Is possible to save the user that uses the download action in an interactive report.

Hi,
In my application I want to save who is downloading the interactive reports information in any format, is it possible?
Regards

Hi Eva,
As far as I know there is not an out of the box option that shows you the user that is downloading the interactive report. I guess you would have to write your own logic for that.
You can create your own logging table and a dynamic action with
1) a pl/sql procedure to insert the logging into the table, and
2) submits the page with the appropriate download format, eg. f?p=&APP_ID.:&APP_PAGE_ID.:&SESSION_ID.:CSV::::
As trigger of the dynamic action you need to use either of the download buttons, so I'd suggest the jQuery selector "#apexir_dl*"
Kind regards,
Vincent

Similar Messages

  • How get the user that use CRM in my web site

    Hi all,
    I have a web app that connect to my CRM. I use C#.
    I connect to CRM with my credential because I'm admin in CRM.
    But my app is used from others CRM user and I need to know who is systemuser CRM that use app.
    I need the same of Xrm.Page.context used in js or the same context used in plugin, but I have the problem that I connect  to CRM with my user. So If I use WhoAmIRequest class I have my userid and not the userid of the user that use my web app.
    Is it possible know this? Do I change my login with user login in CRM?
    Thanks

    Hi,
         As you use system admin to connect to CRM, WhoAmIRequest does not return the user from website. You are correct. Change that so that it uses logged in user however be aware that means each user needs to be a valid CRM user else they
    will get not a valid user error.
    Hope this helps.
    Minal Dahiya
    blog : http://minaldahiya.blogspot.com.au/
    If this post answers your question, please click "Mark As Answer" on the post and "Vote as Helpful"

  • How can I find out the screen size of the users moniter using the Acrobat SDK?

    How can I find out the screen size of the users moniter using the Acrobat SDK? I need to know how much sreen real estate that is available on the users moniter. Is there some call that I can make from the SDK to discover the maximun X and Y coordinates?
    Thanks,
    Gregory

    Currently, I am testing on multiple moniters and it is defaulting to the moniter designated as the #1 moniter. For our purposes, this is acceptable. Once the two documents have loaded, the user can move and re-size at will.
    Gregory

  • Restrict the users to use the field Unplanned delivery cost at MIRO

    Dear Friends,
    I want to restrict some users to use the unplanned delivery cost at MIRO. It should be displayed as visible to enter for some users and it should be displayed in grey mode not to enter anything for some users. I am asking this to restrict some misutilisation of this field by some users. Can I restrict through profiles?
    Simply, I want to restrict the users to use the field Unplanned delivery cost at MIRO through Profiles of them. Pls help me,, it is impacting our business.
    Regards,
    Venkata Reddy.Mudda

    Hi,
    Check the customization for unplanned cost:
    SPRO -- Materials Management -- Invoice Verification -- Logistics Invoice Verification -- Incoming Invoice -- Configure How Unplanned Delivery Costs Are Posted
    Best Regards
    Anamika

  • Find the user that executed the SQL procedure

    We are using Oracle 10g R2 on Linux.
    I want to know the OS user that executed the purging procedure (PURGE). For this, i am using the following query which is not returning any row:
    select *
    from DBA_HIST_ACTIVE_SESS_HISTORY ash, DBA_HIST_SQLTEXT s
    where ASH.SQL_ID = s.SQL_ID
    and UPPER(s.SQL_TEXT) like '%PURGE%';Is the above query fine?

    Moazzam wrote:
    We are using Oracle 10g R2 on Linux.
    I want to know the OS user that executed the purging procedure (PURGE). For this, i am using the following query which is not returning any row:Since what you are doing to get the user indirectly is not working would another approach be helpful?
    Since you want to know who is running the procedure would a log table you could insert into at the start or end of the procedure help, to store the information you are interesting in seeing?
    Or, can you get the information you want from other system views? V$SESSION has the OSUSER column as well as SQL_ID and other join columns for other views (like V$SQL).

  • CC log  for user that used the application

    Hello GRC gurus ,
    I would like to know if there is a possibility to check users last log on in Compliance Calibrator . We have people that are doing simulations over Informer tab--> risk analysis --> user level and we would like to have a log .
    Thank you very much in advance

    Hello David,
    Well, sorry but I am still not clear with your question. There are two diffrent things I can guess in the same message. I would request you to please let me know which is the one which exactly you want to do, and would explain you both of the cases as under:
    1. Are you wanting to monitor if risk analysis is done on role creation?
    OR
    2. Are you wanting to monitor if the risk analysis is done on the assignement of the role to a user?
    I'm asking this because each of these 2 requirements can be  achieved by RE and AE respectively and the user carrying out these tasks need not even log into CC for doing either/both of 1 & 2.
    For 1:
    You can use RE and enable the Risk analysis step in the role creation process by enabling and using the web service which connects the Risk analysis from RE to AE. Here (in RE) you can enable the option "not to generate the role if Risk analysis is not done", to ensure everyone does a risk analysis before generating a role.
    For 2:
    You can use AE directly and do a risk analysis the same way as we did for RE (by using web service), before the role assignment is approved/done to the user.
    CASE 3:
    In case you do not have RE or AE installed (which is also one of the inferences I get from your post when you mentioned that there is one service desk who takes care of the role assignments), you may configure Risk Terminator in this case, wherein you can configure this tool at the backend to make it mandatory to do the risk analysis when:
    a) A role is generated at the backend.
    b) A role assignment is done at the backend.
    Regards,
    Hersh.
    Edited by: HERSH GUPTA on Sep 27, 2008 11:54 PM

  • How can i change the user that open the rfc connection (sm58) from R/3?

    Hi all,
    i'd like to know how can i customize the user 'connecting' R/3 and BW, i mean: when i launch a data extraction a fixed user creates the rfc connection to BW (and i can see it from tcode sm58 in r/3), i need to use a different username so that it will come be more easy for me to reorganize the rfc queue in case of errors (we are doing some testing), it's possible to do something like this or everyone has to share the same user r/3 side?
    I hope i've been clear...
    thanks for the help
    S.

    Hi...
    Its recommended that only one user executes the RFC because you must manage the authorizations for remote execution only with few users....in case on error you can send the user as a parameter of the RFC  and you can buid the error message with this parameter and identify the user of execution...
    I hope this helps you
    Regards

  • I had to purchase a new MacBook when my old one was stolen. We have two other MacBooks that use the ITunes library.  Is there any way to get the library transferred to my new computer.

    I had to purchase a new MacBook when my old one was stolen.  We have two other MacBooks in the family that use the ITunes library.  How do I get the full ITunes library on the new computer when I don't have access to the old computer?

    If your backup copy of the old computer was not stolen, then use it to put everything back.

  • Module status on LMS is showing as incomplete - even after the user has completed the module.

    Hi Folks,
    Hope you are all keeping well! I have a bit of a problem here. On a number of modules that were developed using presenter - and custom animation (including click next to continue) etc etc, the LMS is not showing the module status as complete - even AFTER the user had comleted the module and closed. This problem has been noticed only when the user uses the CLICK NEXT or click this part of the screen to continue.
    When the user navigates using the presenter control buttons - to navigate the training content that is, the LMS is correctly showing as the module has been completed.
    The problem I am having is that - is there any way to make presenter detect a click within a slide (user click to navigate from within a slide) and thereby register it as a valid module completion?
    Thanks in advance folks,
    Kind Regards,
    Alex.

    Hi Shubi,
    Thanks for you quick reply.
    Shubhi Shukla Dubey wrote:
    Hi Alex,
    Which LMS server you are using?  Secondly what is the Setting in Quiz>Reporting tab is it SCORM 1.2,2004 or Aicc.
    You want status on basis of user clicks then please make sure that Report data is set to "Slide view =100%" (or whatever precentage you want) and  Report Pass/Fail set to "Complete/ Incomplete."
    Thanks,
    Shubhi
    LMS = cornerstone on demand. It has been customised to suit the company requirements, Reporting tab is SCORM 1.2   
    To circumvent the issue I have changed the % view to 0% so in theory when the user launches even one slide / page - it will set it to report as status complete.
    However this is not a viable solution on content critical modules....dont you think so?
    Ideally I would like to get to the bottom of why a button within the module (which is able to navigate between pages) is not being able to report / set / increment the completion status counter.
    Thanks and Kind Regards,
    Alex.

  • How to check if the user has only the display authority of a message

    hi,
    How to check if the user has only the display authority of a message but does not have the change authority for a certain message?
    Best regards,

    hi blake
    though i am an application consultant and for authorisation u need to have help of BASIS person if u r not the one but still i can guide u regarding the same,
    Basically Authorization Management 
    Use
    You can use the following authorization objects to control the authorizations for maintaining business partner data:
    •        Authorization objects for the Business Partner:
    •             B_BUPA_GRP
    •             B_BUPA_ATT
    •             B_BUPA_FDG
    •             B_BUPA_RLT•       
    Authorization objects for relationships:
    •             B_BUPR_BZT
    •             B_BUPR_FDG
    In addition, you can assign an authorization group to a business partner in the dialog. The authorization group controls which users may maintain data for this business partner.
    You can also define authorizations for fields and field groups using the Business Data Toolset (BDT). Depending on the settings you have made, the system carries out the relevant authorization checks.
    In the dialog in the SAP GUI, you can display an overview of the authorizations assigned to you by pressing the button Settings.
    For more information on authorization management, see the Implementation Guide (IMG) of the Business Partner, as well as in the Developer’s Handbook for the BDT under  Authorizations.
    IntegrationAuthorization management for the Business Partner forms part of the  SAP authorization concept.
    Prerequisites
    You have made the necessary settings in Customizing of the Business Partner under Basic Settings--> -Address Management.
    Moving over
    AS ABAP Authorization Concept 
    The ABAP authorization concept protects transactions, programs, and services in SAP systems from unauthorized access. On the basis of the authorization concept, the administrator assigns authorizations to the users that determine which actions a user can execute in the SAP system, after he or she has logged on to the system and authenticated himself or herself.
    To access business objects or execute SAP transactions, a user requires corresponding authorizations, as business objects or transactions are protected by authorization objects. The authorizations represent instances of generic authorization objects and are defined depending on the activity and responsibilities of the employee. The authorizations are combined in an authorization profile that is associated with a role. The user administrators then assign the corresponding roles using the user master record, so that the user can use the appropriate transactions for his or her tasks.
    Authorization Checks 
    To ensure that a user has the appropriate authorizations when he or she performs an action, users are subject to authorization checks.
    The following actions are subject to authorization checks that are performed before the start of a program or table maintenance and which the SAP applications cannot avoid:
    •        Starting SAP transactions (authorization object S_TCODE)
    •        Starting reports (authorization object S_PROGRAM)
    •        Calling RFC function modules (authorization object S_RFC)
    •        Table maintenance with generic tools (S_TABU_DIS)
    Checking at Program Level with AUTHORITY-CHECK
    Applications use the ABAP statement AUTHORITY-CHECK, which is inserted in the source code of the program, to check whether users have the appropriate authorization and whether these authorizations are suitably defined; that is, whether the user administrator has assigned the values required for the fields by the programmer. In this way, you can also protect transactions that are called indirectly by other programs.
    AUTHORITY-CHECK searches profiles specified in the user master record to see whether the user has authorization for the authorization object specified in the AUTHORITY-CHECK. If one of the authorizations found matches the required values, the check is successful.
    Starting SAP Transactions
    When a user starts a transaction, the system performs the following checks:
    •        The system checks in table TSTC whether the transaction code is valid and whether the system administrator has locked the transaction.
    •        The system then checks whether the user has authorization to start the transaction.
    The SAP system performs the authorization checks every time a user starts a transaction from the menu or by entering a command. Indirectly called transactions are not included in this authorization check. For more complex transactions, which call other transactions, there are additional authorization checks.
    •             The authorization object S_TCODE (transaction start) contains the field TCD (transaction code). The user must have an authorization with a value for the selected transaction code.
    •             If an additional authorization is entered using transaction SE93 for the transaction to be started, the user also requires the suitable defined authorization object (TSTA, table TSTCA).
    If you create a transaction in transaction SE93, you can assign an additional authorization to this transaction. This is useful, if you want to be able to protect a transaction with a separate authorization. If this is not the case, you should consider using other methods to protect the transaction (such as AUTHORITY-CHECK at program level).
    •        The system checks whether the transaction code is assigned an authorization object. If so, a check is made that the user has authorization for this authorization object.
    The check is not performed in the following cases:
    You have deactivated the check of the authorization objects for the transaction (with transaction SU24) using check indicators, that is, you have removed an authorization object entered using transaction SE93. You cannot deactivate the check for objects from the SAP NetWeaver and HR areas.
    This can be useful, as a large number of authorization objects are often checked when transactions are executed, since the transaction calls other work areas in the background. In order for these checks to be executed successfully, the user in question must have the appropriate authorizations. This results in some users having more authorization than they strictly need. It also leads to an increased maintenance workload. You can therefore deactivate authorization checks of this type in a targeted manner using transaction SU24.
    •             You have globally deactivated authorization objects for all transactions with transaction SU24 or transaction SU25.
    •             So that the entries that you have made with transactions SU24 and SU25 become effective, you must set the profile parameter AUTH/NO_CHECK_IN_SOME_CASES to “Y” (using transaction RZ10).
    All of the above checks must be successful so that the user can start the transaction. Otherwise, the transaction is not called and the system displays an appropriate message.
    Starting Report Classes
    You can perform additional authorization checks by assigning reports to authorization classes (using report RSCSAUTH). You can, for example, assign all PA* reports to an authorization class for PA (such as PAxxx). If a user wants to start a PA report, he or she requires the appropriate authorization to execute reports in this class.
    We do not deliver any predefined report classes. You must decide yourself which reports you want to protect in this way. You can also enter the authorization classes for reports with the maintenance functions for report trees. This method provides a hierarchical approach for assigning authorizations for reports. You can, for example, assign an authorization class to a report node, meaning that all reports at this node automatically belong to this class. This means that you have a more transparent overview of the authorization classes to which the various reports are transported.
    You must consider the following:
    •     •         After you have assigned reports to authorization classes or have changed assignments, you may have to adjust objects in your authorization concept (such as roles (activity groups), profiles, or user master records).
    •     •         There are certain system reports that you cannot assign to any authorization class. These include:
    •     •         RSRZLLG0
    •     •         STARTMEN (as of SAP R/3 4.0)
    •     •         Reports that are called using SUBMIT in a customer exit at logon (such as SUSR0001, ZXUSRU01).
    •     •         Authorization assignments for reports are overwritten during an upgrade. After an upgrade, you must therefore restore your customer-specific report authorizations.
    Calling RFC Function Modules
    When RFC function modules are called by an RFC client program or another system, an authorization check is performed for the authorization object S_RFC in the called system. This check uses the name of the function group to which the function module belongs. You can deactivate this check with parameter auth/rfc_authority_check.
    Checking Assignment of Authorization Groups to Tables
    You can also assign authorization groups to tables to avoid users accessing tables using general access tools (such as transaction SE16). A user requires not only authorization to execute the tool, but must also have authorization to be permitted to access tables with the relevant group assignments. For this case, we deliver tables with predefined assignments to authorization groups. The assignments are defined in table TDDAT; the checked authorization object is S_TABU_DIS.
    You can assign a table to authorization group Z000. (Use transaction SM30 for table TDDAT) A user that wants to access this table must have authorization object S_TABU_DIS in his or her profile with the value Z000 in the field DICBERCLS (authorization group for ABAP Dictionary objects).
    please See also:
    •        SAP Notes 7642, 20534, 23342, 33154, and 67766
    guess this info will help you,there is one graphic which actually explain the hierarchy of authorisation,i will find some time out to let u know more info about the authorisation
    but if u sit with ur BASIS guy then u can learn lot of things in PFCG
    i guess u r a basis guy,then its not a problem
    best regards
    ashish

  • How to find the user who deleted the contents of DSO.

    Dear friends,
    Can u please tell me ,how to find the user who deleted the contents of the DSO.
    The user has deleted the complete contents of the DSO. We need to find the user ,date and time.
    regards,
    Vijai

    Hi,
    If the user has used the manage option to delete the contents of the DSO then the changed by field will be updated by the users name. In case a program is used for the deletion then it wont be the case.
    Regards
    Govind.

  • Is it possible to hide the save function and only use the save as function in teststand

    Hi,
    When i'm done building a sequence i want to prevent other engineers to save the sequence with the same filename (or version number).
    Is it somehow possible to "hide" the save button and only use the save as function?
    Or is there another possiblity to solve my problem.
    The idea is to have a sequence called Sequence_V1.0.seq which i have build. When installing this in a factory enviroment I would like whenever there is a change needed in the sequence that the version number increases (manual action) (becomes Sequence_V1.1.seq). So from the moment you want to save i would like to only have the function save as. In this way you are obligated to fill in a new sequence name (original sequence will be read-only)
    What would even be great if there could be a log of what the changes were
    Thx!!! 

    1) You could mark the file as read-only, by default you would then not be able to save over it. The user could make it not read-only though if they know what they are doing.
    2) Another possibility is to lock the sequence file for editing (this is a teststand feature). Go to the Sequence File Property dialog, on the advanced tab, where it says Password Protection, set it to Not Editable and give it a good password. This doesn't however keep someone from saving another file to the same name as the locked one, but they at least won't be able to saved the locked file again without your password, nor will they be able to edit it.
    Hope this helps,
    -Doug

  • How to find out the Transactions used per month & the USER who used that

    Hi,
    1)How to find out the Transactions used per month & the USER who used that?
    2)and can i get the above same for minimum 20 month?
    System : SAP- Enterprise Core Component.

    You can use my program...
    *& Report  Z_ABAP_TCODE_MONITOR
    *****&  Program Type          : Report                                 *
    *****&  Title                 : Z_ABAP_TCODE_MONITOR                   *
    *****&  Transaction code      : ZTCODE_USAGE                           *
    *****&  Developer name        : Shailendra Kolakaluri                  *
    *****&  Deveopment start date : 26 th Dec 2011                         *
    *****&  Development Package   : ZDEV                                   *
    *****&  Transport No          : DEVK906086                                       *
    *****&  Program Description   : This program is to display
    *List all tcodes executed during previous day.
    *& Show the number of users executing tcodes
    *& Modification history
    REPORT  Z_ABAP_TCODE_MONITOR.
    *& List all tcodes executed during previous day.
    *& Show the number of users executing tcodes
    TYPE-POOLS : slis.
    DATA: ind TYPE i,
          fcat TYPE slis_t_fieldcat_alv WITH HEADER LINE,
          layout TYPE slis_layout_alv,
          variant TYPE disvariant,
          events  TYPE slis_t_event WITH HEADER LINE,
          heading TYPE slis_t_listheader WITH HEADER LINE.
    *REPORT  z_report_usage.
    TYPES: BEGIN OF zusertcode,
      date   TYPE swncdatum,
      user   TYPE swncuname,
      mandt     TYPE swncmandt,
      tcode     TYPE swnctcode,
      report TYPE swncreportname,
      count     TYPE swncshcnt,
    END OF zusertcode.
    *data   : date type n.
    DATA: t_usertcode  TYPE swnc_t_aggusertcode,
          wa_usertcode TYPE swncaggusertcode,
          wa           TYPE zusertcode,
          t_ut         TYPE STANDARD TABLE OF zusertcode,
          wa_result    TYPE zusertcode,
          t_result     TYPE STANDARD TABLE OF zusertcode.
    PARAMETER: month TYPE dats DEFAULT sy-datum.
    *PARAMETER: date TYPE dats.
    *select-options : username for wa_usertcode-account.
    START-OF-SELECTION.
    PERFORM get_data.
    PERFORM get_fieldcatalog.
      PERFORM set_layout.
    PERFORM get_event.
    PERFORM get_comment.
      PERFORM display_data.
    FORM get_data .
    *date = sy-datum - 2 .
    After start-of-selection add this line (parameter Month required 01 as day).
      concatenate month+0(6) '01' into month.
      CALL FUNCTION 'SWNC_COLLECTOR_GET_AGGREGATES'
        EXPORTING
          component     = 'TOTAL'
          ASSIGNDSYS    = 'DEV'
          periodtype    = 'M'
          periodstrt    = month
        TABLES
          usertcode     = t_usertcode
        EXCEPTIONS
          no_data_found = 1
          OTHERS        = 2.
      wa-date  = month.
    *wa-date  = date.
      wa-mandt = sy-mandt.
    wa_usertcode-account = username.
      LOOP AT t_usertcode INTO wa_usertcode.
        wa-user = wa_usertcode-account.
        IF wa_usertcode-entry_id+72 = 'T'.
          wa-tcode  = wa_usertcode-entry_id.
          wa-report = space.
        ELSE.
          wa-tcode  = space.
          wa-report = wa_usertcode-entry_id.
        ENDIF.
        COLLECT wa INTO t_ut.
      ENDLOOP.
      SORT t_ut BY report ASCENDING.
      CLEAR: wa, wa_result.
    endform.
    FORM get_fieldcatalog .
    fcat-tabname     = 't_ut'.
    fcat-fieldname   = 'DATE'.
    fcat-seltext_l   = 'Date'.
    fcat-key         = 'X'.
    APPEND fcat.
      CLEAR fcat.
      fcat-tabname     = 't_ut'.
      fcat-fieldname   = 'MANDT'.
      fcat-seltext_l   = 'Client'.
      fcat-key         = 'X'.
      APPEND fcat.
      CLEAR fcat.
      fcat-tabname     = 't_ut'.
      fcat-fieldname   = 'USER'.
      fcat-seltext_l   = 'User Name'.
      fcat-key         = 'X'.
      APPEND fcat.
      CLEAR fcat.
      fcat-tabname     = 't_ut'.
      fcat-fieldname   = 'TCODE'.
      fcat-seltext_l   = 'Transaction Code'.
      fcat-key         = 'X'.
      APPEND fcat.
    ENDFORM.
    *&      Form  SET_LAYOUT
          text
    -->  p1        text
    <--  p2        text
    FORM set_layout .
      layout-colwidth_optimize = 'X'.
    ENDFORM.                    " SET_LAYOUT
    *&      Form  GET_EVENT
          text
    -->  p1        text
    <--  p2        text
    *FORM get_event .
    events-name = slis_ev_top_of_page.
    events-form = 'TOP_OF_PAGE'.
    APPEND events.
    *ENDFORM.                    " GET_EVENT
    **&      Form  GET_COMMENT
          text
    -->  p1        text
    <--  p2        text
    *FORM get_comment .
    DATA: text(30).
    text = 'Billing Report'.
    heading-typ = 'H'.
    heading-info = text.
    APPEND heading.
    *ENDFORM.                    " GET_COMMENT
    **&      Form  top_of_page
          text
    -->  p1        text
    <--  p2        text
    *FORM top_of_page .
    CALL FUNCTION 'REUSE_ALV_COMMENTARY_WRITE'
       EXPORTING
         it_list_commentary       = heading[]
      I_LOGO                   =
      I_END_OF_LIST_GRID       =
    *ENDFORM.                    " top_of_page
    *&      Form  DISPLAY_DATA
          text
    -->  p1        text
    <--  p2        text
    FORM display_data .
      sort t_ut[].
    DELETE ADJACENT DUPLICATES FROM t_ut[] COMPARING ALL FIELDS.
      CALL FUNCTION 'REUSE_ALV_GRID_DISPLAY'
        EXPORTING
          i_callback_program = sy-cprog
          is_layout          = layout
          it_fieldcat        = fcat[]
          i_save             = 'A'
          is_variant         = variant
          it_events          = events[]
        TABLES
          t_outtab           = t_ut
        EXCEPTIONS
          program_error      = 1
          OTHERS             = 2.
      IF sy-subrc <> 0.
        MESSAGE ID sy-msgid TYPE sy-msgty NUMBER sy-msgno
                WITH sy-msgv1 sy-msgv2 sy-msgv3 sy-msgv4.
      ENDIF.
    ENDFORM.                    " DISPLAY_DATA

  • HT4137 I have two iPad's that use the same iTunes/store account. I want the two devices to play games with with other, but it recognizes them as the same. I have set up two different iCloud accounts, but still not recognizing the users as different. What

    Hello, I have no idea if my question went out, so I'll post it again. I have two iPads (one 3rd gen and one 4th) that use the same iTunes/store account. I want the two devices to game with each other, but the apps recognize them as the same. I have created two different iCloud accounts in an attempt to differentiate between the two, but no luck. How can I continue to use the same iTunes/store account for music and movies, but also have the two devices recognize each other for games?

    You can share your iTunes ID and still have separate iCloud accounts with separate IDs, they don't have to be the same.  If you kids don't already have an iCloud account, have them set up separate accounts on their devices using separate IDs.  If they are already sharing your account, migrate their devices to separate accounts.  To do this, start by saving any photo stream photos they wish to keep to ther camera roll (unless already there) by opening your my photo stream album, tapping Select, tap the photos, tap the share icon (box with upward pointing arrow), then tap Save to Camera Roll.  If they are syncing notes with iCloud, you'll need to open each of your notes and email them to them so you can later copy and paste the text into new notes created in their new account.  Then go to Settings>iCloud, tap Delete Account (which only deletes it from thier device and won't effect your device), choose Keep on My iDevice and provide the password to turn off Find My iPhone (if using iOS 7).  Then sign back in with a different Apple ID to create their new account and choose Merge to upload the data.  Once everyone is on a separate account you can go to icloud.com from your computer, sign into each account separately and delete your data from their account.

  • Is it possible to set up a computer that uses the Sprint...

    Is it possible to set up a computer that uses the Sprint Pantech PX-500 (Mobile Broadband Card) to share its connection via Wi-fi? How would I set this up on a WRT54G?
    Thanks so much!
    -B

    If you haven't got the router then get WRT54G3G. If you already have a router then use it as a switch/access point, and use windows internet connection sharing or proxy server to share internet.

Maybe you are looking for

  • Is there a way of printing or copy and pasting to a word doc markers

    I have a long interview which I have created over 50 markers for various points in the audio. I want to put these into a word doc with timings for easier logging. Any ideas?

  • ICloud not streaming music to iPhone 4s

    For some reason, my iPhone 4s will not stream songs directly from the cloud. Instead, it will attempt to download every song any time I attempt to play one...emphasis on the word attempt. Most of the time, the song won't play at all. Other times, it

  • I can't Mac Pro to AirPrint  with my CanonMX922

    I am having no luck getting the MacBook pro to AirPrint with the Canon MX 922; (all updates loaded); it works fine using the USB.  It used to work sporadically at first,but then I was still enthusiastically in discovery mode.  Now I forgot the magic

  • Problems with type ... is table of - values

    Hello, please look at the following procedure: CREATE OR REPLACE PROCEDURE fct_s_snpdb_ersetzung_einzeln ( p_tnr IN VARCHAR2, p_ersetzung IN VARCHAR2 IS -- DECLARE VARIABLES p_ersetzung_rep VARCHAR2(4000); v_test_table NUMBER; TYPE nersetzungtab IS T

  • EP-PSERV component fails using JSPM

    Hey guys, Maybe cuz it's time to go home but I've got this one last component to upgrade for our EP dev system to SP17. It involves the Table WCR_USERSTAT: Conversion currently not possible. Like I said, I've got all the rest of the stack deployed bu