Need more info on PlayDock please

I am about to buy the PlayDock MP3 speakers, but want to make sure my MP3 player is reasonably compatible. There are almpost no photos of the PlayDock at the Creative site, this is a real marketing oversight. There appear to be no manuals available online, again, makes it hard to sell a product without good info. I therefore have no idea what the various cradles that hold the MP3 players look like and their dimensions. I have a Tascam MP-GT MP3 guitar trainer unit that I want to use with the PlayDock. It is essentially an MP3 player, albeit a bulky one. It's dimensions are 4.25"x3"x0.75". Will any of the rubber cradles accomodate a device of this size?Also, it is rechargeable via USB. The Creative site makes no mention of what characteristics of an MP3 player determine if it is or is not rechargeable via the PlayDock. Can you supply me with this information as well. My MP3 device has a headphone jack so presumably I can use it with the PlayDock one way or another. Are there any characteristics other than this necessary to use the PlayDock or which might preclude my use of the PlayDock with the MP-GT? Thanks very much, jim

What are you talking about? Touches are not "locked." It's not an iPhone. Try reading the manual:
Please Get the iPod Touch User Manual for iOS 5

Similar Messages

  • Need more info on EO,VO and AM *.java files

    HI,
    Friends and experts I need your help in learning OAF.
    I am new to OAF and want to know more info about the following java classes.
    When I created a simple search page with EO, VO and AM, the following java classes are created.
    I want to know
    what is it?
    what we do with that ?
    where we use that?
    Any sample scripts if possible?
    EOImpl.java
    Please correct me if I am wrong,I know that we use this one for manipulating data for a particular row ,operations such as getattribut,setattribute, delete ,update, insert. There are various methods got created when you create the EO if you select options on the " Generate Method " during step 4 on EO wizard.
    EOCollImpl.java
    VOImpl.java
    ViewRowImpl
    AMImpl.java
    Thanks
    Sri.

    Hi Sri ,
    EO :
    Entity Objects are basically based on one table which encapsulate the business rules. These objects are used by OAF page to perform update/insert/delete operations .
    Inside EOImpl.java you will find setter() and getter () methods in java we call it as accessor and mutator , each attribute in EO is mapped to column in the data base table .
    You can also generate a create () method Validate () method .
    Eg : To get the sequence value in OAF you can use Create() method .
    VO :
    VOImpl (VO) : It just consist of an Data base sql query , you might have noticed while executing a query eg : VO.executeQuery() ;
    to perform any validation it provides iteration over and access to the view rows in its result set.
    VoRowImpl : Represents a single row in a view object .
    You will understand better when you writing a code using voimpl /voRowimpl objects
    AmImpl :
    It basically performs the Business logic , we will define all our methods to implement business logic .
    Eg : you can call a method from controller and define the method Amimpl.java , you can use of initializing the query or
    you do DML operation , etc ...
    In summery : The main reason why we have java file distribute across EO , VO , AM is because OAF is designed with MVC design pattern ,
    in other words we have to isolate the responsibility of code in each layer ( Model , View , Controller ) .Its bad practice to write
    the entire code in one single class file .
    Eg : Controller class should accept the parameter from user and pass these parameters BC4J files ( AMImpl.java ) and its Job of the AMImpl.java
    to perform the business logic and return the result back to to controller .
    To enforce the coding standard of MVC design pattern we have these java files EO , VO , AM , CO . with more practice you will understand the various
    methods defined in each of these java files .
    Keerthi

  • How do I find out my keychain password? Need more info fast about this

    My computer started to get really slow, so I looked what I could do to make it faster again. After searching I found that the safari content was high and that I should delete it to make it less laggy and slow. Long story short I ended up deleting my saved passwords on safari...Looking into more info, I found out that I needed to get to Keychain Access. I got to Keychain access, found all the passwords.
    My question..
    •How do I get them out of Keychain?
    •If I end up needing my password for Keychain, how do I find that out? I have the like start up CD, but I dont remember ever making a password.
    •And if I do retreive my Keychain Password some how, will that delete everything stored in Keychain? I would have just tried it, but its a lot of passwords I CAN NOT lose...
    Please help :/
    Thanks!

    Never mind the screenshot.
    Please read this whole message before doing anything.
    This procedure is a diagnostic test. It’s unlikely to solve your problem. Don’t be disappointed when you find that nothing has changed after you complete it.
    The purpose of the test is to determine whether the problem is caused by third-party software that loads automatically at startup or login, by a peripheral device, by a font conflict, or by corruption of the file system or of certain system caches.
    Disconnect all wired peripherals except those needed for the test, and remove all aftermarket expansion cards, if applicable. Start up in safe mode and log in to the account with the problem. You must hold down the shift key twice: once when you boot, and again when you log in.
    Note: If FileVault is enabled, or if a firmware password is set, or if the boot volume is a software RAID, you can’t do this. Ask for further instructions.
    Safe mode is much slower to boot and run than normal, with limited graphics performance, and some things won’t work at all, including sound output and Wi-Fi on certain models. The next normal boot may also be somewhat slow.
    The login screen appears even if you usually login automatically. You must know your login password in order to log in. If you’ve forgotten the password, you will need to reset it before you begin.
    Test while in safe mode. Same problem?
    After testing, reboot as usual (not in safe mode) and verify that you still have the problem. Post the results of the test.

  • Need more info abt the functions of each classes in Workflow API's of BPEL

    Need more information about the functions of each method of the classes in Workflow API's of BPEL
    The Java documentation of the workflow API (especially Identity Service classes) is having a one liner explanation for the methods of each class. We need to implement our own Identity Service that implements the BPMIdentityService interface. We are not able to map the function of each methods of this interface to what our security subsystem provides. We feel that we need more detailed information about what each method of each class is doing internally so that we can map to whatever our security subsystem provides.
    The BPEL Developers Guide does not talk about the functionality of each methods of this interface. If anybody can guide me to look into some documentation that has this information or if anybody has this information, then please do the necessary help.
    Regards
    Ramana

    Did you find out the solution for your above posted query ? I'm also in need of some documents. Can you help me out?

  • Need more info about "NestedContainer" violation

    Hello,
    I have a "NestedContainer" violation for a Canvas container in my application. Compared to the application's root container it is located at level 6 i.e. nested in 5 other parent containers. However at the same time I have other containers (again Canvases) which are even deeper nested for example at level 8 compared to the root container.
    I need more information when exactly the "NestedContainer" violation is triggered so I fix my code if needed and submit a bug for FlexPMD in case the rule is not implemented as designed.
    Thanks!
    Smirnoff

    Hi
    I would like to share an example but I need to create it since I don't want to post the actual source code.
    Simply copying the problem mxml file under another name doesn't work because it is put outside its container and then the violation is not generated.
    If I have to create an example it might be too time consuming to achieve these:
    - keep the same component hierarchy
    - keep the problem present
    - keep the example clean from the real source code
    That's why I wanted to get more info when this violation is triggered and hopefully create an example faster.
    Smirnoff

  • Need more info on Java SE 6 after downloading my new operating system to Yosemite

    I updated my operating system on my MacBook Pro to Yosemite 10.10.2, now when I try to open CS4 it directs me to download Java SE 6, but the "more info" button which is to direct to the website to download the Java, does not work, and I can't find anything or where to download this. I need CS4 to do my work, can someone help me?

    Get Apple Java 2014-001.

  • 6358629 SSLSocket.close() / read() deadlock  - need more info

    Java 1.5.0_14 is documented as having this fix ....
    "6358629 jsse runtime SSLSocket.close() and SSLSocket.read() deadlock "
    I cannot find this bug in the bug db and the sun page says sometimes bugs don't show up for security reasons.
    The complete absense of info on this bug other than its title means I cannot tell whether this is the same bug I am seeing randomly in production.
    Given that I cannot replicate the problem in a reproducable test case I need sufficient info to justify upgrading the prod VM and risk introducing new bugs in an otherwise stable platform.
    Is there any way to get more info on this bug ?
    Anyone seen a problem like this in their system?
    Is it possible Sun has just hidden the bug for no good reason?
    Any help appreciated.

    Hello, thank you very much for your information.
    I had met same bug on Linux.
    java version "1.6.0_11"
    Java(TM) SE Runtime Environment (build 1.6.0_11-b03)
    Java HotSpot(TM) 64-Bit Server VM (build 11.0-b16, mixed mode)
    My workaround is here. Closing file descriptor directry by calling private native method( closeSocket0 of java.net.PlainSocketImpl ) using reflection.
    It works well on my environment.
    public static void closeNativeSocket( Socket socket )
    try
    Object object = socket;
    String fieldName = "impl";
    Field field = null;
    Method method = null;
    Class clazz;
    clazz = Class.forName( "java.net.Socket" );
    field = clazz.getDeclaredField( fieldName );
    field.setAccessible( true );
    object = field.get( object );
    clazz = Class.forName( "java.net.PlainSocketImpl" );
    method = clazz.getDeclaredMethod( "socketClose0", new Class[] { Boolean.TYPE } );
    method.setAccessible( true );
    method.invoke( object, new Object[]{ new Boolean( false ) } );
    catch( Exception e )
    e.printStackTrace();
    hope this helps.

  • Need more info for the ag34405 DMM VI's

    Hi !
    I'm working with the Agilent 34405a multimeter and made a little VI for data-logging. The problem is, I want to choose between 4.5 & 5.5 resolution and the is no litterature about it. I'm using the NI drivers and VI's made for this application. There is a VI named "Configure measurement.vi" in which you could perhaps select the resolution (as the default value is 0.0001, that would be for 5.5 digits I think). I already tried to change the value from 0.0001 to 0.001 but the instrument still use the 5.5 digit measurement method.
    Does somebody also know if there is more documentation as the contextual help of each VI made for the ag34405a DMM (there are more or less only default values explained, but I would need more...)?
    I've attached my VI if this could help to solve this issue. Am working with LabView 8.20.
    In advance, thanks for your help !
    Yves
    Attachments:
    Start_stop_logging_ag34405a_V1.vi ‏47 KB

    Yves,
    One of the things that is great about instrument drivers is the context help on each of the controls. You can turn the context help on with Ctrl+H and then hover you mouse cursor over the control. If you open "Configure Measurement.vi" and look at the help for the absolute resolution control you'll see a good description that includes:
    Notes:
    (1) The instrument driver ignores this parameter if the Range parameter is set to AG34405A_VAL_AUTO_RANGE_ON (-1) .
    If you look at the help of the Range parameter you'll find see a similar discription with details and the following:
    Defined Values:
    AG34405A_VAL_AUTO_RANGE_OFF (-2)   (-2.0)  - Auto-Range Off
    AG34405A_VAL_AUTO_RANGE_ON (-1)    (-1.0)  - Auto-Range On
    Based on this, can you try setting the auto-range to -2 and specifying the absoulte resolution?
    Regards,
    Kamran

  • Need More Info on Server 2012 R2 Essentials

    I'm currently running Server 2008 R2 Foundation for my wife's (1 person) online business, and have been looking at 2012 R2 Foundation vs Essentials.  The latter sounds like a better fit, since in my absence, my wife has limited IT knowledge/experience, but
    I need more information:
    1) Can Essentials be run in a WORKGROUP instead of a domain?  I currently have my server that way, and it serves our needs very well.
    2) I read in some of the forums that while essentials allows 25 users, only two can be logged in concurrently.  Is that true, or am I missing something?
    3) Server 2012 R2 Foundation DOES NOT require CALs for local LAN users, is this also true with 2012 R2 Essentials?  Also, how much are the CALS for RDP users?
    Capt. Dinosaur

    Hi again, Grey, and thank you for your response.  I do appreciate your detail, and I'll answer them each in turn.
    "1) http://technet.microsoft.com/en-us/library/dn281793.aspxMust be the domain controller at the root of the forest and
    domain, and must hold all the FSMO roles."
    Well I guess if it must it must, although I don't understand why the (first) response above states emphatically that a workgroup can be used.  I prefer a workgroup because I understand it much better than a domain setup, and I don't understand Active
    Directory etc.  When I bought my server in 2011 I hired someone to set up the os for me.  I also purchased Mark Minasi's book on 2008 R2, but so much of it was over my head.  Fifty five years in the computer business, and today I feel as though
    I've never seen one before (hence the name Capt. Dinosaur).  I am, however, signed up for a course in Managing Windows Server 2012 which starts in January.  I hope that helps get through my aging grey matter.  All these initials and acronyms
    are total confusion to me, along with my case of chronic CRS (Can't Remember Squat).
    "2) If you say you have 3 different users logged into Foundation with RDP I
    am not going to argue.  I know the license only allows for 2
    administrative connections. http://technet.microsoft.com/en-us/library/cc770759.aspx 
    The default connection (RDP-Tcp) only allows a maximum of two simultaneous
    remote connections."
    I currently have two licenses for 2008 R2 Foundation, and Ithe users who log in to those remotely are
    NOT administrator accounts.   I don't know if that makes a difference, but I've had both users logged in from Florida and I was logged in (as an administrator) from a local workstation.  I had to test that early on to make sure
    that my two users could log in concurrently, and that I could be logged in to manage the system.
    "As a rule we do not suggest you use your server as a workstation. ..."
    Maybe I misled you with something I said, but I/we do not use the server as a workstation.  Sometimes, though infrequently, I have to log in to the server directly (as Administrator) to do or fix something, but do not stay on it for
    normal work.  When we're home my (Dell Precision Mobile) Workstation is connected to my LAN.  I also do software development on that workstation.  I have a development environment on an external eSATA drive attached to my workstation,
    and both a beta and a live environment on the server; I use my workstation to operate all three.
    "... And I really have no clue what would happen if you
    restored your dell box to something else.  It may fail activation. 
    Guess you need to try that sometime. ..."
    I have tried it, albeit to another - but completely different Dell box, which is normally the only brand I use;  that's a holdover from my mainframe/minicomputer days when having a mixed shop was seriously avoided - with a clean bare HDD, and it
    worked.  When the restoration was executed, True Image asked only that you provide the drivers for the new computer, and they do the rest.
    " ... The advantage to the Essentials client backup is it will backup a whole lot of PC's to the server and use data dedupe to keep the backup database small.  So it would backup your wife's PC at
    work and the 3 you have on the road."
    I should explain that my wife's office is in our basement at home, in a separate room from my computer room.  My wife has a second business making gourmet wine infused jams, and we built a FDA certified canning kitchen
    in the basement, and her workstation is there so that she can work at both businesses.  Her workstation, my server and my workstation are backed up weekly to hard drives in a docking station, and stored in a fire resistant safe.  The
    computers we have on the road are my mobile workstation and her laptop.  When my daughter comes along, she also brings her laptop.  Since no company information is stored on any of the workstations, only the server data are mission critical. 
    "But in any case if what
    you have is doing what you want.  You don't seem to want what essentials
    offers, Active Directory, Remote Access, or Client backup, so why change?"<o:p></o:p>
    I guess I'm something like the man who bought a tuxedo and so now he has to start looking for formal dances to attend.  I should explain that we live in a very rural area - our town has a population of 1,000, 60% of the country is National
    Forest, and my home is literally in in it, bordered by it on two sides - and have only a very small technical college here.  I need to learn all about the server OS and how to administer it so that I don't
    have to hire someone when something needs to be done, and 2012 R2 is the only course available within 100 miles - up until this year they were only offering 2003, and even that was at a different campus 60 miles away (and over a 2,000' mountain). 
    Since the course I'll be taking is for '12,  I'm simply looking to upgrade so that what I have is what the course covers.  All my other computers are running Windows 7 (Pro and/or Ultimate) 
    "More on #1 Active Directory gives you group policy and more  control over file permissions than workgroup.  Say you had a folder shared and it had your bank.xls  You could give your wife permission to see it but not your daughter. 
    Group Policy is probably not a big deal for one client PC.  The advantage is you can make one setting and it can be applied to hundreds of PC's"
    Actually I have remote access now in '08 R2 Foundation, and I'm not sure what Active Directory will buy me, but that could, of course, change when I get into the course.  Not having Group Policies has been a small problem,
    on one or two rare occasions, so that could be a game changer for me, but with what I have now, I've been able to set up my political campaign system such that
    no one from one campaign can see or access any data for any other campaign.  Also I was able to set up the user accounts so that a remote user logging in
    can not see nor execute anything except the campaign system.  Any attempt to do otherwise automatically logs them out.
    In summation, you may just have convinced me that using a domain instead of a workgroup, with all it advantages might just be the way for me to go, since hopefully I'll learn all about that when I take that course.  The limitation of only two concurrent
    RDS users, however, is still worrying me, and I'm not sure that I'm accurately communicating.  If the
    two concurrent RDS user limitation ONLY refers to
    Administrator accounts then there's no problem, because any user accounts other than those for my wife and myself,
    would not be Administrator accounts.  I can't remember whether 2008 R2 foundation supports
    "Power User" accounts, but if so, that would be the highest level any other users would have, and possibly not even that high.
    Capt. Dinosaur

  • Need more info on adding user than is in UserGuide

    Before I send an invitation to someone to be a user and access one of my computers, I need more information on how that works that is provided in the LMI Pro User Guide.  Would really like to actually have RTV conversation with someone familiar with it (having done it), but it that's impossible, here goes. 1Do I have to give him the PW for my entire account, do I specify a separate PW for him, or does he set it when accepting the invitation ? 2
    Will he have to know the UN & PW of the target computer or will he just be "in" by virtue of the LMI Pro account ? 3Will he have all the remote functionality I have - Remote Control, File Manager, etc ? May have more questions later so I would really appreciate a contact who has used this before.  

     
    Hello  ,
    Thanks for posting your query here! 
    1 - When you invit a secondary user with a Pro account, this person will click on the link invitation and be prompted to login/create and account with his own username (email address) and own password - so you will not share yours
    2 - As for the target computer, the username/password of the session  or the acccess code (according to the settings) need to be known indeed.
    3-  The remote functionalities are set on target computers , therefore secondary users would have the ability to do File Transfer and remote printing. 
    Let me know if that clarifies the situation for you and feel free to get back to me if you have further questions!
    Thanks, 
    Best
    Julie

  • Need more info on solving script errors -- don't have Webroot on my computer, but it gets tied up for hours at a time with Mozilla script blockages !!!!

    Whenever I am logged into FF, my computer will eventually grind to a halt -- sometimes after a few minutes, and sometimes after a few hours. I then get the script error message shown below.
    "A script on this page may be busy, or it may have stopped responding. You can stop the script now, or you can continue to see if the script will complete."
    <nowiki>**************************************************************************</nowiki>
    Below that generic message is one of these specific messages:
    Script: resource://gre/modules/XPCOMUtils.jsm:320
    https://secure.wlxrs.com/w!xbEiA1hkt!tswyuOeDSQ/litedepex.js:1
    resource://gre/modules/XPCOMUtils.jsm:323
    resource://gre/modules/XPCOMUtils.jsm:325
    resource:///components/nsPrompter.js:434
    https://gfx7.hotmail.com/mail/16.2.7137.1204/c2a.js:1
    resource://gre/modules/XPCOMUtils.jsm:325
    https://secure.wlxrs.com/w!xbEiA1hkt!tswyuOeDSQ/wlive.js:1
    https://secure.wlxrs.com/_D/w!xbEiA1hkt!tswyuOeDSQ/jquery-min.js:47
    chrome://global/content/bindings/textbox.xml:98
    chrome://mozapps/content/downloads/download.xml:71
    Script: https://mail.google.com/_/mail-static/_/js/main/m_i,t/rt=h/ver=am293eyFlXI.en./sv=1/am=!v8Czf-oeNMn0BO3a1PgLcnZDWwl3f6w7siCzO0WZ4q30IbVM6NJqQEKHLeJhMzB_YcWyBQ/d=1:2729
    http://pagead2.googlesyndication.com/pagead/osd.js:12
    https://gfx7.hotmail.com/mail/16.2.7137.1204/cmpt0.js:1
    http://mail.yimg.com/zz/combo?nq/launch/common-neo-base_6549.js&nq/launch/common-neo-om_6549.js&nq/launch/search-neo_6549.js&nq/launch/inbox-om_6549.js&nq/launch/inbox-listview-new_6549.js&nq/launch/inbox-message-new_6549.js&nq/launch/inbox-minty-fresh_6549.js&nq/launch/inbox-base_6549.js&nq/intl/js/launch/lang_en-US_6549.js&nq/intl/js/launch/conf_us_6549.js:194
    <nowiki>************************************************************************************</nowiki>
    I have no such problem with Internet Explorer or when the computer is not connected to the Internet; it is specific to FF. I do not have Webroot Spysweeper on my computer.
    Strangely enough, we do not have this problem with two other PCs that use FF, nor did I have it on these two computers during the first few years that I used them with FF. I bought a new PC, moved my files onto it, then suddenly it had the same problem, which is what made me think it was a malware issue.
    I checked Windows Defender and found that was not switched on and could not be switched on. So I bought three different anti-malware programs beginning with Malwarebytes and then SpyBlaster and SpyBot S&D. But they did no good.
    Just pressing the "continue" button in response to the script error message does not good, since it allows the computer to continue grinding to a halt. Worse, if those scripts are malware, I don't want them sending private info to internet sites, which is apparently their function.
    Please help me root out the problem. It has made my computer inoperative for several hours a day for the past few months.

    '''Try the Firefox Safe Mode''' to see how it works there. The Safe Mode is a troubleshooting mode, which disables most add-ons.''
    ''(If you're not using it, switch to the Default theme.)''
    * You can open the Firefox 4.0+ Safe Mode by holding the '''Shift''' key when you use the Firefox desktop or Start menu shortcut.
    * Or use the Help menu item and click on the '''Restart with Add-ons Disabled...''' menu item while Firefox is running.
    ''Don't select anything right now, just use "'Start in Safe Mode"''
    ''To exit the Firefox Safe Mode, just close Firefox and wait a few seconds before using the Firefox shortcut (without the Shift key) to open it again.''
    '''''If it is good in the Firefox Safe Mode''''', your problem is probably caused by an extension, and you need to figure out which one.
    Please follow the [[Troubleshooting extensions and themes]] article for that.
    ''When you figure out what's causing your issues, please let us know. It might help other users who have the same problem.''

  • Need more info on like

    I have a department table with following values
    dept     exclude
    xxx     y
    yyy     y
    zzz n
    I need to exclude the dept with the string xxx% and yyy% from college table(i.e) first i have to look for records with the values exclude=y (for ex) xxx and yyy from above and then I need to exclude them from college table.i need to write them in single query.
    spmething like this...
    select * from college where dept not like (select dept from department where exclude ='y')
    but the problem here is i need to exclude the dept which contains the string xxx and yyy.. please help me on this.
    Thanks in advance
    Edited by: GuruRise on Jun 1, 2012 6:21 AM

    Hi Dude,
    Please see the below Expamples. May be it will useful for you to understand the LIKE.
    Description about like,
    The LIKE condition allows you to use wildcards in the where clause of an SQL statement. This allows you to perform pattern matching. The LIKE condition can be used in any valid SQL statement - select, insert, update, or delete.
    The patterns that you can choose FROM are:
    % allows you TO match ANY string OF ANY LENGTH (including zero LENGTH)
    _ allows you TO match ON a single character
    Examples using % wildcard
    The FIRST example that we'll take a look at involves using % in the where clause of a select statement. We are going to try to find all of the suppliers whose name begins with 'Hew'.
    SELECT * FROM suppliers
    WHERE supplier_name like 'Hew%';
    You can also using the wildcard multiple times within the same string. For example,
    SELECT * FROM suppliers
    WHERE supplier_name like '%bob%';
    In this example, we are looking for all suppliers whose name contains the characters 'bob'.
    You could also use the LIKE condition to find suppliers whose name does not start with 'T'. For example,
    SELECT * FROM suppliers
    WHERE supplier_name not like 'T%';
    By placing the not keyword in front of the LIKE condition, you are able to retrieve all suppliers whose name does not start with 'T'.
    Examples using _ wildcard
    Next, let's explain how the _ wildcard works. Remember that the _ IS looking FOR only one character.
    FOR example,
    SELECT * FROM suppliers
    WHERE supplier_name LIKE 'Sm_th';
    This SQL statement would RETURN ALL suppliers whose name IS 5 characters LONG, WHERE the FIRST two characters IS 'Sm' AND the LAST two characters IS 'th'. FOR example, it could RETURN suppliers whose name IS 'Smith', 'Smyth', 'Smath', 'Smeth', etc.
    Here IS another example,
    SELECT * FROM suppliers
    WHERE account_number LIKE '12317_';
    You might find that you are looking FOR an account NUMBER, but you only have 5 OF the 6 digits. The example above, would retrieve potentially 10 records back (WHERE the missing VALUE could equal anything FROM 0 TO 9). FOR example, it could RETURN suppliers whose account numbers are:
    123170
    123171
    123172
    123173
    123174
    123175
    123176
    123177
    123178
    123179.
    Examples using Escape Characters
    Next, IN Oracle, let's say you wanted to search for a % or a _ character in a LIKE condition. You can do this using an Escape character.
    Please note that you can define an escape character as a single character (length of 1) ONLY.
    For example,
    SELECT * FROM suppliers
    WHERE supplier_name LIKE '!%' escape '!';
    This SQL statement identifies the ! character as an escape character. This statement will return all suppliers whose name is %.
    Here is another more complicated example:
    SELECT * FROM suppliers
    WHERE supplier_name LIKE 'H%!%' escape '!';
    This example returns all suppliers whose name starts with H and ends in %. For example, it would return a value such as 'Hello%'.
    You can also use the Escape character with the _ character. For example,
    SELECT * FROM suppliers
    WHERE supplier_name LIKE 'H%!_' escape '!';
    This example returns all suppliers whose name starts with H and ends in _. For example, it would return a value such as 'Hello_'.
    Regards,
    N.Senthil.
    Edited by: Senthil Nataraj on Jun 2, 2012 1:50 AM

  • IBP 4.0 FP1 Patch 2 - Need more info on new features in Supply Planning

    Hi All,
    I was reading the SAP help and some of the new features are not very clear to me, if you have clarity around it please read and help me to get more clarity.
    As per SAP Help,The following features are now available in IBP for supply:
    Separate lead time units of measure can be defined for use in multiple planning areas depending on different time granularities.
    My Query - Where do we define it? I do not see any additional attribute in the MDT where lead time is present but don't see any attribute to define lead time units or any other different settings in the planning area so how can we define this?
    Static periods of supply are taken into account as input for the inventory target, with projected periods of coverage provided as output.
    My Query - What exactly has changed and which are the new key figures here to support this? I could not understand this from reading the above text.
    Independent demand is taken into account as input at the product location, in addition to the distribution demand from other nodes and customer demand.
    The optimizer algorithm supports the Non-Delivery Cost Rate key figure as input for the independent demand at the product location.
    My Query - A new key figure "INDEPENDENTDEMAND" is available now @PERPRODLOC so first point is very clear but second point is very confusing to me as "Non delivery cost rate" is only defined @PERPRODCUST so how we will define the non delivery cost rate for independent demand which is at different planning level and if we are not able to define it how optimizer algorithm will support it? Ideally it needs to be at same level like consensus demand and Non delivery cost rate both @PERPRODCUST Level.
    Thanks
    Girish

    Hi Mark,
    While I'm not in your list of people to respond I figure I give it a go anyways :-)
    The list of features you mentioned is a nice summary. One of the main release themes is data quality as you noticed. Apart from changes to the name&address functionality we also added the advanced matching and merging into this release. So you can use custom rules to match and merge data. This also allows you to do things like householding for customer data records. In essence we have now completed the integration of Pure*Integrate into Warehouse Builder.
    The mapping debugger is another big thing. This allow you to walk through your mappings and see in detail what happes to the data.
    The metadata change management is now in the UI. THis means there is now object level version management in Warehouse Builder via the UI. You can also compare versions and get a difference report.
    As you mentioned there are a number of smaller and bigger features next to this. The idea for this release is to make OWB a top Data Quality product and allow you to do your ETL and DQ in one tool. Apart from that we have added usability features (debugger, N&A wizard) and we have added some features to solve specific problems.
    Especially the corelated commit is interesting in that respect. You can now, in a map with multiple targets control the commit, and choose to either commit all targets or none, or commit them individually (current behavior).
    As usual there is a lot more, as this is indeed a major release. Keep an eye on OTN for more collateral regarding the new features. We are currently updating the site to reflect the new stuff.
    On the OLAP patch, both 9.0.4 and 9.2 will work equally well with the OLAP patch (when it is available). In 9.2 we added some small thing around composites. More about that when there is an OLAP patch to test this one on in a customer site.
    I hope this answered the question, if not let me know.
    Jean-Pierre

  • Need more Info on TechEd 2010 @ Bangalore

    My Greetings Fellow SCN mates,
    Feeling great to on SCN after quite a long gap, was really missing this platform:)
    To start with, could you please help me with some info on TechEd 2010 going to be held at Bangalore:
    1. Is SDN Day/Community day called off/replaced this year with Inside Track or will have something else as well?
    While searching for Community Day found a wiki of Somnath and read about  [SAP Inside Track 2010 Bangalore|http://wiki.sdn.sap.com/wiki/display/events/SAPInsideTrack2010Bangalore]. Seems we have no more Community Day and is relplaced by Inside Track.
    2. Are we going to have hackers night or we have any other program scheduled for TechEd apart from the agenda shared @ [Agenda at a Glance|http://www.sapteched.com/india/activities/home.htm]
    3. I could also see Innovation Weekend at other TechEd, do we have something similar @ Bangalore?
    Regards,
    Subhash

    Hello Subhasha,
    Have a look at below link and you may contact SAP India for more information or kestone (people who take care of SAP teched)
    http://www.sapteched.com/india/home.htm
    Kestone Integrated Marketing Services Pvt Ltd
    12/1 Palace Cross Road, Bangalore - 560 020, INDIA
    Phone: +91 80 40018855
    Fax : +91 80 23361889
    mail: sapteched at kestone.in
    All the best
    Edited by: prateek_y on Sep 17, 2010 6:51 PM

  • Web response monitoring(WRM) need more info how to utilize it in server for

    I don't have much idea whatis the real benefit i am going to get from WRM monitoring. I have got some jsp with very few lines of code. Here it is:-
    1)appcheck.jsp contains
    <FORM METHOD="Post" NAME="TestForm" ACTION="Test">
    <TABLE class="maintable">
    <TR>
    <TD>
         <%@ include file = "setup.jsp" %>
         <%@ include file = "jboss_health_test.jsp" %>
         <%@ include file = "showoutput.jsp" %>
    </TD>
    </TR>
    </TABLE>
    </FORM>
    2) setup.jsp contains
    <%@ page import = "com.ca.gis.util.*, com.ca.gis.ldap.dao.*, org.apache.log4j.Logger" %>
    <%
         //set values for getting connections
         ApplicationContext appctx = new ApplicationContext(application);
         //set up fields for tests
         String email = "[email protected]";
         CAUserKey userKey = new CAUserKey();
         userKey.setUserId(email);
         CAUserModel userModel = new CAUserModel(userKey);
         String currenttime = DateUtil.getSQLCurrentTime();
         boolean allSuccessful = true;
         String errors = "";
         Logger logger = Logger.getLogger(this.getClass().getName());
    %>
    3)jboss_health_test.jsp
    <%
              out.println("SYSTEM TEST SUCCESS");
    %>
    4)showoutput.jsp
    <%
         if(allSuccessful)
              out.println("SYSTEM TEST SUCCESS");
         else
         out.println("<!--" + errors + "-->");
    %>
    I don't know how much effective its going to be for getting info like:
    A)I need to check if there is any problem with application while running.
    B)I don't think it can give me info if jboss is really down as if server is not up application will also be down.
    If someone have good idea on this please let me know
    what are the major advantages of wrm monitoring.
    can i do what i am really looking for.
    send me any link any good lines of code using which something useful can be done here.
    thanks
    vijendra

    When one follows this how-to, one got the following result:
    The same page, say xyz.html, can be accessed in two ways: one is from
    http://localhost:8080/xyz.html, and the other is from https://localhost:8443/xyz.html.
    How can one allow people to be only able to access from https://localhost:8443/xyz.html, to be not able to access from http://localhost:8080/xyz.html? There is one sentence mentioned some where that Servlet 2.4 specification can do this. But Servlet 2.4 specification would not provide any help. Any clue?

Maybe you are looking for

  • Sharing iTunes library with another user on the same computer

    My husband and I use the same iMac and have the same iTunes login, but have different user accounts on our computer. When I download things from iTunes, they only show up in my library and do not show up in his. In addition, the two libraries are not

  • How to populate a table with array loop

    I'm looping an array object and as I loop, I'm calling a function and this function returns 6 items <CFLOOP  from="1" to="#ArrayLen(zz)#" index="k">   <cfdump var="#zz[k].getLine()#"> <p> </CFLOOP >  The above cfdump will return something like: [empt

  • Reg script

    Hi Experts, i added one field to from, i written one subroutine pool program for that field .but in that program w_egbel value are not getting. The first select statement is not working .if it all i  changed the data at runtime iam getting the output

  • Error message: the appropriate pricing procedure could not be determined

    Hi SAP friends, What does this error message means please? The appropriate pricing procedure could not be determined because no entry with keys 'M100 20 P1' 'A' '1' exists in table 683V. Tcode: VA01 (sales order).   Regards, Bahia.

  • Building and Debugging MIDP applications.

    Hi, I have java files(MIDlet) for MIDP applications. I am unable to compile it in JBuilder7.0. Using J2ME -> KToolbar i am able to build the application/project, But i am unable to debug it. Can anybody tell me how can i successfully create/build/deb