Need data retrieval recommendations for the UK only please

Hey folks.
I just wanted to say that I had a problem with strange sounds off my hard disk, the lengthy restarts and problems waking up the computer after battery being empty and finally my hard disk died completely.
With 17 months under its belt this Hitachi 80GB hard disk ought not to have died but this happens. Sadly I was ABOUT to back up (isn't that always the way?) but had not managed (due to the problems) and so lost some EXTREMELY valuable data. ie photos (numbering 400 and about 600 others) of my grandfather who was taken into hospital for heart failure aged 91 on the VERY SAME DAY.
Now- I am NOT letting this hard disk go. I have been told by the kind but very slow (Apple took over a fortnight to send them a replacement disk and they had it for 16 days in the end- I went mad) folk who repaired it, it is the mechanism which failed and not the platters which melted or otherwise warped.
So- this means that the chances of data retrieval are high. BUT- I have had one quote from the firm they recommended and was told it could be as much as £1,300 on the slowest service. Now, as you will appreciate, there IS no value which can be placed on such precious things as memories of a loved one but SURELY there is a chance that someone here has knowledge of a more- erm- cost efficient method?
LOOOOONG story short: Can you recommend anyone in the UK area who does a good job retrieving data from what has been deemed a high probability recovery?
Anything I need to know about the subject? All I can tell you is that this WILL involve removing the platters from the mechanism and placing them to another, functioning one with the probability of needing to back up in the region of 20GB.
Your help in this is so very gratefully received. I am thankful you users are here to hold my hand on this.

Posted this under the correct header as well- 15 Powerbook. Resolved it myself- went on the net and just picked one. Was semi-successful and if you are needing info check it out- I have explained this there.

Similar Messages

  • Passing values to subreport in SSRS throwing an error - Data Retrieval failed for the report, please check the log for more details.

    Hi,
    I have the subreport calling from the main report. The subreport is based on MDX query agianst the SSAS cube. some dimensions in cube has values 0 and 1.
    when I try to pass '0' to the sub report as the parameter value, it gives an error "Data Retrieval failed for the report, please check the log for more details".
    Actually I am using table for storing these parameter values. In the main report I am calling this table (dataset) and passing these values to subreport.
    so I have given like [0],[1] and this works fine. when I give only either [0] or [1] then it is throwing an error.
    Could you please advise on this.
    Appreciate all and any help.
    Thanks,
    Divya

    Hi Divya,
    Based on the current description, I understand that there is no issue if you pass two values from main report to subreport, while the issue occurs when passing one value to subreport.
    To narrow down the issue, I want to confirm whether the subreport can run if there is only [0] or [1] in the subreport. If so, it indicates the query statements exist error in the subreport. If it’s not the case, this shows the issue occurs during passing
    values from main report to subreport. To make further analysis, please post the details of query statements of the subreport to the forum.
    Regards,
    Heidi Duan
    Heidi Duan
    TechNet Community Support

  • Data retrieval failed for the subreport

    Hi All,
    I m getting this error whn i try to bind a sub report within a report,
    Data retrieval failed for the subreport, 'Subreport2', located at: E:\Anil\Sample.rdlc. Please check the log files for more information.
    Thanks,
    Anil Kumar Dhiman

    Hi Anil,
    This is a know issue which you can see in the link:https://connect.microsoft.com/SQLServer/feedback/details/648560/subreport-with-shared-dataset-throws-error
    This issue occurs only on Business Integrated Development Studio (BIDS) and use a shared dataset in subreport. And it is fixed in SQL Server Reporting Services 2012. So you can avoid this issue by changing the shared dataset to embedded dataset or deploy the
    shared dataset to Report Server and view report on Report Manage.
    If you have any questions, please feel free to ask.
    Regards,
    Charlie Liao
    TechNet Community Support

  • MI7.1 Delete the inserted data before sync for the upload only data object

    Hi,
    I have a upload only data which have insert bapi wrapper only. I am able to save the data and insert data but my problem is how to delete the data before it syncr. Is this possible?? Or must i create a delete bapi wrapper??
    Thanks.

    Hi,
    Thanks for you reply. I manage to delete the inserted data refer to the employee_ui sample application but the data still appear at the backend after sync. Any idea why this happen??
    Using the following code i am able to delete the record at the devices. But when it sync the data still get insert to database table.
              ZmovementZmovementheader header = (ZmovementZmovementheader) wdContext.nodeasset_services().nodegetZmovementHeaders().nodegetZmovementHeadersOutput().getCurrentElement().model();                    
              ZmovementZmovementdetail detail = (ZmovementZmovementdetail) wdContext.nodeasset_services().nodegetZmovementDetail().nodegetZmovementDetailOutput().getCurrentElement().model();
              header.removeFromZmovementdetails(detail);
              root.commit();
    thanks
    Edited by: fcgan on Aug 28, 2008 10:17 AM

  • Need a recommendation for the best LP turntable to transfer lps to iTunes library...recieved a SONY that is recommended for windows only. Have a brand new SONY ps-lx300USB recieved as a gift that only says they will not guarentee results w/ mac.Help.

    Need a recommendation for the best LP turntable to transfer lps to iTunes library...recieved a SONY that is recommended for windows only. Have a brand new SONY ps-lx300USB recieved as a gift that only says they will not guarentee results w/ mac. Please Help.

    Just use that turntable with -> Audacity

  • When the apple review team review our app,they point out that our  app uses a background mode but does not include functionality that requires that mode to run persistently.but in fact,when the app in background ,the app need data update to make the

    when the apple review team review our app,they point out that our  app uses a background mode but does not include functionality that requires that mode to run persistently。but in fact,when the app in background ,the app need data update to make the function of  trajectory replay come ture。in fact, we have added function when the app  is in background mode。we have point out the point to them by email。but they still have question on the background mode,we are confused,does anyone can help me,i still don't know why do review team can't find the data update when  the app is in background and how do i modify the app,or what is the really problem they refered,do i misunderstand them?
    the blow is the content of the review team email:
    We found that your app uses a background mode but does not include functionality that requires that mode to run persistently. This behavior is not in compliance with the App Store Review Guidelines.
    We noticed your app declares support for location in the UIBackgroundModes key in your Info.plist but does not include features that require persistent location.
    It would be appropriate to add features that require persistent use of real-time location updates while the app is in the background or remove the "location" setting from the UIBackgroundModes key. If your application does not require persistent, real-time location updates, we recommend using the significant-change location service or the region monitoring location service.
    For more information on these options, please see the "Starting the Significant-Change Location Service" and "Monitoring Shape-Based Regions" sections in the Location Awareness Programming Guide.
    If you choose to add features that use the Location Background Mode, please include the following battery use disclaimer in your Application Description:
    "Continued use of GPS running in the background can dramatically decrease battery life."
    Additionally, at your earliest opportunity, please review the following question/s and provide as detailed information as you can in response. The more information you can provide upfront, the sooner we can complete your review.
    We are unable to access the app in use in "http://www.wayding.com/waydingweb/article/12/139". Please provide us a valid demo video to show your app in use.
    For discrete code-level questions, you may wish to consult with Apple Developer Technical Support. When the DTS engineer follows up with you, please be ready to provide:
    - complete details of your rejection issue(s)
    - screenshots
    - steps to reproduce the issue(s)
    - symbolicated crash logs - if your issue results in a crash log
    If you have difficulty reproducing a reported issue, please try testing the workflow as described in <https://developer.apple.com/library/ios/qa/qa1764/>Technical Q&A QA1764: How to reproduce a crash or bug that only App Review or users are seeing.

    Unfortunately, these forums here are all user to user; you might try the developer forums or get in touch with the team that you are working with.

  • In Bdc I have huge volume of data to upload for the given transaction

    Hi gurus,
    In Bdc I have huge volume of data to upload for the given transaction, here am using session method, it takes lots of exection time to complete the whole transaction, Is there any other method to process the huge volume with minimum time,
    reward awaiting
    with regards
    Thambe

    Selection of BDC Method depends on the type of the requirement you have. But you can decide which one will suite requirement basing the difference between the two methods. The following are the differences between Session & Call Transaction.
    Session method.
    1) synchronous processing.
    2) can tranfer large amount of data.
    3) processing is slower.
    4) error log is created
    5) data is not updated until session is processed.
    Call transaction.
    1) asynchronous processing
    2) can transfer small amount of data
    3) processing is faster.
    4) errors need to be handled explicitly
    5) data is updated automatically
    Batch Data Communication (BDC) is the oldest batch interfacing technique that SAP provided since the early versions of R/3. BDC is not a typical integration tool, in the sense that, it can be only be used for uploading data into R/3 and so it is
    not bi-directional.
    BDC works on the principle of simulating user input for transactional screen, via an ABAP program.
    Typically the input comes in the form of a flat file. The ABAP program reads this file and formats the input data screen by screen into an internal table (BDCDATA). The transaction is then started using this internal table as the input and executed in the background.
    In ‘Call Transaction’, the transactions are triggered at the time of processing itself and so the ABAP program must do the error handling. It can also be used for real-time interfaces and custom error handling & logging features. Whereas in
    Batch Input Sessions, the ABAP program creates a session with all the transactional data, and this session can be viewed, scheduled and processed (using Transaction SM35) at a later time. The latter technique has a built-in error processing mechanism too.
    Batch Input (BI) programs still use the classical BDC approach but doesn’t require an ABAP program to be written to format the BDCDATA. The user has to format the data using predefined structures and store it in a flat file. The BI program then reads this and invokes the transaction mentioned in the header record of the file.
    Direct Input (DI) programs work exactly similar to BI programs. But the only difference is, instead of processing screens they validate fields and directly load the data into tables using standard function modules. For this reason, DI programs are much faster (RMDATIND - Material Master DI program works at least 5 times faster) than the BDC counterpart and so ideally suited for loading large volume data. DI programs are not available for all application areas.
    synchronous & Asynchronous updating:
    http://www.icesoft.com/developer_guides/icefaces/htmlguide/devguide/keyConcepts4.html
    synchronous & Asynchronous processings
    Asynchronous refers to processes that do not depend on each other's outcome, and can therefore occur on different threads simultaneously. The opposite is synchronous. Synchronous processes wait for one to complete before the next begins. For those Group Policy settings for which both types of processes are available as options, you choose between the faster asynchronous or the safer, more predictable synchronous processing.
    By default, the processing of Group Policy is synchronous. Computer policy is completed before the CTRLALTDEL dialog box is presented, and user policy is completed before the shell is active and available for the user to interact with it.
    Note
    You can change this default behavior by using a policy setting for each so that processing is asynchronous. This is not recommended unless there are compelling performance reasons. To provide the most reliable operation, leave the processing as synchronous.

  • Which antivirus product is recommended for the iMac?

    Which antivirus product is recommended for the iMac?

    OS X already includes everything it needs to protect itself from viruses and malware. Keep it updated with software updates from Apple.
    A much better question is "how should I protect my Mac":
    Never install any product that claims to "speed up", "clean up", "optimize", or "accelerate" your Mac. Without exception, they will do the opposite.
    Never install pirated or "cracked" software, software obtained from dubious websites, or other questionable sources. Illegally obtained software is almost certain to contain malware.
    Don’t supply your password in response to a popup window requesting it, unless you know what it is and the reason your credentials are required.
    Don’t open email attachments from email addresses that you do not recognize, or click links contained in an email:
    Most of these are scams that direct you to fraudulent sites that attempt to convince you to disclose personal information.
    Such "phishing" attempts are the 21st century equivalent of a social exploit that has existed since the dawn of civilization. Don’t fall for it.
    Apple will never ask you to reveal personal information in an email. If you receive an unexpected email from Apple saying your account will be closed unless you take immediate action, just ignore it. If your iTunes or App Store account becomes disabled for valid reasons, you will know when you try to buy something or log in to this support site, and are unable to.
    Don’t install browser extensions unless you understand their purpose. Go to the Safari menu > Preferences > Extensions. If you see any extensions that you do not recognize or understand, simply click the Uninstall button and they will be gone.
    Don’t install Java unless you are certain that you need it:
    Java, a non-Apple product, is a potential vector for malware. If you are required to use Java, be mindful of that possibility.
    Disable Java in Safari > Preferences > Security.
    Despite its name JavaScript is unrelated to Java. No malware can infect your Mac through JavaScript. It’s OK to leave it enabled.
    Block browser popups: Safari menu > Preferences > Security > and check "Block popup windows":
    Popup windows are useful and required for some websites, but popups have devolved to become a common means to deliver targeted advertising that you probably do not want.
    Popups themselves cannot infect your Mac, but many contain resource-hungry code that will slow down Internet browsing.
    If you ever see a popup indicating it detected registry errors, that your Mac is infected with some ick, or that you won some prize, it is 100% fraudulent. Ignore it.
    Ignore hyperventilating popular media outlets that thrive by promoting fear and discord with entertainment products arrogantly presented as "news". Learn what real threats actually exist and how to arm yourself against them:
    The most serious threat to your data security is phishing. To date, most of these attempts have been pathetic and are easily recognized, but that is likely to change in the future as criminals become more clever.
    OS X viruses do not exist, but intentionally malicious or poorly written code, created by either nefarious or inept individuals, is nothing new.
    Never install something without first knowing what it is, what it does, how it works, and how to get rid of it when you don’t want it any more.
    If you elect to use "anti-virus" software, familiarize yourself with its limitations and potential to cause adverse effects, and apply the principle immediately preceding this one.
    Most such utilities will only slow down and destabilize your Mac while they look for viruses that do not exist, conveying no benefit whatsoever - other than to make you "feel good" about security, when you should actually be exercising sound judgment, derived from accurate knowledge, based on verifiable facts.
    Do install updates from Apple as they become available. No one knows more about Macs and how to protect them than the company that builds them.
    Summary: Use common sense and caution when you use your Mac, just like you would in any social context. There is no product, utility, or magic talisman that can protect you from all the evils of mankind.

  • What software is recommended for the maintenance of mac?

    What software is recommended for the maintenance of mac?

    How to maintain a Mac
    1. Make redundant backups, keeping at least one off site at all times. One backup is not enough. Don’t back up your backups; all should be made directly from the original data. Don’t rely completely on any single backup method, such as Time Machine. If you get an indication that a backup has failed, don't ignore it.
    2. Keep your software up to date. In the App Store or Software Update preference pane (depending on the OS version), you can configure automatic notifications of updates to OS X and other Mac App Store products. Some third-party applications from other sources have a similar feature, if you don’t mind letting them phone home. Otherwise you have to check yourself on a regular basis.
    Keeping up to date is especially important for complex software that modifies the operating system, such as device drivers. Before installing any Apple update, you must check that all such modifications that you use are compatible. Incompatibility with third-party software is by far the most common cause of trouble with system updates.
    3. Don't install crapware, such as “themes,” "haxies," “add-ons,” “toolbars,” “enhancers," “optimizers,” “accelerators,” "boosters," “extenders,” “cleaners,” "doctors," "tune-ups," “defragmenters,” “firewalls,” "barriers," “guardians,” “defenders,” “protectors,” most “plugins,” commercial "virus scanners,” "disk tools," or "utilities." With very few exceptions, such stuff is useless or worse than useless. Above all, avoid any software that purports to change the look and feel of the user interface.
    The more heavily promoted the product, the more likely it is to be garbage. The most extreme example is the “MacKeeper” scam.
    As a rule, the only software you should install is that which directly enables you to do the things you use a computer for, and doesn't change the way other software works.
    Safari extensions, and perhaps the equivalent for other web browsers, are a partial exception to the above rule. Most are safe, and they're easy to get rid of if they don't work. Some may cause the browser to crash or otherwise malfunction.  Some are malicious. Use with caution, and install only well-known extensions from relatively trustworthy sources, such as the Safari Extensions Gallery.
    Never install any third-party software unless you know how to uninstall it. Otherwise you may create problems that are very hard to solve.
    4. Beware of malware. Malware is malicious software that circulates on the Internet. This kind of attack on OS X used to be so rare that it was hardly a concern, but it's now increasingly common, and increasingly dangerous.
    There is some built-in protection against downloading malware, but you can’t rely on it — the attackers are always at least one day ahead of the defense. You can’t rely on third-party protection either. What you can rely on is common-sense awareness — not paranoia, which only makes you more vulnerable.
    Never install software from an untrustworthy or unknown source. If in doubt, do some research. Any website that prompts you to install a “codec” or “plugin” that comes from the same site, or an unknown site, is untrustworthy. Software with a corporate brand, such as Adobe Flash Player, must come directly from the developer's website. No intermediary is acceptable, and don’t trust links unless you know how to parse them. Any file that is automatically downloaded from the web, without your having requested it, should go straight into the Trash. A web page that tells you that your computer has a “virus,” or that anything else is wrong with it, is a scam.
    In OS X 10.7.5 or later, downloaded applications and Installer packages that have not been digitally signed by a developer registered with Apple are blocked from loading by default. The block can be overridden, but think carefully before you do so.
    Because of recurring security issues in Java, it’s best to disable it in your web browsers, if it’s installed. Few websites have Java content nowadays, so you won’t be missing much. This action is mandatory if you’re running any version of OS X older than 10.6.8 with the latest Java update. Note: Java has nothing to do with JavaScript, despite the similar names. Don't install Java unless you're sure you need it. Most people don't.
    5. Don't fill up your boot volume. A common mistake is adding more and more large files to your home folder until you start to get warnings that you're out of space, which may be followed in short order by a boot failure. This is more prone to happen on the newer Macs that come with an internal SSD instead of the traditional hard drive. The drive can be very nearly full before you become aware of the problem.
    While it's not true that you should or must keep any particular percentage of space free, you should monitor your storage use and make sure you're not in immediate danger of using it up. According to Apple documentation, you need at least 9 GB of free space on the startup volume for normal operation.
    If storage space is running low, use a tool such as OmniDiskSweeper to explore the volume and find out what's taking up the most space. Move seldom-used large files to secondary storage.
    6. Relax, don’t do it. Besides the above, no routine maintenance is necessary or beneficial for the vast majority of users; specifically not “cleaning caches,” “zapping the PRAM,” "resetting the SMC," “rebuilding the directory,” "defragmenting the drive," “running periodic scripts,” “dumping logs,” "deleting temp files," “scanning for viruses,” "purging memory," "checking for bad blocks," "testing the hardware," or “repairing permissions.” Such measures are either completely pointless or are useful only for solving problems, not for prevention.
    Let go of the Windows mentality that every computer needs regular downtime maintenance such as "defragging" and "registry cleaning." Those concepts do not apply to the Mac platform. The machine should not be a focus of your attention. You shouldn't have to think about it at all. It should be a transparent, almost unnoticeable tool by means of which you communicate, work, and play. If you want a computer that depends on you to keep going, use a PC.
    The very height of futility is running an expensive third-party application called “Disk Warrior” when nothing is wrong, or even when something is wrong and you have backups, which you must have. Disk Warrior is a data-salvage tool, not a maintenance tool, and you will never need it if your backups are adequate. Don’t waste money on it or anything like it.

  • Err "Couldn't retrieve binding for the given channelId" in receiver SOAP CC

    Hello.
    We have increase the support package level of our XI 3.0 system from level 17 to 23. After this "upgrade" all interfaces using a receiver SOAP channel communication are getting the next error:
    SOAP: response message contains an error XIServer/UNKNOWN/ADAPTER.JAVA_EXCEPTION - com.sap.aii.af.service.cpa.impl.exception.CPALookupException: Couldnt retrieve binding for the given channelId: Binding:CID=8cb6335a548730ea9ca27aaa78034109; at com.sap.aii.af.service.cpa.impl.lookup.AbstractLookupManager.getBindingByChannelId(AbstractLookupManager.java:361) at com.sap.aii.af.mp.soap.web.MessageServlet.doPost(MessageServlet.java:421) at javax.servlet.http.HttpServlet.service(HttpServlet.java:760) at javax.servlet.http.HttpServlet.service(HttpServlet.java:853) at com.sap.engine.services.servlets_jsp.server.HttpHandlerImpl.runServlet(HttpHandlerImpl.java:401) at com.sap.engine.services.servlets_jsp.server.HttpHandlerImpl.handleRequest(HttpHandlerImpl.java:266) at com.sap.engine.services.httpserver.server.RequestAnalizer.startServlet(RequestAnalizer.java:386) at com.sap.engine.services.httpserver.server.RequestAnalizer.startServlet(RequestAnalizer.java:364) at com.sap.engine.services.httpserver.server.RequestAnalizer.invokeWebContainer(RequestAnalizer.java:1039) at com.sap.engine.services.httpserver.server.RequestAnalizer.handle(RequestAnalizer.java:265) at com.sap.engine.services.httpserver.server.Client.handle(Client.java:95) at com.sap.engine.services.httpserver.server.Processor.request(Processor.java:175) at com.sap.engine.core.service630.context.cluster.session.ApplicationSessionMessageListener.process(ApplicationSessionMessageListener.java:33) at com.sap.engine.core.cluster.impl6.session.MessageRunner.run(MessageRunner.java:41) at com.sap.engine.core.thread.impl3.ActionObject.run(ActionObject.java:37) at java.security.AccessController.doPrivileged(Native Method) at com.sap.engine.core.thread.impl3.SingleThread.execute(SingleThread.java:102) at com.sap.engine.core.thread.impl3.SingleThread.run(SingleThread.java:172)
    We have done the next steps:
    - Run SXI_CACHE and start a complete cache refresh,
    - http://<Host>:<portNo.>/CPACache/refresh?mode=full
    - Restart J2EE server.
    The problem isn't solved.
    any idea?

    Probably you need to ask your BASIS team if they have done it or not.
    Secondly you can just see if something has been done under SWCV SAP BASIS --- http://sap.com/xi/XI/System --- Adapter Metadata, just by oping any adapter and then by looking at Properties or Hisotry from menu "Adapter Metadata". Here you can see the date under "Changed on", so if this matches with your upgrade date then something has been done. But this check will not help you know about the SP level. So better to ask with BASIS.

  • Need best Architecture design for the following scenario

    Hi Experts,
    I need best architecture design for the following scenario:
    Sender: Mail
    Receiver: if sender body contain u201DApproveu201D, then call SOAP adapter, If SOAP adapter execute successfully, then  send Mail(SOAP adapter executed successfully) and SMS .  So receiver is SOAP, Mail and SMS.
    My current approach issue:
    Three message mapping:
    Mapping1: mail to SOAP
    Mapping2: mail to Mail
    Mapping3: mail to SMS
    In interface determinant>u201DSelect all three operation mappingu201D> u201Cselect order at runtimeu201D.
    Issue in current approach: For me first SOAP adapter should complete successfully, after that only my Mail and SMS operation mapping should execute:
    But problem is before success of SOAP adapter engine, Mail and SMS mapping completed or integration engine executed.
    Note: There is possible to fail the SOAP request in adapter engine.
    Kindly help me --> u201CAm I going correct way or want to change the architectureu201D?
    Thanks for advance!!
    Regards, Kumar

    What do you mean by successful execution of soap call?  Are you talking about Successful response (happy flow) from the soap call instead of application error ? Then based on the response you want to decide sending mail and sms.  How big call is your soap ?  If your soap interface is very simple I can give the other possible way.
    Sender sends the message, use mapping  to read the content and then do soap call in the mapping itself and after seeing the soap response decide about two receivers (mail and SMS).  If your soap call is very simple one, you can go for it. Otherwise I would not recommend this. The reason is you loose some visibility regards to monitoring during soap call in the mapping.
    Other option is go for CCBPM.  Here you receive the message, use send step to soap interface which is sync step. Then after seeing the response create another block with fork steps each for two senders mail and sms. If response bad then dont proceed or execute the next block. Simply use exeception or control step to jump out from the block,

  • Recommendations for the best i7 L3 8GB Laptop to buy?

    Can someone tell me what the best Laptop to buy with the following specifications:
    i7 L3 8GB (or more)
    I need something that will last for five years, and run Dragon.
    Thanks!

    Thank you for your quick reply. The "Knowbrainer website" has the following laptop recommendation for the best performance of the Dragon Naturally Speaking program. I looked through the Best Buy options--there are quite a few that offer what is recommended below. So which of the Best Buy options (that meet the specs below) should I buy? The specs, according to "Knowbrainer" are:
    1. Core™ i7 Ivy Bridge with four cores and hyperthreading (eight threads). In other words, go with the highest Core™ i7 Ivy Bridge you can find as far as speed, number of cores, L3 cache, etc. 
    2. Look for at least 8 GB of RAM and preferably 16 GB of RAM. The reason for this is that there are going to be a lot of changes to the size and number of 64-bit applications over the next few years. 8 GB might do you just fine right now, but if you're going to go for five years with this laptop, then you're better off going with 16 GB of RAM looking down the road. 
    it's the processor, the amount of L3 cache and the RAM that form the core. 
    The bottom line: take into consideration that the computer needs to run both Windows 8 and DNS 12, and looking down the road to possibly DNS 13. Also, keep in mind that it's a given that whatever you're going to purchase now is going to be out of date inside of nine months. You just can't win at the rate that technology is advancing. Also, sometime next year Intel is going to introduce a whole new set of processors for both desktops and laptops that will raise the bar on performance. It's the game we play with hardware and Dragon. 
    Thanks!

  • Data gets deleted for the table RSTRFIELDSH

    If data gets deleted for the table RSTRFIELDSH at BW end
    ...what should i do?to get it back

    Wim,
    We lost the data from production. We ran Archive program to archive the data and archiving file is still exist.
    There is no possibliity to run the OUTBOUND process again to create the IDOCs.
    But only my concern is When we run the Transaction SARA we will be getting the data for other period as well.
    But I need to reload the data for three months only because that archiving file also has other period data as well.
    Can you send me details of how to use SARA Transaciton for particular period.
    Thanks,
    Kalikonda.

  • How to get the date of Friday for the given week

    HI,
    I have a requirement to get the date of Friday for the given week.
    Eg: I have an input of 200722 (Yearweek), From this I need to get the Date of the friday for this week 22 of Year 2007.
    Plz let me know how to get this..
    Thanks in advance..
    Sridhar.

    Hi,
    Thanks for your reply...
    I have implemented your logic but not getting exact output as required.
    Suppose, If i give the input as 200720, I am getting an output as 18 (friday of week 20 of year 2007), but i need to get an output of 18.05.2007
    Plz let me know how to do thdi.
    Thanks in advance..

  • Data Recovery Software for the Zen Vision M

    Data Recovery Software for the Zen Vision M:
    Has anyone had any success recovering lost sound files from a Vision M, with software, physical repair services, or otherwise? Does anyone claim to be able to recover information from these devices?
    The data recovery programs I have tried fail to recognize the dri've, since it doesn't show up in list of dri'ves for some reason (Is there a way to make this show up?). Any suggestions/ recommendations would be greatly appreciated as I lost over a year of recordings after an unexpected forced reformatting. How would one even go about finding someone for this job?
    Thanks, GW

    Haven't really tried the data recovery so I would like to know more about this one too.
    http://storeyourpicture.com/images/s...lectronics.jpg

Maybe you are looking for

  • Is there any facility to create responsive html page with tools

    I create many html page is there any tool to create responsive page easilily. Check this sample page of msbte result here i coded manually i not found any buttons or option for it

  • How to open Pagemaker 7.0 in Indesign CC.

    I just got Indesign CC after talking to an Adobe rep for about 30 minutes via chat. I told her I had several Pagemaker files I needed to open. (New computer - which I now got Indesign CC on her recomendation) She said that was the only way I could op

  • Leading zeros in data uploading

    hello experts, i am uploading the data for the business partner using lsmw here my issue is while i am uploading the data i am feeding the system for the business partner like '0000001' but when i finish the uploading and when i check the records it

  • LSMW for Material master data

    Hi, Anybody can help me, how to make LSMW for Material master data. Thanks in Advance Arjun

  • BIOS WMI Tool (example script?) M58 machines

    I have recently been given the job of building a Lenovo X230 using SCCM 2012. I have download the sample scripts and the documentation and have manually tried to set the WakeOnLan bios setting. The command I am using is... cscript.exe setconfig.vbs W