Perl can not determine Timezone

# perl -T -MDateTime::TimeZone::Local -le 'print
DateTime::TimeZone::Local->TimeZone()->name'
Cannot determine local time zone
But Timezone seems to be set correctly
# timedatectl
Local time: Fr 2014-10-24 18:55:06 CEST
Universal time: Fr 2014-10-24 16:55:06 UTC
RTC time: Fr 2014-10-24 16:55:04
Time zone: Europe/Berlin (CEST, +0200)
NTP enabled: no
NTP synchronized: no
RTC in local TZ: no
DST active: yes
Last DST change: DST began at
So 2014-03-30 01:59:59 CET
So 2014-03-30 03:00:00 CEST
Next DST change: DST ends (the clock jumps one hour backwards) at
So 2014-10-26 02:59:59 CEST
So 2014-10-26 02:00:00 CET
# date
Fr 24. Okt 18:55:06 CEST 2014

Found.
The DateTime::TimeZone is completely useless/unuseable without the AllUtils Package
https://aur.archlinux.org/packages/perl-list-allutils/
So this package (even if its in AUR) have to be an dependency... seems like a bug to me
https://bugs.archlinux.org/task/42531
Last edited by Vamp898 (2014-10-24 18:47:41)

Similar Messages

  • The need to compress to max 1GB is obsolete. You can not determine what and how the space provided on iDisk can be used. You provide it or NOT. If you DO, then let US free, if you don't, then TELL us WHY, so we can choose to go public elsewhere. The stren

    The need to compress to max 1GB is obsolete. You can not determine what and how the space provided on iDisk can be used. You provide it or NOT. If you DO, then let US free, if you don't, then TELL us WHY, so we can choose to go public elsewhere. The strengthood for Apple for the fourthfullness to be legal, which I respect, can become too restrictive in my European eyes. Any hearing around? René

    As was noted in the introductory material for the Apple Support Communities website (presented when you registered), these forums are set up for user-to-user assistance and discussion, not for user-to-Apple communications.
    Suggest you resubmit your position statement to Apple via product feedback for iCloud, which you can access via a link on this page -
    Apple - Feedback
    ...we've all moved to iCloud, isn't it?
    Um, no, we all haven't.

  • Can not determine remote server time.

    Can not determine remote server time.
    Why isn't this fixed in a ******* patch already? I am on a
    lot of machines, in various locations. I am not going to flippin
    modify DW with a flippin hex editor every where I go.
    Do I really need to spend billable time on hold with front
    line techs at hosting companies?
    What's the deal?
    This should so not be a problem.

    > Why isn't this fixed in a ******* patch already?
    There's no evidence that it's DW that is at fault. What is
    your firewall?
    Where is your server? Is this true on ALL your sites hosted
    on that server?
    Do you have sites hosted on other servers?
    Murray --- ICQ 71997575
    Adobe Community Expert
    (If you *MUST* email me, don't LAUGH when you do so!)
    ==================
    http://www.dreamweavermx-templates.com
    - Template Triage!
    http://www.projectseven.com/go
    - DW FAQs, Tutorials & Resources
    http://www.dwfaq.com - DW FAQs,
    Tutorials & Resources
    http://www.macromedia.com/support/search/
    - Macromedia (MM) Technotes
    ==================
    "M.E. Again" <[email protected]> wrote in
    message
    news:fdlvt4$6tm$[email protected]..
    > Can not determine remote server time.
    >
    > Why isn't this fixed in a ******* patch already? I am on
    a lot of
    > machines, in
    > various locations. I am not going to flippin modify DW
    with a flippin hex
    > editor every where I go.
    >
    > Do I really need to spend billable time on hold with
    front line techs at
    > hosting companies?
    >
    > What's the deal?
    >
    > This should so not be a problem.
    >

  • Since installing OSX 10 my iMac randomly shuts down and restarts.  I can not determine why this is happening.  Any ideas?

    Since installing OSX 10, my iMac randomly shuts down and restarts.  I can not determine why this is happening.  Any ideas?

    1. This is a comment on what you should and should not do to protect yourself from malicious software ("malware") that circulates on the Internet. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
       3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandboxing security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you always stay within a safe harbor of computing practices. How do you know what is safe?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is unsafe.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are outside the safe harbor, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe. For instance, if a web page warns you that Flash is out of date, do not follow an offered link to an update. Go to the Adobe website to download it, if you need it at all.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    "FREE WI-FI !!!" networks in public places are unsafe unless you can verify that the network is not a trap (which you probably can't.) Even then, do not download any software or transmit any private information while connected to such a network, regardless of where it seems to come from or go to.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use one of the free anti-virus products in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. Most of the real danger comes from highly targeted "zero-day" attacks that are not yet recognized.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular trojan it is, but do you care? In practice, there's seldom a reason to use the software unless an institutional policy requires it.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither should you assume that you will always be safe from exploitation, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • After the update the new version can not determine downloads folder. In the eyes determine folder, however downlload files go in C / documets and settings even

    After the update the new version can not determine downloads folder. In the eyes determine folder, however downlload files go in C / documets and settings even though I chose a different folder

    hello, there's a general regression in firefox 27 that won't allow files to download directly into a root drive. please try to create a subfolder (like ''D:\Downloads'') and set this as default location for downloads...
    also see [https://bugzilla.mozilla.org/show_bug.cgi?id=958899 bug #958899].

  • ASM - can not determine RAW

    I have three RAW disks . But for some reasons , I can not stamp with asmtoolg ... Please advise.
    I have 11gr2 on windows 2008 r2.
    C:\>asmtool -list
    NTFS \Device\Harddisk0\Partition1 152578M
    ORCLDISKDATA40 \Device\Harddisk0\Partition2 7M
    ASM-00007: Could not get device number for \\?\Volume{95a7735e-4998-11df-90e6-00
    219b2dedc6}
    O/S-Error: (OS 1) Incorrect function.
    ASM-00007: Could not get device number for \\?\Volume{95a7735d-4998-11df-90e6-00
    219b2dedc6}
    O/S-Error: (OS 1) Incorrect function.
    ASM-00007: Could not get device number for \\?\Volume{95a7735c-4998-11df-90e6-00
    219b2dedc6}
    O/S-Error: (OS 1) Incorrect function.
    ASM-00007: Could not get device number for \\?\Volume{7fa003fb-4b56-11df-90e6-00
    219b2dedc6}
    O/S-Error: (OS 1) Incorrect function.
    C:\>

    DISKPART> list disk
    Disk ### Status Size Free Dyn Gpt
    Disk 0 Online 149 GB 0 B
    Disk 1 Online 37 GB 1024 KB *
    Disk 2 No Media 0 B 0 B
    Disk 3 No Media 0 B 0 B
    Disk 4 No Media 0 B 0 B
    Disk 5 No Media 0 B 0 B
    DISKPART> list volume
    Volume ### Ltr Label Fs Type Size Status Info
    Volume 0 D Oracle NTFS Simple 25 GB Healthy
    Volume 1 G RAW Simple 4102 MB Healthy
    Volume 2 F RAW Simple 4102 MB Healthy
    Volume 3 E RAW Simple 4101 MB Healthy
    Volume 4 H DVD-ROM 0 B No Media
    Volume 5 I DVD-ROM 0 B No Media
    Volume 6 C OS NTFS Partition 149 GB Healthy System
    Volume 7 RAW Partition 8032 KB Healthy
    Volume 8 J Removable 0 B No Media
    Volume 9 K Removable 0 B No Media
    Volume 10 L Removable 0 B No Media
    Volume 11 M Removable 0 B No Media

  • Can not determine sales office or sales group on ppoma_crm

    Hi, CRM Gurus.
    I would like to change organigation on PPOMA_CRM.
    When I assign sales office or sales group on sales senario at the
    function tab, this error message is occured.
    "No sales office could be determined."
    How should I do to determine sales office of sales group?
    Edited by: WON BUM LEE on Oct 7, 2008 7:03 AM
    Edited by: WON BUM LEE on Oct 7, 2008 8:22 AM

    Hi WON BUM LEE,
    Hava you replicated the sales area from R/3. If not replicate it and see wheather the sales area exist in crm or not. If yes go to Tcode OOATTRCUST and chosse SALES and doubleclick on attribute and scenario. Thre U make
    SALE     IS_SA_GRP     No inheritance     3
    SALE     IS_SA_OFF     No inheritance     2
    SALE     IS_SA_ORG     No inheritance     1
    Change it to    0
                          0
                          0
    I think it will solve.
    Thanx
    Chinmaya

  • Itunes can not sync apps with the iphone [name], because it can not determine which apps are installed on the iphone.

    After installing the latest Version of iTunes (10.5.1.42) on my Windows XPs PC it's not possible to sync my iPhone 3GS (not iOS 5!) any more - I get the error message above. It's possible to download music, apps, podcasts - but not possible to sync with my iPhone..
    Any Ideas?

    Basic troubleshooting is reset, restart, restore.  Have the first two been tried?
    How about simply unplugging the iPhone and plugging it back in to sync?
    What has been done in an attempt to troubleshoot the issue?

  • "Can not determine IP address "

    When I try to install 10g on my XP-Pro machine I get the above message. First time I have seen this! Any suggestions?

    you have to install microsoft loopback adapter and message will disapperar.

  • HT5467 Each time I try to use location appears "CAN NOT DETERMINE LOCATION" I've tried restarting the iPad ,turning on and off , using wifi and cellular but still doesn't work ......is it a problem that Apple fail to advice it's customers?

    Please help. I heard that many users have the same problem with the location service in the iPad. Regardless if they're using wifi or cellular network

    Nevermind, I seem to have solved the issue by going to Time & Date settings and switching the "Set Automatically" switch to off for a few seconds than back on again.

  • Can't determine the role of_. The group Adminsitrators could not be found.

    WebCenter Content logs:
    Warning,
    can not determine the role of guest privileges. The group Adminsitrators could not be found. The exception error type 'java.lang.Throwable'. [Details]Content Server has generated a diagnostic warning. The following stack trace can display detailed information.
    Another two warnings, the difference is that the guest replaced by admin, sysmanager.

    What is the final destination of the download?
    Firefox usually initially download the file first to the temp folder whole you enter the destination location and later tries to copy the file and possibly includes the permissions of the file in the temp folder.
    It is possible that anti-virus software is corrupting downloaded files or is otherwise interfering with downloading files.
    See:
    *http://kb.mozillazine.org/Unable_to_save_or_download_files
    *browser.download.manager.scanWhenDone

  • I have about 5,000 images in a Folder.  How can I determine which images are NOT in a Collection?

    I have about 5,000 images in a Folder.  How can I determine which images are NOT in a Collection?

    Create a smart collection with criteria "collection" and "does not contain"; and also with criterion Folder contains (or folder contains all)
    That works if you are thinking about a specific named collection.
    If you are interested in finding photos that are not in ANY collection, the usual trick is "collection" "does not contain" "a e i o u y"

  • I have synced my ipod many times, but for some reason it will no longer sync the apps, and says there are app installed that can not be determined. What should I do?

    I have synced my ipod many times, but for some reason it will no longer sync the apps, and says there are apps installed that can not be determined. What should I do?

    See these previous discussions:
    not determined
    iTunes cannot sync... apps not determined installed on...: Apple Support Communities
    installed apps could not be determined...: Apple Support Communities

  • Customer number of business partner can not be determined

    Hello,
    I created the BP for role TR0100 Main Loan Partner and I also added the role for FLCU00 for FI Client where I put the Company Code information and link this BP with the customer number in FI.
    When I am create a general loan (SAP Banking) the system did not determine the customer number in the Partner view, so when I go to make a Disburse (FN5V), I put the company code and the contract number, and then I get the error message "Customer number of main loan partner cannot be determined" Message no. 67087.
    I have reviewed the configuration and the SAP help for this scenario but I have not resolved this problem. We are starting this project so do you think this error could be generated because FI has not been fully customized ?
    Thank you for your help.

    Thank you Prasad,
    But I have not resolved the issue,
    I reviewed you 2 suggestions but the issue still continues.
    1. I configured 2 company codes and the settings for product types and the activities for the loans are completed. In fact, I can save contracts and see the cash flow.
    2. I am using for example the condition 201 A_Nominal Interest and the flow type assigned is 0110 and the check "Payment transaction" is set.
    I hope you can tell me others suggestions,
    Thank you.
    Regards

  • Can not get the agent from rule determination

    Dear expert,
      We have a PR workflow,for one step, the agent is determined by one rule,In our Q system,everythink is ok to get the agent correctly,and the workflow also can works.but in our P system,can not get the agent from the rule,when we simulate the rule,the agent can be get smoothly,but in workflow,realy can't get the agent(after trace the workflow), so would you like to give me sone suggestion, whant had happen in our workflow?
    Many thanks!
    Best Regards,
    Kerry

    Tks!
    I have one question,how to check the agent assignment is active?
    and also want to say,the rule that determin the responsible agent is used at one step of the workflow,not for possible agent of task ,and the rule's type is RESPONSIBILITIES.
    Best Regards
    Edited by: Kerry Wang on Jun 25, 2010 3:14 AM

Maybe you are looking for

  • 'profit center report Revenue side'

    Dear friends, While doing AP invoice ,i am selecting Profit center. OR for JE of AP invoice if i select profit center. So its amount is comming in 'profit center report Revenue side' is it right?not understood its logic.? Regds mahesh.

  • How do i change from xp on booting to mac

    I just bought the new imac w/intel duo processor. the mac rep loaded boot camp and windows xp home on my request. (i have stuff from both mac and xp). in any event the computer starts up in windows xp. what do I have to push that should give me the o

  • Lookout 6.6 - Logon Error: Security file does not exist

    I'm trying to run Lookout 6.6 evaluation. It loads fine, I get a message saying that it's running evaluation version. I press OK to clear that box and a logon window opens. It's filled in with the default settings, Administator, local doman, no passw

  • Attachments missing in emails

    Since updating to Mavericks, all attachments in existing emails are missing - there's a box with a question mark where they were. Any suggestions, please? Phil

  • Hp dv6700 keyboard some keys locked,

    hp dv6700 keyboard some keys locked, like up and down aero, Enter button, some numric buttons, some alfabate keys, remember these also not working in bios setup,plz tell me the trick how can i solve this problem?