Question about multiple application modules.

Hello,
Suppose I have 2 database schema’s. For both schemas I have 1 application module. All view objects are in the same project.
For each application module I have an application definition.
Is it possible to link between these two applications? Because sometimes these database schema’s link to each other and you would like to jump from one application directly to the other.
For example you have orders locates in 1 DB schema and customers in another DB schema.
You would want to jump from the order directly to the customer details in the second schema.
Is this possible? Or do I need to make nested application modules etc?
I can find very little info about this; the JHS def guide does not offer much information about multiple application modules etc.
-Anton

Anton,
Yes, you can jump aroundd as you like.
You just can't use view links between VO's based on different db schema tables.
Nesting AM's doesn't help there, the DB connection of the top-level AM will be used.
Why don't you create synomyms for the tables in the other schema?
Steven Davelaar,
JHeadstart Team.

Similar Messages

  • Question about shared application modules

    Hello,
    I read the part in the developer guide but I still have some questions.
    1) The dev guide states that shared app modules use a different configuration.
    I assume this is the <appmod>Shared configuration?
    2) Where is this defined? Can this be changed?
    3) I understand there are two type of ‘scopes’ session and application. I’m using application for static lists, but I do not understand what the session scope is for? Is there any reason to use this scope over a normal application module?
    4) We have a system which uses VPD in an ‘odd’ way. We use it to set the current working year. Because the data is bound to years. Is it possible to use a session scoped shared module for this? And when I changed the current year (Context being set via the app module) to refresh all the session scoped shared module’s views?
    -Anton

    Anton,
    Yes, you can jump aroundd as you like.
    You just can't use view links between VO's based on different db schema tables.
    Nesting AM's doesn't help there, the DB connection of the top-level AM will be used.
    Why don't you create synomyms for the tables in the other schema?
    Steven Davelaar,
    JHeadstart Team.

  • Question about the Application Module in bc4j

    Hi all,
    I've been playing with JDeveloper9i for a little ovar a week only and have been trying to get access to a BC4J View Object in order to execute a runtime specific query on it, by passing 2 user input values to the object, and setting the WHERE clause by a call to the setWhereClause() method on the View Object. The only way i could come across to get hold of the View Object was to create an Application Object (in this case its called Bc4jModule) and then to use a call to a custom method in the Application Module Implementation which i created and set to be a Client Method.
    The code is as follows:
    In the Application Module (Bc4jModuleImpl)
    public int authenticateUser(String strLogin, String strP_Word)
    getUsersView().setWhereClause(" LOGIN='" + strLogin + "' AND P_WORD='" + strP_Word + "'");
    System.out.println(getUsersView().getWhereClause());
    getUsersView().executeQuery();
    return getUsersView().getRowCount();
    In the JClient panel (JButton action):
    Bc4jModule app = (Bc4jModule)panelBinding.getApplicationModule();
    int n = app.authenticateUser(txtUser.getText(), txtPassword.getText());
    System.out.println("Number of rows queried = " + n);
    I would like to know if this is the best way of doing a custom query on the Entity Object or is there some other way that i'm missing?

    The best way would be to:
    [list=1]
    [*]Design a view object in JDeveloper which has bind variables for the parameters you need to pass in at runtime. For example, your WHERE clause for your view object would look like:
    LOGIN = :0 and P_WORD = :1[*]Add an instance of that view object definition to your application module
    [*]Write your custom AppModule method like this:
    public boolean authenticateUser(String strLogin, String strP_Word)
      getUsersView().setWhereClauseParams(new Object[]{strLogin,strP_Word});
      getUsersView().executeQuery();
      return getUsersView().first() != null;
    }[list]

  • Question about the function module (RFC_READ_TABLE)

    Dear everyone
    Could I ask you a question about the function module (RFC_READ_TABLE)?
    I was asked if it's possible to create a report which compares the data between different SAP systems (both production systems).
    Now, the easiest way would be to use the function module (RFC_READ_TABLE) within a SAP infoset query (SQ01 type query).
    But I heard the rumor that using the function module (RFC_READ_TABLE) is not advisable due to the security reason.
    However, I am not exactly sure what sort of security problems this function module can possibly have...
    Would you help me on this?
    I also would like to know if using "remote enabled module" type function module can always overcome this possible security issue.
    Or, are there any points that I need to be careful about even when I use "remote enabled module" function module?
    Thank you very much in advance.
    Takashi

    Dear Fred-san
    Thank you very much for your support on this.
    But, may I double check about what you mentioned above?
    So, what you were mentioning was that if some user executes the query with
    the function module (RFC_READ_TABLE), under the following conditions, he can access to
    the HR data even when he does not have the authorizations for HR transactions?
    <Conditions>
    1. the user has the authorization for HR database tables themselves
    2. RFC_READ_TABLE is called to retrieve the data from HR database
    <example>
    Data: LF_HR_TABLE like  DD02L-TABNAME value 'PA0000'.
    CALL FUNCTION 'RFC_READ_TABLE'
       EXPORTING
        query_table                = LF_HR_TABLE
      TABLES
       OPTIONS                    =
       fields                     =
       data                       =    .
    But then, as long as we call this function module for a non-critical tables such as
    VBAP (sales order) or EKKO (purchase order) within our query, it wouldn't seem to be
    so security risk to use RFC_READ_TABLE...
    Besides, each query (infoset query) has got the concept of user groups, which limits
    the access to the queries within the user group.
    ※If someone does not belong to the user group, he cannot execute the queries within that
       user group, etc
    So, my feeling is that even infoset queries does have authorization concept...
    Would you give me your thought on this?
    I also thank you for your information for SCU0.
    That is an interesting transaction
    Kind regards,
    Takashi

  • I bought a Canon 8400F scanner- question about multiple photos being scanne

    Hi,
    I have a question about about scanning photos. It was posted that if you scan something with multiple photos, it will separate the pictures.
    If I put 6 pictures on the scanner, will it automatically scan them and separate them, or is there something in the software where I select it to separate each picture.
    Thank you

    I'm not at my Mac right now but it should be real obvious in the CanoScan software. Open it up and play around. It will jump out at you.
    You don't tell it to select "each" picture. You merely tell it that there are multiple pictures and it then does everything automatically.

  • Newbee questions about XE application builder

    Hi
    I find that Oracle support someting that we can use to build some real database driven applications
    i have some questions about it :
    1-Does this application builder differ from Oracle 10g R2 Application builder ? i means is it limited ?
    2-Does any one use it to build a real world application that works some where in some business place ?
    3-what is its behind code and technology , does it use JSF and managed Beans ? how i can see the generted codes ?
    Thanks

    Hello,
    Here's the link to the Application Express Forum Oracle Application Express (APEX)
    You should also look at the Application Express OTN page, http://www.oracle.com/technology/products/database/application_express/index.html there is howtos tutorials all sorts of good stuff.
    Carl

  • Multiple Application Modules

    I'm currently working on a BC4J/Struts project that requires accessing multiple disparate databases.
    I've setup 2 separate BC4J projects, one is the primary project that the Struts project uses as it's application module (Stateful). The secondary BC4J project is accessing a different database (Stateless).
    I've created methods in the primary application module to access the secondary application module. I'm currently using the Configuration.createRootApplicationModule() method create an instance of the secondary application module within the primary application module.
    Is there anything wrong with this approach?
    How have others achieved this?
    Thank you.

    Hi,
    Configuration.createRootApplicationModule will use the ApplicationPool (caching mechanism). This is intended for programmatic use and is okay to use when accessing a different root AM from within another AM. Please note that this will set up a different transaction context in the second AM that will not be nested within the first (i.e. the framework will not commit the second when commiting the first). If this is not the desired architecture then you should nest the second AM rather than using a programmatic approach.
    You should always release the second AM when done. Best practice recommends that the createRootApplciationModule...releaseRootApplicationModule pair are performed in a try...finally block. If you release with the remove parameter=false -- will release the AM to the pool for reuse.
    Hope this helps,
    JR

  • Question about managing application licenses together with netboot

    Hello
    So far I had made no experience with an MacOSX Server netboot configuration but we plan to introduce it in some weeks. Therefore we are "wondering" how management/assignment of application licenses is working in a netboot configuration. Normally in a local MacOSX configuration licenses for application are in generally assigned on the application (some are bound to a certain user name, others to the CPU ID) and is valid for all users login to the same computer. How and at which time are application licenses (for example MS Office 2004, Adobe Acrobat etc.) assigned in a netboot environment?
    Many thanks in advance for any clarification and with best regards, André Müller

    Hi Andre,
    Is this a technical or legal question Either way it is an interesting question about a major grey-area, and I wonder if anyone has the right answer.
    Boiling your question down to specifics, it could be...
    I have 15 individual Photoshop serials. I want to run Photoshop off a NetBoot image for 15 simultaneous users. Can I install one serial on the image, and allow 15 users to open Photoshop simultaneously. What if I want to install the image on 20 machines, but only 15 users will ever use Photoshop simultaneously.
    There is a technical answer and a legal answer to the question. I don't know if there is a 'right' answer since multi-user installations of titles that are technically possible under NetBoot may not be allowed legally under the user license agreement you committed to on breaking the seal on the software. And these agreements are different for different countries.
    Here's the technial answer. Sometime before OSX server 10.0, when Apple introduced netboot technology, developers were advised not to perform network scans checking for duplicate serial numbers when aps start up.
    In practice this means you can install software title on your image, activate with a serial number, and it will not conflict with the other identical versions of the same application on other images on the network.
    FileMaker Pro is the only software I am aware of that doesn't play by these rules, altthough it no longer checks when the applicaton starts, but when any FMPro network activity is started.
    Here's the leagl answer. It depends on the title and the country you are in. The legality is definded under the eulas for the titles concerned. I don't know if the leaglity has ever been tested in a court of law in any country in this context.
    The easy way to do the right thing for some titles it to purchase a multi-user serial number, ie. a single number which will work for 5 or 10, 20, 50... etc. users. Fore example, FileMaker has a volume licensing serial number which I beleieve can be purchased in increments of 10 users. However, not all titles offer this option, though, and it's difficult if you need 12 copies and have to buy 20.
    Sassafras software http://www.sassafras.com/ sells Keyserver, which may be an appropriate solution. Keyserver tracks installations and authenticates serial numbers to ensure no more than the licensed number of copies can be run at the same time.
    I don't think I've answerede your question for you but hope to have expanded the contxt of the question for other suggestions.
    Good luck,
    b.

  • Question about evictor, application performance, and log growth

    Hello,
    I've got an application that using two BDB environments, one with critical data and one with data that can be reconstructed, just for the sake of backup convenience. For a while, I was getting OutOfMemoryErrors with increasing frequency. This caused the app to crash without closing the databases or the environment until the recovery time was around 30 minutes. After reading through many of the posts here and trying various workarounds, I got to a state where that stopped happening. I think that what did that fixed is was decreased the cache sizes.
    Then, I was seeing what appeared to be evictor deadlocks. The application would hang for thirty minutes before a monitoring script that I've got would detect that no work was being done and would restart the application. Another round of searching ensued and I seem to have gotten it to a state where it doesn't run out of memory or deadlock anymore.
    After getting rid of all these issues and letting it run for four or five days, the size of one of the critical BDB environment was 550GB. Since it was almost filling the drive, I moved it aside and created a new BDB for the app to use. Now, I'm trying to figure out what happened. It looks like the BDB contains about 15G of actual data.
    It seems like everything starts out fine and then, somehow, it starts to collapse under the weight of itself. I'd like to figure out what type of abuse I may be guilty of that could cause this.
    Here's a little bit about my application:
    First (critical) BDB environment:
    - add only, no deletes
    - two databases
    - average data sizes are 1k and 11k respectively
    - average key sizes are around 80 and 16 bytes respectively
    - almost no locality of reference to access pattern in either
    - minimal lookups, mostly used as an archive
    - cache size is 1MB
    - 8 threads reading/writing, 40 threads reading only
    Second (reconstructable) BDB environment:
    - six databases
    - five databases are mostly add with purges of two-week-old data
    - one database has frequent adds and deletes
    - lots of lookups, things are likely to be looked up shortly after they're added
    - cache size is 64MB
    - 40 threads reading/writing
    On both environments,I've set je.evictor.forcedYield=true.
    I'm running the JVM with:
    -Xmx1800m
    -Dje.adler32.chunkSize=8192
    -XX:+UseMembar
    JVM version is:
    java version "1.6.0_01"
    Java(TM) SE Runtime Environment (build 1.6.0_01-b06)
    Java HotSpot(TM) Server VM (build 1.6.0_01-b06, mixed mode)
    BDB version is 3.2.23
    OS/Kernel is:
    Linux app2 2.6.9-42.0.10.ELsmp #1 SMP Fri Feb 16 17:17:21 EST 2007 i686 i686 i386 GNU/Linux
    So, my question is:
    What could cause the critical database (especially with no deletes) to grow to 550GB when there's only 15GB of data in it? It was my understanding that the cleaner should take care of any unused log file cruft. It seems like the log files grow faster as the performance gets worse. I have no idea which is the cause or the effect.
    And, I guess the real question is how can I prevent this in the future?
    Thanks,
    -Justin

    For the record, the problem was that the user's cache size was too small for the size of the database thereby creating a large number of records in the log when eviction of dirty records occurred. The cleaner was unable to keep up with the log load.
    Note to readers: eviction of dirty records causes records to be written to the log. JE has to evict to somewhere and the log is what it uses.
    Charles Lamb

  • Questions about Real Application Testing(RAT)

    Hi All,
    We have a production database running on 10gR3 on a server with local drives, while we have a Oracle 11gR2 DB running on a server with NFS mounts (using S7310 - AmberRoad) i.e. Faster and better storage.
    We captured the load on 10gR3 and replayed it on 11gR2. We noticed the following:
    (1) Replay is considerably slow even though Oracle11gR2 instance has a faster storage. We suspect that it may be something to do with the buffer cache / SGA because there is nothing in cache on the target (we didn't shutdown 10gR2 DB for capture) – what should we do then?
    (2) To make sure that we can take the advantage of cache, we replayed the load 2nd time right after the 1st replay and everything ran to our surprise. So we are wondering how’s that possible since we did not restore the DB as we do not want to wipe off the cache (chicken and egg situation)? Does Oracle rollback the changes after the replay?
    (3) Do we have to restore database on Target every time we do replay? But if we do that then we won't have anything in the SGA.
    So we need your advise and also would like to know how everyone else is doing this testing?
    Regards,
    RJiv.

    DB Replay's workload capture facility allows you to either start capture from a closed (mounted) database (capture starts upon opening the DB), or to begin capture mid-stream during normal activity. Starting capture on the production system from a closed database eliminates the divergence in performance resulting from a primed cache, as well as possible data divergence issues from open, partially-completed transactions at the time the capture started.
    For many customers, it will clearly not be possible to close their database during peak periods (!!)
    One way to address the cache priming issue is to start capture in production from a closed state during a low period of activity, and the allow capture to run through the peak period.
    Another approach is to start capture mid-stream with the DB open and to run capture for a long period (long enough to stabilize the cache). When performing the replay, begin a new AWR snapshot after the cache has stabilized.
    Your question about running the replay again after the first replay is done is confusing. Of course you will not get meaningful data from that, since replay must begin from the capture start SCN. If you run replay twice in a row without reverting the database to the capture start SCN, it will be applying meaningless changes to a database in a state that is unlike that of the original. You will be testing the data errors codepath instead of real performance.
    It is typical to enable database flashback on the repay database so that it can be repeatedly reverted to the capture start SCN for testing under a variety of scenarios.
    Regards,
    Jeremiah Wilton
    Blue Gecko, Inc.
    http://www.bluegecko.net

  • BC4J/UIX: Multiple Application Modules / Database Connections

    My UIX application must have access to two databases. One is the main database for the application and the other contains lookup information. The lookup database is shared by many applications of different types. I need to display values in the UIX page and also create a composite view from tables in each database.
    My understanding of this is that a UIX page requires a root Application Module which can have nested application modules allowing construction of a complex application. It appears that a UIX page must be tied to the root Application Module and then the nested modules can be referenced and used later in the UIX page.
    Can I create a root Application Module that contains a nested application module that connects to a different database? If so, are there limitations in building associations between the AM's that use different databases?
    If this is possible, how do I do it? I have created separate projects: one for each of the databases I mentioned and one for the main application module in a separate project. I try to create a "New Business Components Package" and "EJB Entity Facades for existing Entity Beans". The two application modules do not appear. (I created jar files for each of them and referenced these as libraries in the root module project.) Is this the correct approach? I have not found documentation that shows me how to do this yet so I admit I could be completely off base.

    Okay, I figured out that I have to build all of the BC4J packages under the same project and that the EJB Entity Facades is not what I should be working with.
    Maybe I will figure out the rest before too long.

  • Question about bundling application in Netbeans

    Hi All,
              My question is regarding bundling an application in netbeans? At present I have my application all working fine when I build and clean or run the application within Netbeans.
    Sweet so far! However the standalone JAR that is created each time when I run or build / clean my app does not work. OK I found the problem why the JAR does not work. But what
    I am not sure about is how to do the following in Netbeans?
    See the problem is that my application reads in a small file containing core application information for my programme upon start up. How do I get Netbeans to recognise this file and
    create the appropiate path under the "dist" folder each time I do a NEW build / clean or run my app within Netbeans? Is there a location where I can perform this setting in Netbeans?
    Or do I have to modify some file generated by Netbeans?
    Thank you in advance for your assistance!
    Kind Regards
    Mark

    You may want to use  the Java Preferences API to manage your application info.
    http://docs.oracle.com/javase/7/docs/technotes/guides/preferences/overview.html

  • Questions about database application tables connector

    Hi all,
    I need to manage with OIM several databases (each one with its custom tables).
    Also, one of them will be my trusted target on the initial load of users. The structure of our tables is not similar to the included in the example.
    The documentation explains how the OraAppX.xml could be modified but it doesn't speak about relations with "DBTable_nonTrusted.xml" and/or "DBTable_trusted.xml" For example, if I don't have a column called USR_COMM_LANG, could I replace this column name for another that I have in my database ? And what about the references on the "DBTable_nonTrusted.xml" file. Connector doc doesn't explain how references to that field (USR_COMM_LANG---xel_usr_comm_lang) are managed by the connector and if the normal working of the connector could be affected if the name of a variable is changed in the xml conf file.
    It could be that adapters of this connector were hardcoded with the referece to xel_usr_comm_lang (???) .
    The connector documentation includes a section titled "Adding Custom Database Columns for Provisioning and Reconciliation". The first impression reading this document is that it is possible to extend the predefined table rather than create and define a new structure of table.
    Has anyone rebuilt the "DBTable_nonTrusted.xml", "DBTable_trusted.xml" and "OraAppX.xml" files changing all default variables in order to manage a customized table? .
    Many thanks in advance,
    Claudia

    Hi Claudia,
    1) Yes, you must replace the column names in the "column" tag on your XML file for the column names that you have in your database tables. Also, remember that you need to configure the other parameters (like data_type, data_typ_size, etc) according to your database table.
    2) The "xel_data_source" parameter is the attribute name that will be recognized by the OIM and they can be mapped to a form field (UD_DBAPP_XXXX) in your process definition in OIM Design Console.
    3) You can customize your Database Application Tables connector for provisioning as you wish, but some issues exists. In the Known Issues section of the documentation you can see that this connector doesn't work for more than two tables.
    4) To customize your Database Application Tables for Trusted Recon, there are other restrictions because OIM users have some required fields that must be filled to create a user successfully.
    Hope that helps, and please let me know if you have more questions.
    Regards.

  • Question about multiple audio tracks

    Hello,
    I see that imovie has only 2 audio tracks available when creating a movie. I need more than two since I will be working with a voiceover track, a soundtrack and at least one background/environment track all at one time. I won't be able to use the sound recorded with the video so that "track" is not an option.
    My question is; Am I out of luck here and need to spend the 1K for studio pro to add more multiple audio tracks?
    Also, I tried working with garageband but since all of my audio tracks import in at a minimum of 40 beats per minute, the voiceovers are all sped up and sound chipmunky.
    Thanks for any help!

    Well I didn't mean to irritate you...LOL And yes, I realize that this is the iM 6 forum but the gist of my question was related to multiple audio tracks in iM and thought I would ask about it in the forum pertaining to the latest release.
    I had already posted a question in the GB forum regarding the bpm problem and found no answers so I was pretty much about to shelve that idea and forgo the whole garageband thing; this without knowing about the new "swap" features. I just updated to iM 6 yesterday.
    As far as the "on-tape" raw audios: I was working on my movie in iM4. I wanted to add more audio bits but I don't have a proper mic for my G5 so I recorded the audio bits on dv8 tape through my camcorder. I imported the video (the image was the inside of my lens cap!), extracted the audio, took those audio files and imported them into GarageBand. That's when I noticed the bpm problem.
    I'm sorry about the lack of info I originally gave but like I said, I had pretty much gave up on the idea of using GarageBand. I'm pretty new at this and I'm trying to decide what I need in terms of software to get what I want out of my movie. I'd be willing to pay for FCxp but still looking into whether I need to do just that or whether I can get by by using imovie and now it looks like GarageBand too.
    ah, thanks for that
    what irritates me, Prince wrote:
    The audio tracks were voiceovers that came from my
    dv8tape, imported into imovie4.
    ... ehm, but this is the iM 6(six) section, as said,
    iM 6 allows now "swapping" files with GB3... (I'm way
    back in the 90ies.... see my specs... )
    so, video is in some iM, and he wants to use the
    actual "on-tape" raw audios...
    I thnik we need a little more detail...

  • OT: question about multiple root directories

    ok, so on this website i just transferred to a new host, i
    password
    protected a directory, and for many people (possibly
    everyone) it is
    asking for the login info twice or three times before it lets
    you in. i
    contacted the host tech support, who gave me an explanation
    that i don't
    think makes sense. or maybe it does, but i don't think
    applies to my
    problem. and even if it does, they didn't offer any advice on
    how to
    solve the problem, just what might be causing it. bad tech
    support.
    anyway, i had a different idea about what the might be. there
    are two
    root directories on the server: public_html and www. they
    both have the
    same files, and therefore my protected directory is protected
    in both
    places. to me, that seems like it could be why it's asking
    for login
    info more than once.
    so, i want to find out if this is the case by deleting the
    one i'm not
    uploading to. so basically, my question is, if i have chosen
    public_html
    as the directory that i upload to, is it safe to delete the
    www
    directory? or is there a reason that i need two root
    directories and,
    essentially, two copies of my site on the server?
    i realize these are probably questions best suited for my
    host, but i'm
    unimpressed with their tech support so far (though i like
    everything
    else about them), and i'm confident that someone here will be
    able to
    answer this question for me.
    thanks!

    ok, well that's good to know! thanks.
    also, i changed my mind about the tech support response.
    here's what he
    said:
    Typically when you are seeing multiple login prompts like
    what you
    describe it has to do with content/site linking.
    Here is a rather wordy explanation:
    When entering a password-protected web site for the first
    time, you
    will occasionally notice that you are asked for your
    password twice.
    This may happen immediately after you entered the password
    the first
    time, or it may happen when you click on the first link
    after
    authenticating the first time.
    This happens for a very simple, but nonetheless confusing,
    reason,
    again having to do with the way that the browser caches the
    login
    information.
    Login information is stored on the browser based on the
    authentication realm, specified by the AuthName directive,
    and by
    the server name. In this way, the browser can distinguish
    between
    the Private authentication realm on one site and on another.
    So, if
    you go to a site using one name for the server, and internal
    links
    on the server refer to that server by a different name, the
    browser
    has no way to know that they are in fact the same server.
    For example, if you were to visit the URL
    http://example.com/private/,
    which required authentication, your
    browser would remember the supplied username and password,
    associated with the hostname example.com. If, by virtue of
    an
    internal redirect, or fully-qualified HTML links in pages,
    you are
    then sent to the URL
    http://www.example.com/private/,
    even though
    this is really exactly the same URL, the browser does not
    know this
    for sure, and is forced to request the authentication
    information
    again, since example.com and www.example.com
    <
    http://www.example.com> are
    not exactly the same hostname. Your
    browser has no particular way to know that these are the
    same web site.
    at first i thought that didn't make any sense because i've
    been using
    the same url every time. but after paying closer attention
    during the
    login process, i see that he's right. i've been typing in the
    url with
    the www, but once you get logged in, there is no www. so i
    tried typing
    it in without the www, and i got right in with the first
    attempt.
    so, i suppose my question now is, can i make it so that
    typing in the
    url with the www, lets you in on the first login attempt? or
    should i
    just tell everyone to leave out the www?
    thanks for the help!
    Alan wrote:
    >
    >> there are two
    >> root directories on the server: public_html and www
    >>
    >
    > Usually, only one of them is a real folder. The other is
    a symbolic link, a
    > shortcut to the other.
    >
    > Don't delete either of them. You might delete the real
    folder instead of the
    > symbolic link. And- in most hosting setups, you wont
    have permissions to
    > delete the folder anyway. Changing the
    ownership/permissions of those
    > folders prevents panicked help ticket calls.
    >
    > You didn't say what the host says is the reason people
    are asked for
    > passwords several times. What did they say?
    >
    > and- is the first page that opens in the password
    section a framed page?
    > Or- does it draw images and other files from deeper
    nested directories? Such
    > an images folder?
    >
    >

Maybe you are looking for

  • Why has windows vista home premium disappeared from my computer

    I have an hp a6511.uk which I have had for 4 years, it came with windows vista home premium, I did download service pack 2 last year. 2 days ago a window appeared on my screen asking me to activate windows as the copy I had was illegal. I duly entere

  • PHP include call used to work, doesn't now, and my ISP blames me...help?

    Hello all, Here's the deal: I have a website, www.website.com which has a sub-domain, subdomain.website.com. I use one CSS file for both sites, the subdomain calls to the main website. Likewise, I pull graphics from the main site that appear on the s

  • Mailbox database admission control by maximum mailboxdatabase size limit

    I would like to have a feature which allowes to set a maximum size limit on a mailboxdatabase. This way we can keep the mailboxdatabases around a certain size. Existing mailboxex within the mailboxdatabase can grow according to their sizing limits bu

  • Call web service from OBI dashboard to show real-time data alongside data from DW

    Hello, OBI = 11.1.1.7.0 We have a requirement to pull in real-time data from an external, secure web service (WS) into an OBI report.  The OBI report also contains data from the data warehouse (DW) along with a calculation that is derived from multip

  • Smartform PO Output

    HI Experts.                From last few days i was wondering for the right answer for this question. I have a PO and in that I have a table. Table is in main window. Below the main, I have couple of windows at bottom of page, displaying company addr