[SOLVED] system no longer knows about xfs filesystems?!?

last Monday (11/14/2011) my system was able to mount an external drive with an xfs filesystem on it.
as of today (11/21/2011) it no longer recognizes xfs:
% mount <my_dir>
mount: unknown filesystem type 'xfs'
does anyone else have this problem?  i searched and didn't see anything in the forums.
Last edited by djg1971 (2011-11-21 22:24:52)

graysky:  thanks for responding. 
yes, xfsprogs is installed (xfsprogs 3.1.7-1 to be exact).
dmesg only says that it sees the disk just fine:
[14795.651276] usb 2-2: USB disconnect, device number 2
[14795.653229] sd 5:0:0:0: [sdb] Synchronizing SCSI cache
[14795.653264] sd 5:0:0:0: [sdb]  Result: hostbyte=0x01 driverbyte=0x00
[19343.468136] usb 2-2: new high speed USB device number 5 using ehci_hcd
[19343.609541] scsi6 : usb-storage 2-2:1.0
[19343.615795] input: LaCie d2 quadra (button) as /devices/pci0000:00/0000:00:1d.7/usb2/2-2/2-2:1.1/input/input13
[19343.615989] generic-usb 0003:059F:1014.0003: input,hidraw0: USB HID v1.11 Device [LaCie d2 quadra (button)] on usb-0
000:00:1d.7-2/input1
[19344.610282] scsi 6:0:0:0: Direct-Access     LaCie    d2 quadra             PQ: 0 ANSI: 4
[19344.612000] sd 6:0:0:0: [sdb] 3907029168 512-byte logical blocks: (2.00 TB/1.81 TiB)
[19344.612894] sd 6:0:0:0: [sdb] Write Protect is off
[19344.612897] sd 6:0:0:0: [sdb] Mode Sense: 10 00 00 00
[19344.613910] sd 6:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
[19344.618146]  sdb: sdb1
[19344.627243] sd 6:0:0:0: [sdb] Attached SCSI disk
but I cannot mount it.  when i try i get the error that xfs is an unknown file system type.
and no, there is nothing in errors.log or anyplace else i've checked.
it seems weird to me too...
Last edited by djg1971 (2011-11-21 21:13:09)

Similar Messages

  • Does anybody knows about ios filesystem and Lingo?

    I've developped an app with Adobe Director 11.5 that uses files with Lingo:
    gFile= "@/myfile.xml"
    gNetId = postNetText(gFile)
    or
    gFile= "http://myserver/myfile.xml"
    gNetId = getNetText(gFile)
    Now when I've converted it to Adobe Director 12 iOS app, it crashes just at the beginning and I get message:
    Media not ready -2147218474
    Does anybody know how could I debug the execution???

    http://developer.apple.com/library/mac/#documentation/FileManagement/Conceptual/FileSystem ProgrammingGUide/FileSystemOverview/FileSystemOverview.html
    files & data you want the user to have access to should be saved to "/Documents/"
    anything else should be saved to "/Library/"

  • Know about Project system

    Hi, I am basically HR functional consultant. I would like to know about Project systems. Is project systems is for managing the projects like what we do in Microsoft project and primavera.
    Could any one give me clear idea about project systems and guide me how the beginner can learn about project system.
    Please don't hesitate about my question. I am completely new this topic.
    I will appreciate you response.
    Many thanks
    santhi

    Hi,
    Pls check things like http://www.sap-img.com/sap-ps.htm
    Eddy
    PS. Which type of SDN Ubergeek/BPX suit are <a href="/people/eddy.declercq/blog/2007/05/14/which-type-of-sdn-ubergeekbpx-suit-are-you">you</a>?
    Deadline: June 15th

  • I am getting messages that I can't download and read .pdf files since I have the wrong Adobe reader. I know about their security disasters of course, but I downloaded the latest version of Adobe Reader from the Adobe web site and I have other ,pdf file re

    I am getting messages that I can't download and read .pdf files since I have the wrong Adobe reader. I know about their security disasters of course, but I downloaded the latest version of Adobe Reader from the Adobe web site and I have other ,pdf file readers as well, and for some reason they won't work either. I have 5 computers running top end processors and RAM. By this I mean I have one, this one which I am using that has an AMD Phenom Black 3.2 Quad-core with 8 GBs of Corsair top DDR2 RAM, my other two AMD have either an Athlon II triple core with 4 GBs of DDR2 Corsair RAM, one with the Phenom X4 965 3.4 GHz Quad-core with 8 GBs of their best DDR2 RAM, and two Intels with the i7 920 Processors using the triple channel 1366 socket processors and one with 8 GBs of low latency DDR3 RAM and the other with 4 GBs of the same RAM. I am getting the message on this one, which has a fresh install of XP Pro X64 operating system, as do the other 4 as well. I have run Avast Business Pro Anti-virus on this one, which I am getting the message on with a single result which I deleted, and also both Spybot Search and Destroy, which came back clean as well as Malwarebytes Antimalware, which got a lot of tracing cookies now removed, and SuperAntiSpware which also found a few cookies also now deleted. Can you tell me what I need to do to get these files to show as .pdf files rather than as a clean blank page. One other issue is that I wish to know how to turn off my downloads so they are saved and Mozilla will give me the option of returning them instead of me losing them all together as it does now. Thanks for your assistance. If there is another Adobe reader I should download and install, could you provide me with the link to it? I appreciate your assistance here
    == When I download and try to read a .pdf file and when I am asked to turn off all Firefox files and if I do, I lose them since I need to know how to save them without rebooting my computer.

    Brilliant! Problem solved! Thanks so much.

  • What every developer should know about character encoding

    This was originally posted (with better formatting) at Moderator edit: link removed/what-every-developer-should-know-about-character-encoding.html. I'm posting because lots of people trip over this.
    If you write code that touches a text file, you probably need this.
    Lets start off with two key items
    1.Unicode does not solve this issue for us (yet).
    2.Every text file is encoded. There is no such thing as an unencoded file or a "general" encoding.
    And lets add a codacil to this – most Americans can get by without having to take this in to account – most of the time. Because the characters for the first 127 bytes in the vast majority of encoding schemes map to the same set of characters (more accurately called glyphs). And because we only use A-Z without any other characters, accents, etc. – we're good to go. But the second you use those same assumptions in an HTML or XML file that has characters outside the first 127 – then the trouble starts.
    The computer industry started with diskspace and memory at a premium. Anyone who suggested using 2 bytes for each character instead of one would have been laughed at. In fact we're lucky that the byte worked best as 8 bits or we might have had fewer than 256 bits for each character. There of course were numerous charactersets (or codepages) developed early on. But we ended up with most everyone using a standard set of codepages where the first 127 bytes were identical on all and the second were unique to each set. There were sets for America/Western Europe, Central Europe, Russia, etc.
    And then for Asia, because 256 characters were not enough, some of the range 128 – 255 had what was called DBCS (double byte character sets). For each value of a first byte (in these higher ranges), the second byte then identified one of 256 characters. This gave a total of 128 * 256 additional characters. It was a hack, but it kept memory use to a minimum. Chinese, Japanese, and Korean each have their own DBCS codepage.
    And for awhile this worked well. Operating systems, applications, etc. mostly were set to use a specified code page. But then the internet came along. A website in America using an XML file from Greece to display data to a user browsing in Russia, where each is entering data based on their country – that broke the paradigm.
    Fast forward to today. The two file formats where we can explain this the best, and where everyone trips over it, is HTML and XML. Every HTML and XML file can optionally have the character encoding set in it's header metadata. If it's not set, then most programs assume it is UTF-8, but that is not a standard and not universally followed. If the encoding is not specified and the program reading the file guess wrong – the file will be misread.
    Point 1 – Never treat specifying the encoding as optional when writing a file. Always write it to the file. Always. Even if you are willing to swear that the file will never have characters out of the range 1 – 127.
    Now lets' look at UTF-8 because as the standard and the way it works, it gets people into a lot of trouble. UTF-8 was popular for two reasons. First it matched the standard codepages for the first 127 characters and so most existing HTML and XML would match it. Second, it was designed to use as few bytes as possible which mattered a lot back when it was designed and many people were still using dial-up modems.
    UTF-8 borrowed from the DBCS designs from the Asian codepages. The first 128 bytes are all single byte representations of characters. Then for the next most common set, it uses a block in the second 128 bytes to be a double byte sequence giving us more characters. But wait, there's more. For the less common there's a first byte which leads to a sersies of second bytes. Those then each lead to a third byte and those three bytes define the character. This goes up to 6 byte sequences. Using the MBCS (multi-byte character set) you can write the equivilent of every unicode character. And assuming what you are writing is not a list of seldom used Chinese characters, do it in fewer bytes.
    But here is what everyone trips over – they have an HTML or XML file, it works fine, and they open it up in a text editor. They then add a character that in their text editor, using the codepage for their region, insert a character like ß and save the file. Of course it must be correct – their text editor shows it correctly. But feed it to any program that reads according to the encoding and that is now the first character fo a 2 byte sequence. You either get a different character or if the second byte is not a legal value for that first byte – an error.
    Point 2 – Always create HTML and XML in a program that writes it out correctly using the encode. If you must create with a text editor, then view the final file in a browser.
    Now, what about when the code you are writing will read or write a file? We are not talking binary/data files where you write it out in your own format, but files that are considered text files. Java, .NET, etc all have character encoders. The purpose of these encoders is to translate between a sequence of bytes (the file) and the characters they represent. Lets take what is actually a very difficlut example – your source code, be it C#, Java, etc. These are still by and large "plain old text files" with no encoding hints. So how do programs handle them? Many assume they use the local code page. Many others assume that all characters will be in the range 0 – 127 and will choke on anything else.
    Here's a key point about these text files – every program is still using an encoding. It may not be setting it in code, but by definition an encoding is being used.
    Point 3 – Always set the encoding when you read and write text files. Not just for HTML & XML, but even for files like source code. It's fine if you set it to use the default codepage, but set the encoding.
    Point 4 – Use the most complete encoder possible. You can write your own XML as a text file encoded for UTF-8. But if you write it using an XML encoder, then it will include the encoding in the meta data and you can't get it wrong. (it also adds the endian preamble to the file.)
    Ok, you're reading & writing files correctly but what about inside your code. What there? This is where it's easy – unicode. That's what those encoders created in the Java & .NET runtime are designed to do. You read in and get unicode. You write unicode and get an encoded file. That's why the char type is 16 bits and is a unique core type that is for characters. This you probably have right because languages today don't give you much choice in the matter.
    Point 5 – (For developers on languages that have been around awhile) – Always use unicode internally. In C++ this is called wide chars (or something similar). Don't get clever to save a couple of bytes, memory is cheap and you have more important things to do.
    Wrapping it up
    I think there are two key items to keep in mind here. First, make sure you are taking the encoding in to account on text files. Second, this is actually all very easy and straightforward. People rarely screw up how to use an encoding, it's when they ignore the issue that they get in to trouble.
    Edited by: Darryl Burke -- link removed

    DavidThi808 wrote:
    This was originally posted (with better formatting) at Moderator edit: link removed/what-every-developer-should-know-about-character-encoding.html. I'm posting because lots of people trip over this.
    If you write code that touches a text file, you probably need this.
    Lets start off with two key items
    1.Unicode does not solve this issue for us (yet).
    2.Every text file is encoded. There is no such thing as an unencoded file or a "general" encoding.
    And lets add a codacil to this – most Americans can get by without having to take this in to account – most of the time. Because the characters for the first 127 bytes in the vast majority of encoding schemes map to the same set of characters (more accurately called glyphs). And because we only use A-Z without any other characters, accents, etc. – we're good to go. But the second you use those same assumptions in an HTML or XML file that has characters outside the first 127 – then the trouble starts. Pretty sure most Americans do not use character sets that only have a range of 0-127. I don't think I have every used a desktop OS that did. I might have used some big iron boxes before that but at that time I wasn't even aware that character sets existed.
    They might only use that range but that is a different issue, especially since that range is exactly the same as the UTF8 character set anyways.
    >
    The computer industry started with diskspace and memory at a premium. Anyone who suggested using 2 bytes for each character instead of one would have been laughed at. In fact we're lucky that the byte worked best as 8 bits or we might have had fewer than 256 bits for each character. There of course were numerous charactersets (or codepages) developed early on. But we ended up with most everyone using a standard set of codepages where the first 127 bytes were identical on all and the second were unique to each set. There were sets for America/Western Europe, Central Europe, Russia, etc.
    And then for Asia, because 256 characters were not enough, some of the range 128 – 255 had what was called DBCS (double byte character sets). For each value of a first byte (in these higher ranges), the second byte then identified one of 256 characters. This gave a total of 128 * 256 additional characters. It was a hack, but it kept memory use to a minimum. Chinese, Japanese, and Korean each have their own DBCS codepage.
    And for awhile this worked well. Operating systems, applications, etc. mostly were set to use a specified code page. But then the internet came along. A website in America using an XML file from Greece to display data to a user browsing in Russia, where each is entering data based on their country – that broke the paradigm.
    The above is only true for small volume sets. If I am targeting a processing rate of 2000 txns/sec with a requirement to hold data active for seven years then a column with a size of 8 bytes is significantly different than one with 16 bytes.
    Fast forward to today. The two file formats where we can explain this the best, and where everyone trips over it, is HTML and XML. Every HTML and XML file can optionally have the character encoding set in it's header metadata. If it's not set, then most programs assume it is UTF-8, but that is not a standard and not universally followed. If the encoding is not specified and the program reading the file guess wrong – the file will be misread.
    The above is out of place. It would be best to address this as part of Point 1.
    Point 1 – Never treat specifying the encoding as optional when writing a file. Always write it to the file. Always. Even if you are willing to swear that the file will never have characters out of the range 1 – 127.
    Now lets' look at UTF-8 because as the standard and the way it works, it gets people into a lot of trouble. UTF-8 was popular for two reasons. First it matched the standard codepages for the first 127 characters and so most existing HTML and XML would match it. Second, it was designed to use as few bytes as possible which mattered a lot back when it was designed and many people were still using dial-up modems.
    UTF-8 borrowed from the DBCS designs from the Asian codepages. The first 128 bytes are all single byte representations of characters. Then for the next most common set, it uses a block in the second 128 bytes to be a double byte sequence giving us more characters. But wait, there's more. For the less common there's a first byte which leads to a sersies of second bytes. Those then each lead to a third byte and those three bytes define the character. This goes up to 6 byte sequences. Using the MBCS (multi-byte character set) you can write the equivilent of every unicode character. And assuming what you are writing is not a list of seldom used Chinese characters, do it in fewer bytes.
    The first part of that paragraph is odd. The first 128 characters of unicode, all unicode, is based on ASCII. The representational format of UTF8 is required to implement unicode, thus it must represent those characters. It uses the idiom supported by variable width encodings to do that.
    But here is what everyone trips over – they have an HTML or XML file, it works fine, and they open it up in a text editor. They then add a character that in their text editor, using the codepage for their region, insert a character like ß and save the file. Of course it must be correct – their text editor shows it correctly. But feed it to any program that reads according to the encoding and that is now the first character fo a 2 byte sequence. You either get a different character or if the second byte is not a legal value for that first byte – an error.
    Not sure what you are saying here. If a file is supposed to be in one encoding and you insert invalid characters into it then it invalid. End of story. It has nothing to do with html/xml.
    Point 2 – Always create HTML and XML in a program that writes it out correctly using the encode. If you must create with a text editor, then view the final file in a browser.
    The browser still needs to support the encoding.
    Now, what about when the code you are writing will read or write a file? We are not talking binary/data files where you write it out in your own format, but files that are considered text files. Java, .NET, etc all have character encoders. The purpose of these encoders is to translate between a sequence of bytes (the file) and the characters they represent. Lets take what is actually a very difficlut example – your source code, be it C#, Java, etc. These are still by and large "plain old text files" with no encoding hints. So how do programs handle them? Many assume they use the local code page. Many others assume that all characters will be in the range 0 – 127 and will choke on anything else.
    I know java files have a default encoding - the specification defines it. And I am certain C# does as well.
    Point 3 – Always set the encoding when you read and write text files. Not just for HTML & XML, but even for files like source code. It's fine if you set it to use the default codepage, but set the encoding.
    It is important to define it. Whether you set it is another matter.
    Point 4 – Use the most complete encoder possible. You can write your own XML as a text file encoded for UTF-8. But if you write it using an XML encoder, then it will include the encoding in the meta data and you can't get it wrong. (it also adds the endian preamble to the file.)
    Ok, you're reading & writing files correctly but what about inside your code. What there? This is where it's easy – unicode. That's what those encoders created in the Java & .NET runtime are designed to do. You read in and get unicode. You write unicode and get an encoded file. That's why the char type is 16 bits and is a unique core type that is for characters. This you probably have right because languages today don't give you much choice in the matter.
    Unicode character escapes are replaced prior to actual code compilation. Thus it is possible to create strings in java with escaped unicode characters which will fail to compile.
    Point 5 – (For developers on languages that have been around awhile) – Always use unicode internally. In C++ this is called wide chars (or something similar). Don't get clever to save a couple of bytes, memory is cheap and you have more important things to do.
    No. A developer should understand the problem domain represented by the requirements and the business and create solutions that appropriate to that. Thus there is absolutely no point for someone that is creating an inventory system for a stand alone store to craft a solution that supports multiple languages.
    And another example is with high volume systems moving/storing bytes is relevant. As such one must carefully consider each text element as to whether it is customer consumable or internally consumable. Saving bytes in such cases will impact the total load of the system. In such systems incremental savings impact operating costs and marketing advantage with speed.

  • FAQ: I already have a Revel account. What do I need to do? What do I need to know about this?

    Q: I already have a Revel account. What do I need to do? What do I need to know about this?
    A: If your Revel account uses the same Adobe ID as your Photoshop.com account, your JPEGs will be moved there. Otherwise, a new Revel account will be set up for you using the same Adobe ID you use with your Photoshop.com account.
    Revel accounts can be merged manually. Use the Adobe Media Downloader to download all of the JPEG photos from your Photoshop.com library and then upload those photos to your existing Revel account.
    Click here to archive your Photoshop.com library so you do not lose any files.
    You will be asked to download an Adobe Air application called Media Downloader

    Your .mac Mail account will continue to operate normally as long as you access the account from the Mac's Mail program. Read this:
    What if I just want to keep using my email on all my devices?
    As of May 1, you can choose to keep using your mail after MobileMe ends, even on devices that don’t meet the iCloud system requirements. Just go to me.com/move and select the option to keep using your email after MobileMe ends. Once you have completed this short process, your mail will continue to work on devices that don’t meet the iCloud requirements after MobileMe ends on June 30th, 2012.
    iCloud is a collection of features that allows you to sync Safari bookmarks, Calendar items, Contacts, and iWork documents (Pages, Numbers) among multiple devices, among other things. Your photos in iPhoto will not be affected.
    iCloud is most valuable for people with iOS devices and Macs and requires OS X 10.7 "Lion".
    Here is some more information: http://www.apple.com/mobileme/transition.html

  • Want to know about maccleaner what is this

    hi may i know about maccleaner

    Is it going to damage my mac?
    Maybe. That depends on what you did with it. You would have to describe the problem, if you have one.
    i am unable to delete it.
    Any third-party software that doesn't install by drag-and-drop into the Applications folder, and uninstall by drag-and-drop to the Trash, is a system modification.
    Whenever you remove system modifications, they must be removed completely, and the only way to do that is to use the uninstallation tool, if any, provided by the developers, or to follow their instructions. If the software has been incompletely removed, you may have to re-download or even reinstall it in order to finish the job.
    I never install system modifications myself, and except as stated in this comment, I don't know how to uninstall them. You'll have to do your own research to find that information.
    Here are some general guidelines to get you started. Suppose you want to remove something called “BrickMyMac” (a hypothetical example.) First, consult the product's Help menu, if there is one, for instructions. Finding none there, look on the developer's website, say www.brickmymac.com. (That may not be the actual name of the site; if necessary, search the Web for the product name.) If you don’t find anything on the website or in your search, contact the developer. While you're waiting for a response, download BrickMyMac.dmg and open it. There may be an application in there such as “Uninstall BrickMyMac.” If not, open “BrickMyMac.pkg” and look for an Uninstall button. The uninstaller might also be accessed by clicking the Customize button, if there is one.
    Back up all data before making any changes.
    You will generally have to restart the computer in order to complete an uninstallation. Until you do that, there may be no effect, or unpredictable effects.
    If you can’t remove software in any other way, you’ll have to erase and install OS X. Never install any third-party software unless you're sure you know how to uninstall it; otherwise you may create problems that are very hard to solve.
    Trying to remove complex system modifications by hunting for files by name often will not work and may make the problem worse. The same goes for "utilities" such as "AppCleaner" and the like that purport to remove software.

  • C++ libraries I should know about.

    I'm a physics student doing some calculations and learning C++ in the process. Not so long a go, I started using boost library in my applications and found it to be a great help. Is there any other great C++ libraries I should definitely know about (programming in general, BLAS, etc) ?

    For general purpose computing, Boost and STL are the obvious places to start. It's hard to image a frequently occurring programming problem that hasn't been addressed by Boost.
    If you plan on running your codes in a distributed memory environment (e.g. linux cluster), you will probably want to learn the basics of MPI. MPI-2 does define a C++ API, however, if you read the official MPI-2 documentation, you'll find that the entire C++ API has been depreciated. There are some 3rd party libraries out their that provide a more modern C++ interface to MPI (e.g. Boost MPI) than that defined by the MPI standard.
    There are numerous C++ libraries out there for numerical computing (c.f. oonumerics.org). However, I don't think there is a "standard" C++ library for numerical computing. Even BLAS and LAPACK do not define C++ APIs. The Boost uBLAS library is popular, but it only implements BLAS functionality (e.g. uBLAS does not provide the tools needed to solve equations). In the end, you might be better served by first identifying what your specific needs are, focus on learning the fundamentals of modern C++ software design, and then patch together a custom C++ library (or libraries) that meets your specific needs. It's usually a good idea to try to reuse the tools that are already out there; however, sometimes there are pragmatic and/or pedagogical reasons to develop some tools from scratch.
    For my own research (application of Finite Volume Methods to problems in aeroelasticity and flight dynamics), I have my own C++ numerical library that I've developed mostly from scratch, which provides the building blocks I need to compose a "physics" based model ("classical" continuum mechanics) of my problem. The linear algebra library (or sub-library) is just a C++ wrapper around BLAS and LAPACK; I find it difficult to beat the performance of vendor supplied math libraries--even with modern template meta-programming libraries such as uBLAS.
    Also, Fortran 2003 introduced features for binding fortran code with C. Most modern compiler suites (e.g. GCC, Intel, Open64) implement the ISO C Binding features of Fortran 2003. This means that you can now implement C bindings to legacy fortran libraries without having to guess the name mangling scheme used by a particular fortran compiler. Also, C structs and Fortran derived types are now inter-operable. I don't necessarily recommend developing in Fortran, but if you come across a mature library that was written in Fortran, you could potentially create C++ bindings (via C) to that library if need be.
    I hope this helps.

  • Hello like to know about graphics card AMD RADEON R7 250A

    hello like to know about graphics card AMD RADEON R7 250A if it is compatible with Infrastructure software suites Deign Suite Premium 2013 Creative Suite 6 Design Premium, Master Collection CS6

    Hi @Fodi 
    Welcome to the HP Support Forums!
    Ok, I understand  that you are trying to install drivers for your graphics adapter and the one built in to your cpu.
    In reality you do not need to install the separate drivers. It is covered by the main driver for your graphics adapter when there is both an integrated and discrete gpu.
    As to the Error 43 -  please see this page: Expand Code 43: Windows has stopped this device because it has reported problems
    Since you have tried several times you may need to remove both drivers and restart the system and let the os find the built-in graphics, before installing the driver for the AMD device.
    All the various drivers for this notebook that have been HP customized can be found here:
    HP Pavilion Notebook - 15-p259ng - Software & Drivers
    Malygris1
    I work on behalf of HP
    Please click Accept as Solution if you feel my post solved your issue, it will help others find the solution.
    Click Kudos Thumbs Up on the right to say “Thanks” for helping!

  • Playbook Orders Canceled, does RIM know about this?

    I have seen several posts about discounted playbook orders canceled on shop.Blackberry.com or with extremely long wait times to receive the merchandise. Do the head executives and board of trustees of RIM know about this problem? I can't imagine that
    they could given the magnitude of this problem, does RIM still love us as much as we love them? Certainly doesn't
    seem so! I've been a Blackberry user for a long time and I planned to upgrade my Bold 9700 to a Torch 9810 because of this PB deal. If RIM doesn't right the ship I don't know how long I could continue to support/advocate them. My contract is up Feb 2012 and I certainly hope by then they will have all their ducks in a row. With that said I am willing to wait for my Playbook given it is one hell of a deal and it's Christmas time, big companies such as RIM always get inundated with massive orders. So I propose this... Given RIM glorious record in the past I say we give them a chance to make things right! What do you say?

    Yea, there's a whole long thread here on the issue with shopblackberry.com backorders with statements from the CIO of that company about what they are doing ongoing to right their problem.
    Does RIM know? I dunno. It's a big mess regardless, that certainly deserves some attention.
    1. If any post helps you please click the below the post(s) that helped you.
    2. Please resolve your thread by marking the post "Solution?" which solved it for you!
    3. Install free BlackBerry Protect today for backups of contacts and data.
    4. Guide to Unlocking your BlackBerry & Unlock Codes
    Join our BBM Channels (Beta)
    BlackBerry Support Forums Channel
    PIN: C0001B7B4   Display/Scan Bar Code
    Knowledge Base Updates
    PIN: C0005A9AA   Display/Scan Bar Code

  • Did you know about Flash Cookies?

    I know about regular cookies, and delete them... but had no idea there was such a thing as a Flash Cookie
    Read about 1/2 way down here http://windowssecrets.com/comp/100805

    Rod,
    Since you're a confessed geek with some actual coding chops, I'm sure you'll understand the hair I'm about to split here. Hang on a moment while I grab my axe...
    Even with your page jumps, the cookie isn't doing anything. It's just a text file named after a snack. What's causing your page to jump, browsers to redirect, and the moon to shift its gravitational field three degrees to the north is the code in the web page that's being loaded. True, it may look in the text file to see what IP address to report to, but the connection, handshaking, transfer of data and powering up of lasers are all on your web page (or the server side code being executed on its behalf). The cookie is little more than a poorly dressed informant hanging out on the street corner waiting to pass along tidbits of information when the right person asks. Doesn't exactly make it a savory character (name notwithstanding), but it's a harmless one nonetheless. If it's evil you seek, you'll find it in the web site, not the cookie. And that's why I never understood the religious fervor against cookies.
    Now, if you want a truly dangerous leave behind, at least on Windows, ActiveX controls are your guys. They're really just glorified COM objects, and thus have complete access to the entire Windows API. Give me permission to install an ActiveX control on your machine and I can rewrite your file system, start and stop services, reboot your computer, or just turn the screen a hyperintelligent shade of the color blue because it amuses me. Anything that can be done in Windows programming is essentially available to the ActiveX control.
    Of course, browsers got hip to this years ago, and now the default security settings for ActiveX are to not install automatically, or at least to query the user first. Or, as it's configured on my machine, feel free to install if you can make it past this shotgun pointed at your head. Maybe that's why there's not as much of a flap about ActiveX as there is about cookies. Because they're truly dangerous, the browser community took it seriously.and now only someone with a death wish allows a web page to install an ActiveX component.
    And overall, this is kinda my point. The much maligned cookie gets a bad rap while in truth it's the web page staring you right in the face that's preparing to rob, rape and pillage. But then, misdirection has always been a classic tactic in warfare.

  • How do I delete an iCloud account from my iPad that I no longer know the password for and have no access to the email account to change it?

    How do I delete an iCloud account from my iPad that I no longer know the password for and have no access to the email account to change it?

    You will need the password. If you can't get it reset via http://iforgot.apple.com (if you remember the answers to the account's security questions then you should be able to reset it via them) then try contacting Support in your country, they should be able to reset it.
    Contacting Apple about account security : http://support.apple.com/kb/HT569
    If your country isn't on that page then try this form and explain and see what they reply with : https://ssl.apple.com/emea/support/itunes/contact.html

  • I just got my replacement phone from Warranty. The phone was on for just 2 hours and it crashed. I was told that motorola knows about this "possible" issue. I got a new sim, hard reset, If it can be done I did it. They are now sending me the same phone ag

    I just got my replacement phone from Warranty. The phone was on for just 2 hours and it crashed. I was told that motorola knows about this "possible" issue. I got a new sim, hard reset, If it can be done I did it. They are now sending me the same phone again. Number 3. I would hope this one doesn't crash but I rather have a different phone so I can enjoy using my account. The phone's most recent error was today. " Unfortunately, the process com.motorola.widget.circlewidget3d" has stopped. At least the error message works and it's polite. I told tech this and they could not answer my question or help me other then "let's do a hard reset" My warranty replacement is coming on Monday. Let's hope this one works. Anyone else havinbg the same problem. it says "such and such as stop working" on all sorts of stuff! Help! I want my iPhone Back!

    I just did a google search on this issue. OMG, I got a ton of videos on this or similar issues. Each one says in some way to clear the cache, reset the data, etc. Why in the world would this continue to happen and they not do a fix that resloves this without having to lose or stop what your doing. This is a very long and constant issue it seems with Android phones as there must have been pages and pages of what I now call "Unfortunately"  So I am going to pray that Verizon helps me  out and gets me away from this issue and helps me go back to iPhone or try the Samsung.

  • In finder, it says that I am shared to a pc which I didn't know about nor do i know the pc, how do I stop sharing with it?

    In finder, it says that I am shared to a pc which I didn't know about nor do i know the pc, how do I stop sharing with it?

    I gather that you are seeing other "pee-seas" (and | other hosts) in MAC OSX Finder UI under SHARED ? T/F ??  The Finder is reflecting what others are sharing.
    In any case consider these items:
    1) Other hosts on your network (local) have ITEMS (folders and structures) that they themselves are sharing
    with anyone on there network and to others outside who will access them via a specic host nae or address. KInda like your mate who has some files he wants to share with you. You connect to his host (machine) either by a host name (yourmate.com), an IP address (33.33.33.11) or on your local area network usually over Bonjour (yourmates_macbookair.local).
    Simply THEY ARE sharing their stuff with you and this your MACs FINDER makes then apear under the SHARED parion of the side bar in the UI. This is likely what you are seeing
    microsoft platforms have their users share DIRECTORIES mainly through the SHARING properties for that opject. YEp.. and then you can at a minimum SEE it . HOwever this doesnt mean you can access the contents.... This is all familiar to most.. nothing to be concerned about.
    Probably no need for concern.....
    (IMO), its amazing the number of PC users that unknowingly expose their folder contents on a hotel WIFI or ETHERNET network... its astonishing....!
    2) YOUR CONCERN that you are sharing your stuff:
    I'll hazard a guess that form you minmal description that you may feel that others on your network can SEE YOUR STUFF?? Bt Default, any user can see ANYTHING you have put in your ~/Public folder (theis is your Public folder in your home directory. Usually they can ONLY read whats there unless you have gone out of your way to change the ACCESS CONTROL LIST (ACL) to an access for others other than READ ONLY.
    An extention so to speak of this sharing is the concept of a "DROP BOX" that is also maintained by default in your homes public folder (~/Public/Drop Box). This is very useful for people to GIVE you their files by DROPPING then into this ~/Public/Drop Box folder.
    So THIS folder is exposed for all to see on your local network.
    How to stop anyone seeing anything?.. easy..
    Step 1: go to SYSTEM PREFERENCES/Sharing/ and UNTICK the  "File Sharing" service. Its probably already unticked. This will stop exposing anything that you have shared to others. pee-sea users may need your to enable SMB/CIFS TO READ YOUR STUFF. YOU WONT HAVE THIS ENABLED UNLESS YOU DID IT YOURSELF. Additionally there are windows .apps to read mac file systems too... so stopping all fie sharing will do the trick
    Step 1.1: if you dont want others to see your ~/Public folder either then simply select the Public folder in your finder, open the Finder inspector (+i), open the disclosure triangle for "sharing and permissions" and then set the access by others to "NO ACCESS"
    Step 2: while you are in SYSTEM PREFERENCES/Sharing/ and UNTICK the  "Remote Login" and "Screen Sharing" services. Its very likely already unticked. This will stop exposing remote services such as ssh and vnc anything that you have shared to others.
    Step 3: for extra go to SYSTEM PREFERENCES/Security/Firewall and enable any setting for network here that you want to disable or filter... seek out these apple discussion forums.. tonnes of stuff here on his.
    Others reading this thread will also have good advice and opinions.
    Post your results for others to see.
    Warwick
    Hong Kong

  • The dealer changed our plan without letting us know about disadvantage.

    An authorized dealer changed our plan without letting us know what is going to be changed, and we didn't even know they are changing our plan on new contract, we just found out, they do not want to answer. I want to know if we can get back our old plan, as the contract was signed under false information.
    This is the story happened today:
    My mom, is the master holder of our VZW account, we've been using verizon for years and years, and we first got our smartphone when Verizon just started selling iphone 4, we ordered it online when it was just released.
    The plan we had was family plan with unlimited data.
    We did not used data that much for the most of the time, but we did used it a lot for some month - thanks to unlimited plan.
    We were trying to keep our unlimited data plan, even when my mom lost her iphone 4, she didn't connect with her old phone (not the smart one) so that our unlimited data plan would not be changed.
    The dealer we made contract for iphone 4 has moved, or disappeared, i don't know, so my mom had to find another verizon dealer who speaks Korean,
    because she doesn't speak English at all - but she's the one who take care of the bills and this kind of stuffs as she has more available time than me.
    I wanted iphone 5 when it was released, but wasn't really sure about paying for it to get upgraded because iphone 4 was doing pretty well enough for me.
    Then she found this dealer in Korea Town ( Ultimate Wireless - at 6th), and she told me that they could get us the newest smartphone only for $75 -
    iphone 5 for me, and Samsung note 3 for her.
    I was like - 'Samsung maybe offer some sort of special rate, but I'm pretty sure Apple wouldn't sell their just-newly-released-phone for much low price than 2yr contract price.'
    and my mom was like ' i don't know but they said they can do it for sure' - so i was like Ok, why not .
    I guess that's about an year and half ago.
    Now iphone 6 is here, and i looked up on my verizon account and Sadly, my contract ends next May or something.
    So I told my mom about Verizon's iphone trade-in offer and I feel  sad about that I am not eligible for it right now.
    My mom happened to visit this dealer again to add a new line in our plan, and she asked about that trade-in offer and mention that her daughter (me)
    is sad that she is not eligible.
    And that evening, my mom told me that they said they can do this trade-in thing for me.
    and i was like what? how?
    and she was like 'how do i know? they said they can do it so just told me to bring the old phone'
    Well my mom, is 54 years old Korean born woman, who doesn't know about technology, English, or any complicated stuffs.
    She doesn't even know what the term 'trade-in' means, so that I even had to explain her like it's an offer from verizon you give them old iphone 4 or above, and they give you $200 certificate. But only for new 2yr contracts.
    She was like 'well, she said she ordered it already so just go pick it up'
    She normally picks up the phone for me (since she's always around K-town, but im not) but today, I happened to have free time on afternoon, and she had some appointment so I had to go visit the dealer to pick up the phone.
    So I went in, they were nice and kind, recognized my mom by mentioning her name.
    She, the dealer, was a bit busy helping out other customer so I had to wait for a while -
    While i was waiting for her, I just looked around inside of the store - like TV screens promoting new phones, and new plans and stuffs.
    Finally she got back to me and brought out the iphone 6 from back -
    and she was like
    'Not sure if you know, but your contract has not been end - so it's going to be like returning and getting back with the EDGE' (speaking Korean)
    If i didn't see the 'EDGE' plan stuffs from the TV screen, i probably would just go ok- ok- ok- thanks.
    But when she just mentioned 'EDGE', i felt something is not right.
    so I asked her, what exactly the 'EDGE' is, and what is being changed.
    she hesitated a bit -and said
    'Um... so you now have 6 GB data.. and ..'
    i was like what? no no. we have unlimited data plan since our very first smartphone - and we never changed plan and tried keep the plan when even we lost one of our phone.
    then she was like
    "um...but..it seems like it changed.."
    SO i asked When did it changed.
    and she was like "i don't know. But you guys use only 3GB anyway"
    I was like ' well, that's not important how much we actually use our data. the thing is we never changed our plan to keep the unlimited data plan'
    and she just ignored it and move to next issue - setting up the new iphone 6 for my number.
    she was like 'You don't need to give us the old phone. the payments will be billed to your statement and it's going to be.."
    She was saying everything quickly and just briefly in Korean. She sounds like YOU DON'T HAVE TO PAY ANYTHING FOR THE PHONE.
    I didn't even know there is such thing like payment plan for buying a phone BEFORE I saw it on TV SCREEN while i was waiting.
    And those promoting screens was made in English, while most of their customers are Korean who doesn't know English much.
    and i was like "what? what payment? Are you saying I don't have to pay for the phone OR are you saying I'm paying for the phone every month?"
    She was like " uh... I mean.. there's certain payment amount you are paying for iphone 5 currently, and this plan, there will be about $10 difference for the phone payment...and.."
    I'm a person who raised in Korean till highschool I speak Much better Korean than English, but I was hard to understand what she was exactly saying
    because she was saying everything so complicated.
    So I tried to clarify: "Ok. so this phone - I am not getting it for free. Right?"
    then she was like 'uh...yes - it's now free but you don't have to pay anything right now'
    So I clarified again " so that means, I'm buying the phone. not free. right?"
    and she was like "uh..but it's not that you buy this right now. It's about $30... so.."
    She then was saying this very unclearly so that she sounded like the phone only costs $30.
    "then why did you tell my mom that you can to trade-in deal for me?" I asked.
    then she was like "I didn't tell her I can do trade-in. It's not trade-in"
    So I told her" OK, as you know, she doesn't know about anything about this kind of stuffs. she doesn't even know the word 'trade-in' in English. She said she asked you about we bringing you the old phone and you get us $200 gift card so we would use that card to buy iphone 6 and she told me that you said YES YOU CAN DO IT, SO BRING THE IPHONE 4"
    She paused for a while, and I asked her again "and what's up with the change of plan? Our plan was unlimited data. Did you tell my mom about changing the plan? If she knew plan's being changed, she would not do this with you, or she always asks me before signing a contract if there's any change. All i remember is you are getting us decent phones only for $75. How can you explain about this?"
    I was amazed after hearing her answer
    "I don't know"
    and her kind attitude was gone, she was like 'i don't have nothing to do or say'
    I was so mad, told her to cancel the iphone 6, and I just left the store.
    I'm not a person related to the law, but I've met some lawyer few times with my friends, and I remember hearing this story about fraud -
    although the customer signed the contract on a stack of paper with small letters saying all about the terms and condition -
    if the customer was been told differently than the actual contract info by seller,and the seller took advantage from it, then that could be counted as fraud.
    I felt so conned and so sorry for my mom. I told her the story and she's mad, too.
    My mom and I will look up the old statement and check records to see if we were paying for our phone during current contract and visit the dealer again if we find something odd.
    But as from the story above, the dealer goes like she doesn't know anything about plan changes (even it was something she did) - so I don't really wanna talk about it with her.
    So I was wondering if anyone knows if it is possible to go back to our old plan in the case when the plan was changed without user's acknowledgement.
    Sorry to let you read this long story, sorry about temper.. but does anybody have idea on this sort of cases?

    yes I knew it was too good to be true, so i was worried but their answer was don't worry it can be done, we are the authorized dealer.
    If they fully told us about it, I wouldn't even upgrade my phone and just kept it up with my iphone 4 which I think is still working good for me.
    ahh... I just feel so bad
    I mean i might be ok with 6gb as we actually don't use that much for the most of the time, but still. This is wrong.
    And they tried to do exactly same thing again. and just ignored the issue when I brought it up.
    The reason I'm mad and want to get back my old plan is mainly because I feel we've been conned and lost something that we would not have lost without knowing it - and they knew about it all but hid it.
    I don't know.. not just about losing the plan... but I think this is so wrong.

Maybe you are looking for

  • Using ACS with PIX/ASA

    Hi there, We have an implementation of Cisco Secure ACS 4.1.4 using RSA SecurID as its authentication source to provide role-based access control and command level authorisation. We have succesfully deployed this our routers/switches, and are now loo

  • Applet-Adf communication help!

    Version 11.1.1.3.0 So i have a USe case: Where i have a ADF serach screen..simple serach get result in table.Then from table i need to select row and click on View button. from View button we need to show the image which we can zoom in/out and can do

  • Trouble creating an animated gif in Photoshop

    Hello. I am having trouble creating a gif in Photoshop (using still images). I get as far as the step where you click the dropdown menu on the top right of the timeline screen (following multiple online tutorials) and don't see the option to "create

  • I can't use some of the buttons in my Yahoo Mail account

    This is one of the reasons I stopped using Pale Moon. I cannot use half of the buttons in my Yahoo Mail account HALF of the time, sometimes they work, sometimes they don't. Same issue with Fonts, I am looking at 5 different size fonts right now even

  • What is this Box sliding up from bottom right of screen, then sliding back, contains a 1, A and down arrow?

    this box contains three squares, one contain a 1, the second the letter A and the third a down arrow. it appears and disappears quite quickly.