Pull forward Journals and Ownership via Rules

Hi,
Is it possible to pull forward the Journals for 1 scenario towards the other scenario? By rules? Same question for the ownership.
I can full forward data from one scenario towards the other but the Journals and ownership is a different case.
Thanks!
Gr,
Bob

Hi Bob,
We have done the pull forward of journals actually with metadata by setting the ZeroViewForAdjs property for Scenarios to Periodic. If you choose to do so, you of cause need to evaluate that it fits your application design as a whole.
Ownership is a bit trickier, I don't think there's any good solution with rules, because it might change from period to another and you don't want the new values to be overwritten by the old ones. What you are looking for one would of course achieve nicely by changing the account type of [POWN] to BalanceRecurring, but it simply doesn't change even if you would load metadata with such a change into the application. At least this is the case until versions 11.1.2.1.
Kind regards,
Lauri

Similar Messages

  • Rule to write carrry forward Journals

    Dear users,
    Is it possible to write rules to create automatic carry forward Journals in HFM?
    The rule should generate journals to be posted to <Entity Curr Adj> and <Parent Curr Adjs>.
    I would like the system to automatrically carry forward from one month to the next any balance in the Asset and Liabilities accounts.
    Example:
    Period January
    Cash 100 debit
    Sales 100 credit
    Period February
    The system should generate a posting in account Cash of 100 debit
    Any experiencies/ideas are very much appreciated.
    Rgds,
    Diego

    You can use a different custom member (say custom4) to post the carried forward adjustments. For example post normal adjustments to Custom 4 = [None] and carry forward adjustments to Custom 4 = CarriedFwd. Both members will be under the TotalCustom4 top member.
    If HS.Value.Member() = "<Entity Curr Adjs> or HS.Value.Member() = "<Parent Curr Adjs> Then
    HS.Exp "A#Cash.C4#CarriedFwd = A#Cash.P#Prior.C4#TotalCustom4"
    HS.Exp "A#Sales.C4#CarriedFwd = A#Cash.P#Prior.C4#TotalCustom4"
    End If
    This way you will also be able to tell current period's adjustments from previous period's ones.

  • Auto-elimination of intercompany profit in inventory - how to eliminate IC balance via rules?

    Hi Experts:
    I’ve designed and developed a data form in HFM to calculate the amount of MARGIN in the inventory of the receiving company (when the receiving company has received the inventory from an intercompany partner).
    Does anyone have any experience or ideas how to write a rule (or use IC logic) to automatically eliminate this calculated amount against IC Cost of Sales?
    The IC Cost of Goods sold entry will be the same at the margin in inventory (but this is not broken out separately in any account – just buried in COGS).
    Does anyone have any suggestions for a rule/account/IC logic that could automatically grab this calculated balance in inventory and remove it from inventory as well as reduce IC_COGS?
    We prefer to do this elim entry automatically if possible.    Is it possible to do an “auto” journal entry that could grab these amounts?    Or could we use a rule to populate an IC account so that this would self eliminate?
    Should we set up an elim account part and populate them automatically via rules, then allow HFM to use it's built in IC elim logic?   This issue is that this entry occurs all on one entity, but I know it's possible to set up IC accounts so that you can book a balance with yourself.
    How do I do this elim entry automatically in HFM?
    Inventory
    $    (1,000)  this will be calculated in HFM.
    IC_COGS
    $      1,000   this will equal to above account
    Thanks,
    Mark

    Hi. Try this. Tag it as an intercompany account (use Y instead of R) and give it a plug account. Put the plug account within COGS. Basically you're doing a one-sided elimination.
    Elimination of profit in inventory is not easy, and if this solves things for you then you're on the easy side of it.
    Regards,
    Eric

  • Apple Mail and GoogleMail via IMAP

    Disclaimer: Apple does not necessarily endorse any suggestions, solutions, or third-party software products that may be mentioned in the topic below. Apple encourages you to first seek a solution at Apple Support. The following links are provided as is, with no guarantee of the effectiveness or reliability of the information. Apple does not guarantee that these links will be maintained or functional at any given time. Use the information below at your own discretion.
    _*Apple Mail and GoogleMail via IMAP*_
    As posts concerning the setup of Apple Mail for GoogleMail IMAP access become more frequent on Apple Discussions, I decided to collect some of the most asked-for info in one place. The following hints are intended to provide enough info for anyone who wants to get started with Google Mail IMAP and Mail.app.
    As you might have noticed already, GoogleMail behaves differently from other IMAP accounts in some respects. One of the underlying reasons is its use of labels instead of folders (i.e. instead of moving messages to different folders – like e.g. Private and Work – in order to establish some order, rather there are labels tagged to the messages). Because of this a particular setup of Apple’s Mail client is required.
    *Activating IMAP for Google Mail*
    If you haven’t activated access via IMAP for Google Mail already, follow the instructions given by Google [here|http://mail.google.com/support/bin/answer.py?answer=77695&topic=13294]. It boils down to this:
    1) Sign in to Gmail.
    2) Click "Settings" at the top of any Gmail page,
    3) click "Forwarding and POP/IMAP",
    4) select "Enable IMAP".
    5) Click "Save Changes".
    *Creating a new account in Apple Mail*
    To add a Google Mail IMAP account in Mail.app, go to File > Add Account. A wizard will open which prompts you to insert your Name, the eMail-address of the new account and the password. Don’t use the option for automatic configuration if it’s available. Info on what to type into the different fields can be obtained from Google [here|http://mail.google.com/support/bin/answer.py?answer=78799&topic=12814]. The most important are:
    1) Incoming Server: imap.gmail.com, port 993 (using SSL)
    2) Outgoing Server: smtp.gmail.com, port 465 or 587 (using SSL)
    3) Your account name is your full email address including "@gmail.com" (without the quotation marks)
    *Configuring the Google Mail account in Apple Mail*
    After you have added your Google Mail IMAP account to Mail.app, you’ll find a section for Google Mail in Mail.app’s sidebar with subfolders like "All Mail" (which has in turn several subfolders) and folders for each label you created with GoogleMail. Now you have to configure the account properly. Despite what [Google recommends|http://mail.google.com/support/bin/answer.py?answer=78892&topic=1281 4], I found the following settings to work best for me.
    In the sidebar, navigate to the subfolders Trash/Sent/Drafts/Junk of "Google Mail" (the one with the white folder icon instead of a blue one) in turn and go to "Mailbox" menu > "Use this mailbox for..." > Trash/Sent/Drafts/Junk respectively. Afterwards these folders show up as subfolders to the main Trash/Sent/Drafts/Junk folders in the sidebar (and at the same time disappear from the GMail section). Among others this step is necessary because of Google Mail’s implementation of labels. E.g., as Google states [here|http://mail.google.com/support/bin/answer.py?answer=78892&topic=12814]:
    Messages that are deleted from an IMAP folder (...) only have that label removed and still exist in All Mail
    So if you want to delete a message you have to set the option to "Use this mailbox for… Trash" as described above. Same applies to sent messages etc.
    Furthermore, make sure every checkbox in Mail's Preferences > Accounts > GoogleMail > Behavior is checked . (Some will already and automatically be checked when you apply the option "Use this mailbox for..." as described above).
    *Some basic troubleshooting tips*
    1) If your counter for unread messages in Mail.app doesn’t refresh properly, go to "Mailbox" menu > "Sync all accounts".
    2) If you have set up a Smart Mailbox in Mail e.g. for unread messages and every unread message of Google Mail shows up twice, then add the criterion "Message is not in mailbox" > "All Mail", and set the requirement for messages to comply with ALL conditions (instead of ANY). This is necessary because of every message there is a copy stored in All Mail.
    I hope these info will be regarded as helpful by anyone who tries to get started with Google Mail and experiences some problems on the way.
    The links given were accessible as of September, 3rd, 2008. The setup was tested on a MacBook with OS X 10.5.4 Leopard and Mail 3.4 (928/928.1).
    Good computing.
    floba
    (Note: the above given hints are personal suggestions and I don’t assume liability for any disorders that might occur after applying the described steps.)
    Do you want to provide feedback on this User Contributed Tip or contribute your own? If you have achieved Level 2 status, visit the User Tips Library Contributions forum for more information.

    Disclaimer: Apple does not necessarily endorse any suggestions, solutions, or third-party software products that may be mentioned in the topic below. Apple encourages you to first seek a solution at Apple Support. The following links are provided as is, with no guarantee of the effectiveness or reliability of the information. Apple does not guarantee that these links will be maintained or functional at any given time. Use the information below at your own discretion.
    _*Apple Mail and GoogleMail via IMAP*_
    As posts concerning the setup of Apple Mail for GoogleMail IMAP access become more frequent on Apple Discussions, I decided to collect some of the most asked-for info in one place. The following hints are intended to provide enough info for anyone who wants to get started with Google Mail IMAP and Mail.app.
    As you might have noticed already, GoogleMail behaves differently from other IMAP accounts in some respects. One of the underlying reasons is its use of labels instead of folders (i.e. instead of moving messages to different folders – like e.g. Private and Work – in order to establish some order, rather there are labels tagged to the messages). Because of this a particular setup of Apple’s Mail client is required.
    *Activating IMAP for Google Mail*
    If you haven’t activated access via IMAP for Google Mail already, follow the instructions given by Google [here|http://mail.google.com/support/bin/answer.py?answer=77695&topic=13294]. It boils down to this:
    1) Sign in to Gmail.
    2) Click "Settings" at the top of any Gmail page,
    3) click "Forwarding and POP/IMAP",
    4) select "Enable IMAP".
    5) Click "Save Changes".
    *Creating a new account in Apple Mail*
    To add a Google Mail IMAP account in Mail.app, go to File > Add Account. A wizard will open which prompts you to insert your Name, the eMail-address of the new account and the password. Don’t use the option for automatic configuration if it’s available. Info on what to type into the different fields can be obtained from Google [here|http://mail.google.com/support/bin/answer.py?answer=78799&topic=12814]. The most important are:
    1) Incoming Server: imap.gmail.com, port 993 (using SSL)
    2) Outgoing Server: smtp.gmail.com, port 465 or 587 (using SSL)
    3) Your account name is your full email address including "@gmail.com" (without the quotation marks)
    *Configuring the Google Mail account in Apple Mail*
    After you have added your Google Mail IMAP account to Mail.app, you’ll find a section for Google Mail in Mail.app’s sidebar with subfolders like "All Mail" (which has in turn several subfolders) and folders for each label you created with GoogleMail. Now you have to configure the account properly. Despite what [Google recommends|http://mail.google.com/support/bin/answer.py?answer=78892&topic=1281 4], I found the following settings to work best for me.
    In the sidebar, navigate to the subfolders Trash/Sent/Drafts/Junk of "Google Mail" (the one with the white folder icon instead of a blue one) in turn and go to "Mailbox" menu > "Use this mailbox for..." > Trash/Sent/Drafts/Junk respectively. Afterwards these folders show up as subfolders to the main Trash/Sent/Drafts/Junk folders in the sidebar (and at the same time disappear from the GMail section). Among others this step is necessary because of Google Mail’s implementation of labels. E.g., as Google states [here|http://mail.google.com/support/bin/answer.py?answer=78892&topic=12814]:
    Messages that are deleted from an IMAP folder (...) only have that label removed and still exist in All Mail
    So if you want to delete a message you have to set the option to "Use this mailbox for… Trash" as described above. Same applies to sent messages etc.
    Furthermore, make sure every checkbox in Mail's Preferences > Accounts > GoogleMail > Behavior is checked . (Some will already and automatically be checked when you apply the option "Use this mailbox for..." as described above).
    *Some basic troubleshooting tips*
    1) If your counter for unread messages in Mail.app doesn’t refresh properly, go to "Mailbox" menu > "Sync all accounts".
    2) If you have set up a Smart Mailbox in Mail e.g. for unread messages and every unread message of Google Mail shows up twice, then add the criterion "Message is not in mailbox" > "All Mail", and set the requirement for messages to comply with ALL conditions (instead of ANY). This is necessary because of every message there is a copy stored in All Mail.
    I hope these info will be regarded as helpful by anyone who tries to get started with Google Mail and experiences some problems on the way.
    The links given were accessible as of September, 3rd, 2008. The setup was tested on a MacBook with OS X 10.5.4 Leopard and Mail 3.4 (928/928.1).
    Good computing.
    floba
    (Note: the above given hints are personal suggestions and I don’t assume liability for any disorders that might occur after applying the described steps.)
    Do you want to provide feedback on this User Contributed Tip or contribute your own? If you have achieved Level 2 status, visit the User Tips Library Contributions forum for more information.

  • I have a new hard drive, can I pull my contacts and ical from my iphone?

    I have a new hard drive and I would like to pull my ical and contacts from my iphone to replace what I lost but when I sync my phone it doesn't bring the data onto my computer and if I choose sync calendar and contacts it seems to want to erase the phone and replace with the blank computer data. Any ideas?

    If you are running OSX Lion and iOS 5, you can sync via iCloud.
    What versions of OSX and iOS are you running?

  • SCCM 2012 - Pull distribution point and target PKI or HTTPS DPs

    I have spent several days researching this and so far have found only a single page that even takes a stab at offering a solution.
    Problem:
    Trying to target an HTTPS DP when creating a pull distribution point in SCCM 2012 R2. The link that I'm referring to that does offer a workaround is here(guess I can't post a link, but it ends with the following, how-to-set-an-https-distribution-point-as-a-source-dp-for-pull-dps)
    I have several problems with the proposed solution.
    Is a script really the only way to proceed with something that has up till now been a built in feature with the rest of the product.
    You have to provision the DP to use a self signed cert initially for it to even work, then supposedly you can add the private key to the DP later.
    Does that mean I have to unbind the cert from both the pull and target/source push DP in IIS?
    Powershell which would be a logical way to go, doesn't seem to make any head way(Mr. Snover I know you don't oversee configman but please push for more documentation, you've taught me to live and die by get-help. A single example for a command as large
    as set-cmdistributionpoint or add-cmdistributionpoint is a shame. Perhaps my update help just didn't finish properly and I'm talking prematurely. If that is the case then I apologize!)
    Is there no other solution other than build the DP with a self signed cert then run this VB script and then switch the private key later? I have read through a lot of the pull DP documentation and it makes mention of leveraging the SDK but I haven't seen
    anything definitive. I would like to at the very least convert this from VB to powershell(if that script is the only option) and I know how to convert the portions where it's interacting with the site's WMI namespace (smsprovider if I'm not mistaken).
    What I don't know how to do, rather don't have the chops for is what comes after. The site control file piece, I see it's also WMI and I could spend the time stepping through the different piece and just might to learn more about SCCM in the lab anyhow. I've
    spent the last year getting to know powershell and have spent next to no time with VB. I know enough to recognize what a script is doing.
    The environment:
    The reason this is important for me is I'm about to start the production build(been all lab up till now) that is going to have just under 300 DPs in the field connected via T1 lines. They were all 07 secondary sites. I was thinking about migrating them using
    the migration tool but considering the amount of work its going to take if that link is the ONLY path to target a HTTPS DP then I might as well just spend the time and manually uninstall and reinstall the field DPs. The client count in the field is an average
    of 50 machines per site where there are on-prem devices... Total client count is around 25k. The primary site in the datacenter will house the majority of the site roles unless I start running into resource issues, at which time I will begin offloading site
    roles to one of two more servers that I have slated for the project. No CAS, no Secondaries. SQL is co-located on the primary.
    Ramblings:
    I'm sure there are more people out there using PKI, and using pull DPs. How have you managed to target your HTTPS enabled DPs? Security wants this to be a HTTPS only environment, and up until now I have successfully done that. If someone could please point
    me in the direction of some more thorough documentation I would be very grateful. I understand that this is a somewhat new feature, but there has to be an easier way. Perhaps powershell can cleanly do it with the set-cmdistribution point...but when I update
    help and do showwindow for the command I only get one example and so far haven't found any other stories like mine with the exception of the link I posted in the beginning.
    While I'm rambling, Wally there are a lot of us in the community that are going to miss your presence at Microsoft and should you read this I wish you luck with your new position. But that is a whole different topic. Thanks in advance for any links or help
    you can provide. -K.R.

    Yes, this is the only way, from
    http://technet.microsoft.com/en-us/library/gg712321.aspx#BKMK_PlanPullDps: "However, you can use the Configuration Manager SDK to specify a source distribution point that is configured for HTTPS. To use a source distribution point that is configured
    for HTTPS, the pull-distribution point must be co-located on a computer that runs the Configuration Manager client. "
    Does "why" really matter , who cares? It just is. Whether it was an oversight, a coding bug, or an act of God doesn't change anything. Why does there "have to be" an easier way? And what's wrong with using the VBScripts others have
    written? A script is a script is a script particularly if you've been given it already. Just because the hammer is pink doesn't mean it can't hammer the nail in.
    Jason | http://blog.configmgrftw.com | @jasonsandys

  • Can any 1 tell me how to create budget journal and how to enter journal ?

    hi all+
    Can any one tell me how to create budget journal and how to enter journal against that budget ?+
    Regards+
    Yasir+

    http://download.oracle.com/docs/cd/A60725_05/html/comnls/us/gl/budjrnl.htm#index-Budget-journals-Entering--0
    Enter budget journals to maintain an audit trail for your budget balances. You can use budget rules to calculate budget journal amounts automatically.
    When you post budget journals, the journal amounts update existing budget balances. You can review and change your budget journals before posting them.
    Attention: When you use budget rules in Journal Mode, General Ledger calculates the appropriate debit or credit needed to achieve the balance you enter for the account type.
    Prerequisites
    1. Define a budget
    2.Open one or more years for your budget
    3.Define a budget organization
    4. Assign the "Entered" budget entry type to the accounts for which you want to enter budget journals
    To enter budget journals for a single account:
    1. Navigate to the Enter Budget Journals window.
    2. Specify the Budget Organization for the account to which you want to budget. If the budget organization is password-protected, you must enter the password before you can enter budget journals.
    3. Enter the Budget you want to update. You cannot use a budget that is frozen.
    4. Enter the range of Accounting Periods to which you want to budget.
    5. Enter the Currency of the budget amounts you are entering. The accounts must be assigned to the budget organization for this currency.
    6. Choose Journal Mode from the region poplist to enter budget amounts in a journal format.
    You can also use Single Row Mode or Worksheet Mode to enter budget journal amounts. However, you can only generate budget journals from these entry modes when you use the Enter Budget Journals window.
    Additional Information: When you use Journal Mode, Balance Type is a display-only field. It displays Budget when you are entering budget journals. In the Enter Journals window, this field displays Actual when you are entering actual journals.
    7. Enter or query the Account to which you want to budget. You can also switch to Worksheet Mode to easily query accounts, then return to Journal Mode to enter budget journals.
    8. Enter a Debit or Credit amount for each period. Do not enter journal amounts if you want to use budget rules to calculate and distribute budget amounts.
    9. Choose Create Journals to create a budget journal batch. If you are using budgetary control, you specify a funds action when you create the batch.

  • What are the Relations between Journalizing and IKM?

    What is the best method to use in the following scenario:
    I have about 20 source tables with large amount of data.
    I need to create interfaces that join the source tables into target tables.
    The source tables are inserted every few secondes with about hundreds to thousands rows.
    There can be a gap of few seconds between the insert of different tables that sould be joined.
    The source and target tables are on the same Oracle instance and schema.
    I want to understand the role of: 'Journalizing CDC' and 'IKM - Incremental Update' and
    how can i use it in my scenario?
    In general What are the relations between 'Journalizing' and 'IKM'?
    Should i use both of them? Or maybe it is better to deelte and insert to the target tables?
    I want to understand what is the role of 'Journalizing CDC'?
    Can 'IKM - Incremental Update' work without 'Journalizing'?
    Does 'Journalizing' need to have PK on the tables?
    What should i do if i can't put PK (there can be multiple identical rows)?
    Thanks in advance Yael

    Hi Yael,
    I will try and answer as many of your points as I can in one post :-)
    Journalizing is way of tracking only changed data in your source system, if your source tables had a date_modified you could always use this as a filter when scanning for changes rather than CDC, Log based CDC (Asynchronous in ODI, Logminer/Streams or Goldengate for example) removes the overhead of of placing a trigger on the source table to track changes but be aware that it doesnt fully remove the need to scan the source tables, in answer to you question about Primary keys, Oracle CDC with ODI will create an unconditional log group on the columns that you have defined in ODI as your PK, the PK columns are tracked by the database and presented in a Journal table (J$<source_table_name>) this Journal table is joined back to source table via a journalizing view (JV$<source_table_name>) to get the rest of the row (ie none PK columns) - So be aware that when ODI comes around to get all data in the Journalizing view (ie Inserts, Updates and Deletes) the source database performs a join back to the source table. You can negate this by specifying ALL source table columns in your PK in ODI - This forces all columns into the unconditional log group, the journal table etc. - You will need to tweak the JKM to then change the syntax sent to the database when starting the journal - I have done this in the past, using a flexfield in the datastore to toggle 'Full Column' / 'Primary Key Cols' to go into the JKM set up (there are a few Ebusiness suite tables with no primary key so we had to do this) - The only problem with this approach is that with no PK , you need to make sure you only get the 'last' update and in the right order to apply to your target tables, without so , you might process the update before the insert for example, and be out of sync.
    So JKM's provide a mechanism for 'Change data only' to be provided to ODI, if you want to handle deletes in your source table CDC is usefull (otherwise you dont capture the delete with a normal LKM / IKM set up)
    IKM Incremental update can be used with or without JKM's, its for integrating data into your target table, typically it will do a NOT EXISTS or a Minus when loading the integration table (I$<target_table_name>) to ensure you only get 'Changed' rows on the load into the target.
    user604062 wrote:
    I want to understand the role of: 'Journalizing CDC' and 'IKM - Incremental Update' and
    how can i use it in my scenario?Hopefully I have explained it above, its the type of thing you really need to play around with, and throroughly review the operator logs to see what is actually going on (I think this is a very good guide to setting it up : http://soainfrastructure.blogspot.ie/2009/02/setting-up-oracle-data-integrator-odi.html)
    In general What are the relations between 'Journalizing' and 'IKM'?JKM simply presents (only) changed data to ODI, it removes the need for you to decide 'how' to get the updates and removes the need for costly scans on the source table (full source to target table comparisons, scanning for updates based on last update date etc)
    Should i use both of them? Or maybe it is better to deelte and insert to the target tables?Delete and insert into target is fine , but ask yourself how do you identify which rows to process, inserts and updates are generally OK , to spot a delete you need to compare the table in full, target table minus source table = deleted rows , do you want to copy the whole source table every time to perform this ? Are they in the same database ?
    I want to understand what is the role of 'Journalizing CDC'?Its the ODI mechanism for configuring, starting, stopping the change data capture process in the source systems , there are different KM's for seperate technologies and a few to choose for Oracle (Triggers (Synchronous), Streams / Logminer (Asynchronous), Goldengate etc)
    Can 'IKM - Incremental Update' work without 'Journalizing'?Yes of course, Without CDC your process would look something like :
    Source target ----< LKM >---- Collection table (C$) ----<IKM>---- Integration table (I$) -----< IKM >---- Target table
    With CDC your process looks like :
    Source Journal (J$ table with JV$ view) ----< LKM >---- Collection table (C$) ----<IKM>---- Integration table (I$) -----< IKM >---- Target table
    as you can see its the same process after the source table (there is an option in the interface to enable the J$ source , the IKM step changes with CDC as you can use 'Synchronise Journal Deletes'
    Does 'Journalizing' need to have PK on the tables?Yes - at least a logical PK in the datastore, see my reply at the top for reasons why (Log Groups, joining back the J$ table to the source table etc)
    What should i do if i can't put PK (there can be multiple identical rows)? Either talk to the source system people about adding one, or be prepared to change the JKM (and maybe LKM, IKM's) , you can try putting all columns in the PK in ODI. Ask yourself this , if you have 10 identical rows in your source and target tables, and one row gets updated - how can you identify which row in the target table to update ?
    >
    Thanks in advance YaelA lot to take in, as I advised I would reccomend you get a little test area set up and also read the Oracle database documentation on CDC as it covers a lot of the theory that ODI is simply implementing.
    Hope this helps!
    Alastair

  • Permission and ownership

    I search the forum and find tons of info about people having trouble with permission and how to resolved. Can anyone share what is permission and ownership. I have use disk repair, but I don't know why it works as it relate to this topic.
    Austin

    At the risk of repeating what has already been offered:
    What are permissions?
    Every file and folder on a Mac OS X hard drive has a set of permissions—settings that determine which user(s) have access to each item, and exactly what that access is. For example, permissions dictate whether or not a particular user can open and edit a particular file. But permissions also determine which items the operating system—or specific parts of it—can access and modify, and which files are accessible by applications.
    What does repairing permissions do?
    The Repair Disk Permissions function—the process that actually performs the task of repairing permissions—examines certain files and folders on your Mac’s hard drive to see if their current permissions settings are what Mac OS X expects them to be; if discrepancies are found, the offending permissions are changed to match the expected settings.
    (In Mac OS X 10.3 and later, repairing permissions also performs one other, unrelated, task: If the invisible /tmp symbolic link—which is linked to the /private/tmp directory—is missing, the link will be recreated.)
    Why is it necessary to repair permissions?
    If permissions on particular files are “incorrect”—i.e., not what Mac OS X expects them to be or not what they need to be for your Mac’s normal operation—you can experience problems when the operating system tries to access or modify those files. For example, you may have trouble logging in to your account, printing, launching applications, or even starting up your Mac. Similarly, if an application—from Apple or a third-party developer—needs access to a particular file or folder to function, and the permissions on that item have changed in a way that prevents such access, the application may not function properly (or at all). The Repair Disk Permissions function can fix such problems by ensuring that certain files have the correct permissions.
    There’s also a security element here: Many system-level files have permissions set a particular way so that applications or users that shouldn’t be meddling with those files can’t. If the permissions on certain system-level files somehow get changed so that access to those files is no longer restricted, you’ve got the potential for a major security issue. Repairing permissions can resolve such issues by resetting permissions on those files to prevent unauthorized access.
    How do I repair permissions?
    The Repair Disk Permissions function is part of Apple’s Disk Utility (in /Applications/Utilities). After launching Disk Utility, select the desired disk—generally your startup disk—in the list to the left, then click the First Aid tab. At the bottom of the First Aid panel, click the Repair Disk Permissions button. (You could instead use the Verify Disk Permissions option to preview any potential repairs before performing them, but for most users there’s little benefit from this extra step.)
    Permissions can also be repaired via the shell (Terminal) by using the command sudo diskutil repairPermissions /. However, it’s unlikely that the typical user will ever need to perform the task in this manner. It’s useful if for some reason Disk Utility itself won’t launch, or for repairing permissions on a remote Mac when connected via Remote Login (SSH), but otherwise you’re just as well served using Disk Utility.
    How does the Repair Disk Permissions function know what the “correct” permissions are?
    When you use Apple’s Installer utility to install software (such as Mac OS X itself or an OS X update), the installation package (the .pkg file you double-click to begin installation, or that Software Update downloads in the background for an automatic installation) generally leaves behind a receipt—a smaller Mac OS X package that includes information about every file installed, including the permissions each file should have. This receipt is placed in /Library/Receipts. When you run the Repair Disk Permissions function, it examines the receipts in the /Library/Receipts directory of the disk being repaired—which means the feature works only on volumes with Mac OS X installed—and compares the information in the receipt with the actual files on your drive. If the Repair Disk Permissions function finds a file with permissions that differ from what a receipt claims they should be, that file’s permissions are reset to their receipt-specified values. (If you’re curious about the information contained in a receipt, the easiest way to view it is to use the utility Pacifist; simply drag and drop the appropriate receipt into the Pacifist window and you’ll be presented with a list of all files installed by the similarly-named installation package, along with each file’s original permissions.)
    It’s worth noting here that although the function is called “Repair Disk Permissions,” what is actually happening is that files’ permissions are being reset or restored to a particular state. It’s possible—though not common—for a particular file’s permissions to differ from what a receipt claims they should be without those permissions actually being “broken.”
    Are all files affected by Repair Disk Permissions?
    No. As you may have inferred from the above description, only those files installed using OS X’s Installer utility and whose installation packages leave behind a proper receipt in /Library/Receipts are affected by the Repair Disk Permissions function. This means that most of the files affected by the Repair Disk Permissions function are system-level files, application files, or system add-ons—not applications installed by drag-and-drop, and not your documents or other user-level files.
    If repairing permissions is useful in general, why doesn’t Apple recommend it as routine maintenance?
    Apple does, quite explicitly:
    It’s a good idea to repair disk permissions as a regular maintenance task after upgrading or installing new software.
    That’s taken from Mac Help—in both Panther and Tiger—right on your Mac. Similar statements can be found in other Support articles, one of which is:
    http://docs.info.apple.com/article.html?artnum=25751

  • Software Update never pulls anything down, and Network Pane is blank(!)

    Hey all. I'm kind of concerned that my software update hasn't pulled anything for a while. When I do it manually, the blue bar moves about 5% of the way and just will hang forever.
    I was curious if there was something going on in the Network tab that might be affecting its ability to connect - I'm on the internet with it all the time - but then there was nothing in the Network tab as well!
    I dumped the preferences files, and repaired the permissions, but it still won't work. Any other suggestions?

    Hi Auto and Welcome to Apple Discussions ...
    Have you checked the drive for available drive space lately? If not, select your MacintoshHD icon on your Desktop, press Command + I on your keyboard. That will prompt your Get Info window. Click the General tab so it faces down and look where it says: Capacity and Available. Rule of thumb, never allow the available drive space to fall below 15%, 20% is better.
    If that's not the issue, try deleting this file: com.apple.softwareupdate.plist
    /Users/YourName/Library/Preferences. Drag that file to the trash, empty the Trash and reboot.
    Now, go to System Preferences/Software Update and see if it works.
    Carolyn

  • Firewall: The invalid rule and all subsequent rules were skipped.

    Hi All,
    As a web developer, I have had some experience administering Linux, Solaris, Windows, but I am new to OSX.
    I have a problem with the firewall I need help with.
    Here are the symptoms:
    1) Address Groups: Besides any, I have an address group called Admin, it contains my home and work ip address. Other address group is for LAN. When inspecting the properties of a group, the interface tells me 'valid IP address' or 'address range from .. to ..'. This seems OK
    2) When editing an Advanced Rule, I can select one of the Address Groups just created for a source/destination. I save the configuration, resulting in a error 'Error while writing settings (cannot apply one or more rules - detail in log)'.
    Opening the editor for the rule again, the field with the source/destination now has a small note under it: 'Invalid IP address, range or group). This is my first problem.
    3) I have now deleted all Advanced Rules and deselected the ones I cannot delete. Still the error message 'Error while writing settings...'. The log offers no help at all:
    May 23 10:17:07 Shaman servermgrd: servermgr_ipfilter:ipfw config:Notice:Disabled firewall
    May 23 10:17:07 Shaman servermgrd: servermgr_ipfilter:ipfw config:Info:Finished generating rules in 2 ms
    May 23 10:17:07 Shaman servermgrd: servermgr_ipfilter:ipfw config:Notice:Flushed rules
    May 23 10:17:07 Shaman servermgrd: servermgr_ipfilter:ipfw config:Error:Failure code returned by ipfw command: 64, message: 'Line 18: recv, xmit, via require interface name or address\n'
    May 23 10:17:07 Shaman servermgrd: servermgr_ipfilter:ipfw config:Error:The invalid rule and all subsequent rules were skipped.
    May 23 10:17:07 Shaman servermgrd: servermgr_ipfilter:ipfw config:Notice:Enabled firewall
    I cannot find out what is wrong from this output.
    3) At this point I may as well turn the firewall off, for instance I have given access to http/ssh/ftp to group 'any', but they can in fact reach any port at all.
    Thanks in advance for any help or suggestions,
    Sander
    2GHz PowerPC G5   Mac OS X (10.4.6)  

    Well, the obvious question is what does line 18 say?
    The log clearly states that the rule on that line is the one it's having problems with:
    May 23 10:17:07 Shaman servermgrd: servermgr_ipfilter:ipfw config:Error:Failure code returned by ipfw command: 64, message: 'Line 18: recv, xmit, via require interface name or address\n'
    Check /etc/ipfilter/ipfw.conf for the configuration file in question.

  • I hid the toolbar(file,edit,bookmarks,history...etc.) backward,forward arrow and home icon also,how to show it again???tnx

    i hid the toolbar(file,edit,bookmarks,history...etc.) backward,forward arrow and home icon also,how to show it again???tnx
    == This happened ==
    Just once or twice
    == last night

    '''Menu Bar''' (File, Edit, View, History, Bookmarks, Tools, Help)
    Press ALT+ V T M (CTRL+V T M on Macs) on your keyboard. This should restore the menu bar (Firefox 3.6)
    '''Other toolbars'''
    View|Toolbars|Select the desired Toolbar
    '''Other steps to try'''
    Try restoring the default set by going to View|Toolbars|Customize| Restore Default Set. This will put the toolbars back in the default place
    '''Safe Mode'''
    You May need to reset toolbars and controls via [[Safe Mode]]
    Make sure you completely close Firefox first. When you get to the Safe Mode window, select Reset toolbars and controls and then Make Changes and Restart.
    Hope this helps!

  • I want back, forward, home and reload as icons, everything else as text please.

    Hi.
    I am using the Multirow Toolbar Bookmarks Plus 1.0
    In customize tools I have icons set as text only.
    Is there a way of having back, forward, home and reload as icons.

    Firefox 4 uses a combined Stop/Reload/Go button that is positioned at the right end side of the location bar.
    During the page load process it shows as a Stop button and after the loading has finished the button is changed to a Reload button.
    If you type in the location bar then that button becomes a Go button.
    Middle-click the Reload button to duplicate the current tab to a new tab.
    Make sure that all the toolbars like the "Navigation Toolbar" and the "Bookmarks Toolbar" are visible: "View > Toolbars"
    * If items are missing then open the Customize window via "View > Toolbars > Customize" or via "Firefox > Options > Toolbar Layout"
    * If a missing item is in the toolbar palette then drag it back from the Customize window on the toolbar
    * If you do not see an item on a toolbar and in the toolbar palette then click the "Restore Default Set" button to restore the default toolbar set up.
    See also:
    * http://kb.mozillazine.org/Toolbar_customization
    A possible cause for issues with bookmarks is a problem with the file places.sqlite that stores the bookmarks and the history.
    * http://kb.mozillazine.org/Bookmarks_history_and_toolbar_buttons_not_working_-_Firefox

  • BRE Forward Chaining and Backward Chaining

    Hello Experts,
    Can you please help me in understanding what is forward and backward chaining in BRE
    Thanks

    Forward chaining:
    Following is the extract from my favourite BizTalk book - Professional
    BizTalk Server 2006. I would recomment you to read though this book on forward chaining with BRE.
    In short: Forward chaining describes the ability for one rule’s actions to impact facts relied on by another rule and thus require such a rule to be reevaluated to maintain consistency.
    Forward chaining describes the ability for one rule’s actions to impact facts relied on by another rule and thus require such a rule to be reevaluated to maintain consistency.
    Consider this three-rule scenario: Rules 1 and 2 rely on the Loan Risk property to establish which APR the loan should be set to. Rule 3 marks the customer as High Risk if the customer meets the profiling criteria.
    Rule 1: IF Customer.LoanRisk = “Low” THEN Loan.APR = 0%
    Rule 2: IF Customer.LoanRisk = “High” THEN Loan.APR = 39%
    Rule 3: IF Customer.Age < 21 AND Income < “20,000” THEN Customer.LoanRisk = “High”
    A clear dependency exists between these rules. The action of Rule 1 or Rule 2 can be made invalid by Rule 3.  The action of Rule 3 modifies the LoanRisk fact, which is used as part of the conditions for Rule 1 and Rule 2. 
    This is where forward chaining comes in. The BRE requires that users create rules with this mind and add an UPDATE statement to the rule. This indicates to the BRE that the fact specified with the UPDATE statement has changed and that all rules that rely
    on this fact in a condition should be reevaluated and therefore pass through the match–conflict resolution–action stages again.
    The previous rule statement would need to be modified as follows.  
    Rule 1: IF Customer.LoanRisk = “Low” THEN Loan.APR = 0%
    Rule 2: IF Customer.LoanRisk = “High” THEN Loan.APR = 39%
    Rule 3: IF Customer.Age < 21 AND Income < “20,000” THEN Customer.LoanRisk = “High”
    UPDATE Customer
    Here Forward chaining describes the ability for one rule’s actions (Rule3's action) to impact facts relied on by another rule( Rule1 and Rule2) and thus require such a rule to be reevaluated to maintain consistency.
     Backward chaining
    Regarding
    Backward chaining, I don't know anyone who has implemented backward chaining other than Charles Young. In case of Microsoft's BRE with backward chaining, his blogpost on this topic is the only reference. So its better I refer to his one and only blog on this
    topic (in Microsoft BRE engine)
    Charles Young's excellent blog on this: MS BRE Backward Chaining - Part 2: The 'Simple Name' pattern
    Other references for you on this topic..
    Technet Wiki:Biztalk: BRE Forward Chaining
     A
    real time use case addressed in MSDN forum
    As said from my favourite - excellent detail provided on this topic with an in book Professional
    BizTalk Server 2006 with an example
    If this answers your question please mark it accordingly. If this post is helpful, please vote as helpful by clicking the upward arrow mark next to my reply.

  • HT4623 why does my ipad kick me out of FB and sometimes to the 'settings' page or sometimes to the desk top, for what reason?     I have 50.8 GB of capacity available; it is version 5.1.1 and model MC497LL.   it is WIFI and internet via AT&T???  Can you h

    Can anyone help me?  Why does my ipad kick me out of FB?  Sometimes to the 'settings' page and sometimes to the desk top?  I would like to know why this happens and what I can check or change to make it stop.   I have 50.8 GB of capacity available; it is version IOS 5.1.1; model MC497LL.  It is WIFI and internet via AT&T?   Can anyone give me some clues on what to do; or change in settings???  Thank you very much! 

    Please read this whole message before doing anything.
    This procedure is a diagnostic test. It’s unlikely to solve your problem. Don’t be disappointed when you find that nothing has changed after you complete it.
    The purpose of the test is to determine whether the problem is caused by third-party software that loads automatically at startup or login, by a peripheral device, by a font conflict, or by corruption of the file system or of certain system caches.
    Disconnect all wired peripherals except those needed for the test, and remove all aftermarket expansion cards, if applicable. Start up in safe mode and log in to the account with the problem. You must hold down the shift key twice: once when you turn on the computer, and again when you log in.
    Note: If FileVault is enabled, or if a firmware password is set, or if the startup volume is a Fusion Drive or a software RAID, you can’t do this. Ask for further instructions.
    Safe mode is much slower to start up and run than normal, with limited graphics performance, and some things won’t work at all, including sound output and Wi-Fi on certain models. The next normal startup may also be somewhat slow.
    The login screen appears even if you usually login automatically. You must know your login password in order to log in. If you’ve forgotten the password, you will need to reset it before you begin.
    Test while in safe mode. Same problem?
    After testing, restart as usual (not in safe mode) and verify that you still have the problem. Post the results of the test.

Maybe you are looking for

  • (not) saving documents in pages

    Historically when I would exit a document I was working on I would get an option to save it with the new revisions or not. When I declined to save the document the old version would remain. Since the Mountain Lion upgrade when I exit a document it si

  • X6 and headphones problem

    My X6.00/32 (V21.0.0004) does't recognize headphones. When I insert phones into the jack and press "headphones" choice it gives me stupid message "use telephone's microfon", so I can't use radio. I have tried different headphones and played with sett

  • RAID Logs

    Hi, We have a late 2009 Intel Xserve with hardware RAID configured with 3 disks in RAID 5 configuration. Our disk 1 (bay 1) failed. Initially when we noticed this the disk was detected in the RAID utility but before we could do anything else the rest

  • No activation of the developer account since January 28, 2014

    Hi everyone! I created a new individual developer account and I made payment on January 28 2014, but until now the status is Contacting Your Reference. Contacting Your Reference We are contacting the reference you provided to verify that you have the

  • Windows 8, Pavilion, Internal Speakers not working

    Greetings, Objective: To use the regular NoteBook speakers i.e. not external speakers Info:  Pavilion G7 2235dx Windows 8.0 ** Speakers are not working ** Red X next to Speaker Icon on taskbar ** Sound / Playback / Properties: Digital Display Audio J