Question about applying Cyclic bulletin 8.0o

Dear all:
        Its the first time Im gonna be in charge of implementing this new Cyclic bulleting, and I have doubts about what will happen when the basis team update the BSI softwarw. Will we lose all the configuration we had in the BSI side? (we have some rules there), or it will inherit the configuration from the prior version?
Thank you a lot !

Hello Federico,
In the old BSI client you should proceed to make a backup from the data table and restore in the new BSi client as
described in the note 1067730:
1.  Launch the TaxFactory 8.0 client GUI.
2.  In the resultant logon screen, enter the following default initial
    administrative login and password.
       Login             Password
       TF80              bsi
3.  Select the Tech Tools icon.
4.  Select Custom Backup/Restore.
5.  Choose Restore.
6.  Restore to the current dataset the backup file BTXTAXC.BAK that you
    obtained upon unzipping the file BTXTAXC.zip.
7.  Repeat this procedure for all dataset(s) defined for TaxFactory 8.0
    in your system landscape.
Cheers
Jaime

Similar Messages

  • Question about "Apply Now" window in Photoshop CS6

    Is there a way to turn off such warning or notification windows like the "Apply Now" Yes or No window that appears after certain changes, such as resizing an image? Also frustrating that I have to reselect the Select tool in order for the change to take place. thanks for any help. I am a former Elements 8 to CS6 user, so I may be missing something.

    Never having used a discussion board before, I am not sure how to even make a response to yours, but let’s see if this works. If I am in a .psd file, and say I resize an image…a photo. In order to make the resize take effect, I cannot just click my cursor onto another area of the file, as it won’t release that particular layer I am on. I have to go back to my tool box and select the Pointer Tool or select too again. Once I do that, Photoshop sends up a window asking if I want to apply my changes…every time. Does this make sense?

  • A question about applying fades?

    I can't seem to find in the manual where you can apply fades in small increments. I know there is a keyboard key you hit while applying the fade with the fade tool that will apply it in small increments.
    When I use the fade tool It always applies a certain amount of fade and I can't figure out how to apply it in small increments from the very start with the fade tool.
    Also for some reason I cannot use the fade tool at the end of some regions. At the very least can someone direct me to the areas in the manual where it discusses this and I will read it.

    I'm not aware of a modifier key that allows for fine-tuning on the fade tool.  Zoom level affects this.  Also, keep in mind what you see is not what you get - the fades can graphically appear longer than they are if you are zoomed out.  To get a fine-tune while zoomed out click-drag the number field in the inspector instead of using the fade tool.  It's blank if there is no fade yet, but you can drag and apply very small amounts.  If you are not sure where to click-drag, use the fade tool and look at the inspector to see the #'s change.  You can select several regions and put the same fade all at once.
    While looking at the inspector, you might see the words "Eq. pwr" or something like that.  IIRC when you set-up a cross fade with certain settings, and then try to change it to just a fade out it won't work.  You need to change it back to 'fade out' or whatever.

  • Question about Project Lockdown

    I've been reading through Arup Nanda's "Project Lockdown". I understand all of his rationals and procedures, but a few things leave me feeling a bit uneasy. Maybe it's just fear of the "unknown unknowns". In particular is the discussion on changing the unix access profiles for the oracle binaries. I have this uneasy feeling that if I were to implement those particular suggestions, it would end up biting me somewhere down the road.
    Has anyone implemented all of the suggestions in this document? If so, what have been your experiences?

    Arup Nanda_2 wrote:
    Hi Ed,
    Thanks Mark for pointing me out to this.
    I have been using that for more than 8 or 9 years now, without any side effects. But as Emre Baransel reported that although he has been following that without any untoward effects, you should take every advise in the specific context of your environment. I have tried to put all caveats there; but there is no way for me to check all possible comobinations.
    For instance, one of the advises is to remove executable permissions from extjob executable. If you are not using extrnal jobs from the database (99% of people don't), heeding that advise does nothing to your activities. But if you do external jobs, they are broken now. I have made that clear in the article; but I can't be sure if the reader will pay attention to that. But if you don't use external jobs, by changing the permissions you just closed a major vulnerability without applying the CPU patch, which may or may not close all the vulnerabilities.
    Another is the case of nmb and nmo executables. If you are using Enterprise Manager to manage the O/S as well, then changing those executables will no longer allow you to do that. But if you don't do that particular activity (most don't), you again closed a major vulnerabillity without affecting your functionality.
    For anyone who has ever authored anything, one thing is clear - the work is like broadcast, not point to point transmission. Even point-to-point. "If you explain something so clearly that no one can misunderstand, someone will".
    It's not consulting which is situation specific. So, any work which is not prepared in context of a specific situation must be taken with that disclaimer - your mileage may vary. Understanding and testing is a must before committing the work.
    Hope this helps.
    ArupThanks for the response. Besides worrying about the "unknown unknowns" I also have a question about applying patches, especially the quarterly CPUs. Since, at some level, applying a patch is simply overlaying a specific file with a newer version, will this cause permissions to revert to default? Would we have to go through the process after applying a patch? I'll go back and re-read the original doc several more times to make sure I have a good grasp of what's going on here.

  • Questions about CIN tax procedure choice and pricing schemas

    Hi all,
    I have to implement SAP on a Indian company and I'm verifying all particularity about this country (in particular tax procedures and the great number of differents tax conditions used).
    I have two questions about tax procedures and pricing schemas. Every feedback about thse points will be appreciated.
    a) To choose tax procedure TAXINN or TAXINJ which are the elements that I have to consider?
         I have read lot of documentation about CIN implementation and Iu2019m oriented to choose TAXINN schema, but If possible I  would  to understand better which are on behalf of one choice or another.
    b) To define pricing schemas for India, after check with local users and using examples of documents (in particular tax invoice) actually produced, I have understood that taxes have to be applied on amount defined starting from price list, minus discounts recognized to customer plus surcharges eventually to bill (packing, transport,  etc.).
    Itu2019s correct for any type of taxes that tax amount is calculated on u201Cnet valueu201D defined at item level or there are exceptions to this rule?
    Thanks in advance
    Gianpaolo

    hi,
    this is to inform you that,
    a) About point 1 I know the difference between the 2 tax procedures (conditions or formulas). I also have read in others post in the FORUM that TAXINN is preferable. So I would to understand which are the advantages to choose instead TAXINJ. There are particular reasons or it'a only an alternative customizing setting?
    a.a. for give for posting the link : plese give me the advantages of TAXINJ and TAXINN
    CIN - TAXINN and TAXINJ
    b) About point 2, to define which value has to be used as base amount to calculate taxes isn't a choice, but is defined depending by fiscal requirement of the country, in this case India fiscal requirement. I know that, as Lakshmipathi
    write as answer on my question, exception could be, but it was important for me to understand if I have understood correctly the sequence of the pricing condition in the schema in "normal" situation.
    b.b. you can create your own pricing procedure for this and go ahead.
    hope this clears your issue.
    balajia

  • A question about creating packages as local objects in ABAP

    Hi,
    I have a question about creating packages with SE80. Whenever I create a new package it is assigned a new transport request. After that, I can create new programs inside this package, and each time I can choose whether to assign the new program to a transport request or just save it as a local object (I often do this for test programs that I don't transport and I remove them once my tests have been done).
    What I would like to ask is that, is it possible to create a package (and not just programs inside a given package) as a local object? so that every new object created in this package will be considered as a local object?
    Thanks in advane,
    Kind Regards,
    Dariyoosh

    Thomas Zloch wrote:
    Please also check the F1 help for the package field e.g. in SE80, SAP standard is in range A-S and U-X, namespaces start with "/", so you should be save. I am using the T namespace for temporary stuff since a long time and did not have a problem so far.
    > Thomas
    >
    > P.S. this applies to the package name only, of course
    Thank you very much for this remark, I checked F1 help for the package field and in fact as you mentioned these ranges are for local objects.
    Once again, thank you very much for your help.
    Kind Regards,
    Dariyoosh

  • Questions about 1003051 - TDMS 3.0 corrections - Composite SAP Note

    Experts:
    We, from a big SAP shop, want to set up TDMS for ERP,  BI, HCM and CRM.
    We have some questions about note 1003051:
    1) Is this note about ERP (and HCM)  only?  If so, what are the notes for TDMS on BI and CRM?
    2) Should we apply this note to all systems involved: sender, controller (SM7.0 in our case) and receiver?
    3) We have enhp1...enhp4 in our ERP (and HCM), enhp1 on BI and perhaps enhp1 on CRM (not sure yet).
        a)  What is the impact of enhp on TDMS?
        b) should we install TDMS before applying enhp OR the sequence does not matter?
    Thanks for your help!

    1) Is this note about ERP (and HCM) only? If so, what are the notes for TDMS on BI and CRM?
    >This is a composite note, and contains information about various other notes related to TDMS. Refer to each note mentioned in this note individually to assess the same.
    2) Should we apply this note to all systems involved: sender, controller (SM7.0 in our case) and receiver?
    >Depends from note to note, Each note contains the necessary information about the system it has to be installed on.
    3) We have enhp1...enhp4 in our ERP (and HCM), enhp1 on BI and perhaps enhp1 on CRM (not sure yet).
    a) What is the impact of enhp on TDMS?
    >TDMS in standard supports Basis 7.0 systems. However it generally works fine with 7.01 too.
    b) should we install TDMS before applying enhp OR the sequence does not matter?
    >As TDMS 3.0 is only available for systems with basis 4.6C to 7.0. So install TDMS first and then the EHP.
    I hope these answers help.
    Regards
    Pankaj.

  • Question about metadata filtering and document sets

    Hello,
    I have a question about the metadata filtering when using document sets.
    When i use the metadata filter for example for "Installatie: P00001" it shows.
    But i wan't to show only the document set and not all the documents. Is this possible OOTB?

    Hi striker,
    You can add the "Content Type" in Hierarchy Fields for your list, then click the "Document Set" to filter the document set type item, then you can input the "P00001" in Installatle key filter, click apply, then it should show only document set
    items with field value P00001.
    http://office.microsoft.com/en-001/sharepoint-help/set-up-metadata-navigation-for-a-list-or-library-HA102832523.aspx
    Thanks
    Daniel Yang
    TechNet Community Support

  • Question about LRU in a replicated cache

    Hi Tangosol,
    I have a question about how the LRU eviction policy works in a replicated cache that uses a local cache for its backing map. My cache config looks like this:
    <replicated-scheme>
    <scheme-name>local-repl-scheme</scheme-name>
    <backing-map-scheme>
    <local-scheme>
    <scheme-ref>base-local-scheme</scheme-ref>
    </local-scheme>
    </backing-map-scheme>
    </replicated-scheme>
    <local-scheme>
    <scheme-name>base-local-scheme</scheme-name>
    <eviction-policy>LRU</eviction-policy>
    <high-units>50</high-units>
    <low-units>20</low-units>
    <expiry-delay/>
    <flush-delay/>
    </local-scheme>
    My test code does the following:
    1. Inserts 50 entries into the cache
    2. Checks to see that the cache size is 50
    3. Inserts 1 additional entry (as I understand it, this should cause the eviction logic to kick-in)
    4. Checks the cache size again, expecting it to now be 20
    With HYBRID and LFU eviction policies, the above logic works exactly as expected. When I switch to LRU however, the code at step 2 always returns a value significantly less than 50. All 50 inserts appear to complete successfully, so I can only assume that some of the entries have already been evicted by the time I get to step 2.
    Any thoughts?
    Thanks.
    Pete L.
    Addendum:
    As usual, in attempting to boil this issue down to its essential elements, I left out some details that turned out to be important. The logic that causes the condition to occur looks more like:
    1. Loop 2 times:
    2. Create named cache instance "TestReplCache"
    3. Insert 50 cache entries
    4. Verify that cache size == 50
    5. Insert 1 additional entry
    6. Verify that cache size == 20
    7. call cache.release()
    8. End Loop
    With this logic, the problem occurs on the second pass of the loop. Step 4 reports a cache size of < 50. This happens with LRU, LFU, and HYBRID-- so my initial characterization of this problem is incorrect. The salient details appear to be that I am using the same cache name each pass of the loop and that I am calling release() at the end of the loop. (If I call destroy() instead, all works as expected.)
    So... my revised question(s) would be: is this behavior expected? Is calling destroy() my only recourse?
    Message was edited by: planeski

    Robert,
    Attached are my sample code and cache config files. The code is a bit contrived-- it's extracted from a JUnit test case. Typically, we wouldn't re-use the same cache name in this way. What caught my eye however, was the fact that this same test case does not exhibit this behavior when running against a local cache directly (as opposed to a repl cache backed by a local cache.)
    Why call release? Well, again, when running this same test case against a local cache, you have to call release or it won't work. I figured the same applied to a repl cache backed by a local cache.
    Now that I understand this is more a byproduct of how my unit tests are written and not an issue with LRU eviction (as I originally thought), it's not a big deal-- more of a curiosity than a problem.
    Pete L.<br><br> <b> Attachment: </b><br>coherence-cache-config.xml <br> (*To use this attachment you will need to rename 545.bin to coherence-cache-config.xml after the download is complete.)<br><br> <b> Attachment: </b><br>LruTest.java <br> (*To use this attachment you will need to rename 546.bin to LruTest.java after the download is complete.)

  • Question about swapping SIM cards on a Z10

    Hi, everyone, I am a non-Blackberry user who works in IT support.  One of my clients uses a Blackberry and has often asked me very complicated questions about how to do various unusual things with his device.  At the present time, he is considering switching to a Z10, which would be set up using ActiveSync.  He wants to know if he could swap the SIM card without having to go through the setup process again.   My client travels a lot, and wants to use a local SIM card on an upcoming trip to a very remote area.  
    I've not been able to find an answer to this anywhere. 
    This is his exact question: "I just got it from a friend (ATT version) and I am trying to see if I like it enough to switch to it as my primary phone.  Blackberry z10 asks you to sign in with your blackberry world ID when you first set up the phone.  Question: Would you have to do it again if you put a different simm into it?  With iPhone, it makes no difference so long as the device is unlocked—you can then exchange simm cards as often as you want.  Would it be the same with an unlocked blackberry z10 (I know it's not possible with the bold 9900 as System 7 ties your ID to the simm card).  In short, in blackberry z10, could you exchange the US simm for another country's simm without having to wipe the phone,  etc.  "
    If anyone can shed some light on this for me, I'd be very grateful.,  Thanks!

    Hi and Welcome to the Community!
    The key issues are thus:
    Ensuring that the device is truly carrier unlocked
    Ensuring that the specific device model is compatible with the radio frequencies/technologies that the desired carrier uses. There are 4 different Z10 models:
    http://www.bbin.in/en/2013/03/03/4-types-blackberry-z10-models-fits-better/?utm_campaign=4-types-of-...
    If both of those are OK (separate research of the desired carriers would of course be necessary), then it is indeed a simple matter to change carriers. For example, I changed from ATT to TMO by simply changing the SIM...no need to WIPE or anything, and my same BBID came along just fine. You should, however, always obtain a properly-sized SIM card from the carrier -- there are plenty of reports of folks trying to use "cut" SIM cards and experiencing errors.
    With BB10, it's actually simpler than with legacy BBs. Legacy BBs used the BIS service, which required receipt onto the device (from the carrier data network) of Service Books so as to activate the various services that the user subscribed to. When changing carriers, it often could be that a latent Service Book from the prior carrier causes issues when shifting to a different carrier...and that's where WIPING and such came into play, so as to cleanse the device so that the new carrier could deliver all of the proper Service Books to the device. With BB10, there is no BIS, and there are no Service Books...so all of that complication is eliminated.
    But, as always, YMMV.
    Good luck!
    Occam's Razor nearly always applies when troubleshooting technology issues!
    If anyone has been helpful to you, please show your appreciation by clicking the button inside of their post. Please click here and read, along with the threads to which it links, for helpful information to guide you as you proceed. I always recommend that you treat your BlackBerry like any other computing device, including using a regular backup schedule...click here for an article with instructions.
    Join our BBM Channels
    BSCF General Channel
    PIN: C0001B7B4   Display/Scan Bar Code
    Knowledge Base Updates
    PIN: C0005A9AA   Display/Scan Bar Code

  • Question about size of ints in Xcode

    Hello. I have a a few quick questions about declaring and defining variables and about their size and so forth. The book I'm reading at the moment, "Learn C on the Mac", says the following in reference to the difference between declaring and defining a variable:
    A variable declaration is any statement that specifies a variables name and type. The line *int myInt;* certainly does that. A variable definition is a declaration that causes memory to be allocated for the variable. Since the previous statement does cause memory to be allocated for myInt, it does qualify as a definition.
    I always thought a definition of a variable was a statement that assigned a value to a variable. If a basic declaration like "int myInt;" does allocate memory for the variable and therefore is a definition, can anyone give me an example of a declaration that does not allocate memory for the variable and therefore is not a definition?
    The book goes on, a page or so late, to say this:
    Since myInt was declared to be of type int, and since Xcode is currently set to use 4-byte ints, 4 bytes of memory were reserved for myInt. Since we haven't placed a value in those 4 bytes yet, they could contain any value at all. Some compilers place a value of 0 in a newly allocated variable, but others do not. The key is not to depend on a variable being preset to some specific value. If you want a variable to contain a specific value, assign the value to the variable yourself.
    First, I know that an int can be different sizes (either 4 bytes or 8 bytes, I think), but what does this depend on? I thought it depended on the compiler, but the above quote makes it sound like it depends on the IDE, Xcode. Which is it?
    Second, it said that Xcode is currently set to use 4-byte ints. Does this mean that there is a setting that the user can change to make ints a different size (like 8 bytes), or does it mean that the creators of Xcode currently have it set to use 4-byte ints?
    Third, for the part about some compilers giving a newly allocated variable a value of 0, does this apply to Xcode or any of its compilers? I assume not, but I wanted to check.
    Thanks for all the help, and have a great weekend!

    Tron55555 wrote:
    I always thought a definition of a variable was a statement that assigned a value to a variable. If a basic declaration like "int myInt;" does allocate memory for the variable and therefore is a definition, can anyone give me an example of a declaration that does not allocate memory for the variable and therefore is not a definition?
    I always like to think of a "declaration" to be something that makes no changes to the actual code, but just provides visibility so that compilation and/or linking will succeed. The "definition" allocates space.
    You can declare a function to establish it in the namespace for the compiler to find but the linker needs an actual definition somewhere to link against. With a variable, you could also declare a variable as "extern int myvar;". The actual definition "int myvar;" would be somewhere else.
    According to that book, both "extern int myvar;" and "int myvar;" are declarations, but only the latter is a definition. That is a valid way to look at it. Both statements 'delcare' something to the compiler, but on the second one 'define's some actual data.
    First, I know that an int can be different sizes (either 4 bytes or 8 bytes, I think), but what does this depend on? I thought it depended on the compiler, but the above quote makes it sound like it depends on the IDE, Xcode. Which is it?
    An "int" is supposed to be a processor's "native" size and the most efficient data type to use. A compiler may or may not be able to change that, depending on the target and the compiler. If a compiler supports that option and Xcode supports that compiler and that option, then Xcode can control it, via the compiler.
    Second, it said that Xcode is currently set to use 4-byte ints. Does this mean that there is a setting that the user can change to make ints a different size (like 8 bytes), or does it mean that the creators of Xcode currently have it set to use 4-byte ints?
    I think that "setting" is just not specifying any option to explicitly set the size. You can use "-m32" or "-m64" to control this, but I wouldn't recommend it. Let Xcode handle those low-level details.
    Third, for the part about some compilers giving a newly allocated variable a value of 0, does this apply to Xcode or any of its compilers? I assume not, but I wanted to check.
    I don't know for sure. Why would you ask? Are you thinking of including 45 lines of macro declarations 3 levels deep to initialize values based on whether or not a particular compiler/target supports automatic initialization? Xcode current supports GCC 3.3, GCC 4.0, GCC 4.2, LLVM GCC, CLang, and Intel's compiler for building PPC, i386, and x86_64 code in both debug and release, with a large number of optimization options. It doesn't matter what compiler you use or what it's behavior is - initialize your variables in C.

  • Another BW question about filter in the query definition

    Hi ,
    I have another question about filter in the query definition.
    <u>Question:</u>
    Which of the following objects can be filtered in the query definition?
    A. characteristic
    B. Key figure
    C. Structure
    D. Units
    E. Hierarchy
    My answer is A,B,D,E.
    The answer in the book is A,B,D
    Can anybody tell me which one is wrong?
    Thanks in advance,
    Liu Jia

    HI
    1.The answer could be A,B,D.you can not apply filters on hierarchies
    2.Whenever there is a change in Attribute data(like Location,Num etc...)that has to be reflected in all aggregates of the cube.Thsi can be done by running "ATTRIBUTE CHANGE RUN".
    sri

  • Questions about upgrading from Exchange 2010 RTM to Exchange 2010 Service Pack 3

    I am preparing to perform an maintenance upgrade on our current Exchange 2010 Server, to Service Pack 3 (and any post-SP3 roll ups), but I have a couple questions about the process.
    Current Exchange Server details:
    Exchange 2010 Standard
    Version: 14.0 (Build 639.21) - from Exchange Management Console
    Version: 14.0.702.4000 - from Outook client
    Active Directory forest and domain levels: Windows 2008 R2 native
    The questions I have are:
    1.  Can I assume that because it's version 10.0.702.4000 I am on Exchange Server 2010 RTM Update Rollup 4?
    2.  Can Exchange 2010 Standard RTM be patched directly to Service Pack 3, or would I need to perform incremental patches (i.e. SP1, SP2, etc.) before going to SP3?
    3.  Do I need to manually perform the AD domain schema prep before applying Service Pack 3, or will the Service Pack 3 update process automatically handle the modifications of the AD schema?

    Hi,
    Here are my answers you can refer to:
    1. Firstly, I’d like to explain , we can use connection status to check our Exchange server version from Outlook client:
    http://office.microsoft.com/en-in/outlook-help/determine-the-version-of-microsoft-exchange-server-my-account-connects-to-HA010117038.aspx
    And I check my version from both EMC and Outlook client. It’s same.
    2. We can directly update RTM version to SP3 , and the update will take an additional 30 minutes or longer per database.
    3. Since Exchange 2010 SP3 makes updates to the Active Directory schema, we need prepare AD domain schema. However, it will automatically prepare AD and the domain when you install the update.
    For more information, you can refer to the following article:
    http://technet.microsoft.com/en-us/library/jj965774(v=exchg.141).aspx
    If you have any question, please feel free to let me know.
    Thanks,
    Angela
    Angela Shi
    TechNet Community Support

  • Questions about Access Manager tutorials available in netbeans site

    Hi
    Thank you for reading my post
    I have some questions about two tutoral which i find in :
    http://www.netbeans.org/kb/55/amsecurity.html and
    http://www.netbeans.org/kb/55/amsecurity-liberty.html
    here is my problem :
    we have some web services, now we want to have authentication applied for consumer who try to access our web services.
    we need to have most possible flexibility because we may deploy the server for a customer with an already established Identity database ( Database Table with user details)
    Also we need to have Transport level security using SSL.
    I read and studied both of them and now i have some questions :
    -I think Securing Web Services Using the SAML or UserNameToken is what we need for authentication and autorization of web service consumers?
    is that right?
    -Does Sun Java System Access Manager provide flexibility to authenticate user/password with a database table content?
    -How we can apply roles in Sun Java System Access Manager when we authenticate users ?
    Thanks

    Imagine that we want to have an end to end security for our web services
    we thought that we could use message level encryption to protect the soap message and also we should protect our web services from un-authenticated acess,
    we will use userName token for this.
    Our customer has large database which contains many user/password and role of those users.
    some of web services should be available to higher role (manager) and not for all users.
    so we should check a user role before we allows him/her to access a web service.
    my question is whether Sun Access manager can help us with this? or there are other configuration or packages that we should apply to have this feature.
    to explain more :
    our client side is a swing application, users enter username/password to login into system. after they loged in, we send user/pass every time user want to request some data from some services. (is it good to send user/pass every time?)
    We want Sun Access Manager to handle users authentication .
    We also need to handle role related authorization, can Sun access manager handle this?
    Thanks

  • Question about upgrading R12

    Dear all,
    My customer wants to upgrade EBS from 12.1.1 to 12.1.3.
    He has questions about module OTL and AGIS.
    He wants to know:
    1. Apply OTL&AGIS on 12.1.1, then upgrade to 12.1.3
    2. Upgrade 12.1.3, finish all post upgrade of 12.1.3, then apply patch to add OTL&AGIS module
    Which one should be correct?
    If neither of them, please advise.
    Also, please post the note/doc number.
    Thanks in adv,
    Jackie

    Jackie Han wrote:
    Dear all,
    My customer wants to upgrade EBS from 12.1.1 to 12.1.3.
    He has questions about module OTL and AGIS.
    He wants to know:
    1. Apply OTL&AGIS on 12.1.1, then upgrade to 12.1.3
    2. Upgrade 12.1.3, finish all post upgrade of 12.1.3, then apply patch to add OTL&AGIS module
    Which one should be correct?
    If neither of them, please advise.
    Also, please post the note/doc number.
    Thanks in adv,
    JackieUpgrade to 12.1.3 then apply the latest patchsets.
    Thanks,
    Hussein

Maybe you are looking for

  • Installed Adobe CS 5.5 Design Premium on new computer... WIN 8.1... get Exit Code 6

    Adobe tech support told me phone support for this version is no longer available. I am at your mercy. I would like to try to re-install by shutting down running apps in the System Configuration. and deactivating my anti-virus software. I am unsure wh

  • N95 can not sent text messages

    Hi, I have been using my N95 since UK release without a problem but now it is refusing to send texts. When I try to send one, it goes to my outbox with status 'Resend in...', tries a few times then fails telling me that the memory is full. I can stil

  • Song order rearranges in playlists

    I listen to music on my iPhone 4 (6.1.3 - not enough space to upgrade to ios7) when working out and traveling.  Recently I tried to change the order of songs in a couple of playlists and add new songs and the changes won't keep.  For instance when ed

  • Start Java application at system start up linux/unix

    Hi, I am working on a application, which needs to run as a background process in linux/unix without the intervention of the user. Please give me the details procedure how to make it as background process. thanks

  • Putting new ipod onto computer that has old ipod softwear already installed

    i got a new 30gb video ipod that i haven't installed onto my computer yet, but i do already have a 20gb 4th gen ipod installed on it. i am wondering what i have to do to install the new one...will it erase the songs in my itunes? do i need to uninsta