IBP 4.0 FP1 Patch 2 - Need more info on new features in Supply Planning

Hi All,
I was reading the SAP help and some of the new features are not very clear to me, if you have clarity around it please read and help me to get more clarity.
As per SAP Help,The following features are now available in IBP for supply:
Separate lead time units of measure can be defined for use in multiple planning areas depending on different time granularities.
My Query - Where do we define it? I do not see any additional attribute in the MDT where lead time is present but don't see any attribute to define lead time units or any other different settings in the planning area so how can we define this?
Static periods of supply are taken into account as input for the inventory target, with projected periods of coverage provided as output.
My Query - What exactly has changed and which are the new key figures here to support this? I could not understand this from reading the above text.
Independent demand is taken into account as input at the product location, in addition to the distribution demand from other nodes and customer demand.
The optimizer algorithm supports the Non-Delivery Cost Rate key figure as input for the independent demand at the product location.
My Query - A new key figure "INDEPENDENTDEMAND" is available now @PERPRODLOC so first point is very clear but second point is very confusing to me as "Non delivery cost rate" is only defined @PERPRODCUST so how we will define the non delivery cost rate for independent demand which is at different planning level and if we are not able to define it how optimizer algorithm will support it? Ideally it needs to be at same level like consensus demand and Non delivery cost rate both @PERPRODCUST Level.
Thanks
Girish

Hi Mark,
While I'm not in your list of people to respond I figure I give it a go anyways :-)
The list of features you mentioned is a nice summary. One of the main release themes is data quality as you noticed. Apart from changes to the name&address functionality we also added the advanced matching and merging into this release. So you can use custom rules to match and merge data. This also allows you to do things like householding for customer data records. In essence we have now completed the integration of Pure*Integrate into Warehouse Builder.
The mapping debugger is another big thing. This allow you to walk through your mappings and see in detail what happes to the data.
The metadata change management is now in the UI. THis means there is now object level version management in Warehouse Builder via the UI. You can also compare versions and get a difference report.
As you mentioned there are a number of smaller and bigger features next to this. The idea for this release is to make OWB a top Data Quality product and allow you to do your ETL and DQ in one tool. Apart from that we have added usability features (debugger, N&A wizard) and we have added some features to solve specific problems.
Especially the corelated commit is interesting in that respect. You can now, in a map with multiple targets control the commit, and choose to either commit all targets or none, or commit them individually (current behavior).
As usual there is a lot more, as this is indeed a major release. Keep an eye on OTN for more collateral regarding the new features. We are currently updating the site to reflect the new stuff.
On the OLAP patch, both 9.0.4 and 9.2 will work equally well with the OLAP patch (when it is available). In 9.2 we added some small thing around composites. More about that when there is an OLAP patch to test this one on in a customer site.
I hope this answered the question, if not let me know.
Jean-Pierre

Similar Messages

  • Why do I get a message 'need more storage' after I purchased a storage plan of $40 ?

    Why do I get a message 'need more storage' after I purchased a storage plan of $40 ?

    Go to Settings-iCloud-Storage&Backup Check how much the total storage is and how much storage you have available.mIf you are using the entire storage it is normal that you get this message.
    Best,
    Burcu

  • Need more info on EO,VO and AM *.java files

    HI,
    Friends and experts I need your help in learning OAF.
    I am new to OAF and want to know more info about the following java classes.
    When I created a simple search page with EO, VO and AM, the following java classes are created.
    I want to know
    what is it?
    what we do with that ?
    where we use that?
    Any sample scripts if possible?
    EOImpl.java
    Please correct me if I am wrong,I know that we use this one for manipulating data for a particular row ,operations such as getattribut,setattribute, delete ,update, insert. There are various methods got created when you create the EO if you select options on the " Generate Method " during step 4 on EO wizard.
    EOCollImpl.java
    VOImpl.java
    ViewRowImpl
    AMImpl.java
    Thanks
    Sri.

    Hi Sri ,
    EO :
    Entity Objects are basically based on one table which encapsulate the business rules. These objects are used by OAF page to perform update/insert/delete operations .
    Inside EOImpl.java you will find setter() and getter () methods in java we call it as accessor and mutator , each attribute in EO is mapped to column in the data base table .
    You can also generate a create () method Validate () method .
    Eg : To get the sequence value in OAF you can use Create() method .
    VO :
    VOImpl (VO) : It just consist of an Data base sql query , you might have noticed while executing a query eg : VO.executeQuery() ;
    to perform any validation it provides iteration over and access to the view rows in its result set.
    VoRowImpl : Represents a single row in a view object .
    You will understand better when you writing a code using voimpl /voRowimpl objects
    AmImpl :
    It basically performs the Business logic , we will define all our methods to implement business logic .
    Eg : you can call a method from controller and define the method Amimpl.java , you can use of initializing the query or
    you do DML operation , etc ...
    In summery : The main reason why we have java file distribute across EO , VO , AM is because OAF is designed with MVC design pattern ,
    in other words we have to isolate the responsibility of code in each layer ( Model , View , Controller ) .Its bad practice to write
    the entire code in one single class file .
    Eg : Controller class should accept the parameter from user and pass these parameters BC4J files ( AMImpl.java ) and its Job of the AMImpl.java
    to perform the business logic and return the result back to to controller .
    To enforce the coding standard of MVC design pattern we have these java files EO , VO , AM , CO . with more practice you will understand the various
    methods defined in each of these java files .
    Keerthi

  • Need more info about "NestedContainer" violation

    Hello,
    I have a "NestedContainer" violation for a Canvas container in my application. Compared to the application's root container it is located at level 6 i.e. nested in 5 other parent containers. However at the same time I have other containers (again Canvases) which are even deeper nested for example at level 8 compared to the root container.
    I need more information when exactly the "NestedContainer" violation is triggered so I fix my code if needed and submit a bug for FlexPMD in case the rule is not implemented as designed.
    Thanks!
    Smirnoff

    Hi
    I would like to share an example but I need to create it since I don't want to post the actual source code.
    Simply copying the problem mxml file under another name doesn't work because it is put outside its container and then the violation is not generated.
    If I have to create an example it might be too time consuming to achieve these:
    - keep the same component hierarchy
    - keep the problem present
    - keep the example clean from the real source code
    That's why I wanted to get more info when this violation is triggered and hopefully create an example faster.
    Smirnoff

  • How do I find out my keychain password? Need more info fast about this

    My computer started to get really slow, so I looked what I could do to make it faster again. After searching I found that the safari content was high and that I should delete it to make it less laggy and slow. Long story short I ended up deleting my saved passwords on safari...Looking into more info, I found out that I needed to get to Keychain Access. I got to Keychain access, found all the passwords.
    My question..
    •How do I get them out of Keychain?
    •If I end up needing my password for Keychain, how do I find that out? I have the like start up CD, but I dont remember ever making a password.
    •And if I do retreive my Keychain Password some how, will that delete everything stored in Keychain? I would have just tried it, but its a lot of passwords I CAN NOT lose...
    Please help :/
    Thanks!

    Never mind the screenshot.
    Please read this whole message before doing anything.
    This procedure is a diagnostic test. It’s unlikely to solve your problem. Don’t be disappointed when you find that nothing has changed after you complete it.
    The purpose of the test is to determine whether the problem is caused by third-party software that loads automatically at startup or login, by a peripheral device, by a font conflict, or by corruption of the file system or of certain system caches.
    Disconnect all wired peripherals except those needed for the test, and remove all aftermarket expansion cards, if applicable. Start up in safe mode and log in to the account with the problem. You must hold down the shift key twice: once when you boot, and again when you log in.
    Note: If FileVault is enabled, or if a firmware password is set, or if the boot volume is a software RAID, you can’t do this. Ask for further instructions.
    Safe mode is much slower to boot and run than normal, with limited graphics performance, and some things won’t work at all, including sound output and Wi-Fi on certain models. The next normal boot may also be somewhat slow.
    The login screen appears even if you usually login automatically. You must know your login password in order to log in. If you’ve forgotten the password, you will need to reset it before you begin.
    Test while in safe mode. Same problem?
    After testing, reboot as usual (not in safe mode) and verify that you still have the problem. Post the results of the test.

  • Need more info on Java SE 6 after downloading my new operating system to Yosemite

    I updated my operating system on my MacBook Pro to Yosemite 10.10.2, now when I try to open CS4 it directs me to download Java SE 6, but the "more info" button which is to direct to the website to download the Java, does not work, and I can't find anything or where to download this. I need CS4 to do my work, can someone help me?

    Get Apple Java 2014-001.

  • 6358629 SSLSocket.close() / read() deadlock  - need more info

    Java 1.5.0_14 is documented as having this fix ....
    "6358629 jsse runtime SSLSocket.close() and SSLSocket.read() deadlock "
    I cannot find this bug in the bug db and the sun page says sometimes bugs don't show up for security reasons.
    The complete absense of info on this bug other than its title means I cannot tell whether this is the same bug I am seeing randomly in production.
    Given that I cannot replicate the problem in a reproducable test case I need sufficient info to justify upgrading the prod VM and risk introducing new bugs in an otherwise stable platform.
    Is there any way to get more info on this bug ?
    Anyone seen a problem like this in their system?
    Is it possible Sun has just hidden the bug for no good reason?
    Any help appreciated.

    Hello, thank you very much for your information.
    I had met same bug on Linux.
    java version "1.6.0_11"
    Java(TM) SE Runtime Environment (build 1.6.0_11-b03)
    Java HotSpot(TM) 64-Bit Server VM (build 11.0-b16, mixed mode)
    My workaround is here. Closing file descriptor directry by calling private native method( closeSocket0 of java.net.PlainSocketImpl ) using reflection.
    It works well on my environment.
    public static void closeNativeSocket( Socket socket )
    try
    Object object = socket;
    String fieldName = "impl";
    Field field = null;
    Method method = null;
    Class clazz;
    clazz = Class.forName( "java.net.Socket" );
    field = clazz.getDeclaredField( fieldName );
    field.setAccessible( true );
    object = field.get( object );
    clazz = Class.forName( "java.net.PlainSocketImpl" );
    method = clazz.getDeclaredMethod( "socketClose0", new Class[] { Boolean.TYPE } );
    method.setAccessible( true );
    method.invoke( object, new Object[]{ new Boolean( false ) } );
    catch( Exception e )
    e.printStackTrace();
    hope this helps.

  • Need more info for the ag34405 DMM VI's

    Hi !
    I'm working with the Agilent 34405a multimeter and made a little VI for data-logging. The problem is, I want to choose between 4.5 & 5.5 resolution and the is no litterature about it. I'm using the NI drivers and VI's made for this application. There is a VI named "Configure measurement.vi" in which you could perhaps select the resolution (as the default value is 0.0001, that would be for 5.5 digits I think). I already tried to change the value from 0.0001 to 0.001 but the instrument still use the 5.5 digit measurement method.
    Does somebody also know if there is more documentation as the contextual help of each VI made for the ag34405a DMM (there are more or less only default values explained, but I would need more...)?
    I've attached my VI if this could help to solve this issue. Am working with LabView 8.20.
    In advance, thanks for your help !
    Yves
    Attachments:
    Start_stop_logging_ag34405a_V1.vi ‏47 KB

    Yves,
    One of the things that is great about instrument drivers is the context help on each of the controls. You can turn the context help on with Ctrl+H and then hover you mouse cursor over the control. If you open "Configure Measurement.vi" and look at the help for the absolute resolution control you'll see a good description that includes:
    Notes:
    (1) The instrument driver ignores this parameter if the Range parameter is set to AG34405A_VAL_AUTO_RANGE_ON (-1) .
    If you look at the help of the Range parameter you'll find see a similar discription with details and the following:
    Defined Values:
    AG34405A_VAL_AUTO_RANGE_OFF (-2)   (-2.0)  - Auto-Range Off
    AG34405A_VAL_AUTO_RANGE_ON (-1)    (-1.0)  - Auto-Range On
    Based on this, can you try setting the auto-range to -2 and specifying the absoulte resolution?
    Regards,
    Kamran

  • Need more info abt the functions of each classes in Workflow API's of BPEL

    Need more information about the functions of each method of the classes in Workflow API's of BPEL
    The Java documentation of the workflow API (especially Identity Service classes) is having a one liner explanation for the methods of each class. We need to implement our own Identity Service that implements the BPMIdentityService interface. We are not able to map the function of each methods of this interface to what our security subsystem provides. We feel that we need more detailed information about what each method of each class is doing internally so that we can map to whatever our security subsystem provides.
    The BPEL Developers Guide does not talk about the functionality of each methods of this interface. If anybody can guide me to look into some documentation that has this information or if anybody has this information, then please do the necessary help.
    Regards
    Ramana

    Did you find out the solution for your above posted query ? I'm also in need of some documents. Can you help me out?

  • Need More Info on Server 2012 R2 Essentials

    I'm currently running Server 2008 R2 Foundation for my wife's (1 person) online business, and have been looking at 2012 R2 Foundation vs Essentials.  The latter sounds like a better fit, since in my absence, my wife has limited IT knowledge/experience, but
    I need more information:
    1) Can Essentials be run in a WORKGROUP instead of a domain?  I currently have my server that way, and it serves our needs very well.
    2) I read in some of the forums that while essentials allows 25 users, only two can be logged in concurrently.  Is that true, or am I missing something?
    3) Server 2012 R2 Foundation DOES NOT require CALs for local LAN users, is this also true with 2012 R2 Essentials?  Also, how much are the CALS for RDP users?
    Capt. Dinosaur

    Hi again, Grey, and thank you for your response.  I do appreciate your detail, and I'll answer them each in turn.
    "1) http://technet.microsoft.com/en-us/library/dn281793.aspxMust be the domain controller at the root of the forest and
    domain, and must hold all the FSMO roles."
    Well I guess if it must it must, although I don't understand why the (first) response above states emphatically that a workgroup can be used.  I prefer a workgroup because I understand it much better than a domain setup, and I don't understand Active
    Directory etc.  When I bought my server in 2011 I hired someone to set up the os for me.  I also purchased Mark Minasi's book on 2008 R2, but so much of it was over my head.  Fifty five years in the computer business, and today I feel as though
    I've never seen one before (hence the name Capt. Dinosaur).  I am, however, signed up for a course in Managing Windows Server 2012 which starts in January.  I hope that helps get through my aging grey matter.  All these initials and acronyms
    are total confusion to me, along with my case of chronic CRS (Can't Remember Squat).
    "2) If you say you have 3 different users logged into Foundation with RDP I
    am not going to argue.  I know the license only allows for 2
    administrative connections. http://technet.microsoft.com/en-us/library/cc770759.aspx 
    The default connection (RDP-Tcp) only allows a maximum of two simultaneous
    remote connections."
    I currently have two licenses for 2008 R2 Foundation, and Ithe users who log in to those remotely are
    NOT administrator accounts.   I don't know if that makes a difference, but I've had both users logged in from Florida and I was logged in (as an administrator) from a local workstation.  I had to test that early on to make sure
    that my two users could log in concurrently, and that I could be logged in to manage the system.
    "As a rule we do not suggest you use your server as a workstation. ..."
    Maybe I misled you with something I said, but I/we do not use the server as a workstation.  Sometimes, though infrequently, I have to log in to the server directly (as Administrator) to do or fix something, but do not stay on it for
    normal work.  When we're home my (Dell Precision Mobile) Workstation is connected to my LAN.  I also do software development on that workstation.  I have a development environment on an external eSATA drive attached to my workstation,
    and both a beta and a live environment on the server; I use my workstation to operate all three.
    "... And I really have no clue what would happen if you
    restored your dell box to something else.  It may fail activation. 
    Guess you need to try that sometime. ..."
    I have tried it, albeit to another - but completely different Dell box, which is normally the only brand I use;  that's a holdover from my mainframe/minicomputer days when having a mixed shop was seriously avoided - with a clean bare HDD, and it
    worked.  When the restoration was executed, True Image asked only that you provide the drivers for the new computer, and they do the rest.
    " ... The advantage to the Essentials client backup is it will backup a whole lot of PC's to the server and use data dedupe to keep the backup database small.  So it would backup your wife's PC at
    work and the 3 you have on the road."
    I should explain that my wife's office is in our basement at home, in a separate room from my computer room.  My wife has a second business making gourmet wine infused jams, and we built a FDA certified canning kitchen
    in the basement, and her workstation is there so that she can work at both businesses.  Her workstation, my server and my workstation are backed up weekly to hard drives in a docking station, and stored in a fire resistant safe.  The
    computers we have on the road are my mobile workstation and her laptop.  When my daughter comes along, she also brings her laptop.  Since no company information is stored on any of the workstations, only the server data are mission critical. 
    "But in any case if what
    you have is doing what you want.  You don't seem to want what essentials
    offers, Active Directory, Remote Access, or Client backup, so why change?"<o:p></o:p>
    I guess I'm something like the man who bought a tuxedo and so now he has to start looking for formal dances to attend.  I should explain that we live in a very rural area - our town has a population of 1,000, 60% of the country is National
    Forest, and my home is literally in in it, bordered by it on two sides - and have only a very small technical college here.  I need to learn all about the server OS and how to administer it so that I don't
    have to hire someone when something needs to be done, and 2012 R2 is the only course available within 100 miles - up until this year they were only offering 2003, and even that was at a different campus 60 miles away (and over a 2,000' mountain). 
    Since the course I'll be taking is for '12,  I'm simply looking to upgrade so that what I have is what the course covers.  All my other computers are running Windows 7 (Pro and/or Ultimate) 
    "More on #1 Active Directory gives you group policy and more  control over file permissions than workgroup.  Say you had a folder shared and it had your bank.xls  You could give your wife permission to see it but not your daughter. 
    Group Policy is probably not a big deal for one client PC.  The advantage is you can make one setting and it can be applied to hundreds of PC's"
    Actually I have remote access now in '08 R2 Foundation, and I'm not sure what Active Directory will buy me, but that could, of course, change when I get into the course.  Not having Group Policies has been a small problem,
    on one or two rare occasions, so that could be a game changer for me, but with what I have now, I've been able to set up my political campaign system such that
    no one from one campaign can see or access any data for any other campaign.  Also I was able to set up the user accounts so that a remote user logging in
    can not see nor execute anything except the campaign system.  Any attempt to do otherwise automatically logs them out.
    In summation, you may just have convinced me that using a domain instead of a workgroup, with all it advantages might just be the way for me to go, since hopefully I'll learn all about that when I take that course.  The limitation of only two concurrent
    RDS users, however, is still worrying me, and I'm not sure that I'm accurately communicating.  If the
    two concurrent RDS user limitation ONLY refers to
    Administrator accounts then there's no problem, because any user accounts other than those for my wife and myself,
    would not be Administrator accounts.  I can't remember whether 2008 R2 foundation supports
    "Power User" accounts, but if so, that would be the highest level any other users would have, and possibly not even that high.
    Capt. Dinosaur

  • Need more info on adding user than is in UserGuide

    Before I send an invitation to someone to be a user and access one of my computers, I need more information on how that works that is provided in the LMI Pro User Guide.  Would really like to actually have RTV conversation with someone familiar with it (having done it), but it that's impossible, here goes. 1Do I have to give him the PW for my entire account, do I specify a separate PW for him, or does he set it when accepting the invitation ? 2
    Will he have to know the UN & PW of the target computer or will he just be "in" by virtue of the LMI Pro account ? 3Will he have all the remote functionality I have - Remote Control, File Manager, etc ? May have more questions later so I would really appreciate a contact who has used this before.  

     
    Hello  ,
    Thanks for posting your query here! 
    1 - When you invit a secondary user with a Pro account, this person will click on the link invitation and be prompted to login/create and account with his own username (email address) and own password - so you will not share yours
    2 - As for the target computer, the username/password of the session  or the acccess code (according to the settings) need to be known indeed.
    3-  The remote functionalities are set on target computers , therefore secondary users would have the ability to do File Transfer and remote printing. 
    Let me know if that clarifies the situation for you and feel free to get back to me if you have further questions!
    Thanks, 
    Best
    Julie

  • HT6104 How do I upgrade to Safari 7 if I currently have OS X 10.6.8 running on my desktop?  I need it to access new features on another website.

    I need Safari 7 to be able to use some of the newer features at Fidelity Investments' website.  When I tried upgrading, I received a message stating that I could not update my OS X system (as currently configured).  Fidelity says this is supposed to be a free upgrade to Safari 7.  Any help appreciated.

    Before you finish considering upgrading your OS, do a check on your existing programs because many of them (in particular those that are PPC) will not work on the newer, higher OSs.
    Cross check using this feature.   Application compatibility table - RoaringApps

  • Who's in Charge? What needed fixing and/or new feature added?

    Having been a software development engineer and manager for over 20 years and a Mac Evangelist since 1984, I have been very disturbed by the GUI changes that Apple has made to the OS X over the past 5 years.
    There appears to have been an invasion of Microsoft SW programmers into the Mac OS X systems SW department.
    Any change to an established GUI should be a very critical concern of any Software Manager and only done to fix a major error or to add new features, which should not impact GUIs for current features.
    The most costly investment a user makes in any software is in the user training to become productive in its use.  This is where the GUI makes or breaks the user experience and his decision to continue its use or toss it and replace it with another app with a more familiar and user friendly GUI.
    When Apple makes changes to the GUI with no apparent benefit except that some rogue programmers decided they didn't like the old way and wanted to "make it their own", it costs the user community literally hundreds of thousands of hours in lost time adjusting the the new GUI without any added benefit and it creates frustration and disappointment with the app. It also creates a sense of betrayal and fear that other unneeded changes to the GUI will follow with more lost time.
    There should be a strictly controlled change control process when any contemplated GUI change is being considered.  A change request must be created and thoroughly reviewed especially with the impact on users being the foremost consideration.  When new features are added, the GUI should be consistent with the current feature GUI as much as possible.  Obviously, when a released feature's GUI proves to be cumbersome and unproductive, it should be revised. But revised only to minimum extent required. When a new GUI for current features can be justified based on consistency, improved productively and/or accuracy, then an option should be provided to current users to revert to the old GUI if they choose to for at least 1 or 2 releases/updates.
    GUI changes should be beta tested by a broad base of REAL users before being released.  REAL users should be heavily weighted to LONG time users and not just based on younger, inexperienced users with very little investment in time relative to the current GUI.
    In GUI software, change for change's sake should be quickly stopped and denied approval for implementation.  Yosemite is a classic example of how not to upgrade software.  It obviously was not very well tested before release. The SW QA dept should be replaced.  The SW Engineering Manager should be fired for approving a Software Specification and GUI Specification that was Yosemite.  Did anyone on the SW Engineering Development team have ANY experience using Mac OS X?  Mavericks was a significant change from Mountain Lion but it was still recognizable as a Mac OS.  Yosemite looks like a rejected Windoze OS release.
    Being an Apple shareholder and a Mac Evangelist since 1984 (even had a Lisa in 1982!) I am deeply concerned that Apple is loosing it's way.
    A user friendly, well tested GUI used to be Apple's strong point and is what created a loyal user base. Let's hope Apple does not lose sight of their best product discriminator.

    You are not addressing Apple here. This is a user to user support forum. If you want to let Apple know how you feel about something, then use the feedback page HERE, and then click on the appropriate subject.
    Sorry, it was a typo, but stedman1 has provided you a good one.

  • Need more info on solving script errors -- don't have Webroot on my computer, but it gets tied up for hours at a time with Mozilla script blockages !!!!

    Whenever I am logged into FF, my computer will eventually grind to a halt -- sometimes after a few minutes, and sometimes after a few hours. I then get the script error message shown below.
    "A script on this page may be busy, or it may have stopped responding. You can stop the script now, or you can continue to see if the script will complete."
    <nowiki>**************************************************************************</nowiki>
    Below that generic message is one of these specific messages:
    Script: resource://gre/modules/XPCOMUtils.jsm:320
    https://secure.wlxrs.com/w!xbEiA1hkt!tswyuOeDSQ/litedepex.js:1
    resource://gre/modules/XPCOMUtils.jsm:323
    resource://gre/modules/XPCOMUtils.jsm:325
    resource:///components/nsPrompter.js:434
    https://gfx7.hotmail.com/mail/16.2.7137.1204/c2a.js:1
    resource://gre/modules/XPCOMUtils.jsm:325
    https://secure.wlxrs.com/w!xbEiA1hkt!tswyuOeDSQ/wlive.js:1
    https://secure.wlxrs.com/_D/w!xbEiA1hkt!tswyuOeDSQ/jquery-min.js:47
    chrome://global/content/bindings/textbox.xml:98
    chrome://mozapps/content/downloads/download.xml:71
    Script: https://mail.google.com/_/mail-static/_/js/main/m_i,t/rt=h/ver=am293eyFlXI.en./sv=1/am=!v8Czf-oeNMn0BO3a1PgLcnZDWwl3f6w7siCzO0WZ4q30IbVM6NJqQEKHLeJhMzB_YcWyBQ/d=1:2729
    http://pagead2.googlesyndication.com/pagead/osd.js:12
    https://gfx7.hotmail.com/mail/16.2.7137.1204/cmpt0.js:1
    http://mail.yimg.com/zz/combo?nq/launch/common-neo-base_6549.js&nq/launch/common-neo-om_6549.js&nq/launch/search-neo_6549.js&nq/launch/inbox-om_6549.js&nq/launch/inbox-listview-new_6549.js&nq/launch/inbox-message-new_6549.js&nq/launch/inbox-minty-fresh_6549.js&nq/launch/inbox-base_6549.js&nq/intl/js/launch/lang_en-US_6549.js&nq/intl/js/launch/conf_us_6549.js:194
    <nowiki>************************************************************************************</nowiki>
    I have no such problem with Internet Explorer or when the computer is not connected to the Internet; it is specific to FF. I do not have Webroot Spysweeper on my computer.
    Strangely enough, we do not have this problem with two other PCs that use FF, nor did I have it on these two computers during the first few years that I used them with FF. I bought a new PC, moved my files onto it, then suddenly it had the same problem, which is what made me think it was a malware issue.
    I checked Windows Defender and found that was not switched on and could not be switched on. So I bought three different anti-malware programs beginning with Malwarebytes and then SpyBlaster and SpyBot S&D. But they did no good.
    Just pressing the "continue" button in response to the script error message does not good, since it allows the computer to continue grinding to a halt. Worse, if those scripts are malware, I don't want them sending private info to internet sites, which is apparently their function.
    Please help me root out the problem. It has made my computer inoperative for several hours a day for the past few months.

    '''Try the Firefox Safe Mode''' to see how it works there. The Safe Mode is a troubleshooting mode, which disables most add-ons.''
    ''(If you're not using it, switch to the Default theme.)''
    * You can open the Firefox 4.0+ Safe Mode by holding the '''Shift''' key when you use the Firefox desktop or Start menu shortcut.
    * Or use the Help menu item and click on the '''Restart with Add-ons Disabled...''' menu item while Firefox is running.
    ''Don't select anything right now, just use "'Start in Safe Mode"''
    ''To exit the Firefox Safe Mode, just close Firefox and wait a few seconds before using the Firefox shortcut (without the Shift key) to open it again.''
    '''''If it is good in the Firefox Safe Mode''''', your problem is probably caused by an extension, and you need to figure out which one.
    Please follow the [[Troubleshooting extensions and themes]] article for that.
    ''When you figure out what's causing your issues, please let us know. It might help other users who have the same problem.''

  • Need more info on like

    I have a department table with following values
    dept     exclude
    xxx     y
    yyy     y
    zzz n
    I need to exclude the dept with the string xxx% and yyy% from college table(i.e) first i have to look for records with the values exclude=y (for ex) xxx and yyy from above and then I need to exclude them from college table.i need to write them in single query.
    spmething like this...
    select * from college where dept not like (select dept from department where exclude ='y')
    but the problem here is i need to exclude the dept which contains the string xxx and yyy.. please help me on this.
    Thanks in advance
    Edited by: GuruRise on Jun 1, 2012 6:21 AM

    Hi Dude,
    Please see the below Expamples. May be it will useful for you to understand the LIKE.
    Description about like,
    The LIKE condition allows you to use wildcards in the where clause of an SQL statement. This allows you to perform pattern matching. The LIKE condition can be used in any valid SQL statement - select, insert, update, or delete.
    The patterns that you can choose FROM are:
    % allows you TO match ANY string OF ANY LENGTH (including zero LENGTH)
    _ allows you TO match ON a single character
    Examples using % wildcard
    The FIRST example that we'll take a look at involves using % in the where clause of a select statement. We are going to try to find all of the suppliers whose name begins with 'Hew'.
    SELECT * FROM suppliers
    WHERE supplier_name like 'Hew%';
    You can also using the wildcard multiple times within the same string. For example,
    SELECT * FROM suppliers
    WHERE supplier_name like '%bob%';
    In this example, we are looking for all suppliers whose name contains the characters 'bob'.
    You could also use the LIKE condition to find suppliers whose name does not start with 'T'. For example,
    SELECT * FROM suppliers
    WHERE supplier_name not like 'T%';
    By placing the not keyword in front of the LIKE condition, you are able to retrieve all suppliers whose name does not start with 'T'.
    Examples using _ wildcard
    Next, let's explain how the _ wildcard works. Remember that the _ IS looking FOR only one character.
    FOR example,
    SELECT * FROM suppliers
    WHERE supplier_name LIKE 'Sm_th';
    This SQL statement would RETURN ALL suppliers whose name IS 5 characters LONG, WHERE the FIRST two characters IS 'Sm' AND the LAST two characters IS 'th'. FOR example, it could RETURN suppliers whose name IS 'Smith', 'Smyth', 'Smath', 'Smeth', etc.
    Here IS another example,
    SELECT * FROM suppliers
    WHERE account_number LIKE '12317_';
    You might find that you are looking FOR an account NUMBER, but you only have 5 OF the 6 digits. The example above, would retrieve potentially 10 records back (WHERE the missing VALUE could equal anything FROM 0 TO 9). FOR example, it could RETURN suppliers whose account numbers are:
    123170
    123171
    123172
    123173
    123174
    123175
    123176
    123177
    123178
    123179.
    Examples using Escape Characters
    Next, IN Oracle, let's say you wanted to search for a % or a _ character in a LIKE condition. You can do this using an Escape character.
    Please note that you can define an escape character as a single character (length of 1) ONLY.
    For example,
    SELECT * FROM suppliers
    WHERE supplier_name LIKE '!%' escape '!';
    This SQL statement identifies the ! character as an escape character. This statement will return all suppliers whose name is %.
    Here is another more complicated example:
    SELECT * FROM suppliers
    WHERE supplier_name LIKE 'H%!%' escape '!';
    This example returns all suppliers whose name starts with H and ends in %. For example, it would return a value such as 'Hello%'.
    You can also use the Escape character with the _ character. For example,
    SELECT * FROM suppliers
    WHERE supplier_name LIKE 'H%!_' escape '!';
    This example returns all suppliers whose name starts with H and ends in _. For example, it would return a value such as 'Hello_'.
    Regards,
    N.Senthil.
    Edited by: Senthil Nataraj on Jun 2, 2012 1:50 AM

Maybe you are looking for

  • How to get the date of Friday for the given week

    HI, I have a requirement to get the date of Friday for the given week. Eg: I have an input of 200722 (Yearweek), From this I need to get the Date of the friday for this week 22 of Year 2007. Plz let me know how to get this.. Thanks in advance.. Sridh

  • After upgrading to lion my battery is no longer recognized ho do i fix his

    Since i upgraded to lion i can only use my macbookpro with the plug - this computer is only 1 year old so i'd imagine  the battery has not ben fully drained.  Also my laptop has slowed down to a craw in everything!!! PLEASE HELP

  • Time Machine Buddy says:  Stopping Backupd to eject destination disk!

    I have a new external hard drive to replace one that failed for Time Machine BAck up.  I formatted it and two nights ago,  did a successful initial backup which consisted of about 600 or 700 GB (on a 2TB drive) . Last night,  I checked on Time Machin

  • Could not edit in photoshop. photoshop does not appear to be installed

    V When editing a menu in Encore this message appears. How to solve? My system is Windows 7 64Bit. Use the Encore and Photoshop CS6 CC. Ao editar um menu no Encore esta mensagem aparece. Como resolver? Meu Sistema é Windows 7 64Bit. Uso o Encore CS6 e

  • Migrate of SCCM Console connection

    Hey, I installed a second MP and additional SMS_Provider to one of my SiteServer to be able to connect via SCCM AdminConsole to it. Unfortunately it is not working :P What I already checked is the existence of WMI keys Root\SMS\site_<site code> with