing not started yet and i want to cancel this request!

    You can't, but after the erasure the activation lock will still be in place, so the device will be useless for anyone not knowing your apple-id and password.

  • Hello I would like to know how to stop my service by mistake and canceled an amount not want to pay or the product

    hello I would like to know how to stop my service by mistake and canceled an amount not want to pay or the product

    Hi Jimmy,
    You may be able to cancel your membership following the processes outlined here: https://helpx.adobe.com/x-productkb/policy-pricing/cancel-membership-subscription.html
    Else, you will need to contact our support for assistance with the process: Contact Customer Care
    Be sure to sign into the Adobe ID associated with your membership
    Hope that helps,
    - Dave

  • How to stop JSF requesting readonly data from applyRequestValues?

    Hello everybody,
    I need to optimise server performance without deep knowledge of jsf.. Not easy..
    Debugging I found the next dirty picture:
    Page1 shows some information which cannot be modified on this page, for example - top 10 winners. The Page1 has a commandLink which leads to Page2, no data processing needed when swithching to Page2.
    Click on that commandLink leads to full jsf lifecycle:
    1) execute()
    - restore view
    - applyRequestValues - here Page1 requests values, doing processDecodes on "<h:dataTable cellpadding="3" cellspacing="0" width="100%" border="0" var="product" value="#{HomeManager.top}">"
    - processValidations
    - updateModelValues
    - invokeApplication
    2) render()
    I see the same picture everywhere in the application.
    One solution is to use outputLink instead of commandLink.
    Then jsf does not go into the full lifecycle and would just render Page2.
    But I'm anyway interested to find the way to stop jsf from requesting readonly data, but still pass its lifecycle.
    I supposed that some jsf tags like panelGrid, dataTable or outputText have readonly attribute which will stop jsf from requesting data on applyRequestValues step, but found nothing about such attribute for these elements.
    I imagine I miss some key knowledge about jsf.. Can somebody help?
    Thanks in advance

    I still cannot solve this problem, but I have some more observations:
    1) yes it is a JApplet, and yes, the data streaming is performed in a separate thread.
    2) Wireshark sniffing shows that data sent out by the PHP datasource on the server is sent immediately, and is not buffered (am using ob_start(), ob_flush() and flush() alls in the PHP script).
    3) On Windows Vista, using Internet Explorer or Firefox, there is a constant 30 second delay before the Applet returns from this line: InputStream is = url.openStream();
    4) After this 30 seconds, data appears in the Applet, but it can be seen also with java console debug prints that the data seems to be buffered. The newest data shown in the Applet is not the newest data sent to the client by the PHP datasource script.
    5) On a SUSE Linux client, the Applet works as it should, there is no delay time in showing the data.
    It appears as if there is on Windows a buffering of data which I do not wish to have and which does not occur on Linux. I need to find out how to get the URL openStream() call to return immediately allowing the initial data to be read and shown on the Applet. And I need to remove the buffering of data so that the data can be shown on the Applet when it arrives.
    Can anyone help? Why does this work on Linux but not on Windows, and what can I do, at best within the Java code, to get the Applet to work on Windows as it does on Linux?
    Thanks!
    Steve, Denmark

  • How to stop the running infospoke

    Hi Experts,
    there is a infospoke is still running so long time, it's incorrect, i'll cancel it as kick off the dependenies, i have no idea to how to stop the running infospoke. Anybody could tell me how to do it. thanks in advance.

    hi denny,
       Go to SM37 , find the job , stop the process
    or
       To stop the job find the job with the help of the request name ( TC - SM37 ),then in the job Details find the PID .
    find the process in the process Overview (SM50 / SM51 ).
    Set the restart to NO and Cancel the process without core
    u can also see these threads that are already posted:
    stopping v3 run job LIS-BW-VB_APPLICATION_02_010
    how to cancel or change the background job which is scheduled
      In SM37, for the job , click on Step button. Then from the menu Goto > variant. You can see the process chain name here.
    sure it helps
    Thanks
    Varun CN

  • How to stop spooling and get error or status of the statement

    Hi All,
    I am using the bellow in .sql file to generate a spool file which is called from a shell script.
    The issue is whn i kill the job the .csv file is still generated and doesnt thow any error.
    Could any one please let me know how to stop spooling if the script end in between or catch the status of the error and email if spooling stops in between.
    Please help. Thanks
    below is used in .sql
    set feedback off
    set term off
    set trimspool on
    set pagesize 0
    exec dbms_output.disable
    exec dbms_output.enable(40000)
    set linesize 2000;
    set long 2000;
    WHENEVER SQLERROR EXIT 1 ROLLBACK
    whenever oserror exit 1 rollback
    alter session set global_names=false;
    spool  $HOME/data/abc.csv
    select statement;
    spool off;
    exit
    sql is called from this script:
    #!/bin/ksh
    status=`sqlplus -s / @$HOME/sql/extract/abc.sql `
    status1=$?
    if [ $status1 -ne 0 ]
      then
    mailx  -s "Fatal - Error in Extraction process "  [email protected]
    fi ____________________________________
    Edited by: user11942774 on 1 Mar, 2012 4:07 AM

    Hi, dczay, and welcome to the Community,
    Sign in to your Skype account via the Skype website; the link to Sign In appears at the upper right corner of the website page.
    Cancel the subscription.
    Please contact Skype Customer Service to explain the situation and to request a refund.
    (The blue type is actually a link to the instruction related to contacting Skype Customer Service and how to request a refund.)
    Regards,
    Elaine
    Was your question answered? Please click on the Accept as a Solution link so everyone can quickly find what works! Like a post or want to say, "Thank You" - ?? Click on the Kudos button!
    Trustworthy information: Brian Krebs: 3 Basic Rules for Online Safety and Consumer Reports: Guide to Internet Security Online Safety Tip: Change your passwords often!

  • I believe that i have malware on my mac, osx 10.9.4. accordingly, i've tried to run clamxav (on my mac HD) but just get a spinning wheel, then have to shut down. any advice on how to stop spinning wheel or get rid of malware? please help. :-).

    i believe that i have malware (possible highjack of safari browser) on my mac, osx 10.9.4. accordingly, i've tried to run clamxav (on my mac HD) but just get a spinning wheel, then have to shut down. any advice on how to stop spinning wheel or get rid of malware? i have symnatic endpoint and, after scanning, it reveals nothing. please help. :-).

    are locked user files or that have incorrect permission a bad thing?
    Yes.
    why am i removing symantec?
    Short answer: Because it's worse than useless and worse than the imaginary "viruses" you're afraid of would be if they really existed. For the long answer, see below.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, and a technological fix is not going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the scam artists. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software.
    ☞ Rogue websites such as Softonic and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in everyemail attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It's as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

Maybe you are looking for

  • ITunes brings my PC to its knees during song import

    iTunes takes 95-100% of my CPU processing whenever it imports songs from a CD. Basically, it brings the machine to its knees. Also, the import speed is rarely above 2x. I have a Pentium (~400Mhz) with 512Mb of memory. The NEC DVD drive holding the CD

  • Aso mdx issue !!!!!

    ([Jan],(Actual),(LOB]) verify's ([Jan],[SC_Actual],[LOB])=([lob1]*(.75))+[lob2]*(.25)); Error(1260052) - Syntax error in input MDX query on line 1 at token '=' CombinedLOB please advise Edited by: Next Level on Jul 8, 2012 4:43 AM Edited by: Next Lev

  • YouTube videos are just... not good.

    I watch a lot of YouTube videos.  I used to have really slow Internet, and we upgraded on July 23.  My speedtests went from 1.86 down, 0.3 up to 17 down, 1.5 up.  Everything else I do on the Internet has very much benefited from this upgrade, but You

  • Can two versions of a package coexist - virtualbox for palm-sdk

    Hello, I am trying to install palm-sdk on my 3.8.6-1-ARCH x86_64 GNU/Linux machine. And it turns out that this package requires virtualbox <=4.1. Current version of virtualbox is 4.2 so I downloaded virtualbox-4.1.8-2-x86_64.pkg.tar.xz and virtualbox

  • Audio not playing in jar

    hello! i have a jar file and a wav file in the resource folder and resource folder itself in the jar file.. problem is that jar is not playing audio.. the code AudioClip au=Applet.newAudioClip(this.getClass().getResource("resources/voice.wav")); au.p