Need more info on adding user than is in UserGuide

Before I send an invitation to someone to be a user and access one of my computers, I need more information on how that works that is provided in the LMI Pro User Guide.  Would really like to actually have RTV conversation with someone familiar with it (having done it), but it that's impossible, here goes. 1Do I have to give him the PW for my entire account, do I specify a separate PW for him, or does he set it when accepting the invitation ? 2
Will he have to know the UN & PW of the target computer or will he just be "in" by virtue of the LMI Pro account ? 3Will he have all the remote functionality I have - Remote Control, File Manager, etc ? May have more questions later so I would really appreciate a contact who has used this before.  

 
Hello  ,
Thanks for posting your query here! 
1 - When you invit a secondary user with a Pro account, this person will click on the link invitation and be prompted to login/create and account with his own username (email address) and own password - so you will not share yours
2 - As for the target computer, the username/password of the session  or the acccess code (according to the settings) need to be known indeed.
3-  The remote functionalities are set on target computers , therefore secondary users would have the ability to do File Transfer and remote printing. 
Let me know if that clarifies the situation for you and feel free to get back to me if you have further questions!
Thanks, 
Best
Julie

Similar Messages

  • Need more info on EO,VO and AM *.java files

    HI,
    Friends and experts I need your help in learning OAF.
    I am new to OAF and want to know more info about the following java classes.
    When I created a simple search page with EO, VO and AM, the following java classes are created.
    I want to know
    what is it?
    what we do with that ?
    where we use that?
    Any sample scripts if possible?
    EOImpl.java
    Please correct me if I am wrong,I know that we use this one for manipulating data for a particular row ,operations such as getattribut,setattribute, delete ,update, insert. There are various methods got created when you create the EO if you select options on the " Generate Method " during step 4 on EO wizard.
    EOCollImpl.java
    VOImpl.java
    ViewRowImpl
    AMImpl.java
    Thanks
    Sri.

    Hi Sri ,
    EO :
    Entity Objects are basically based on one table which encapsulate the business rules. These objects are used by OAF page to perform update/insert/delete operations .
    Inside EOImpl.java you will find setter() and getter () methods in java we call it as accessor and mutator , each attribute in EO is mapped to column in the data base table .
    You can also generate a create () method Validate () method .
    Eg : To get the sequence value in OAF you can use Create() method .
    VO :
    VOImpl (VO) : It just consist of an Data base sql query , you might have noticed while executing a query eg : VO.executeQuery() ;
    to perform any validation it provides iteration over and access to the view rows in its result set.
    VoRowImpl : Represents a single row in a view object .
    You will understand better when you writing a code using voimpl /voRowimpl objects
    AmImpl :
    It basically performs the Business logic , we will define all our methods to implement business logic .
    Eg : you can call a method from controller and define the method Amimpl.java , you can use of initializing the query or
    you do DML operation , etc ...
    In summery : The main reason why we have java file distribute across EO , VO , AM is because OAF is designed with MVC design pattern ,
    in other words we have to isolate the responsibility of code in each layer ( Model , View , Controller ) .Its bad practice to write
    the entire code in one single class file .
    Eg : Controller class should accept the parameter from user and pass these parameters BC4J files ( AMImpl.java ) and its Job of the AMImpl.java
    to perform the business logic and return the result back to to controller .
    To enforce the coding standard of MVC design pattern we have these java files EO , VO , AM , CO . with more practice you will understand the various
    methods defined in each of these java files .
    Keerthi

  • How do I find out my keychain password? Need more info fast about this

    My computer started to get really slow, so I looked what I could do to make it faster again. After searching I found that the safari content was high and that I should delete it to make it less laggy and slow. Long story short I ended up deleting my saved passwords on safari...Looking into more info, I found out that I needed to get to Keychain Access. I got to Keychain access, found all the passwords.
    My question..
    •How do I get them out of Keychain?
    •If I end up needing my password for Keychain, how do I find that out? I have the like start up CD, but I dont remember ever making a password.
    •And if I do retreive my Keychain Password some how, will that delete everything stored in Keychain? I would have just tried it, but its a lot of passwords I CAN NOT lose...
    Please help :/
    Thanks!

    Never mind the screenshot.
    Please read this whole message before doing anything.
    This procedure is a diagnostic test. It’s unlikely to solve your problem. Don’t be disappointed when you find that nothing has changed after you complete it.
    The purpose of the test is to determine whether the problem is caused by third-party software that loads automatically at startup or login, by a peripheral device, by a font conflict, or by corruption of the file system or of certain system caches.
    Disconnect all wired peripherals except those needed for the test, and remove all aftermarket expansion cards, if applicable. Start up in safe mode and log in to the account with the problem. You must hold down the shift key twice: once when you boot, and again when you log in.
    Note: If FileVault is enabled, or if a firmware password is set, or if the boot volume is a software RAID, you can’t do this. Ask for further instructions.
    Safe mode is much slower to boot and run than normal, with limited graphics performance, and some things won’t work at all, including sound output and Wi-Fi on certain models. The next normal boot may also be somewhat slow.
    The login screen appears even if you usually login automatically. You must know your login password in order to log in. If you’ve forgotten the password, you will need to reset it before you begin.
    Test while in safe mode. Same problem?
    After testing, reboot as usual (not in safe mode) and verify that you still have the problem. Post the results of the test.

  • 6358629 SSLSocket.close() / read() deadlock  - need more info

    Java 1.5.0_14 is documented as having this fix ....
    "6358629 jsse runtime SSLSocket.close() and SSLSocket.read() deadlock "
    I cannot find this bug in the bug db and the sun page says sometimes bugs don't show up for security reasons.
    The complete absense of info on this bug other than its title means I cannot tell whether this is the same bug I am seeing randomly in production.
    Given that I cannot replicate the problem in a reproducable test case I need sufficient info to justify upgrading the prod VM and risk introducing new bugs in an otherwise stable platform.
    Is there any way to get more info on this bug ?
    Anyone seen a problem like this in their system?
    Is it possible Sun has just hidden the bug for no good reason?
    Any help appreciated.

    Hello, thank you very much for your information.
    I had met same bug on Linux.
    java version "1.6.0_11"
    Java(TM) SE Runtime Environment (build 1.6.0_11-b03)
    Java HotSpot(TM) 64-Bit Server VM (build 11.0-b16, mixed mode)
    My workaround is here. Closing file descriptor directry by calling private native method( closeSocket0 of java.net.PlainSocketImpl ) using reflection.
    It works well on my environment.
    public static void closeNativeSocket( Socket socket )
    try
    Object object = socket;
    String fieldName = "impl";
    Field field = null;
    Method method = null;
    Class clazz;
    clazz = Class.forName( "java.net.Socket" );
    field = clazz.getDeclaredField( fieldName );
    field.setAccessible( true );
    object = field.get( object );
    clazz = Class.forName( "java.net.PlainSocketImpl" );
    method = clazz.getDeclaredMethod( "socketClose0", new Class[] { Boolean.TYPE } );
    method.setAccessible( true );
    method.invoke( object, new Object[]{ new Boolean( false ) } );
    catch( Exception e )
    e.printStackTrace();
    hope this helps.

  • Need More Info on Server 2012 R2 Essentials

    I'm currently running Server 2008 R2 Foundation for my wife's (1 person) online business, and have been looking at 2012 R2 Foundation vs Essentials.  The latter sounds like a better fit, since in my absence, my wife has limited IT knowledge/experience, but
    I need more information:
    1) Can Essentials be run in a WORKGROUP instead of a domain?  I currently have my server that way, and it serves our needs very well.
    2) I read in some of the forums that while essentials allows 25 users, only two can be logged in concurrently.  Is that true, or am I missing something?
    3) Server 2012 R2 Foundation DOES NOT require CALs for local LAN users, is this also true with 2012 R2 Essentials?  Also, how much are the CALS for RDP users?
    Capt. Dinosaur

    Hi again, Grey, and thank you for your response.  I do appreciate your detail, and I'll answer them each in turn.
    "1) http://technet.microsoft.com/en-us/library/dn281793.aspxMust be the domain controller at the root of the forest and
    domain, and must hold all the FSMO roles."
    Well I guess if it must it must, although I don't understand why the (first) response above states emphatically that a workgroup can be used.  I prefer a workgroup because I understand it much better than a domain setup, and I don't understand Active
    Directory etc.  When I bought my server in 2011 I hired someone to set up the os for me.  I also purchased Mark Minasi's book on 2008 R2, but so much of it was over my head.  Fifty five years in the computer business, and today I feel as though
    I've never seen one before (hence the name Capt. Dinosaur).  I am, however, signed up for a course in Managing Windows Server 2012 which starts in January.  I hope that helps get through my aging grey matter.  All these initials and acronyms
    are total confusion to me, along with my case of chronic CRS (Can't Remember Squat).
    "2) If you say you have 3 different users logged into Foundation with RDP I
    am not going to argue.  I know the license only allows for 2
    administrative connections. http://technet.microsoft.com/en-us/library/cc770759.aspx 
    The default connection (RDP-Tcp) only allows a maximum of two simultaneous
    remote connections."
    I currently have two licenses for 2008 R2 Foundation, and Ithe users who log in to those remotely are
    NOT administrator accounts.   I don't know if that makes a difference, but I've had both users logged in from Florida and I was logged in (as an administrator) from a local workstation.  I had to test that early on to make sure
    that my two users could log in concurrently, and that I could be logged in to manage the system.
    "As a rule we do not suggest you use your server as a workstation. ..."
    Maybe I misled you with something I said, but I/we do not use the server as a workstation.  Sometimes, though infrequently, I have to log in to the server directly (as Administrator) to do or fix something, but do not stay on it for
    normal work.  When we're home my (Dell Precision Mobile) Workstation is connected to my LAN.  I also do software development on that workstation.  I have a development environment on an external eSATA drive attached to my workstation,
    and both a beta and a live environment on the server; I use my workstation to operate all three.
    "... And I really have no clue what would happen if you
    restored your dell box to something else.  It may fail activation. 
    Guess you need to try that sometime. ..."
    I have tried it, albeit to another - but completely different Dell box, which is normally the only brand I use;  that's a holdover from my mainframe/minicomputer days when having a mixed shop was seriously avoided - with a clean bare HDD, and it
    worked.  When the restoration was executed, True Image asked only that you provide the drivers for the new computer, and they do the rest.
    " ... The advantage to the Essentials client backup is it will backup a whole lot of PC's to the server and use data dedupe to keep the backup database small.  So it would backup your wife's PC at
    work and the 3 you have on the road."
    I should explain that my wife's office is in our basement at home, in a separate room from my computer room.  My wife has a second business making gourmet wine infused jams, and we built a FDA certified canning kitchen
    in the basement, and her workstation is there so that she can work at both businesses.  Her workstation, my server and my workstation are backed up weekly to hard drives in a docking station, and stored in a fire resistant safe.  The
    computers we have on the road are my mobile workstation and her laptop.  When my daughter comes along, she also brings her laptop.  Since no company information is stored on any of the workstations, only the server data are mission critical. 
    "But in any case if what
    you have is doing what you want.  You don't seem to want what essentials
    offers, Active Directory, Remote Access, or Client backup, so why change?"<o:p></o:p>
    I guess I'm something like the man who bought a tuxedo and so now he has to start looking for formal dances to attend.  I should explain that we live in a very rural area - our town has a population of 1,000, 60% of the country is National
    Forest, and my home is literally in in it, bordered by it on two sides - and have only a very small technical college here.  I need to learn all about the server OS and how to administer it so that I don't
    have to hire someone when something needs to be done, and 2012 R2 is the only course available within 100 miles - up until this year they were only offering 2003, and even that was at a different campus 60 miles away (and over a 2,000' mountain). 
    Since the course I'll be taking is for '12,  I'm simply looking to upgrade so that what I have is what the course covers.  All my other computers are running Windows 7 (Pro and/or Ultimate) 
    "More on #1 Active Directory gives you group policy and more  control over file permissions than workgroup.  Say you had a folder shared and it had your bank.xls  You could give your wife permission to see it but not your daughter. 
    Group Policy is probably not a big deal for one client PC.  The advantage is you can make one setting and it can be applied to hundreds of PC's"
    Actually I have remote access now in '08 R2 Foundation, and I'm not sure what Active Directory will buy me, but that could, of course, change when I get into the course.  Not having Group Policies has been a small problem,
    on one or two rare occasions, so that could be a game changer for me, but with what I have now, I've been able to set up my political campaign system such that
    no one from one campaign can see or access any data for any other campaign.  Also I was able to set up the user accounts so that a remote user logging in
    can not see nor execute anything except the campaign system.  Any attempt to do otherwise automatically logs them out.
    In summation, you may just have convinced me that using a domain instead of a workgroup, with all it advantages might just be the way for me to go, since hopefully I'll learn all about that when I take that course.  The limitation of only two concurrent
    RDS users, however, is still worrying me, and I'm not sure that I'm accurately communicating.  If the
    two concurrent RDS user limitation ONLY refers to
    Administrator accounts then there's no problem, because any user accounts other than those for my wife and myself,
    would not be Administrator accounts.  I can't remember whether 2008 R2 foundation supports
    "Power User" accounts, but if so, that would be the highest level any other users would have, and possibly not even that high.
    Capt. Dinosaur

  • Need more info about "NestedContainer" violation

    Hello,
    I have a "NestedContainer" violation for a Canvas container in my application. Compared to the application's root container it is located at level 6 i.e. nested in 5 other parent containers. However at the same time I have other containers (again Canvases) which are even deeper nested for example at level 8 compared to the root container.
    I need more information when exactly the "NestedContainer" violation is triggered so I fix my code if needed and submit a bug for FlexPMD in case the rule is not implemented as designed.
    Thanks!
    Smirnoff

    Hi
    I would like to share an example but I need to create it since I don't want to post the actual source code.
    Simply copying the problem mxml file under another name doesn't work because it is put outside its container and then the violation is not generated.
    If I have to create an example it might be too time consuming to achieve these:
    - keep the same component hierarchy
    - keep the problem present
    - keep the example clean from the real source code
    That's why I wanted to get more info when this violation is triggered and hopefully create an example faster.
    Smirnoff

  • Need more info on Java SE 6 after downloading my new operating system to Yosemite

    I updated my operating system on my MacBook Pro to Yosemite 10.10.2, now when I try to open CS4 it directs me to download Java SE 6, but the "more info" button which is to direct to the website to download the Java, does not work, and I can't find anything or where to download this. I need CS4 to do my work, can someone help me?

    Get Apple Java 2014-001.

  • Need more info for the ag34405 DMM VI's

    Hi !
    I'm working with the Agilent 34405a multimeter and made a little VI for data-logging. The problem is, I want to choose between 4.5 & 5.5 resolution and the is no litterature about it. I'm using the NI drivers and VI's made for this application. There is a VI named "Configure measurement.vi" in which you could perhaps select the resolution (as the default value is 0.0001, that would be for 5.5 digits I think). I already tried to change the value from 0.0001 to 0.001 but the instrument still use the 5.5 digit measurement method.
    Does somebody also know if there is more documentation as the contextual help of each VI made for the ag34405a DMM (there are more or less only default values explained, but I would need more...)?
    I've attached my VI if this could help to solve this issue. Am working with LabView 8.20.
    In advance, thanks for your help !
    Yves
    Attachments:
    Start_stop_logging_ag34405a_V1.vi ‏47 KB

    Yves,
    One of the things that is great about instrument drivers is the context help on each of the controls. You can turn the context help on with Ctrl+H and then hover you mouse cursor over the control. If you open "Configure Measurement.vi" and look at the help for the absolute resolution control you'll see a good description that includes:
    Notes:
    (1) The instrument driver ignores this parameter if the Range parameter is set to AG34405A_VAL_AUTO_RANGE_ON (-1) .
    If you look at the help of the Range parameter you'll find see a similar discription with details and the following:
    Defined Values:
    AG34405A_VAL_AUTO_RANGE_OFF (-2)   (-2.0)  - Auto-Range Off
    AG34405A_VAL_AUTO_RANGE_ON (-1)    (-1.0)  - Auto-Range On
    Based on this, can you try setting the auto-range to -2 and specifying the absoulte resolution?
    Regards,
    Kamran

  • Need more info abt the functions of each classes in Workflow API's of BPEL

    Need more information about the functions of each method of the classes in Workflow API's of BPEL
    The Java documentation of the workflow API (especially Identity Service classes) is having a one liner explanation for the methods of each class. We need to implement our own Identity Service that implements the BPMIdentityService interface. We are not able to map the function of each methods of this interface to what our security subsystem provides. We feel that we need more detailed information about what each method of each class is doing internally so that we can map to whatever our security subsystem provides.
    The BPEL Developers Guide does not talk about the functionality of each methods of this interface. If anybody can guide me to look into some documentation that has this information or if anybody has this information, then please do the necessary help.
    Regards
    Ramana

    Did you find out the solution for your above posted query ? I'm also in need of some documents. Can you help me out?

  • Need more info than ORA-02291

    Hi!
    I wonder if there is a way to find out more specific information than the error "ORA-02291" provides - it only tells you which constraint was violated, not what the violating value(s) were?!
    In my scenario, an application inserts data into several tables that have plenty of constraints. Constraints are deferred. When setting the constraints immediate again (or just COMMITing) I get ORA-02291.
    I really need to know the actual values of the violating record, not just the constraint that was violated.
    I'm using OCI (SQL+ for some debugging) and a 9.2 DB.

    Thanks for the reply.
    First, I don't know PL/SQL very well, so forgive me if I'm being stupid here ;)
    I don't see that this would help in my case. All constraints are DEFERRED, which means I don't get an error even if I checked every insertion (which I do, anyway). This is by design; there are lots of tables and constraints and easier to insert everything in no particular order.
    I can detect the constraint violations when I set the constraints IMMEDIATE again - which is fine. But I only get the violated CONSTRAINT, not the violating record which I (still) need.

  • Need more info on tracking my wireless users

    hi
    went through live tech this amto set up log tracking but that is not the info i wanted, is there a way to find out all users connection on my network, wireless pcs and wired xbox? date, time, etc... thanks for your help

    As you still don't say which router you have in mind I can only guess. For most consumer routers: no. They are made for ease of use and not for advanced or professional business use. They are stripped of most features a "real" router has to simplify the interface. Most have very limited logging functions. Most have only local logging which you can only see through the web interface. Without syslog logging it is not easy to extract. Without SNMP interface it is difficult to retrieve the state of the connections.
    For many of those routers you are able to see the following through the web interface:
    * the DHCP client table, i.e. which IP addresses have been leased when to which MAC address. This does not say whether the client is wireless or wired nor if it is still connected or not unless the client released the DHCP lease in which case it won't appear in the DHCP client table anymore. Also clients with a static IP address won't appear here.
    * the active wireless connections list. Shows you the MAC addresses of the wireless clients which are active at the moment, even those who don't have an IP address or use a static IP address. But this does not show wired clients.
    * sometimes you can see some log of outgoing packets. But that log is very limited and won't get you far if you have heavy traffic through the router.
    You can also use RADIUS authentication on the wireless. With radius you get the whole accounting package. But this is not easy to set up and it won't get you the wired clients. The wired clients are in the LAN and have access. There is nothing you can do about this and there is basically no real way to track them on a consumer router like most Linksys routers.
    The situation is totally different if you look at real profession gear like a Cisco router. There you can do almost anything you want as long as you figure out how to configure it...

  • 10.5.8 Firewall settings- need more info about

    Ok, I know that "Allow all incoming connections" does just that: nothing is refused.
    And I am clear on "allow only essential services" blocks everything except for some basic stuff.
    My question is this: on "set access for specific services and applications," what happens when you select that and haven't added anything down below? Does it just allow all incoming until you specifically set that up?? Or, does it still only allow essential services but ask you as things come up?
    Lastly, Even with "allow only essential services," you can still + things below. Does setting number 2 respect the items listed below?

    Well, you will just need to see. I cannot tell you more than what's in the article. I don't use the OS X firewall. I have a hardware router that has its own built-in firewall so using the one in OS X seems unnecessarily redundant. My home network is all Ethernet. My wireless setup is used sparingly and uses WPA2 security. I do not open up the computer for any form of public access like FTP, web sharing, etc. so I see no need for anything more than what I have. I've never had occasion to turn on the OS X firewall. No one has had occasion to hack into my computers in 28 years. I filter spam, I don't click on strange web page links, I don't respond to phishing emails or web sites. But then my situation doesn't allow for much if any opportunity to outside hackers. Your situation may be substantially different.

  • Need more info on solving script errors -- don't have Webroot on my computer, but it gets tied up for hours at a time with Mozilla script blockages !!!!

    Whenever I am logged into FF, my computer will eventually grind to a halt -- sometimes after a few minutes, and sometimes after a few hours. I then get the script error message shown below.
    "A script on this page may be busy, or it may have stopped responding. You can stop the script now, or you can continue to see if the script will complete."
    <nowiki>**************************************************************************</nowiki>
    Below that generic message is one of these specific messages:
    Script: resource://gre/modules/XPCOMUtils.jsm:320
    https://secure.wlxrs.com/w!xbEiA1hkt!tswyuOeDSQ/litedepex.js:1
    resource://gre/modules/XPCOMUtils.jsm:323
    resource://gre/modules/XPCOMUtils.jsm:325
    resource:///components/nsPrompter.js:434
    https://gfx7.hotmail.com/mail/16.2.7137.1204/c2a.js:1
    resource://gre/modules/XPCOMUtils.jsm:325
    https://secure.wlxrs.com/w!xbEiA1hkt!tswyuOeDSQ/wlive.js:1
    https://secure.wlxrs.com/_D/w!xbEiA1hkt!tswyuOeDSQ/jquery-min.js:47
    chrome://global/content/bindings/textbox.xml:98
    chrome://mozapps/content/downloads/download.xml:71
    Script: https://mail.google.com/_/mail-static/_/js/main/m_i,t/rt=h/ver=am293eyFlXI.en./sv=1/am=!v8Czf-oeNMn0BO3a1PgLcnZDWwl3f6w7siCzO0WZ4q30IbVM6NJqQEKHLeJhMzB_YcWyBQ/d=1:2729
    http://pagead2.googlesyndication.com/pagead/osd.js:12
    https://gfx7.hotmail.com/mail/16.2.7137.1204/cmpt0.js:1
    http://mail.yimg.com/zz/combo?nq/launch/common-neo-base_6549.js&nq/launch/common-neo-om_6549.js&nq/launch/search-neo_6549.js&nq/launch/inbox-om_6549.js&nq/launch/inbox-listview-new_6549.js&nq/launch/inbox-message-new_6549.js&nq/launch/inbox-minty-fresh_6549.js&nq/launch/inbox-base_6549.js&nq/intl/js/launch/lang_en-US_6549.js&nq/intl/js/launch/conf_us_6549.js:194
    <nowiki>************************************************************************************</nowiki>
    I have no such problem with Internet Explorer or when the computer is not connected to the Internet; it is specific to FF. I do not have Webroot Spysweeper on my computer.
    Strangely enough, we do not have this problem with two other PCs that use FF, nor did I have it on these two computers during the first few years that I used them with FF. I bought a new PC, moved my files onto it, then suddenly it had the same problem, which is what made me think it was a malware issue.
    I checked Windows Defender and found that was not switched on and could not be switched on. So I bought three different anti-malware programs beginning with Malwarebytes and then SpyBlaster and SpyBot S&D. But they did no good.
    Just pressing the "continue" button in response to the script error message does not good, since it allows the computer to continue grinding to a halt. Worse, if those scripts are malware, I don't want them sending private info to internet sites, which is apparently their function.
    Please help me root out the problem. It has made my computer inoperative for several hours a day for the past few months.

    '''Try the Firefox Safe Mode''' to see how it works there. The Safe Mode is a troubleshooting mode, which disables most add-ons.''
    ''(If you're not using it, switch to the Default theme.)''
    * You can open the Firefox 4.0+ Safe Mode by holding the '''Shift''' key when you use the Firefox desktop or Start menu shortcut.
    * Or use the Help menu item and click on the '''Restart with Add-ons Disabled...''' menu item while Firefox is running.
    ''Don't select anything right now, just use "'Start in Safe Mode"''
    ''To exit the Firefox Safe Mode, just close Firefox and wait a few seconds before using the Firefox shortcut (without the Shift key) to open it again.''
    '''''If it is good in the Firefox Safe Mode''''', your problem is probably caused by an extension, and you need to figure out which one.
    Please follow the [[Troubleshooting extensions and themes]] article for that.
    ''When you figure out what's causing your issues, please let us know. It might help other users who have the same problem.''

  • Need more info on a USB thumb drive... shell command?

    I need to see about extracting a partnumber from a failing usb thumbdrive.  I plugged it in and checked out /var/log/dmesg and got the following:
    input: Kensington USB Input Device as /devices/pci0000:00/0000:00:1a.1/usb4/4-1/4-1:1.0/input/input6
    generic-usb 0003:047D:1013.0003: input,hidraw2: USB HID v1.00 Mouse [Kensington USB Input Device] on usb-0000:00:1a.1-1/input0
    ieee1394: Host added: ID:BUS[0-00:1023] GUID[000129200006b6b2]
    Is there some where else I can look to get some device-specific info?

    Found it: in the disk utility menu select start volume.
    Thanks.

  • Need more info on PlayDock please

    I am about to buy the PlayDock MP3 speakers, but want to make sure my MP3 player is reasonably compatible. There are almpost no photos of the PlayDock at the Creative site, this is a real marketing oversight. There appear to be no manuals available online, again, makes it hard to sell a product without good info. I therefore have no idea what the various cradles that hold the MP3 players look like and their dimensions. I have a Tascam MP-GT MP3 guitar trainer unit that I want to use with the PlayDock. It is essentially an MP3 player, albeit a bulky one. It's dimensions are 4.25"x3"x0.75". Will any of the rubber cradles accomodate a device of this size?Also, it is rechargeable via USB. The Creative site makes no mention of what characteristics of an MP3 player determine if it is or is not rechargeable via the PlayDock. Can you supply me with this information as well. My MP3 device has a headphone jack so presumably I can use it with the PlayDock one way or another. Are there any characteristics other than this necessary to use the PlayDock or which might preclude my use of the PlayDock with the MP-GT? Thanks very much, jim

    What are you talking about? Touches are not "locked." It's not an iPhone. Try reading the manual:
    Please Get the iPod Touch User Manual for iOS 5

Maybe you are looking for

  • Need help with Casting to HttpsURLConnection

    Can anyone see why this simple cast will not work for me? Thanks. Here's the error message I get when I try to run it: C:\myJava\code\Source>java TestHttpsClientPost We have successfully initialized the default SSLSocketFactory! java.lang.ClassCastEx

  • Illustrator CS5 javascript JPEG export 300 DPI & max quality

    I new to Illustrator CS5 scripting (javascript) and I'm trying to export an .eps to .jpg.  With image quality 8 and DPI 300. I've seen several post asking about this (only a few with answers).  Those answer aren't working for me though. I also found

  • One computer - windowsxp - two ipods. Can both share itunes library?

    I have a 5th gen ipod with 3300 tracks loaded. My wife has now bought a second hand 4th gen with click wheel which I would like to share with my itunes library. Problem is - can this be done and if so how do I go about it? Was about to restore the 4t

  • Unable to open the TAR file

    I have downlaod the P2G and try to unzip the TAR file with the help of Winzip, but it is giving me error 'Reading fail after 293 enteries' if any one has any idea please do let me know With regards

  • Micro SD 1GB memory card

    Hi I'm just a newbie so be nice! My nokia 6210 navigator screen went blank so the phone is no longer any use to me. I have the Micro SD 1GB memory card that i wish to use in another nokia phone. Does anyone know what nokia phones accept the 1GB memor