Question regarding backlight and apps. use

Hi Everybody-
O.K., I know this might seam like a stupid question, but I won't know if I do not ask, so here it goes. I purchased a app called "Emergency Radio" from the app store and it works great. My question is that when i purchased it, I could listen for long periods of time and the screen would go dark after my 1 min. as I have it set in my settings and I just let the iPod lay there as I listen. But recently, the light does not go out and I have tried to reset it and re-install the app, but to no avail, so can somebody help me in figuring out what might have happened? I know it might seam minor, but it is eating up battery life pretty fast sine the app. uses a wifi connection constantly.
Thanks for looking and any help you can provide will be very helpful.
Sincerely- Doug

Try just pushing the wake/sleep switch at the top Left of your touch to turn off the screen.

Similar Messages

  • Questions regarding Outlook Web App, Remote Desktop, Remote Web Access and VPN Access

    Hi there,
    I want to ask a series of questions regarding Outlook Web App, Remote Desktop, Remote Web Access and VPN access and was hoping whether you could help me. Below are my questions to ask you.
    Outlook Web App - What do I need to configure in order to get my Exchange account to work with the OWA app on my iPhone? Is Office 360 required on the server that hosts Outlook Web App in our organisation? When I configure the settings and
    connect I get the following message "couldn't connect -  We couldn't connect to the server. Check your information and make sure it's correct." I can connect with other devices using Outlook Web App.
    Remote Desktop - What do I need to configure in order to connect to my computer at work using Remote Desktop on my Windows Phone? When I configure the settings and connect I get the following message "Connection error - We couldn't connect
    to the remote PC. Make sure the PC is turned on and connected to the network, and that remote access is enabled. Inquiring minds may find this error code helpful: 0x204" I can connect with other devices using Remote Desktop. There are currently no
    RD Server settings in the Remote Desktop app on the Windows Phone and the only way I'm to connect to my PC at work is via Remote Desktop and not to be confused with the one by Microsoft, however the app is on a trial basis and times out every 5 minutes and
    can only be used once every hour unless I purchased the app for £2.99 off the App Store but would ideally like to use the Microsoft Remote Desktop app though.
    Remote Web Access - What do I need to configure in order to get Remote Web Access on my Windows Phone using a URL? When I log in using a URL I get the following message "There is a problem with this Web page. Please contact the person who manages
    the server" I can connect with other devices using Remote Web Access. Also how do you enable the background option for Remote Web Access? I know how to do this in Remote Desktop but not in Remote Web Access. Remote Web Access works on PCs regardless
    being onsite and offsite and on my iPhone, the same issue also occurs with my Nokia 5230s regardless of whether I'm using Opera Mobile or Mini or the latest Nokia Browser.
    VPN access - How do you configure VPN access on a Windows Phone using VPN? I cannot find the protocols PPTP, L2TP, SSTP and IPsec in order to configure VPN access on the Windows Phone apart from IKEv2.
    Many thanks,
    RocknRollTim

    Any help would be much appreciated.
    Kind regards,
    RocknRollTim

  • Question regarding roaming and data usage

    I am currently out of my main country of service, and as such I have a question regarding roaming and data usage.
    I am told that the airplane mode is sufficient from keeping the phone off from roaming, but does this apply to any background data usage for applications and such?
    If the phone is in airplane mode, are all use of the phone including wifi and application use through the wifi outside of all extra charges from roaming?

    Ann154 wrote:
    If you are getting charged to use the wifi, then it is possible.  Otherwise no
    Just to elaborate here, Ann154 is referring to access charges for wifi, which is nothing to do with Verizon, so if you are using it in a plane, hotel, an internet cafe etc that charges for Wifi rather than being free .   Verizon does not charge you (or indeed know about!) wifi usage, or any other usage that is not on their cellular network (such as using a foreign SIM for example in global phones)  So these charges, if any, will not show up on the verizon bill app.  Having it in airplane mode prevents all cellular data traffic so you should be fine

  • **question regarding 3G and wif**.

    I have a question regarding 3G and wifi. I have #G activated as well as wifi, when I go to retrieve mail for example I get a pop up asking me if I want to connect to a wifi network…should I have wifi and 3G activated at the same time, and why am I getting the pop up…
    Thanks

    You can have them on at the same time, but they will not be used at the same time for data. The order of preference for data is WiFi > 3G > EDGE > GPRS. You're getting the pop up, most likely, because you have Settings > Wi-Fi > Ask to Join Networks set to ON. You can set that to OFF, and the iPhone will still join known (i.e. previously used) WiFi networks automatically.

  • Question regarding MM and FI integration

    Hi Experts
    I have a question regarding MM and FI integration
    Is the transaction Key in OMJJ is same as OBYC transaction key?
    If yes, then why canu2019t I see transaction Key BSX in Movement type 101?
    Thanks

    No, they are not the same.  The movement type transaction (OMJJ) links the account key and account modifier to a specific movement types.  Transaction code (OBYC) contains the account assignments for all material document postings, whether they are movement type dependent or not.  Account key BSX is not movement type dependent.  Instead, BSX is dependent on the valuation class of the material, so it won't show in OMJJ.
    thanks,

  • Question regarding Dashboard and column prompt

    My question regarding Dashboard and column prompt:
    1) Dashboard prompt usually work with only for columns which are in subject area. In my report I've created some of the columns which are based on other columns. Like I've daysNumber column that is based on two other columns, as it calculates the difference of two dates. When I create dashboard prompt I can't find this column there. I need to make a prompt on this column.
    2)For one of the column I've only two values 1 and 0. When I create prompt for this column, is it possible that in drop down list It shows 'Yes' for 1 and 'No' for 0 and still filter the request??

    Hi Toony,...
    I think there was another way of doing this...
    In the dashboard prompt go to Show option > select SQL Results from dropdown.
    There you need to write your Logical SQL like...
    SELECT CASE WHEN 1=0 THEN PERIODS.YEAR ELSE difference of date functionality END FROM SubjectAreaName
    Here.. Periods.Year is the column which is already exists in repository's presentation layer..
    and difference of date functionality is the code or formula of column which you want to show in drop-down...
    Also write the CASE WHEN 1=0 THEN PERIODS.YEAR ELSE difference of date functionality END code in fx of that prompt.
    I think it helps you in doing this..
    Just check and inform me if it works...
    Thanks & Regards
    Kishore Guggilla
    Edited by: Kishore Guggilla on Oct 31, 2008 9:35 AM

  • HT3819 Can 2 apple ID's share music and apps using the HOME SHARING?

    Can 2 Different Apple ID's within the same household share music and apps using the "Home Sharing"?  Or should we continue to just use 1 Apple ID?

    Understanding Home Sharing
    How to use multiple iPods, iPads, or iPhones with one computer
    How to use multiple Apple ID's with one computer and iTunes | iMore.com

  • Question regarding encryption and decryption

    Hi all,
    I am doing a authentication project. In which I do encryption and decryption (AES 128 bit) in two different methods. At the time of encryption (for eg a text file ), I store the key in dat file (key.dat). And at the time of decryption, I read the key.dat and extract the key and do the decryption. This works fine. No problem with that.
    But the problem is, that the client requires that
    "No encryption keys will be written to the hard drive."
    I have to store the key somewhere to decrypt the encrypted file. Right. Without storing the key, I cannot decrypt.
    The question is (though its a foolish question) with out storing the key, can i encrypt and decrypt (in two different methods) the text file ?
    Thank You.
    Regards,
    Jay

    Hi Grant,
    Thanks for the reply. ( I am the one whom you helped to solve the encryption and decryption problem using AES )
    I will give you an overview of my project. Its an Two Factor Authentication using an USB Flash Drive.
    Admin Side : ( currently developing this part )
    Through an CPP executable file ( writen by John Hyde USB By Example author), I retrive the Manufature ID, Product ID and Serial number of the USB Flash Drive from a text file which is generated when the executable file is executed.
    From my Java application, i retrive the Manufature ID, Product ID and Serial number.The admin (through an dialog box ) enters an usernam and password . All this information ( Manufature ID, Product ID, Serial number , username and password ) using AES 128 bit encryption i write these information to encrypted file in the USB Flash drive along with the the encryption key used at the time of decryption.
    User Side: ( not yet devleoped )
    When the user plugs in the USB Flash drive, an dialog box is shown where the user enters the username and password ( assigned earlier by the admin). This username and password is checked along with the Manufature ID, Product ID and Serial number encrypted earlier and stored in the USB Flash drive. If username password ,Manufature ID, Product ID and Serial number (retrieved again by exectuing the CPP excutable file ) are correct the user is granted access.
    Whats your suggestion reagrading of storing the encryption key? I have to store the key in the USB Flash drive along with the encrypted file. But then wont an intruder (for eg ) if he gets the key and decrypt the file ?
    Client has mentioned to use AES 128 Bit encryption.
    Thank You.
    Regards,
    Jay.

  • Question regarding homehub and Open reach router -...

    Hi all,
      I had infinity installed earlier this month and am happy with it so far. I do have a few questions regarding the service and hardware though.
      I run both my BT openreach router and BT Home hub from the same power socket. The problem is, if I turn the plug on so both the Homehub and Openreach Router start up at the same time, the home hub will never get an Internet connection from the router. To solve this I have to turn the BT home hub on first and leave it for a minute, then start the router up and it all works fine. I'm just curious if this is the norm or do I have some faulty hardware?
      Secondly, I appreciate the estimated speed BT quote isn't always accurate, I was quoted 49mbits down but received 38mbits down - Which I was happy with. Recently though it has dropped to 30. I am worried this might continue to drop over time. and as of present I am 20mbits down on the estimate . For the record 30mbits is actually fine and probably more than I would ever need. If I could boost it some how though I would be interested to hear from you.
    Thanks, .

    Just a clarification: the two boxes are the HomeHub (router, black) and the modem (white).  The HomeHub has its own power switch, the modem doesn't.
    There is something wrong if the HomeHub needs to be turned on before the modem.  As others have said, in general best to leave the modem on all the time.  You should be able to connect them up in any order, or together.  (For example, I recently tripped the mains cutout, and when I restored power the modem and HomeHub went on together and everything was ok).
    Check if the router can connect/disconnect from the broadband using the web interface.  Leaving the modem and HomeHub on all the time, go to http://192.168.1.254/ on a browser on a connected computer, and see whether the Connect/Disconnect button works.

  • Question regarding IWDTree and context Value Node naming

    Hi,
    I have a question regarding the IWDTree / IWDTreeNodeType components.
    I have a context looking like this:
    Context
      + ResponseNode
        + PersonNode (1..1)
          + PersonAddressNode                    (empty node, placeholder)
          | + AdresNode (0..n)
          + PersonChildNode                      (empty node, placeholder)
          | + PersonNode (0..n)
          |   + PersonAddressNode                (empty node, placeholder)
          |     + AddressNode (0..n)
          + PersonParentsNode                    (empty node, placeholder)
            + PersonNode (0..n)
              + PersonAddressNode                (empty node, placeholder)
                + AddressNode (0..n)
    The context represents a person, a person's address, and a person's children and parents with their respective addresses.
    As a result, on different branches, a PersonNode and AddressNode can appear.
    And for some strange reason, all PersonNodes and AddressNodes link to the same ResponseNode.PersonNode.PersonParentsNode.PersonNode and ResponseNode.PersonNode.PersonParentsNode.PersonNode.PersonAddressNode.AddressNode respectively, irregardless of their branch...
    Is it illegal to have multiple PersonNode and AddressNode node names, and should they be named uniquely?

    Generally, node names need to be unique inside the context, attributes in different nodes can have same names. I wonder if the context structure you described will result in code without compile errors.
    The WD Tree can only be used with recursive context nodes or with a hierarchy of non-singleton child nodes.
    Can you give an example how your tree should look like at runtime?

  • Question regarding filevault and a honeypot account

    I am running osx lion.  I would like to secure my machine, and that includes basics like good passwords and turning on a firmware password.  But I would also like to encrypt the contents of the hard drive.  Filevault to the rescue it would seem.
    But I also have one more requirement.
    Since a lot of my equipment was stolen last year I have installed prey on all of my new computers (www.preyproject.com).  This allows me to track my machines and potentially get them recovered should they go missing.  Prey is useless unless there is a user logged in and so I have created a honeypot account that is minimally protected (i.e. the password is the user name and the password hint explicitly tells you what the password is).  This account has parental controls on it to limit the applications that can be run (only web browser, some games, and skype).  The idea is that a dumb thief steals my computer, finds it easy to log into the honeypot account, and then uses that with their facebook or whatever because getting past the open firmware settings and the individual "real" account passwords is too hard.
    That said, having this software is no guarantee that I will be able to recover my machine, so I want my data encrypted.
    Here is my question:
    Does the fact that I have to add this simple password for the honeypot account to use the computer (aka open a filevault drive) invalidate my filevault protection?  I.e. will this simple password allow them to unencrypt the entire drive, even though I have other accounts with stronger passwords?

    The guest account might be just good enough...  I'll give it a try.  Thanks.  Prey seems to work pretty well for me but it has also been touchy in the past.  I will have to check it carefully with the guest account to ensure it has the permissions needed to use the webcam and send email and such.
    I'm still interested in knowing how filevault encryption works.  Does it allow any of the passwords to unencrypt the whole drive, or does it require a unique password per account to unencrypt the data in that account?
    Edit:  Just saw the repy by Linc Davis
    "If everything worked perfectly, the account would only have access to the files in its home folder. But is there an unknown exploit that enables a local user to gain elevated privileges? Such exploits have been found in the past, and may be found in the future."
    That clears it up for me a bit.  And it makes sense.  I will see if I can make do with the guest account.
    That said, I actually value the computer hardware - though not as much as the data.  I already back the data up which is the first step.  Preventing others from accessing it is my next priority, but there is nothing that is THAT critical.  I can change all my passwords quickly (and I don't use anything like 1password).  I have tax returns on the drive, but they are also password protected.
    My primary goal is to keep the average and even slightly above average user from getting to my data (including yanking the drive and putting it into another machine or booting from a CD).  As I said, I hope the guest account will be adequate for my honeypot needs.
    Also @Linc,
    I accidentally clicked on "Helpful" instead of "Answered" on your post.  Post a reply and I will do it right this time.  Thanks.
    Message was edited by: Bernhard VonZastrow1

  • Question regarding NAT and directed-mode

    Hello,
    I have two WAE 574 devices and a CM 274 all running code level 4.3.1.6, The CM is behind a PIX firewall. There is no firewall between the branch and core WAE. The branch device is behind a NAT router. The CM and SSL ASA rea behind a PIX 515 firewall. The branch WAE is running inline mode and the core WAE is using WCCP redirection. Both the CM and SSL ASA are reverse NATted on the PIX firewall. The branch WAE has the primary interface unchecked on the CM and is using the NAT address.
    I am getting asymmetric route issues. This is because for some reason the NAT address of the branch WAE sends the SYN which is responded to but the ACK is coming from the unnatted private address. When I turn off directed mode I can see optimisation start for some sessions but not for the SSL
    ASA.
    Example
    Branch WAE Private 192.68.1.45
    Branch WAE Public 206.99.88.10
    CM private 192.168.20.9
    CM public 240.10.10.20
    PIX log
    an 15 2012 11:50:58: %PIX-6-106015: Deny TCP (no connection) from 192.68.1.45/46871 to 240.10.10.20/443 flags PSH ACK on interfe
    Although the PIX NATs the CM address, the core WAE is still still seeing it's private address.
    Do you have any idea what could be causing this ?
    Best regards
    Stephen
    Jan 15 2012 11:51:12: %PIX-5-106100: access-list DMZ_access_in denied tcp DMZ/192.168.20.9(443) -> outside/206.99.88.10(46871) hit-cnt 1 f]
    Jan 15 2012 11:51:31: %PIX-6-106015: Deny TCP (no connection) from 192.68.1.45/46871 to 240.10.10.20/443 flags PSH ACK on interfe
    Jan 15 2012 11:51:37: %PIX-6-106015: Deny TCP (no connection) from 192.68.1.45/46847 to 240.10.10.20/443 flags PSH ACK on interfe
    Jan 15 2012 11:52:08: %PIX-6-106015: Deny TCP (no connection) from 192.68.1.45/49634 to 240.10.10.20/443 flags PSH ACK on interfe
    Jan 15 2012 11:52:10: %PIX-5-106100: access-list outside_access_in permitted tcp outside/206.99.88.10(23183) -> DMZ/240.10.10.20(443) ]
    Jan 15 2012 11:52:10: %PIX-6-302013: Built inbound TCP connection 1475554768 for outside:206.99.88.10/23183 (206.99.88.10/23183) to DMZ:WAD)
    Jan 15 2012 11:52:10: %PIX-6-106015: Deny TCP (no connection) from 192.68.1.45/23183 to 240.10.10.20/443 flags ACK on interface e

    Hi Stephen,
    To troubleshoot this further, we would need to get a topology diagram of your network, as well as the configurations from all devices, so it would probably be better if you open a TAC service request.
    Regards
    Daniel

  • Question regarding bleeding and facing pages.

    Hello,
    i'm in trouble with my first InDesign document which is a 96 pages Magazine. It will be printed on A3 sheets stapled in the middle. My printing guy said that it's ok as A4 pages with 3mm bleed.
    So now when i'm trying to export as a printed pdf (i check mark that i want to use the documents bleeding settings) it exports with sections from left and right depending on the pages (the left page exports with ?? i guess 3 mm ?? bleed from the right page and so on). If i override the bleeding settings and i set it to 0mm it all ok but i fear that some pictures or text might get cut off since i have all planned with the bleed markers in indesign.
    And i can't uncheck the facing pages since i have some graphics (charts and so on) that spread from one page to another (on same spread).
    My question is ... is there anything i can do and still use bleeds or (ignore "inside bleeds" or something) or is it ok to use the export as spreadsheet instead of individual pages since he wanted A4 pages?
    Any help for a newbie would be appreciated. Thank you.

    You should ask the printers to use PUR (polyurethane reactive) Bind when making a perfect bound book - that's a much stronger glue than EVA. It won't even break apart or fall apart going from freezing cold (out in the car over night) to being warmed up, which happens with EVA binding. But the PUR bind seems to be a lot more popular and stronger.
    Failing that, getting the book threadsewn also helps to keep pages together. If you have a large print run and need these to last, then I suggest perfect binding them with a threadsewn finish.
    I've definitely seen and done 96pp saddle stitched (well personally I have imposed, printed and delivered these). You might have to sacrafice a drop in weight on the body text. It can get ugly, but it's definitely doable.
    My suggestion here would be to ask the printers for a similiar 96pp saddle stitch sample that they've done before, to make sure you're happy with it.
    In fact, you can ask them to send you out a dummy (a blank version of the book trimmed and folded) to make sure you're happy with it.
    It really is disppointing to get a printed job back from the printers and you discover you are not happy with the binding method.

  • Question Regarding MIDI and Sample Accuracy

    Hi,
    I have 2 questions regarding MIDI.
    1. MIDI is moved by ticks. In the arrange window however, you can move a region by samples. When doing this, you can move within values of the ticks (which you can see on your position box that pops up) Now, will this MIDI note actually be played back at that specific sample point, or will it round the event to the closest tick? (example, if I have a MIDI note directly on 1.1.1.1, and I move the REGION in the arrange... will that MIDI note now fall on the sample that I have moved the region to, or will it be rounded to the closest tick?)
    2. When making a midi template from an audio region, will the MIDI information land exactly on the sample of the transient, or will it be rounded to the closest tick?
    I've looked through the manual, and couldn't find any specific answer to these questions.
    Thanks!
    Message was edited by: Matthew Usnick

    Ok, I've done some experimenting, and here are my results.
    I believe those numbers ARE samples. I came to this conclusion by counting (for some reason it starts on 11) and cutting a region to be 33 samples long (so, minus 11, is 22 actual samples). I then went to the Audio Bin window, and chose to view region length as samples. And there it said it: 22 samples. So, you can in fact move MIDI regions by samples!
    Second, I wanted to see if the MIDI notes in the region itself would be quantized to the nearest tick. I cut a piece of audio, so it had a 1 sample attack (zoomed in asa far as I could in the sample editor, selected the smallest portion, and faded in, and made the start point, the region start position). I saved the region as a new audio file, and loaded it up in the exs sampler.
    I then made a MIDI region, with and triggered the sample on beat 1 (quantized, on the money). I then went into the arrange window, made a fixed cycle length, and bounced the audio. I then moved the MIDI region by one sample to the right. I did this 22 times (which is the number of samples in a tick, at 120, apparently). After bouncing all of these (cycle position remained fixed, only the MIDI region was moving) I imported all the audio into the arrange on new tracks, and YES!!! The sample start was cascaded by a sample each time!
    SO.
    Not only can you move MIDI regions by sample, but the positions are NOT quantized to Logics ticks!
    This is very good news, and glad I worked this out!
    (if anyone thinks this sounds wrong, please correct me, but I'm pretty sure I proved it, in my test)
    Message was edited by: Matthew Usnick

  • Question regarding G510 and switchable graphic cards

    So as I have mentioned in another post, my machine is the G510 with i5 cpu, 4 gigs of ram, HD4500 integrated video card and 2GB HD8570M dedicated video card.
    My question is the following> Ok, the whole switchable thing is nice and all, but I'm having some issues with games recognizing my dedicated card, even if I put them on high performance through the switchable program by AMD. Is there a way to deactivate the integrated card once and for all and only use the dedicated one? What I have done right now is simply uninstall the intel graphics drivers, and disable the integrated device from the device manager. I have currently installed the AMD drivers from the AMD website and am about to restart my pc to see if it is working. If not, please feel free to give me any advice on how to do this or feel free to give me an answer to my question.

    cat /sys/kernel/debug/vgaswitcheroo/switch should tell you wich one is powered. Do not forget to restart X whenever you switch cards.

Maybe you are looking for

  • Replication Error with Vendor Master Records

    Hello, We are trying to replicate vendor master records from R/3 to SRM via BBPGETVD.  When we go to SLG1, there is an error stating Business Partner XXXX: Invalid Value 0003 for field Authorization Group. Currently, the AP dept. maintains the field

  • Acrobat 9 pro that came with cs5?!?!

    Hi i have acrobat 9 pro and after getting my key from adobe i have tried a few times to instal the software but nothing happens it accepted my key once but never installs acrobat 9 pro,  nothing happens, what im i doing wrong if anything or what do i

  • Openbox Print Screen keybind Won't work

    In .config/openbox/rc.xml i've got: <!-- Screenshot --> <keybind key="Print"> <action name="Execute"> <command>scrot -q 100 -e 'mv $f ~/Screenshots/'</command> </action> </keybind> Nothing happens when i press the Print Screen key.I checked with Xev

  • Custom webauth settings in between Anchor & Foreign

    Hi techies, We have implemented a new wireless mobility guest SSID in between the anchor and multiple foreign controllers. We are using a custom webauth page, written by the customer, which was working great. Since we've upgraded to 7.2.115.2, we rec

  • HT4897 What if there is no "delete alias" option under the accounts I want to remove?

    HELP! The aliases that were atomaticatly set up were for my old employer, and I do not want his business assosiated with me anymore! How do I remove those aliases from my account, when there is no "delete alias" option on them? There is under the two