Need more info from CSQsSummary

I'm getting data from CSQsSummary table in db_cra db, but it's missing one value that I need: current longest wait time. It shows longest wait time for the day, but not current longest.
I think I can somehow get it from contactQueueDetail and contactCallDetail, but I'm just not sure how to link those 2 together.
Also, how can I get a list of all call details currently in wait queue?
Thanks.

Try this link
http://www.cisco.com/en/US/products/sw/custcosw/ps1846/products_user_guide_chapter09186a0080146c43.html

Similar Messages

  • I need more info from Bookmark Sync PROMPT

    I'm getting a prompt on my MacPro to Sync with MobileMe and the details say that I have 247 bookmarks under the "Add" section. No deletions, no moves.
    I have been cleaning up bookmarks on my MacBookPro but I did not simply Add 247 bookmarks to this machine. I may have RE-ORGANIZED 247 items from folder to folder or somethign along those lines but I ALSO deleted a bunch I am sure.
    Can anyone help me with what this prompt means? either it has so little information or there is something wrong and I already spoke to the MM follks who seem to think the data is fine.
    TIA for any Help

    Try this link
    http://www.cisco.com/en/US/products/sw/custcosw/ps1846/products_user_guide_chapter09186a0080146c43.html

  • I have been backing up  since 2010 but my machine will only go as far back as feb 11 ... why is this? please help i need valueable info from 2010

    i have been backing up  since 2010 but my machine will only go as far back as feb 11 ... why is this? please help i need valueable info from 2010

    Welcome to the discussion area!
    When the Time Capsule disk starts to become full, Time Machine will automatically delete the oldest backups first to make room for new backups.
    For more details, I think you will get a faster and more informed response if you post in the TIme Machine forum for questions like this. We primarily handle configuration set up and networking questons about the Time Capsule as a hardware device on this forum, but it's possible that someone may see your post and respond from here as well.
    Please click the link below and then click the "Refine this list" 'button to see the Time Machine area.
    https://discussions.apple.com/community/mac_os/mac_os_x_v10.6_snow_leopard?categ oryID=263

  • I lost all the information in the ical. I am using icloud and info desapear from ical and several times from my agenda too. But I desperately need the info from my ical. I tried using the time machine but i received a messagem saying that they can not mod

    I am using icloud and info desapear from ical and several times from my agenda too.
    But I desperately need the info from my ical.
    I tried using the time machine but i received a messagem saying that they can not modify ical.
    Can somebody help me?

    First of all, we are not Adobe.  This is a user to user forum.  We are consumers just like you. And I have arthritis, too, although not severe.
    Now let's see if we can help you resolve your problem.
    Where was it purchased from?
    Was it downloaded or was a disc purchased?
    What is your operating system?
    Is it version Photoshop Elements 13?
    Did you use a redemption code to get a serial number?
    Did you sign in/activate?
    Did you create an Adobe account?

  • Need more info on EO,VO and AM *.java files

    HI,
    Friends and experts I need your help in learning OAF.
    I am new to OAF and want to know more info about the following java classes.
    When I created a simple search page with EO, VO and AM, the following java classes are created.
    I want to know
    what is it?
    what we do with that ?
    where we use that?
    Any sample scripts if possible?
    EOImpl.java
    Please correct me if I am wrong,I know that we use this one for manipulating data for a particular row ,operations such as getattribut,setattribute, delete ,update, insert. There are various methods got created when you create the EO if you select options on the " Generate Method " during step 4 on EO wizard.
    EOCollImpl.java
    VOImpl.java
    ViewRowImpl
    AMImpl.java
    Thanks
    Sri.

    Hi Sri ,
    EO :
    Entity Objects are basically based on one table which encapsulate the business rules. These objects are used by OAF page to perform update/insert/delete operations .
    Inside EOImpl.java you will find setter() and getter () methods in java we call it as accessor and mutator , each attribute in EO is mapped to column in the data base table .
    You can also generate a create () method Validate () method .
    Eg : To get the sequence value in OAF you can use Create() method .
    VO :
    VOImpl (VO) : It just consist of an Data base sql query , you might have noticed while executing a query eg : VO.executeQuery() ;
    to perform any validation it provides iteration over and access to the view rows in its result set.
    VoRowImpl : Represents a single row in a view object .
    You will understand better when you writing a code using voimpl /voRowimpl objects
    AmImpl :
    It basically performs the Business logic , we will define all our methods to implement business logic .
    Eg : you can call a method from controller and define the method Amimpl.java , you can use of initializing the query or
    you do DML operation , etc ...
    In summery : The main reason why we have java file distribute across EO , VO , AM is because OAF is designed with MVC design pattern ,
    in other words we have to isolate the responsibility of code in each layer ( Model , View , Controller ) .Its bad practice to write
    the entire code in one single class file .
    Eg : Controller class should accept the parameter from user and pass these parameters BC4J files ( AMImpl.java ) and its Job of the AMImpl.java
    to perform the business logic and return the result back to to controller .
    To enforce the coding standard of MVC design pattern we have these java files EO , VO , AM , CO . with more practice you will understand the various
    methods defined in each of these java files .
    Keerthi

  • Need more info about "NestedContainer" violation

    Hello,
    I have a "NestedContainer" violation for a Canvas container in my application. Compared to the application's root container it is located at level 6 i.e. nested in 5 other parent containers. However at the same time I have other containers (again Canvases) which are even deeper nested for example at level 8 compared to the root container.
    I need more information when exactly the "NestedContainer" violation is triggered so I fix my code if needed and submit a bug for FlexPMD in case the rule is not implemented as designed.
    Thanks!
    Smirnoff

    Hi
    I would like to share an example but I need to create it since I don't want to post the actual source code.
    Simply copying the problem mxml file under another name doesn't work because it is put outside its container and then the violation is not generated.
    If I have to create an example it might be too time consuming to achieve these:
    - keep the same component hierarchy
    - keep the problem present
    - keep the example clean from the real source code
    That's why I wanted to get more info when this violation is triggered and hopefully create an example faster.
    Smirnoff

  • Need more info for the ag34405 DMM VI's

    Hi !
    I'm working with the Agilent 34405a multimeter and made a little VI for data-logging. The problem is, I want to choose between 4.5 & 5.5 resolution and the is no litterature about it. I'm using the NI drivers and VI's made for this application. There is a VI named "Configure measurement.vi" in which you could perhaps select the resolution (as the default value is 0.0001, that would be for 5.5 digits I think). I already tried to change the value from 0.0001 to 0.001 but the instrument still use the 5.5 digit measurement method.
    Does somebody also know if there is more documentation as the contextual help of each VI made for the ag34405a DMM (there are more or less only default values explained, but I would need more...)?
    I've attached my VI if this could help to solve this issue. Am working with LabView 8.20.
    In advance, thanks for your help !
    Yves
    Attachments:
    Start_stop_logging_ag34405a_V1.vi ‏47 KB

    Yves,
    One of the things that is great about instrument drivers is the context help on each of the controls. You can turn the context help on with Ctrl+H and then hover you mouse cursor over the control. If you open "Configure Measurement.vi" and look at the help for the absolute resolution control you'll see a good description that includes:
    Notes:
    (1) The instrument driver ignores this parameter if the Range parameter is set to AG34405A_VAL_AUTO_RANGE_ON (-1) .
    If you look at the help of the Range parameter you'll find see a similar discription with details and the following:
    Defined Values:
    AG34405A_VAL_AUTO_RANGE_OFF (-2)   (-2.0)  - Auto-Range Off
    AG34405A_VAL_AUTO_RANGE_ON (-1)    (-1.0)  - Auto-Range On
    Based on this, can you try setting the auto-range to -2 and specifying the absoulte resolution?
    Regards,
    Kamran

  • How do I find out my keychain password? Need more info fast about this

    My computer started to get really slow, so I looked what I could do to make it faster again. After searching I found that the safari content was high and that I should delete it to make it less laggy and slow. Long story short I ended up deleting my saved passwords on safari...Looking into more info, I found out that I needed to get to Keychain Access. I got to Keychain access, found all the passwords.
    My question..
    •How do I get them out of Keychain?
    •If I end up needing my password for Keychain, how do I find that out? I have the like start up CD, but I dont remember ever making a password.
    •And if I do retreive my Keychain Password some how, will that delete everything stored in Keychain? I would have just tried it, but its a lot of passwords I CAN NOT lose...
    Please help :/
    Thanks!

    Never mind the screenshot.
    Please read this whole message before doing anything.
    This procedure is a diagnostic test. It’s unlikely to solve your problem. Don’t be disappointed when you find that nothing has changed after you complete it.
    The purpose of the test is to determine whether the problem is caused by third-party software that loads automatically at startup or login, by a peripheral device, by a font conflict, or by corruption of the file system or of certain system caches.
    Disconnect all wired peripherals except those needed for the test, and remove all aftermarket expansion cards, if applicable. Start up in safe mode and log in to the account with the problem. You must hold down the shift key twice: once when you boot, and again when you log in.
    Note: If FileVault is enabled, or if a firmware password is set, or if the boot volume is a software RAID, you can’t do this. Ask for further instructions.
    Safe mode is much slower to boot and run than normal, with limited graphics performance, and some things won’t work at all, including sound output and Wi-Fi on certain models. The next normal boot may also be somewhat slow.
    The login screen appears even if you usually login automatically. You must know your login password in order to log in. If you’ve forgotten the password, you will need to reset it before you begin.
    Test while in safe mode. Same problem?
    After testing, reboot as usual (not in safe mode) and verify that you still have the problem. Post the results of the test.

  • Need more info on Java SE 6 after downloading my new operating system to Yosemite

    I updated my operating system on my MacBook Pro to Yosemite 10.10.2, now when I try to open CS4 it directs me to download Java SE 6, but the "more info" button which is to direct to the website to download the Java, does not work, and I can't find anything or where to download this. I need CS4 to do my work, can someone help me?

    Get Apple Java 2014-001.

  • 6358629 SSLSocket.close() / read() deadlock  - need more info

    Java 1.5.0_14 is documented as having this fix ....
    "6358629 jsse runtime SSLSocket.close() and SSLSocket.read() deadlock "
    I cannot find this bug in the bug db and the sun page says sometimes bugs don't show up for security reasons.
    The complete absense of info on this bug other than its title means I cannot tell whether this is the same bug I am seeing randomly in production.
    Given that I cannot replicate the problem in a reproducable test case I need sufficient info to justify upgrading the prod VM and risk introducing new bugs in an otherwise stable platform.
    Is there any way to get more info on this bug ?
    Anyone seen a problem like this in their system?
    Is it possible Sun has just hidden the bug for no good reason?
    Any help appreciated.

    Hello, thank you very much for your information.
    I had met same bug on Linux.
    java version "1.6.0_11"
    Java(TM) SE Runtime Environment (build 1.6.0_11-b03)
    Java HotSpot(TM) 64-Bit Server VM (build 11.0-b16, mixed mode)
    My workaround is here. Closing file descriptor directry by calling private native method( closeSocket0 of java.net.PlainSocketImpl ) using reflection.
    It works well on my environment.
    public static void closeNativeSocket( Socket socket )
    try
    Object object = socket;
    String fieldName = "impl";
    Field field = null;
    Method method = null;
    Class clazz;
    clazz = Class.forName( "java.net.Socket" );
    field = clazz.getDeclaredField( fieldName );
    field.setAccessible( true );
    object = field.get( object );
    clazz = Class.forName( "java.net.PlainSocketImpl" );
    method = clazz.getDeclaredMethod( "socketClose0", new Class[] { Boolean.TYPE } );
    method.setAccessible( true );
    method.invoke( object, new Object[]{ new Boolean( false ) } );
    catch( Exception e )
    e.printStackTrace();
    hope this helps.

  • Need More Info on Server 2012 R2 Essentials

    I'm currently running Server 2008 R2 Foundation for my wife's (1 person) online business, and have been looking at 2012 R2 Foundation vs Essentials.  The latter sounds like a better fit, since in my absence, my wife has limited IT knowledge/experience, but
    I need more information:
    1) Can Essentials be run in a WORKGROUP instead of a domain?  I currently have my server that way, and it serves our needs very well.
    2) I read in some of the forums that while essentials allows 25 users, only two can be logged in concurrently.  Is that true, or am I missing something?
    3) Server 2012 R2 Foundation DOES NOT require CALs for local LAN users, is this also true with 2012 R2 Essentials?  Also, how much are the CALS for RDP users?
    Capt. Dinosaur

    Hi again, Grey, and thank you for your response.  I do appreciate your detail, and I'll answer them each in turn.
    "1) http://technet.microsoft.com/en-us/library/dn281793.aspxMust be the domain controller at the root of the forest and
    domain, and must hold all the FSMO roles."
    Well I guess if it must it must, although I don't understand why the (first) response above states emphatically that a workgroup can be used.  I prefer a workgroup because I understand it much better than a domain setup, and I don't understand Active
    Directory etc.  When I bought my server in 2011 I hired someone to set up the os for me.  I also purchased Mark Minasi's book on 2008 R2, but so much of it was over my head.  Fifty five years in the computer business, and today I feel as though
    I've never seen one before (hence the name Capt. Dinosaur).  I am, however, signed up for a course in Managing Windows Server 2012 which starts in January.  I hope that helps get through my aging grey matter.  All these initials and acronyms
    are total confusion to me, along with my case of chronic CRS (Can't Remember Squat).
    "2) If you say you have 3 different users logged into Foundation with RDP I
    am not going to argue.  I know the license only allows for 2
    administrative connections. http://technet.microsoft.com/en-us/library/cc770759.aspx 
    The default connection (RDP-Tcp) only allows a maximum of two simultaneous
    remote connections."
    I currently have two licenses for 2008 R2 Foundation, and Ithe users who log in to those remotely are
    NOT administrator accounts.   I don't know if that makes a difference, but I've had both users logged in from Florida and I was logged in (as an administrator) from a local workstation.  I had to test that early on to make sure
    that my two users could log in concurrently, and that I could be logged in to manage the system.
    "As a rule we do not suggest you use your server as a workstation. ..."
    Maybe I misled you with something I said, but I/we do not use the server as a workstation.  Sometimes, though infrequently, I have to log in to the server directly (as Administrator) to do or fix something, but do not stay on it for
    normal work.  When we're home my (Dell Precision Mobile) Workstation is connected to my LAN.  I also do software development on that workstation.  I have a development environment on an external eSATA drive attached to my workstation,
    and both a beta and a live environment on the server; I use my workstation to operate all three.
    "... And I really have no clue what would happen if you
    restored your dell box to something else.  It may fail activation. 
    Guess you need to try that sometime. ..."
    I have tried it, albeit to another - but completely different Dell box, which is normally the only brand I use;  that's a holdover from my mainframe/minicomputer days when having a mixed shop was seriously avoided - with a clean bare HDD, and it
    worked.  When the restoration was executed, True Image asked only that you provide the drivers for the new computer, and they do the rest.
    " ... The advantage to the Essentials client backup is it will backup a whole lot of PC's to the server and use data dedupe to keep the backup database small.  So it would backup your wife's PC at
    work and the 3 you have on the road."
    I should explain that my wife's office is in our basement at home, in a separate room from my computer room.  My wife has a second business making gourmet wine infused jams, and we built a FDA certified canning kitchen
    in the basement, and her workstation is there so that she can work at both businesses.  Her workstation, my server and my workstation are backed up weekly to hard drives in a docking station, and stored in a fire resistant safe.  The
    computers we have on the road are my mobile workstation and her laptop.  When my daughter comes along, she also brings her laptop.  Since no company information is stored on any of the workstations, only the server data are mission critical. 
    "But in any case if what
    you have is doing what you want.  You don't seem to want what essentials
    offers, Active Directory, Remote Access, or Client backup, so why change?"<o:p></o:p>
    I guess I'm something like the man who bought a tuxedo and so now he has to start looking for formal dances to attend.  I should explain that we live in a very rural area - our town has a population of 1,000, 60% of the country is National
    Forest, and my home is literally in in it, bordered by it on two sides - and have only a very small technical college here.  I need to learn all about the server OS and how to administer it so that I don't
    have to hire someone when something needs to be done, and 2012 R2 is the only course available within 100 miles - up until this year they were only offering 2003, and even that was at a different campus 60 miles away (and over a 2,000' mountain). 
    Since the course I'll be taking is for '12,  I'm simply looking to upgrade so that what I have is what the course covers.  All my other computers are running Windows 7 (Pro and/or Ultimate) 
    "More on #1 Active Directory gives you group policy and more  control over file permissions than workgroup.  Say you had a folder shared and it had your bank.xls  You could give your wife permission to see it but not your daughter. 
    Group Policy is probably not a big deal for one client PC.  The advantage is you can make one setting and it can be applied to hundreds of PC's"
    Actually I have remote access now in '08 R2 Foundation, and I'm not sure what Active Directory will buy me, but that could, of course, change when I get into the course.  Not having Group Policies has been a small problem,
    on one or two rare occasions, so that could be a game changer for me, but with what I have now, I've been able to set up my political campaign system such that
    no one from one campaign can see or access any data for any other campaign.  Also I was able to set up the user accounts so that a remote user logging in
    can not see nor execute anything except the campaign system.  Any attempt to do otherwise automatically logs them out.
    In summation, you may just have convinced me that using a domain instead of a workgroup, with all it advantages might just be the way for me to go, since hopefully I'll learn all about that when I take that course.  The limitation of only two concurrent
    RDS users, however, is still worrying me, and I'm not sure that I'm accurately communicating.  If the
    two concurrent RDS user limitation ONLY refers to
    Administrator accounts then there's no problem, because any user accounts other than those for my wife and myself,
    would not be Administrator accounts.  I can't remember whether 2008 R2 foundation supports
    "Power User" accounts, but if so, that would be the highest level any other users would have, and possibly not even that high.
    Capt. Dinosaur

  • Need more info abt the functions of each classes in Workflow API's of BPEL

    Need more information about the functions of each method of the classes in Workflow API's of BPEL
    The Java documentation of the workflow API (especially Identity Service classes) is having a one liner explanation for the methods of each class. We need to implement our own Identity Service that implements the BPMIdentityService interface. We are not able to map the function of each methods of this interface to what our security subsystem provides. We feel that we need more detailed information about what each method of each class is doing internally so that we can map to whatever our security subsystem provides.
    The BPEL Developers Guide does not talk about the functionality of each methods of this interface. If anybody can guide me to look into some documentation that has this information or if anybody has this information, then please do the necessary help.
    Regards
    Ramana

    Did you find out the solution for your above posted query ? I'm also in need of some documents. Can you help me out?

  • Need more info on adding user than is in UserGuide

    Before I send an invitation to someone to be a user and access one of my computers, I need more information on how that works that is provided in the LMI Pro User Guide.  Would really like to actually have RTV conversation with someone familiar with it (having done it), but it that's impossible, here goes. 1Do I have to give him the PW for my entire account, do I specify a separate PW for him, or does he set it when accepting the invitation ? 2
    Will he have to know the UN & PW of the target computer or will he just be "in" by virtue of the LMI Pro account ? 3Will he have all the remote functionality I have - Remote Control, File Manager, etc ? May have more questions later so I would really appreciate a contact who has used this before.  

     
    Hello  ,
    Thanks for posting your query here! 
    1 - When you invit a secondary user with a Pro account, this person will click on the link invitation and be prompted to login/create and account with his own username (email address) and own password - so you will not share yours
    2 - As for the target computer, the username/password of the session  or the acccess code (according to the settings) need to be known indeed.
    3-  The remote functionalities are set on target computers , therefore secondary users would have the ability to do File Transfer and remote printing. 
    Let me know if that clarifies the situation for you and feel free to get back to me if you have further questions!
    Thanks, 
    Best
    Julie

  • More Info from APPLE needed about Logic Pro 7.2.2

    Nice hardware oriented update from apple.
    No...I can't afford to buy another Mac(Pro) within a year, THANKS.
    BUT...how about some info about bugfixes. I still run 7.2.0 due to the bugs in 7.2.1. How about that? >:I

    don't hold your breath, my friend!

  • Need more info on like

    I have a department table with following values
    dept     exclude
    xxx     y
    yyy     y
    zzz n
    I need to exclude the dept with the string xxx% and yyy% from college table(i.e) first i have to look for records with the values exclude=y (for ex) xxx and yyy from above and then I need to exclude them from college table.i need to write them in single query.
    spmething like this...
    select * from college where dept not like (select dept from department where exclude ='y')
    but the problem here is i need to exclude the dept which contains the string xxx and yyy.. please help me on this.
    Thanks in advance
    Edited by: GuruRise on Jun 1, 2012 6:21 AM

    Hi Dude,
    Please see the below Expamples. May be it will useful for you to understand the LIKE.
    Description about like,
    The LIKE condition allows you to use wildcards in the where clause of an SQL statement. This allows you to perform pattern matching. The LIKE condition can be used in any valid SQL statement - select, insert, update, or delete.
    The patterns that you can choose FROM are:
    % allows you TO match ANY string OF ANY LENGTH (including zero LENGTH)
    _ allows you TO match ON a single character
    Examples using % wildcard
    The FIRST example that we'll take a look at involves using % in the where clause of a select statement. We are going to try to find all of the suppliers whose name begins with 'Hew'.
    SELECT * FROM suppliers
    WHERE supplier_name like 'Hew%';
    You can also using the wildcard multiple times within the same string. For example,
    SELECT * FROM suppliers
    WHERE supplier_name like '%bob%';
    In this example, we are looking for all suppliers whose name contains the characters 'bob'.
    You could also use the LIKE condition to find suppliers whose name does not start with 'T'. For example,
    SELECT * FROM suppliers
    WHERE supplier_name not like 'T%';
    By placing the not keyword in front of the LIKE condition, you are able to retrieve all suppliers whose name does not start with 'T'.
    Examples using _ wildcard
    Next, let's explain how the _ wildcard works. Remember that the _ IS looking FOR only one character.
    FOR example,
    SELECT * FROM suppliers
    WHERE supplier_name LIKE 'Sm_th';
    This SQL statement would RETURN ALL suppliers whose name IS 5 characters LONG, WHERE the FIRST two characters IS 'Sm' AND the LAST two characters IS 'th'. FOR example, it could RETURN suppliers whose name IS 'Smith', 'Smyth', 'Smath', 'Smeth', etc.
    Here IS another example,
    SELECT * FROM suppliers
    WHERE account_number LIKE '12317_';
    You might find that you are looking FOR an account NUMBER, but you only have 5 OF the 6 digits. The example above, would retrieve potentially 10 records back (WHERE the missing VALUE could equal anything FROM 0 TO 9). FOR example, it could RETURN suppliers whose account numbers are:
    123170
    123171
    123172
    123173
    123174
    123175
    123176
    123177
    123178
    123179.
    Examples using Escape Characters
    Next, IN Oracle, let's say you wanted to search for a % or a _ character in a LIKE condition. You can do this using an Escape character.
    Please note that you can define an escape character as a single character (length of 1) ONLY.
    For example,
    SELECT * FROM suppliers
    WHERE supplier_name LIKE '!%' escape '!';
    This SQL statement identifies the ! character as an escape character. This statement will return all suppliers whose name is %.
    Here is another more complicated example:
    SELECT * FROM suppliers
    WHERE supplier_name LIKE 'H%!%' escape '!';
    This example returns all suppliers whose name starts with H and ends in %. For example, it would return a value such as 'Hello%'.
    You can also use the Escape character with the _ character. For example,
    SELECT * FROM suppliers
    WHERE supplier_name LIKE 'H%!_' escape '!';
    This example returns all suppliers whose name starts with H and ends in _. For example, it would return a value such as 'Hello_'.
    Regards,
    N.Senthil.
    Edited by: Senthil Nataraj on Jun 2, 2012 1:50 AM

Maybe you are looking for

  • SATA cable - cause hard drive errors?

    Hi, Apologies for yet another post...I've been inundating you with questions in the past week! My iMac is in for repair, after having the flashing question mark appear and not being able to see the drive in disk utility. Tech Tools scan also showed a

  • Why is my track 2 hrs. long?

    I'm running GarageBand 10.  I record our church services, and edit it down to the 45 minute (or thereeabouts) message, removing the music, announcements, etc.  But when I send it to itunes, it mixes the hour at the end, so it has an hour-plus of blan

  • How To Get That Elusive Yellow Glow?

    I want to make a short animated logo in which part of the logo has a pulsating glow whilst a melodramatic sound plays in the background. I took the following code from the helpfile and tweeked it. What I'd like is a pulsating yellow glow... but all I

  • How to flatten rows

    Hi All, I am trying to build a fact table. The fee snapshot table is as follows id, date, expense_type_cd, cost_type_cd, cost_life_cycle_cd, fee_amt My fact tables has columns like amt1,amt2,amt3,amt4,amt5 amt1= fee_amt from fee snapshot table where

  • How to load 5x7" photo paper so printer does not think tray is empty

    I am using the HP app to try and print on photo paper 5x7" supplied with inks by HP for this printer. Printer takes photo papers at edge of tray but won't print as it detects no paper in it! Crazy! I put the paper sideways, and then it did feel paper