Performing the 5 R's question....

Ipod will not communicate (does charge) with any computer via USB. I've tried a couple things and now leaning towards this but don't want to erase any songs (1000). Has anyone tried this operation to rectify this fault?

The only one of the 5R's that will delete music is the the restore. This deletes music from your iPod but not your iTunes library. So after trying that, it's just a question if reloading the music back to your iPod from your library.

Similar Messages

  • Can HPCM calculate percentages to use in allocations as well as perform the allocations

    Hi All
    I have a client that is evaluating which products to purchase from the Oracle stack.  Unfortunately I don't know HPCM yet so I'm not sure of its capabilities.  I think they will definitely go with Hyperion Planning but they do some relatively simple allocations and I cannot decide whether or not they need HPCM.  They currently have a relational / access database that is used to calculate percentages to be used to allocate costs from back office to front office.  Whether they need to purchase HPCM seems to depend upon whether HPCM can calculate the percentages required for the allocation as well as perform the allocations.  The options as I see it are:
    1.  Replace legacy system with HPCM and use HPCM to calculate percentage and apply percentages to allocate costs
    2.  Keep legacy system for calculating percentages, upload percentages to HPCM and use HPCM to allocate costs
    3.  Keep legacy system for calculating percentages, upload percentages to Essbase and use Essbase to allocate costs
    4.  Keep legacy system for calculating percentages and allocating costs (not ideal as will require additional system interfaces of data from and to Hyperion Planning)
    I know HPCM uses Essbase, when I say Essbase above I mean Hyperion Planning.  I have advised the client that they ought to avoid option 4 but I am not clear enough on what HPCM can do to advise them on which of the other options is most suitable / cost effective.
    Any help would be appreciated.
    Regards
    Stu

    Hi Stu,
    the plain answer is Yes, HPCM can do such a simple task. In my private opinion, it would be a bit oversized.
    I want to add an option and put my vote on this:
    0.  Pull in a DB connection the required data into Planning and use Planning to calculate percentage and apply percentages to allocate costs.
    Regards,
    Philip Hulsebosch.
    www.trexco.nl
    p.s. To all users, close questions which were answered. Then we do not have to open them to see if we can help = saves us time to help others.

  • Error 58 The specified server cannot perform the requested operation

    Hello,
    I will try to explain the situation as brief as possible. Next to our current existing MDT environment (MDT2010 on Windows 2008 R2) we are no building a new system (MDT2013 on WIndows 2012 R2). We have multiple sites and the MDT deployment share is setup
    in DFRS share so every site is getting the same deployment information and replication is done automatically. This has been working firn for 3 years with the old system and also with the new environment it was working fine in our own subnet. But when after
    i have setup the remote MDT and WDS servers it is not working in these remote sites. The images are loading fine but for some reason the win PE is not connecting to the shares on the windows 2012 server in our site. When i manuualy connect from a remote win
    PE to our server i always get the error: system error 58 has occured. The specified server cannot perform the requested operation.
    I have been doing some troubleshooting and it seems i only got this issue when i connect from win PE 5.0 to a windows 2012 R2 server in a remote subnet.
    When i use win PE 5.0 and connect to a windows 2012 R2 share in the same subnet it connects fine. 
    When i use win PE 5.0 and connect to a windows 2008 R2 share in a remote subnet it connects fine
    When i use an older win PE and i connect to a windows 2012 R2 share in a remote subnet it connects fine
    When i use win PE 5.0 and connect to a windows 2012 R2 share in a remote subnet it does NOT connect and gives the above error
    The problem is that this problem also does not occure in Windows 7, after the machine was build by MDT and get into the OS i can connect without a problem to the windows 2012 R2 shares.
    Checking the event viewer on the 2012 R2 server that is hosting the shares i see that the following events are created:
    4624: An account was successfully logged on.
    Subject:
    Security ID:
    NULL SID
    Account Name:
    Account Domain:
    Logon ID:
    0x0
    Logon Type: 3
    Impersonation Level: Impersonation
    New Logon:
    Security ID:
    domain\username
    Account Name:
    username
    Account Domain: domain
    Logon ID:
    0x1F1FC0
    Logon GUID:
    {8e360e91-001b-c726-84a6-e7281a4bcac8}
    Process Information:
    Process ID:
    0x0
    Process Name:
    Network Information:
    Workstation Name:
    Source Network Address:
    x.x.x.x
    Source Port:
    60077
    Detailed Authentication Information:
    Logon Process:
    Kerberos
    Authentication Package:
    Kerberos
    Transited Services:
    Package Name (NTLM only):
    Key Length:
    0
    This event is generated when a logon session is created. It is generated on the computer that was accessed.
    The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
    The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
    The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
    The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
    The impersonation level field indicates the extent to which a process in the logon session can impersonate.
    The authentication information fields provide detailed information about this specific logon request.
    - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
    - Transited services indicate which intermediate services have participated in this logon request.
    - Package name indicates which sub-protocol was used among the NTLM protocols.
    - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
    5140: 
    A network share object was accessed.
    Subject:
    Security ID:
    domain\username
    Account Name:
    username
    Account Domain: domain
    Logon ID:
    0x1F1FC0
    Network Information:
    Object Type:
    File
    Source Address:
    x.x.x.x
    Source Port:
    60077
    Share Information:
    Share Name:
    \\*\Captures
    Share Path:
    \??\D:\Captures
    Access Request Information:
    Access Mask:
    0x1
    Accesses:
    ReadData (or ListDirectory)
    4634: 
    An account was logged off.
    Subject:
    Security ID:
    domain\username
    Account Name:
    username
    Account Domain: domain
    Logon ID:
    0x1F1FC0
    Logon Type: 3
    This event is generated when a logon session is destroyed. It may be positively correlated with a logon event using the Logon ID value. Logon IDs are only unique between reboots on the same computer.
    Anyone an idea why this is happening?

    Hi,
    We can refer to the following blog for MDT troubleshooting:
    http://blogs.technet.com/b/askcore/archive/2012/05/08/mdt-2010-amp-2012-my-deployment-failed-what-and-where-are-logs-i-should-review.aspx
    Best Regards,
    Vincent Wu
    Please remember to click “Mark as Answer” on the post that helps you, and to click “Unmark as Answer” if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread.

  • Help in java program.i cnt solve the need of this question.question inside.

    Create a class named Employee. Includes data members for Employee class :
    Data member     = Data type
    Employee id     = String
    Employee name     = String
    Icno     = String
    Gender     = Char
    Date of birth     = String
    Address     = String
    Commencing Date     = String
    Department     = String
    Position     = String
    Salary     = Double
    Include any relevant methods for example constructor that can perform initialization for all data fields, accessor methods that return each of data field values and mutator method to set values into the data fields. Use a constructor to set each Employee id to 99999 upon object creation.
    Write another java application named EmployeeDb. Declare an array of three Employee objects.
    Your program should be able to perform the following functions:
    (a)     Prompt user to enter three Employees� information from the console and store data in an array
    (b)     Search an employee by name.
    (c)     Display all employee information by using a loop.
    You are NOT required to save records into any text file.
    the code i have done
    public class Employee
         //declaration of private instance variables
         private String employee_id;
         private String employee_name;
         private String ic_no;
         private char gender;
         private String date_of_birth;
         private String address;
         private String commencing_date;
         private String department;
         private String position;
         private double salary;
         /*constructor prototype
         Employee(String, String, String, char, String, String, String, String, String, double);
         //constructor - Employee(String, String, String, char, String, String, String, String, String, double); function
    public Employee()
         this.employee_id = "99999";
         this.employee_name = "name";
         this.ic_no = "ic";
         this.gender = 'g';
         this.date_of_birth = "dob";
         this.address = "add";
         this.commencing_date = "cd";
         this.department = "dept";
         this.position = "post";
         this.salary = 0.00;
    public Employee(String id, String name, String ic, char gen, String dob, String add, String cd, String dept, String post, double sal)
         this.employee_id = id;
         this.employee_name = name;
         this.ic_no = ic;
         this.gender = gen;
         this.date_of_birth = dob;
         this.address = add;
         this.commencing_date = cd;
         this.department = dept;
         this.position = post;
         this.salary = sal;
    /*public setters function prototypes
         public void setEmployee_id(String);
         public void setEmployee_name(String);
         public void setIc_no(String);
         public void setGender(char);
         public void setDate_of_birth(String);
         public void setAddress(String);
         public void setCommencing_date(String);
         public void setDepartment(String);
         public void setPosition(String);
         public void setSalary(double);
    public getters function prototypes
         public String getEmployee_id();
         public String getEmployee_name();
         public String getIc_no();
         public char getGender();
         public String getDate_of_birth();
         public String getAddress();
         public String getCommencing_date();
         public String getDepartment();
         public String getPosition();
         public double getSalary();
    //setters - setEmployee_id(String); function
    public void setEmployee_id(String id)
         this.employee_id = id;
    //setters - setEmployee_name(String); function
    public void setEmployee_name(String name)
         this.employee_name = name;
    //setters - setIc_no(String); function
    public void setIc_no(String ic)
         this.ic_no = ic;
    //setters - setGender(char); function
    public void setGender(char gen)
         this.gender = gen;
    //setters - setDate_of_birth(String); function
    public void setDate_of_birth(String dob)
         this.date_of_birth = dob;
    //setters - setAddress(String); function
    public void setAddress(String add)
         this.address = add;
    //setters - setCommencing_date(String); function
    public void setCommencing_date(String cd)
         this.commencing_date = cd;
    //setters - setDepartment(String); function
    public void setDepartment(String dept)
         this.department = dept;
    //setters - setPosition(String); function
    public void setPosition(String post)
         this.position = post;
    //setters - setSalary(double); function
    public void setSalary(double sal)
         this.salary = sal;
    //getters - getEmployee_id(); function
    public String getEmployee_id()
         return employee_id;
    //getters - getEmployee_name(); function
    public String getEmployee_name()
         return employee_name;
    //getters - getIc_no(); function
    public String getIc_no()
         return ic_no;
    //getters - getGender(); function
    public char getGender()
         return gender;
    //getters - getDate_of_birth(); function
    public String getDate_of_birth()
         return date_of_birth;
    //getters - getAddress(); function
    public String getAddress()
         return address;
    //getters - getCommencing_date(); function
    public String getCommencing_date()
         return commencing_date;
    //getters - getDepartment(); function
    public String getDepartment()
         return department;
    //getters - getPosition(); function
    public String getPosition()
         return position;
    //getters - getSalary(); function
    public double getSalary()
         return salary;
    //class ended
    import java.io.*;
    public class EmployeeDb
         //declaration of private instance variables
         private String employee_id;
         private String employee_name;
         private String ic_no;
         private char gender;
         private String date_of_birth;
         private String address;
         private String commencing_date;
         private String department;
         private String position;
         private double salary;
         public static void main(String args[]) throws IOException
              BufferedReader br = new BufferedReader(new InputStreamReader(System.in));
              int i;
              Employee [] empRec = new Employee[3] ;
              String [] emp = new String [10];
              for(i=0; i<empRec.length; i++)
                   empRec= new Employee();
                   System.out.print("\n");
                   i+=1;
                   System.out.print("employee record number "+ i +"\n");
                   System.out.print("xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx");
                   System.out.print("xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx");
                   System.out.print("\n");
                   System.out.print("Enter employee id : \n");
                   emp[0] = br.readLine();
                   System.out.print("Enter employee name : \n");
                   emp[1] = br.readLine();
                   System.out.print("Enter employee ic number : \n");
                   emp[2] = br.readLine();
                   System.out.print("Enter employee gender : \n");
                   emp[3] = br.readLine();
                   System.out.print("Enter employee date of birth : \n");
                   emp[4] = br.readLine();
                   System.out.print("Enter employee address : \n");
                   emp[5] = br.readLine();
                   System.out.print("Enter employee commencing date: \n");
                   emp[6] = br.readLine();
                   System.out.print("Enter employee department : \n");
                   emp[7] = br.readLine();
                   System.out.print("Enter employee position : \n");
                   emp[8] = br.readLine();
                   System.out.print("Enter employee salary : \n");
                   emp[9] = br.readLine();
              for(i=0; i<empRec.length; i++)
                   System.out.println(empRec[i].getEmployee_id());
                   System.out.println(empRec[i].getEmployee_name());
                   System.out.println(empRec[i].getIc_no());
                   System.out.println(empRec[i].getGender());
                   System.out.println(empRec[i].getDate_of_birth());
                   System.out.println(empRec[i].getAddress());
                   System.out.println(empRec[i].getCommencing_date());
                   System.out.println(empRec[i].getDepartment());
                   System.out.println(empRec[i].getPosition());
                   System.out.println(empRec[i].getSalary());

    42.
    On more consideration, maybe I'll expand that.
    When you post code; wrap it in tags to make it readable. Or highlight the code when you're posting and click that little button labeled CODE.
    We generally don't answer exam questions here, either.
    And please; make your post titles more legible than the rubbish you've given.
    Edited by: meacod on Feb 17, 2008 7:44 PM                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                       

  • Lync Server Control Panel : Insufficient access rights to perform the operation;

    Hi team,
    I have a strange problem in managing Lync users through control panel. But I can enable/disable and Manage users through power shell. Am getting an error " Insufficient Rights to perform the operations" when i try through control panel
    Please can someone help me urgently on tihs. I have all the users in a separate OU from where the RTC and CS groups are available. Is there any issue with the delegation?

    Hi,
    You will receive this error message when you attempt to manage Lync users who are members of protected admin groups in Active Directory (such as Enterprise Administrators etc.).
    Typically I use Lync Management Shell, so don't get this error often as it only occurs in the Control Panel.
    Editing the properties of the user object you are attempting to enable / disable in AD, and enabling inheritance on under the security tabs advanced options will also work around the problem, but you may not wish to do this. The inheritance change will revert
    itself in 15 minutes or so I believe.
    Perhaps someone can advise of an alternate solution through group membership / permissions, but as I don't have the issue often I've not looked into it at any great depth.
    Kind regards
    Ben
    Blog:www.gecko-studio.co.uk/ 
    Twitter:
      LinkedIn:
      Facebook:
    Note: If you find a post informative, please mark it so using the arrow to the left. If it answers a question you've asked, please mark the thread as answered to aid others when they're looking for solutions to similar problems
    or queries.

  • The programming language of the future: a philosophical question

    So after reading some of these posts and reflecting on the history of programming languages, I find myself wondering what the programming language of the future will be? As the human-computer interface evolves (touch interfaces, voice recognition, computer vision, etc) how will this influence the process of creating computer programs? Will programming become more graphical (e.g. flow charts, UML diagrams, etc)? Setting ego's aside, does it make sense for programming to be more graphical? Will we reach a point where we can essentially just sketch out a concept and let the compiler/interpreter handle the rest?
    Perhaps this question is best left to Clark and Asimov, but they're dead. This leaves you guys.
    (Moderator, I apologize in advance if this is out of scope for this forum.)
    Last edited by bsilbaugh (2011-11-23 01:15:47)

    geniuz wrote:I think the mistake of the scientist in question was not that he re-derived the Trapezoid Rule, but that he published it as if it was a new invention, while it existed and was already published in some form. That certainly could be prevented by reconciling to literature before publishing. In fact, I'd not even blame the scientist in question too much, rather the commission that approved his paper to be published in the first place.
    Sure, he didn't publish the paper in isolation - but the peers who reviewed it would have been people from the same or a related profession. My point is that this kind of error results from splintering of the disciplines. You seem to think that the splintering should be somehow undone or reversed at the level of the peer reviewer or the publisher - but non-specialists (or specialists in other areas) will not be invited to comment, because it will be assumed that they lack the qualifications to do so.
    geniuz wrote:Still, I think its a long stretch to compare the derivation of a Mathematical rule or method to the invention of a complete DSL.
    I think I didn't make it clear where I was going with that. My point was that splintering of specialisations from each other permitted this duplication of effort to take place. I see DSLs as a way to splinter disciplines from each other. Thus, the rise of DSLs would make it easier for duplicate effort to take place.
    geniuz wrote:The whole point of a DSL is that it allows experts in a specific domain to focus their efforts on creatively solving problems directly related to their field of expertise. When specific DSL's are integrated in university curricula world-wide, I hardly think there will be much duplicate effort going on.
    Sorry, but this seems a little naive to me. I can see why you might think DSLs would permit specialists to more efficiently focus on solving their particular problems, and I don't entirely disagree, but even if it's true, I don't think it's controversial to think this will lead to considerably more duplicate effort.
    geniuz wrote:Also, in the world of OSS, there are multiple tools that can perform the exact same job. Do you for instance consider the existence of both of the mail clients Mutt and Alpine as duplicate effort?
    I haven't used Alpine, but if it's exactly like Mutt, then sure, I would certainly say that's duplicate effort. The more people who use one single piece of software, the more bugs can be filed against that software.
    Also, I think this is a false analogy from the start. Mutt and Alpine are both written in C. If we're talking about the connection between duplicate effort and DSLs, let's consider the fact that "communicating and storing computational models of biological processes" (from the Wikipedia page on SBML) could be better done in Lisp, Lex/Yacc, or with the Lemon C++ library, instead of coming up with some new way of using harmful XML.
    geniuz wrote:I still don't quite see how this can be interpreted as a necessary weakness or argument against more complex systems. Sure, DSLs can be dependent upon lower level languages, but if they are considered to increase the effectiveness and efficiency of certain experts, what exactly stops them from becoming dominant and continually evolving?
    The fact that higher and higher levels of specialisation are concomitant with smaller and smaller user bases who still need to communicate with experts in other groups. I'm not saying DSLs should never be used. I just think they are essentially self-limiting, and just as bacteria will long outlive us more complicated life-forms, so too will the lower-level languages long outlive more cumbersome DSLs.
    geniuz wrote:I wasn't implying computers will ever be able to mimic the human brain, and I'm not even sure whether it is something we necessarily want to strive for. All I was saying is that computers have already become indispensable tools in virtually every scientific and engineering discipline. They are computationally strong machines able to solve numerically involved problems at rates no human can ever hope to accomplish. It is this very aspect that will continue to guarantee the succes of computers, not AI per se. Again, I believe computers will never (at least not while I'm alive) be able to truly independently mimic and outperform the human brain, especially when it comes to aspects like creativity, i.e. the very aspects of human intelligence scientists have not even been able to understand and quantify to this date. Hence, humans will always remain "in the loop" to a large extent.
    This all seems reasonable.
    geniuz wrote:Don't forget that laws of physics are "laws" that have been defined and created by humankind for its own convenience. Even recently this year, practice has shown that a concept as fundamental as the speed of light might not be as accurate as it was so widely acknowledged by the scientific community. This however hasn't stopped mankind from using these fundamental "laws" to invent e.g. radio communication and electronic devices.
    I don't think you're disagreeing with me. I'm aware of the fragile nature of what we call the laws of physics - but like you say, they're good enough that we can do things with them. It looks like our knowledge of the speed of light breaks down on really large length scales, and it looks like our knowledge of gravity breaks down on really small length scales, but the brain is in the middle. In between, our models for how the physical world works are very accurate, and it is in this regime that the brain operates.
    Also, you should note that most scientists regard those neutrino test results as residing within the bounds of experimental error, and therefore not strongly indicative that the neutrinos really did break light speed.
    geniuz wrote:I haven't said low-level languages will be abandoned completely, I think they will remain to serve their purpose as a base upon which higher level languages (like DSLs) are built. In that sense, I believe that the user base of these low level languages will become more limited to computer scientists, i.e. to the people responsible for "formulating suitable abstractions to design and model complex systems" (source).
    Seems reasonable.
    geniuz wrote:Having said that, I still don't see why it so farfetched that for the rest of the world, physically telling a computer what to do in their native tongue as opposed to typing it in some generic-text programming language, will become the de-facto standard. Hence, I will reformulate my statement by stating that programming as most people know it today will eventually become a redundant practice.
    I don't think a friendly human interface should be considered the same as programming. This thread, if we recall the OP, is about programming languages of the future, not user interfaces of the future. I certainly agree that user interfaces will become more intelligent and attractive. I only disagree that this will have any strong impact on how we do programming.
    Last edited by /dev/zero (2011-12-12 19:20:59)

  • Set-aduser : Insufficient access rights to perform the operation

    I am a domain admin, enterprise admin, exchange admin, domain user, and others.
    While running a PS on a DC as the administrator, The commands I'm running are ...
    $expdate = get-date -date '01/01/2014'
    set-aduser -identity testmail5 -accountexpirationdate $expdate
    I get the following error ...
    set-aduser : Insufficient access rights to perform the operation
    At line:1 char:1
    + set-aduser -identity testmail5 -accountexpirationdate $expdate
        + CategoryInfo          : NotSpecified: (testmail5:ADUser) [Set-ADUser], ADException
        + FullyQualifiedErrorId : Insufficient access rights to perform the operation,Microsoft.ActiveDirectory.Management.Comm
       ands.SetADUser
    I then switch to a different DC, the command 'might' work once, but will never run again in the same window.
    Then I tried this ...
    start-process powershell -verb runas
    That gave me an additional PS window, and I then tried running the commands again.
    Same error message.
    So I tried the following command ...
    $expdate = get-date -date '01/01/2014'
    set-aduser -server XXDC03 -identity testmail5 -accountexpirationdate $expdate
    Same error message.
    Is there any way that I can get around this problem?
    Please help.

    Keep in mind that the account used to open the PowerShell session must be the same account you're using to open ADUC. The error message means that Set-ADUser is trying to set the attribute for the account, but it's failing. Make sure to test with multiple
    different accounts, in case the access control list of the object you're trying to modify is the cause of the problem.
    Your PowerShell syntax is valid, so this isn't really a scripting question but a security/directory services question.
    -- Bill Stewart [Bill_Stewart]

  • On a Mac, in Adobe Photoshop CC 2014, when adding audio to an edit, i get the message "Could not complete your request, because Dynamiclink is not available". When performing the exact same operation in Adobe Photoshop CC, i can add audio in the same way,

    On a Mac, in Adobe Photoshop CC 2014, when adding audio to an edit, i get the message "Could not complete your request, because Dynamiclink is not available".
    When performing the exact same operation in Adobe Photoshop CC, i can add audio in the same way, no error message. Any ideas to solve this, anyone? Would be greatly appreciated.

    I tried to update and it keeps telling me to get the Application Manager. And this is what happens
    Adobe Application Manager failed and it told me to download the Adobe Support Advisor.
    Adobe Support Advisor told me that there was an issue:" cpsid_82829s1: "A restart is pending," bootstrapper error has occurred. "Token Number: 40-87772-063201122012
    I followed the instructions it gave me to correct this issue:
    If you receive the error "Installer has detected that a machine restart is pending. It is recommended that you quit the installer, restart try again," do the following:
    #Restart the computer and try the installation again.
    #If the installation fails, delete the InProgress registry key: 
    Disclaimer: This procedure involves editing the Windows registry. Adobe doesn't provide support for editing the registry, which contains critical system and application information. Make sure to back up the registry before editing it. For more information about the registry, see Windows registry information for advanced users on the Microsoft support site, or contact Microsoft. 
    Launch Windows Registry Editor.
    (Windows XP) Choose Start > Run, type regedit in the Open text box and click OK.
    (Windows Vista/ Windows 7) Choose Start, type regedit in the Search box, and press Enter.
    Navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager.
    Delete the InProgress key.
    I was not able to find the "InProgress" key.

  • I am using a mac mini 2011 an 3gs i phone 2010 macbook white 2008 and a new 2013 apple tv box. When i check info on the cloud I get 'upgrade your operating system to the latest. My question is is it possible to use the icloud system without an upgrade

    I am using a mac mini 2011 an 3gs i phone 2010 macbook white 2008 and a new 2013 apple tv box. When i check info on the cloud I get 'upgrade your operating system to the latest. My question is is it possible to use the icloud system without an upgrade

    iCloud requires OS X 10.7.2.

  • I have a new email address and my old email keeps coming up on icloud when trying to update apps and i don't know the password or security questions for the old email. I can sign in with my apple id which is tied to another email but not itunes how to fix

    I have an apple id and it has my current email attached to it. however when i go to update apps it's asking for the password for an old email. I no longer have the old email and can't use it. when I go to icloud on my ipad it asks for the password for old email. it doesn't allow me to change the old email to current. when i go to reset it i can't remember the password or security questions for the old email so it doesn't let me go any further. How do I fix this? Do i need to call apple support?

    I have the same problem - it is maddening. I rely on this iPad for work so this is not just an annoyance! The above solutions of changing the appleid on the device or on the website do not work.
    The old email address no longer exists - I haven't used it in a year probably and I no longer have the account.  I logged into the appleid website and there is no trace of the old email address so there is nothing that can be deleted or changed there.  On the iPad there is no trace of the old email address so nothing can be deleted there either. I have updated the iPad software and the same problem comes right back.  Every 2 seconds I am asked to log in using the old non-existent email.  The device is currently useless.
    The only recent change to anything was the addition of an Apple TV device, which was set up using the correct login and password.
    Does anyone have any ideas? The iPad has been backed up to the iCloud so presumably it now won't recognize the current iCloud account? So restoring may notbe an option?

  • How does Azure Compute Emulator (or the Azure one) determine if a role is web project or something else ("The Web Role in question doesn't seem to be a web application type project")?

    I'm not sure if this is F# specific or something else, but what could cause the following error message when trying to debug locally an Azure cloud service:
    The Web Role in question doesn't seem to be a web application type project.
    I added an empty F# web api Project to a solution (which adds Global.asax etc., I added an OWIN startup class Startup etc.) and then from an existing
    cloud service project I picked Roles and
    chose Add
    -> Web Role Project in solution, which finds the F# web project (its project type guids are 349C5851-65DF-11DA-9384-00065B846F21 and F2A71F9B-5D33-465A-A702-920D77279786),
    of which the first one seem to be exactly the GUID that defines a web application type.
    However, when I try to start the cloud project locally, I get the aforementioned error message. I have a C# Web Role project that will start when I remove the F# project. I also have F# worker
    role projects that start with the C# web role project if I remove this F# web role project. If I set the F# web project as a startup project,
    it starts and runs as one would expect, normally.
    Now, it makes me wonder if this is something with F# or could this error message appears in C# too, but I didn't find anything on Google. What kind of checks are there when starting the emulator and which one needs
    failing to prompt the aforementioned message? Can anyone shed light into this?
    Sudet ulvovat -- karavaani kulkee

    Sudet,
    Yeah you are right, the GUID mentioned seems to be correct and the first one i.e. {349C5851-65DF-11DA-9384-00065B846F21} means the web application project which compute emulator uses to determine while spawning up role instances.
    You might want to compare the csproj of your C# and F# web projects which might give some pointers.
    Are you able to run your F# web project locally in IIS? If yes then you will definitely be able to run it on azure so I will recommend to test it in IIS Express first.
    Here are some other tips which you can refer or see If you are yet to do those settings
    1. Turn on the IIS Express - You can do it by navigating to project properties
    2. Install Dependent ASP.NET NuGets / Web Api dependencies (If there are any missing), Reference System.Web assembly
    Also I will suggest to refer this nice article about how to create a F# web Api project
    http://blog.ploeh.dk/2013/08/23/how-to-create-a-pure-f-aspnet-web-api-project/
    Hope this helps you.
    Bhushan | http://www.passionatetechie.blogspot.com | http://twitter.com/BhushanGawale

  • Service template problem - Unable to perform the job because one or more of the selected objects are locked by another job - ID 2606

    Hello,
    I’ve finally managed to deploy my first guest cluster with a shared VHDX using a service template. 
    So, I now want to try and update my service template.  However, whenever I try to do anything with it, in the services section, I receive the error:
    Unable to perform the job because one or more of the selected objects are locked by another job.  To find out which job is locking the object, in the jobs view, group by status, and find the running or cancelling job for the object.  ID 2606
    Well I tried that and there doesn’t seem to be a job locking the object.  Both the cluster nodes appear to be up and running, and I can’t see a problem with it at all.  I tried running the following query in SQL:
    SELECT * FROM [VirtualManagerDB].[dbo].[tbl_VMM_Lock] where TaskID='Task_GUID'
    but all this gives me is an error that says - conversion failed when converting from a character string to uniqueidentifier msg 8169, level 16, State 2, Line 1
    I'm no SQL expert as you can probably tell, but I'd prefer not to deploy another service template in case this issue occurs again.
    Can anyone help?

    No one else had this?

  • Unable to remove a host from VMM - Error (2606) Unable to perform the job because one or more of the selected objects are locked by another job.

    I am unable to remove a host from my Virtual Machine Manager 2012 R2. I receive the following error:
    Error (2606)
    Unable to perform the job because one or more of the selected objects are locked by another job.
    Recommended Action
    To find out which job is locking the object, in the Jobs view, group by Status, and find the running or canceling job for the object. When the job is complete, try again.
    I have already tried running the following command in SQL Server Management Studio
    SELECT * FROM [VirtualManagerDB].[dbo].[tbl_VMM_Lock] where TaskID='Task_GUID'
    I received this error back:
    Msg 8169, Level 16, State 2, Line 1
    Conversion failed when converting from a character string to uniqueidentifier.
    I have also tried rebooting both the host and the Virtual Machine Manager Server.  After rebooting them both, I still receive the same error when trying to remove the host.
    Here are my server details
    VMM Server OS = Windows 2012 Standard
    VMM Version = 2012 R2 3.2.7510.0
    Host OS = Windows 2012 R2 Datacenter
    Host Agent Version = 3.2.75.10.0
    SQL Server OS = Windows 2012 Datacenter
    SQL Version = 2012 SP 1 (11.0.3000.0)

    Hi there,
    How many hosts are you managing with your VMM server?
    The locking job might be the background host refresher job. Did you see any jobs in the jobs view, when the host removal job failed?
    If there is no active jobs in the jobs view when this host removal job fails, can you please turn on the VMM tracing, retry the host removal, and paste back the traces for the failed job (search for exception and paste the whole stack)?
    Thanks!
    Cheng

  • Can anybody send me the interview point of Questions on OO ABAP?.

    Can anybody send me the interview point of Questions on OO ABAP?.

    Hello Satish
    ABAP-OO is by no means different from other object-oriented languages. Thus, you can take a book like the one for the <b>Java certification exam</b>. Having read and understood this book you are well prepared for any interview question.
    Regards
      Uwe

  • Please read my question carefully, this is, I think, a question for the experts. It's not the usual name change question.   When I setup my new MacBook Pro, something slipped by me and my computer was named First-Lasts-MacBook-Pro (using my real first and

    Please read my question carefully, this is, I think, a question for the experts. It's not the usual name change question.
    When I setup my new MacBook Pro, something slipped by me and my computer was named First-Lasts-MacBook-Pro (using my real first and last name).
    I changed the computer name in Preferences/Sharing to a new name and Preferences/Accounts to just be Mike. I can right click on my account name, choose advanced, and see that everything looks right.
    However, If I do a scan of my network with my iPhone using the free version of IP Scanner, it lists my computer as First-Lasts-MacBook-Pro! And it lists the user as First-Last.
    So even though another Mac just sees my new computer name, and my home folder is Mike, somewhere in the system the original setup with my full name is still stored. And it's available on a network scan. So my full name might show up at a coffee shop.
    Can I fully change the name without doing a complete re-install of Lion and all my apps?

    One thought... you said the iPhone displayed your computer's old name? I think that you must have used the iPhone with this computer before you changed the name. So no one else's iPhone should display your full name unless that iPhone had previously connected to your Mac. For example, I did this exact same change, and I use the Keynote Remote app to connect with my MacBook Pro. It would no longer link with my MacBook Pro under the old name, and I found that I had to unlink and then create a new link under the new name. So the answer to your question is, there is nothing you need to do on the Mac, but rather the phone, and no other phone will display your full name.

Maybe you are looking for