HT6550 Better protection of personal information at iCloud

In Europe new laws are being introduced regarding data protection. So I expect that two way authentication will be forced. We use a new technique with device DNA and short living cert's. Unique is they way we handle key management. In a large environment as Apple has, customer protection is hard to do. However, as soon as things are happening like the hacked accounts; everybody is pointing at apple and the danger of all information in the Cloud. So besides our KeyTalk solution, we are working for a way with personal encryption on each of your files in the cloud. Question: any idea how to reach that in large environments? Know techniques?

So, the question is, what can iPhone app developers get sent back to them?
Only what you allow, and this sort of thing should be included with an app's detail. Some apps I use request using location services to determine my location, which I can allow or not allow. If an app transmits certain data from the iPhone and this is included with the app's detail (which should be included), you install and run the app and there is not a setting with the app to allow or not allow whatever data to be transferred, you are approving the transmission of whatever data by using the app.
I'm pretty sure there are prohibitions against this or a requirement if this is included with an app - to include a setting for the app to disable or enable it, or at least being included with the app's detail. I'm sure Apple checks this sort of thing before approving an app but when people are involved, mistakes can happen. If an app is found to violate Apple's terms and conditions for an app to be available via the app store after it was approved which was not caught before the app was approved, it will withdrawn from being available via the app store until appropriate changes to the app are made.

Similar Messages

  • I unfortunately just got my IPhone 4s stolen.I thought I had the find my iPhone enabled but I didn't because I cannot locate the phone when I sign in ICloud.How can I erase all data on the phone so the thief can't access my personal information.

    I unfortunately just got my IPhone 4s stolen.I thought I had the find my iPhone enabled but I didn't because I cannot locate the phone when I sign in ICloud.I have a password on the phone but i'm not sure if I turned on the option where the phone resets if you incorrectly put the password more than ten time. I immediately called my phone company (Verizon) and reported the phone stolen.So I know whoever took the phone cannot place calls or use the phone. But can they still access my data on the phone if they manage to unlock the phone?  If so how can I erase all data on the phone so the thief can't access my personal information? is there any other way other than Find my IPhone to wipe off the data on the phone? I really don't want my personal information such as pictures, text messages, notes and social networks profile available to a stranger!!? Help please!!!

        Hello thewrongway,
    I'm sorry to hear about your phone!  I understand the need for an active device. You are able to activate an old device and process an insurance claim for your iPhone 4s within 60days from the incident date.  Keep in mind if the old phone is not a smartphone and you currently have unlimited data that feature will fall off.  If you have a tier data plan no changes will be made.  Please let me know if you have any additional questions.  Thank you.   
    TominqueBo
    VZW Support
    Follow us on Twitter at @VZWSupport

  • My ipad was stolen and I didnt have an icloud, I want to block my personal information

    Please help me. I want to block my personal information because my ipad was stolen, i didnt create an icloud because I just bought it one week ago

    http://support.apple.com/kb/HT5668
    The above article discusses what to do if your phone is lost or stolen.  If the device did not have iCloud turned on prior to the loss, there is nothing that you can do beyond changing your passwords to you apple id.

  • Are the Gameover Zeus and Cryptolocker malware a threat to Mac/Apple computers? If so, what should be done to protect the computer and personal information?

    Are the Gameover Zeus and Cryptolocker malware a threat to Mac/Apple computers? if so, what should be done to protect the computer and personal information?

    These are Windows viruses and will not effect your Mac.
    GameOver Zeus P2P Malware: http://www.us-cert.gov/ncas/alerts/TA14-150A
    Systems Affected
    • Microsoft Windows 95, 98, Me, 2000, XP, Vista, 7, and 8
    • Microsoft Server 2003, Server 2008, Server 2008 R2, and Server 2012
    CryptoLocker Ransomware Infections: http://www.us-cert.gov/ncas/alerts/TA13-309A
    Systems Affected
    • Microsoft Windows systems running Windows 8, Windows 7, Vista, and XP operating systems

  • My ipad was stolen but i dont have icloud open on my ipad. Is there anything else i can do to either locate the phone or lock up all of my personal information.

    My ipad was stolen but i dont have icloud open on my ipad.  Is there anything else i can do to either locate my ipad or lock it up so that my personal information is not available.

    Unfortunately not, you can only try to locate it if Find My iPad was enabled on it and the iPad is currently connected to a network and the device hasn't already been wiped and/or Find My iPad disabled on it.
    If it was stolen then you should report it to the police, and if it was a cellular model you should also contact your carrier. You should also change your iTunes account password, your email account passwords, and any passwords that you'd stored on websites/emails/notes etc.

  • Email recovery password different than in personal information

    i want to change my icloud password because my iphone5s has been stolen yesterday
    therefore, i have to answer 2 secret question by apple but it says my answers was wrong.
    then you may press "send email link to .... @gmail,com"
    but im very confuse why it send to my gmail (which i cannot remember the password too)
    and not to my yahoo email since my personal information stated that my primary email (and also my id) is using yahoo.
    really need help to protect my documentin that iphone

    Go to settings,
    iCloud,
    Account.
    Change the email address and use the correct password.
    This should fix the problem.

  • False Advertising: Selling Used Tablet as New and Personal Information to the Public

    So last week I purchased an LG G Pad 7.0 for my wife. It was on sale for $126.99. I purchased this tablet as I bought one for myself months back and have been very happy with it. This past Monday it was delivered. My wife called me at work and told me it arrived. I told her that she should open it up and plug it in as most manufacturers say you should give it a full charge before use. I told her that I would get her started on it when I came home.
    Later that evening, I came home and checked to make sure it had a full charge. It did. I then powered up the tablet only to find a message on the lock screen saying, "Contact 865-XXX-XXXX if you find this". Immediately I was puzzled. When I first bought my tablet, it took me through a basic set up of the tablet. Not to a lock screen. I then opened the tablet up to the home screen. Numerous user downloaded apps were installed on the tablet. Ebay, Amazon, Yahoo mail, Home Depot, Holy Bible, etc. After paging through the tablet for a few minutes it was clear that this tablet belonged to someone prior to me purchasing it.
    I'm assuming that "Jeffrey XXXXXX" purchased this tablet and returned it for whatever reason. Needless to say, if I were ever to return a tablet that had personal information on it, I would make sure I did a factory reset on it and make sure all my personal data was removed before returning it. Not to mention if I was the business that planned on reselling this tablet, I would make sure all devices were "clean" of any personal information prior to reselling it to avoid liability issues. This tablet not only has personal information on it but also has this man's private business information on it. The "Quick Start Guide" also has sensitive info written on the back of it.
    Now I purchased this item as "NEW". Not used, not refurbished, not from a "Marketplace" seller. From BestBuy.com themselves. Not at any given point did it state that it was used. In fact, after I realized it was used, I went back to BestBuy.com to see if any changes were made. NONE. I took screenshots of the page. Now it did have options to buy it as "Open-Box" for $117.99 but I never selected it. I then checked my paper invoice and my order details online. Not anywhere was it listed as some type of used product.
    This is now the second time in about a month that I have had issues with BestBuy.com. See below link:
    http://forums.bestbuy.com/t5/Delivery-Installation/Won-t-Deliver-Front-Loading-Washing-Machine-But-I...
    I have spent about $2000 in the past few months at Best Buy. And apperently they want me to take my money elsewhere. I expect to get the new tablet that I purchased and would appreciate a response as soon as possible.

    Dear User123727,
    I find a lot of joy in opening a new product; breaking the seals on the box, taking the protective plastic off the screen and seeing the first setup screen. If I had been in your situation, I am sure I would have shared your distaste in discovering the tablet was previously used. I am sorry for any inconvenience and doubt your recent experiences have caused you.
    Using your email address you provided here on the forums, I was able to pull up the order in question. It appears this item shipped from one of our stores. There is a chance all the steps were not followed if this item was previously returned to that store location and was later shipped to you. When a customer returns any product, a thorough inspection should be done by the Best Buy associate that is performing the return transaction. They should be checking for things like accessories, physical condition and functionality, to name a few. However, if the packaging appeared to be sealed and unopened, an employee would not typically open the product as it would then have to be sold as such. Even if you had purchased an open item version of this particular tablet, it still should have been tested, reset by to the default factory settings, and wiped of any existing data before being resold.
    In an effort to look into this situation for you more, I have sent you a private message to acquire some more information from you.
    Sincerely,
    JD|Social Media Specialist | Best Buy® Corporate
     Private Message

  • ESS 50.4 Personal Information iViews customization

    We are using ESS 50.4 on EP 6.0.  With a very tight deadline, I need to remove/hide some buttons and icons in the Personal Information iViews.
    I need to hide the buttons - NEW, Change, Display, Delete
    I need to hide the icon that looks like three columns and when clicked on provides
    'Help for user-defined settings'
    Does anyone have the instructions to make these changes?  If so, I would greatly appreciate you sharing the information with me.
    My email, [email protected]
    Thank you!

    Hi,
    the service is PZ02 - Go in transaction SE80, select Internet Services.
    But to change this service you need an expert in Abap.
    Hope this help.
    Sónia
    Message was edited by:
            Sonia Santos

  • I have an iMac for work and I am leaving the company. How do I clear the computer so that my soon to be former company is unable to see my personal information Ie. - internet, contacts, etc...

    I have an iMac for work and I am leaving the company. How do I clear the computer so that my soon to be former company is unable to see my personal information Ie. - internet, contacts, etc...

    Follow these instructions step by step to prepare a Mac for sale:
    Step One - Back up your data:
           A. If you have any Virtual PCs shut them down. They cannot be in their "fast saved" state. They must be shut down from inside Windows.
           B. Clone to an external drive using using Carbon Copy Cloner.
              1. Open Carbon Copy Cloner.
              2. Select the Source volume from the Select a source drop down menu on the left side.
              3. Select the Destination volume from the Select a destination drop down menu on the right
                  side.
              4. Click on the Clone button. If you are prompted about creating a clone of the Recovery HD be
                  sure to opt for that.
                   Destination means a freshly erased external backup drive. Source means the internal
                   startup drive.
    Step Two - Prepare the machine for the new buyer:
              1. De-authorize the computer in iTunes! De-authorize both iTunes and Audible accounts.
              2, Remove any Open Firmware passwords or Firmware passwords.
              3. Turn the brightness full up and volume nearly so.
              4. Turn off File Vault, if enabled.
              5. Disable iCloud, if enabled: See.What to do with iCloud before selling your computer
    Step Three - Install a fresh OS:
         A. Snow Leopard and earlier versions of OS X
              1. Insert the original OS X install CD/DVD that came with your computer.
              2. Restart the computer while holding down the C key to boot from the CD/DVD.
              3. Select Disk Utility from the Utilities menu; repartition and reformat the internal hard drive.
                  Optionally, click on the Security button and set the Zero Data option to one-pass.
              4. Install OS X.
              5. Upon completion DO NOT restart the computer.
              6. Shutdown the computer.
         B. Lion and Mountain Lion (if pre-installed on the computer at purchase*)
             Note: You will need an active Internet connection. I suggest using Ethernet if possible because
                       it is three times faster than wireless.
              1. Restart the computer while holding down the COMMAND and R keys until the Mac OS X
                  Utilities window appears.
              2. Select Disk Utility from the Mac OS X Utilities window and click on the Continue button.
              3. After DU loads select your startup volume (usually Macintosh HD) from the left side list. Click
                  on the Erase tab in the DU main window.
              4. Set the format type to Mac OS Extended (Journaled.) Optionally, click on the Security button
                  and set the Zero Data option to one-pass.
              5. Click on the Erase button and wait until the process has completed.
              6. Quit DU and return to the Mac OS X Utilities window.
              7. Select Reinstall Lion/Mountain Lion and click on the Install button.
              8. Upon completion shutdown the computer.
    *If your computer came with Lion or Mountain Lion pre-installed then you are entitled to transfer your license once. If you purchased Lion or Mountain Lion from the App Store then you cannot transfer your license to another party. In the case of the latter you should install the original version of OS X that came with your computer. You need to repartition the hard drive as well as reformat it; this will assure that the Recovery HD partition is removed. See Step Three above. You may verify these requirements by reviewing your OS X Software License.

  • How do you get firefox not to report personal information

    A federal Goverment Agency posted some of my personal information on the web and is doing so illigally in violation of the privacy act, and other reporting laws, can some one tell me how to get Fire Fox not to report this illegal information ?

    Hi andy82997gmail.com, what kind of information are you talking about?
    I noticed you included a link to a Department of Housing and Urban Development PDF. What was that for?
    There are a number of aspects to being safe and protecting your privacy on the web.
    When you visit a website using Firefox, the browser usually will allow the site to set and retrieve cookies. This allows the site to know your browser from all the other browsers visiting the site. Most cookies do not contain personal or confidential information, but depending on the site you visit, it's possible. Many (most?) sites also include content from other servers, and these servers can set and retrieve their own cookies, often called "third party" cookies. These tend to be for tracking your online activity to show you more persuasive advertising. Firefox lets you manage all kinds of cookies. For more information, see this article: [[Cookies - Information that websites store on your computer]].
    Using Firefox, you also can store information about your browsing: bookmarks, history, information entered on forms, logins, and so on. Are you concerned about any of that information? You could try this feature: [[Private Browsing - Browse the web without saving information about the sites you visit]].
    When you browse the web (in regular mode or private browsing mode), intermediate service providers generally capture information about the sites you visit in their web logs (e.g., date, time, URL). Some people who do not want their ISP to track their browsing will sign up with a VPN service. Of course, you need to trust the service: there is no way to request a URL and not have anyone see it at all.
    Finally, Firefox allows you to install add-ons, either from the Firefox add-ons site or bundled with other software you install. You should keep an eye on add-ons and all other software you install to avoid spyware or malicious programs.

  • Setting up a new developer account has wrong name listed in personal information with no option to edit

    In the process of setting up a new developer account, getting to step #2 & reviewing the personal information, the first & last name listed for my Apple ID is incorrect, however it is correct on the Apple ID settings page, as well as all of my iTunes billing information. How can this be updated? I don't want to create a developer account and be listed with the wrong name!

    Please read before you post.
    Contact [email protected] to investigate signup issues.

  • How to back up and then purge personal information from iPad 2?

    I want to take advantage of the trade in offer at Apple for the iPad.  Before the trade in, I will back up my iPad2 to my iMac.  I will also need to purge all personal information from the iPad2.
    2 questions:
    1.  Once the iPad2 is backed up to the iMac, when I purchase the iPad air and sync it with the iMac - will all the apps, etc populate on the new iPad air or will I have to re-install everything?
    2.  What are the steps to purge personal information from the iPad2?  Where are all the locations that personal information may exist and do I need to go to each location individually to delete or is there a way to delete all at one time?

    1. Yes. When you restore from the backup and sync the new iPad to your iMac everything should be placed on the new iPad just as it was on the old one. Apps, data, photos, etc...
    iOS: Back up and restore your iOS device with iCloud or iTunes
    2.  You will have to reset the iPad to Factory condition to wipe everything off.   Follow these steps to clean it completely.
    What to do before selling or giving away your iPhone, iPad, or iPod touch

  • MAC and IP should specifically be listed "Personal Information" for all interactions in your Privacy Policy

    Except for those who run cute lil' programs that could disorient or disrupt the system, possessing someone's MAC is possessing the 'true name' of at least one portion of their computer. Follow the computer in your accumulated files, and somewhere, this note even, gives you the mailing address, and a good lead on who owner is. IP address, if too static, well, same deal. With policy in place, I can feel free to run a server AND the rest of my system on the same fiber broadband line, saving me enough $/yr to buy an upgrade or two.
    Let's face it, YOU are your equipment, and if I wanted to use my name, I would.

    First, if you keep up a file until you can match a firewall MAC with doc with a name on it, the rest is fairly simple. Traceroute the IP, and, while NOT as easy as a return address sticker, it is a pretty easy thing to do. Mozilla admits this:
    Any information that can connect even a firewall with a place or individual(s)should be defined strictly as "personal information in a privacy policy, period.
    I worry about the Eternal Word, especially the records kept by suppliers of everything, including Mozilla, which, without paperwork like a subpoena or warrant,
    "may share potentially-personally identifying information with its employees, contractors, service providers, and subsidiaries and related organizations. ..." Otherwise, Mozilla will not publicly release potentially-personally identifying information except under the same circumstances as Mozilla releases personally identifying information. Those circumstances are explained below, the Four Reasons Mozilla may release to companies including Google's Doubleclick Division, which crows, in privacy statements about a)getting access to all of Google's raw data, b) crunching and mashing for best web ad placement - NOT for "people like YOU" but Only for YOU the wife of Bradbury's Fireman is told, as she awaits a once-in-lifetime chance to influence the flow of a 3V soap opera..
    Here's one Mozilla protection against releasing information to the PUBLIC, private industry and the governments of the world:
    First, in admitting what you said above is not the case:,
    "... Mozilla also collects potentially-personally identifying information like Internet Protocol (IP) addresses, which are non-personally identifying in and of themselves but could be used in conjunction with other information to personally identify users"
    What does it do with these records, which I would prefer have every identification mark removed the microsecond it arrives?
    Well, if you are not in business with Mozilla, just another user:
    "1. Mozilla does not publicly release information gathered in connection with commercial transactions (i.e., transactions involving money), including transactions conducted through the Mozilla Foundation Store or donations to the Mozilla Foundation.
    2. Mozilla does not publicly release personally identifying information collected in connection with an application for employment with Mozilla.
    3. Mozilla does not make publicly available information that is used to authenticate users the publication of which would compromise the security of Mozilla's websites (e.g., passwords).
    4. Mozilla does not make publicly available information that it specifically promises at the time of collection to maintain in confidence."
    Part 1 is UNTRUE to the extent that Mozilla reports and/or verifies donations, either the 5 largest or everyone donating more than I think it's $30K for the annual Form IRS 990, a NfP's equivalent of a Form 1040 - the last three are generally posted on the foundation site.
    Part 2 is The Law in most states.
    Part 3 promises internal security to Mozilla, and says NOTHING about users.
    Part 4 avoids nasty suits.
    And the list is followed by a curious statement: "Outside those four contexts, users should assume that personally identifying information provided through Mozilla's websites will be made available to the public."
    What about PRIVATE transactions (purchases, trades, 'aid in kind') - curiously missing is any statement? Or 'requests' from public and private guys in suits?
    Ominously, for those who regard the rapid collection of data from social networking 'harmless' or 'fun', "Mozilla may interact with you through social networks to further our mission. When you interact with us at a third-party social network, such as Facebook, Twitter, or Google +, the network gives us the ability to access and store certain information from your profile for that social network.
    Like the guy who posted a copy of an ad he found for hospital lubricant in 55-gallon drums - and found himself the Facebook spokesman for a KY-Jelly-type product.
    "Consistent with our privacy commitments, we will scrutinize third party requests for information about YOU for compliance with the law, including those coming from governmental agencies or civil litigants. We may access, use, preserve or disclose information about you only WHEN WE HAVE A GOOD FAITH BELIEF that it is REASONABLY necessary to do so to satisfy the applicable law, regulation, legal process or LAWFUL GOVERNMENT REQUEST OF ANY COUNTRY, or to protect the rights, property or safety of Mozilla, its users or the public. We will provide notice of legal process or governmental requests unless prohibited to do so by law or the circumstances warrant otherwise."[emphases added, words a direct quote.] Good Faith in legality of actionswas Nixon's initial excuse too - for setting up the Plumbers unit.
    I would prefer a statement like:
    'Mozilla Foundation and its subdivisions are committed to neither selling, trading, supplying, borrowing or using any data that can possibly be linked to a given user or volunteer.
    We will fight tooth and claw on behalf of our users and participants - to resist ANY attempt by any agency, public or private, for ANY reason, including promises of money or advertising, to divulge ANY information about them to anyone, PARTICULARLY when the request comes from a government with a less-than-stellar civil/judicial rights record, according to agencies like Human Rights Watch, the European Union's human rights division, the Permanent Court of International Justice division dealing with mass murderers and the like.
    We will fight as strongly against US, State or local government agency requests for information. We will place the people we work so hard to serve above ourselves, and be dragged kicking and screaming all the way to the courthouse door, with as many live net feeds and calls to the traditional public media as possible. And we will barricade any door if we fear a midnight knock.
    We will provide governments outside the countries where we do business (list here) with nothing unless ordered to by US courts, at least after fighting as many rounds of appeals as we are allowed, and will publicly and politically battle any agency which attempts to get user/participant data from us. All Foundation AND subsidiary employees earning more than $150,000 a year have pledged a minimum of 10% of their salary to these battles, if needed.
    We further put agencies, public and private, on notice that we maintain as little data as possible on our free and paying customers, and do not maintain a single record we are not required to keep, even if it makes our business a bit more difficult to perform.
    And if we get word someone might be coming, they're liable to find all computers free of data, which, if legally possible - before a subpoena or warrant arrives, just on rumor it is coming, we will destroy everything - to the point of installing and activating scuttling devices on all disks and backups, no matter where stored. We take this protection very seriously, and would rather face a business and directory rebuild than give any information that could locate a product user.'
    I'd rather like to see a statement like this as part of the Privacy Policy of every IT-related corporation in the world - though I doubt even Mozilla has the nerve or commitment to its manifesto. We wont ever see anything like it - when asked by the local Homeland Security-style division, for info on a dozen or, for that matter, all users, it is CYA time around the world.
    Smith 1 is in 1984, Smith 2 is a great San Francisco xerography artist. Smiths 3,4,5,6,7 have been spotted on the net. Use the name, it is a good name to let Big Google know how you feel.

  • What kind of "Personal Information" is sent in a Mozilla Firefox Crash Report?

    In the Mozilla Browser Privacy Notices it says that "Personal Information" may be collected in a crash report. What kind of information is this? Also, if I submit the URL of the website I was on when Firefox crashed, where can I see this URL? It doesn't appear to be in any of the Crash Reports I've seen so far..

    ''philipp [[#answer-695475|said]]''
    <blockquote>
    ''Mountains [[#answer-695466|said]]''
    <blockquote>
    So unless I provide an e-mail address, or I'm logged into my webmail, and this webmail-site (or Facebook, twitter, etc) is sent to Mozilla, no personal information is sent? For example if I visit bbc.co.uk, no personal information is sent?</blockquote>
    exactly, and even if you're logged into any account this doesn't mean that personal information is transmitted - this might only be the case when the URL contains any clues about this, like: www.example.com/?inbox=[email protected]
    <blockquote>And it is not possible for me either to see the visited URLs from my crash report?</blockquote>
    no, this is not possible
    <blockquote>Also, is the "send the URL of the visited page" checked by default? Or do I have to opt-in to send the URL in the crash report?
    </blockquote>
    currently the send URL box is opt-in and not checked by default on Firefox & Firefox for Android. On Firefox OS it is opt-out...
    </blockquote>
    Sorry for all the questions. But I have two other questions as well, I hope you could help me with those too, it's very kind of you:)
    I was wandering if there is a "Unique Device ID" or something similar, that makes it possible to know that it's the same computer/browser that sends different error reports? For example if I send one error report one day, and then three days after send another error-report, would it be possible to know that this is the same computer? And the second question: if you have multiple tabs open in the browser, and you send an error-report with the URL of the visited site as well, would the URLs of all these sites be sent as well? Or just the tab I was on when the error-report was sent? I'm sorry for all the questions, I really appreciate your help!:)

  • Electronic Personal Information Repository

    I am looking for a program that will organize and secure all of my personal information. Information such as: credit card numbers, bank account information, web site passwords, etc. Does anyone use something like this?
    Back in the days when I used Windows, I had a program called FlexWallet that synced with my PocketPC. It organized all sorts of information for me and secured it with a password.
    Now, of course, I could just write myself a database or open up a TextEdit file and keep all my valuables in a text file. This would be fine as long as I keep my computer password protected and always lock it when I walk away from it, but you can never be too safe, right?
    Thanks,
    Jonathan
    MacBook Pro 15"   Mac OS X (10.4.6)  

    You can create a new keychain with "secure note items" to store sensitive data like account numbers, credit card numbers etc. by creating a new keychain ( this is so the keychain does not even have the same password as your original keychain) Then choose File >> New Secure Note Item. Hope this helps.
    -mj
    [email protected]

Maybe you are looking for

  • Working, now not working

    Hi all, I have just upgraded my PC from my sig data to a MSI K9VGN-V MoBo etc etc. It was working OK with an old 20 pin PSU - 20 pin block and 4 pin block for the CPU. Today I fitted a nice new Corsair VX550w PSU - 24 pin block, now the PC won't powe

  • How can I import selected images from a folder instead of the whole folder in iPhoto 9.5.2?

    Hi there, I was trying to help my parents import some photos from a folder they have created with photos from their holiday. They only want to import select images from this folder into iPhoto. I said it would be easy and they can do it in 2 ways. Fi

  • Accouting Integration - status does not appear for selection...

    We are on PPM5.0. We intend to replicate cProjects into PS. We have carried out Accouting Integration, with all the required settings/configs. The Project Type is marked for "Accouting Integration" (with "Flag for Transfer" as the trigger for PS proj

  • Looking to run autodesk inventor on a new mac pro* will it work?

    Looking to run autodesk inventor on a new mac pro* using boot camp and windows. Will it work or am I waiting my time?

  • Bi_server will not start

    I'm trying to figure out why my bi_server will not start.  It was running fine, but after restarting the server, I can no longer start it and I get the error below: b_server1 FAILED_NOT_RESTARTABLE When I try to start the server, I get this long erro