Updating site in another program :-)

Hey all,
If I create a web page for a friend using iWeb, would it be easy enough for him to edit it with updates using a free web WSYWIG tool or would it lose all of the iWeb formatting? If yes, what free WSYWIG tools would you recommend for PC? I know Frontpage Express used to be bundled with Windows 98 but I haven't seen it for a while.
Many thanks,
Stu

While iWeb does generate HTML files, I'm not sure how these HTML files would do after being edited with another HTML generating program. It is straightforward enough to edit with a text editor, but I just don't know how it would work with another WYSIWYG editing tool. The reason for this is that iWeb pages are very dependent on separate CSS files as well as certain JavaScript processing in order to render correctly. In addition, the organization of files is very specific to iWeb. I'm just not sure that any other program can take the files that iWeb generates, modify or add to them, then spit them back out in some functional format. I'd be interested to hear if anyone has any experience, though.

Similar Messages

  • Why am I not informed that another program will be downloaded with Adobe update

    why an I not informed that Adobe update will install another program with in,such as McAfee.. I don't want programs that i don't choose myself

    oh, you may be right.
    when you go to the flash player web page, Adobe - Install Adobe Flash Player you'll see the mcafee option.  but if you allow auto-updates, you may not see that.
    i never allow flash player to auto-update for that reason (and because i am a flash developer and use a different flash player version to debug web-based swfs).  you have limited (or no) control over what happens when you allow flash player to auto-update.
    i hate that and sympathize with the plight you went through.  it happened to me once many years ago.  i learned to never allow that again. 
    hopefully, you were able to uninstall mcafee and not have any residual problem-causing detritus left on your system.

  • HT6065 I updated my iMac computer to osx version 10.9.1 but now can't retrieve photo's from my lacie portable hard drive .  Also when my computer comes on it does not show the finder bar unless I have another program up like Safari...should I delete my up

    I have updated my iMac ot osx 10.9.1 but my screen no longer shows my finder bar unless I activate another program like mail or safari.  also I can't access photos stored on my portable hard drive that was used before the update.  Should I unsubscribe my update?
    Jennifer

    Did you make a backup of your system before you replaced the operating system?

  • Why can't I burn my slide show to DVD in photoshop elements 13. Do I have to buy another program update .?

    Photo shop elements make a nice slide show but will not let me burn it to DVD which makes it useless to me.
    How do I get the photoshop slide show to burn in another program.?

    Thanks so much for your possible solution. If I can pull this off , I will no longer curse adobe PSE 13.
    I'm still a long was off to accomplish this goal but I will surely give it a try. H264 (mp4) is still Greek to me.

  • "Another program on your computer would like to modify Firefox with the following add-on" - how to disable?

    I am using the latest Firefox (28.0) on Windows XP in a shared computer environment. Although I do not have Administrator access, I installed Firefox myself and can change whatever Firefox config settings I want (including about:config and mucking with the files in the installation directory).
    I want to disable the tab that appears on Firefox startup, "Another program on your computer would like to modify Firefox with the following add-on". This tab usually appears once per day (the first time I startup Firefox each day). I want the tab not to appear at all, from now on.
    The "another program" in question is some program that is used in the facility where I'm using the computer, so I can't just uninstall that program. Although this is a shared computer environment, they don't "wipe" the machine every day, just reboot. So the Firefox I installed is still there with all my config settings intact. As far as I know, I'm the only person who uses Firefox on this computer.
    Solutions that don't work:
    "Just click Continue" -- but then I still see the "Another program" tab every day, and don't want to see it.
    "Click Remove in the Add-ons list" -- I removed the Add-on in question but the tab still appears every day.
    I would like a solution that either eliminates the Add-on request for that particular application, or eliminates all such requests ("Another program...") regardless of what application requested it. The ideal solution would be if the request itself had a checkbox for "never ask this again" but, alas, no such luck.

    Gosh... I spent about an hour preparing a response, then accidentally did control-something or alt-something which took me back a page and I lost everything I typed (even after I clicked Forward to try to get back to where I was). If anyone knows of a config setting like "don't ever trash an entire page of user input unless the user explicitly confirms it", or, "keep form input data even if the user goes Back or Forward", I think that would be a great feature.
    OK, back to the original question...
    I appreciate the responses thus far, but I think there have been some misunderstandings. Maybe a multiple-choice version would help:
    Question: Is there a way to suppress the appearance of the notification tab that says, "Another program on your computer would like to modify Firefox with the following add-on" (meaning, any request from another program to install an add-on is to be silently ignored and discarded)?
    Answer:
    (A) Yes, you can suppress that notification (please state how).
    (B) No, but you can request that feature (please state where).
    (C) No, you can't do that or request that feature.
    That's basically my question in a nutshell. If the answer is (B), I might envision a boolean about:config setting like "extensions.allowProgrammaticAddonRequests" that defaults to "true" and can be set to "false" manually. I think that would be the most direct solution (if it were possible).
    I will respond to some comments from above:
    "I don't understand why you are using a mozilla.cfg file to lock those preferences when you can modify the preferences for your current Firefox profile via about:config" -- This is because the "other program" in question (iCafe Manager) was setting certain config options (browser.startup.homepage, and browser.newtab.url) on every reboot (which happens every morning at that facility). I got tired of manually changing the settings back every day. Using the above-mentioned files, I successfully defeated iCafe Manager's daily interference with those config settings. The other things (like stuff related to Socks tunnelling) I probably could have just set once in about:config but doing a lockPref seemed to do no harm. The settings for "enabledScopes" and "xpinstall" were to see if they'd help with the problem I originally asked about, but they did not.
    "I would look in about:config to make sure those preference modifications are in effect" -- yes, I confirmed that the settings are in effect and locked. That much works as expected.
    "A) removing the iCafe Toolbar extension from the Firefox Addons -> Extensions panel results in the "Another program" tab at startup" -- true, but I think it would be more accurate to say: while the toolbar extension is not installed (due to either having been removed, or, never having been installed at all), the "Another program" tab appears on at least the first startup of Firefox after every reboot.
    "B) when you allow the installation it shows up as "(disabled)" in the Extensions list but the unwanted toolbar still shows up (correct?)" -- yes, correct.
    "You could explain the problem to the system administrator of your facility" -- unfortunately, there's no administrator on site, only a person who makes sure the lights are on. They'll call a tech if there's a catastrophic problem (like the net connection goes dead). Since I installed Firefox myself, and since iCafe Manager is a program they installed, I don't think they'll go out of their way to help me with Firefox (especially if I'm trying to defeat iCafe Manager's attempts to interfere with Firefox). From their point of view, their systems are working just fine.
    "allow the installation and then see if you can go to the Firefox Customize menu and HIDE the toolbar as a workaround" -- since I'm not in that facility now (and probably won't be again until this summer or so), I can't experiment with those systems now. But I do recall clicking just about everything I could, including "View - Toolbars" (which seems to be the same menu as when I right-click on a toolbar line). That menu allows hiding toolbars, but from my recollection, the offending toolbar was not displayed in the list, so I could not hide it that way. Also, the Customize menu ("View - Toolbars - Customize") seems to allow only modifications to a toolbar, and not a way to hide an entire toolbar.
    "it might help if you could post a new troubleshooting information list after you allow the iCafe Toolbar installation" -- ok, that troubleshooting report is included below.
    Thanks again for your help.
    Application Basics
    Name: Firefox
    Version: 28.0
    User Agent: Mozilla/5.0 (Windows NT 5.1; rv:28.0) Gecko/20100101 Firefox/28.0
    Crash Reports for the Last 3 Days
    All Crash Reports
    Extensions
    Name: iCafe Manager Toolbar
    Version: 5.2.0.6
    Enabled: false
    ID: {C058FE28-1E07-4FD1-8092-046F8A964D12}
    Important Modified Preferences
    accessibility.typeaheadfind.flashBar: 0
    browser.cache.disk.capacity: 358400
    browser.cache.disk.smart_size.first_run: false
    browser.cache.disk.smart_size.use_old_max: false
    browser.cache.disk.smart_size_cached_value: 358400
    browser.newtab.url: about:blank
    browser.places.smartBookmarksVersion: 6
    browser.sessionstore.upgradeBackup.latestBuildID: 20140314220517
    browser.startup.homepage: http://www.google.com/ncr
    browser.startup.homepage_override.buildID: 20140314220517
    browser.startup.homepage_override.mstone: 28.0
    dom.mozApps.used: true
    extensions.lastAppVersion: 28.0
    gfx.blacklist.direct2d: 3
    gfx.blacklist.layers.direct3d10: 3
    gfx.blacklist.layers.direct3d10-1: 3
    gfx.blacklist.layers.direct3d9: 3
    gfx.blacklist.layers.opengl: 3
    gfx.blacklist.stagefright: 3
    gfx.blacklist.suggested-driver-version: 6.1400.1000.5218
    gfx.blacklist.webgl.angle: 3
    gfx.blacklist.webgl.msaa: 3
    gfx.blacklist.webgl.opengl: 3
    network.cookie.prefsMigrated: true
    network.websocket.enabled: false
    places.database.lastMaintenance: 1398414928
    places.history.enabled: false
    places.history.expiration.transient_current_max_pages: 53428
    plugin.disable_full_page_plugin_for_types: application/pdf
    plugin.importedState: true
    plugin.state.npgoogleupdate: 1
    privacy.sanitize.migrateFx3Prefs: true
    privacy.sanitize.sanitizeOnShutdown: true
    storage.vacuum.last.index: 1
    storage.vacuum.last.places.sqlite: 1396778909
    Graphics
    Adapter Description: Intel(R) G33/G31 Express Chipset Family
    Adapter Drivers: igxprd32
    Adapter RAM: Unknown
    Device ID: 0x29c2
    Direct2D Enabled: Blocked for your graphics driver version. Try updating your graphics driver to version 6.1400.1000.5218 or newer.
    DirectWrite Enabled: false (0.0.0.0)
    Driver Date: 11-3-2008
    Driver Version: 6.14.10.5009
    GPU #2 Active: false
    GPU Accelerated Windows: 0/1 Basic Blocked for your graphics driver version. Try updating your graphics driver to version 6.1400.1000.5218 or newer.
    WebGL Renderer: Blocked for your graphics driver version. Try updating your graphics driver to version 6.1400.1000.5218 or newer.
    Vendor ID: 0x8086
    windowLayerManagerRemote: false
    AzureCanvasBackend: skia
    AzureContentBackend: cairo
    AzureFallbackCanvasBackend: cairo
    AzureSkiaAccelerated: 0
    JavaScript
    Incremental GC: true
    Accessibility
    Activated: false
    Prevent Accessibility: 0
    Library Versions
    NSPR
    Expected minimum version: 4.10.3
    Version in use: 4.10.3
    NSS
    Expected minimum version: 3.15.5 Basic ECC
    Version in use: 3.15.5 Basic ECC
    NSSSMIME
    Expected minimum version: 3.15.5 Basic ECC
    Version in use: 3.15.5 Basic ECC
    NSSSSL
    Expected minimum version: 3.15.5 Basic ECC
    Version in use: 3.15.5 Basic ECC
    NSSUTIL
    Expected minimum version: 3.15.5
    Version in use: 3.15.5

  • Both Chrome and Safari interrupt online streaming to request/demand an update for a PC program that doesn't work on Macs. What is going on?

    Both Chrome and Safari interrupt online streaming to request/demand an update for a PC program that doesn't work on Macs. What is going on?

    The update alerts are fake, and are intended to dupe you into installing malware or disclosing private information so that your identity can be stolen.
    You might get the alerts when visiting a website that has been hacked. Don't visit the site again. If applicable, notify the site administrator of the problem, but don't send email to an unknown party.
    If you get the alerts when visiting more than one well-known website, such as Google, YouTube, or Facebook, then they're almost certainly the result of an attack on your router that has caused you to get false results from looking up the addresses of Internet servers. Requests sent to those sites are redirected to a server controlled by the attacker. It's possible, but less likely, that the DNS server used by your ISP has been attacked, but you should assume that the router is at fault until proven otherwise.
    The router's documentation should tell you how to reset it to the factory default state. Usually there's a pinhole switch somewhere in the back. It may be labeled "RESET." Insert the end of a straightened paper clip or a similar tool and press the button inside for perhaps 15 seconds, or as long as the instructions specify.
    After resetting the router, quit the web browser and relaunch it while holding down the shift key. From the Safari menu bar, select
              Safari ▹ Preferences... ▹ Privacy ▹ Remove All Website Data
    and confirm. Do the equivalent if you use another browser. Open the Downloads folder and delete anything you don't recognize.
    Then go through the router's initial setup procedure. I can't be specific, because it's different for every model. The key points are these:
    1. Don't allow the router to be administered from the WAN (Internet) port, if it has that option. Most do.
    2. Set a strong password to protect the router's settings: at least ten random upper- and lower-case letters and digits. Don't use the default password or any other that could be guessed. Save the password in your keychain. Any password that you can remember is weak.
    3. If the router is wireless, or if you have a wireless access point on the network, use "WPA 2 Personal" security and set a different strong password to protect the network. If the router or access point doesn't support WPA 2, it's obsolete and must be replaced.
    During the time the router was compromised, you were redirected to bogus websites. If you ever connected to a secure site and got a warning from your browser that the identity of the server could not be verified, and you dismissed that warning in order to log in, assume that your credentials for the site have been stolen and that the attacker has control of the account. This warning also applies to all websites on which you saw the fake update alerts.
    Check the router manufacturer's website for a firmware update.
    If you downloaded and installed what you thought was a software update, ask for instructions.

  • Why can I not update my CS 6 programs to Mac OS X

    I am having problems with updating the latest Updates for my CS 6 programs *here PS and Ill. fx. And the notice says to contact costumer support, but only get a few Q's and A's.
    HOW do I get in direct contact (or chat/mail) with costumer service of ADOBE_

    Hej again Steve
    Ok sorry again
    But you seem to be quite into this field. (and I've unfortunately been
    'out' for a while). I used to be up to date, but now, it's all moving so
    fast, and if you're away for a few years then you're (screwed)
    I've been trying to get in touch with Adobe mostly for 1. update of my
    programs because I seem to have a lot of 'faults' in each (crashing, screen
    moving and such)
    BUT 2. also because I want to join CC and with the 40% off (as I have an
    original CS) but when I enter info, it will not accept my serial nr. NOW
    after your guidance I came across this site which shows that I am granted a
    ''free'' CC. Am I reading this right. _ ? I am no idiot, but yes, in the
    computer field _ I am a designer and a damn good one, but all the techichal
    (that is another language _ and heck, we all have our fields_ I go to a
    mechanic to get my car fixed, you?
    Just smiling
    Look forward to hear from you
    Athena
    2014-05-25 22:33 GMT+02:00 Athena Windelev <[email protected]>:
    Thank you Steve / at least it seems that I can get a ''chat'' going.
    A few years ago I could mail them but now not that and no phone (or rather
    when I call long distance I never get thru) what I most want is personal
    contact. Because even if they list 20 or something common Q and A's mine do
    not follow in on any of the categories. BUT thanks again for the link.
    Maybe you can help me with others ... Just a thought
    I\m trying to upgrade my PS, ID and Illustrator CS6 / and I know from
    previous Adobe guidance, one should not just take the latest. I seem to be
    successful with my ID (but yet to prove when I test it, which I haven't had
    time to yet) BUT my PS and Ill come up with this (see attached file).
    Hope you can help. Anyway, you have so far.
    Because you see - I have an original CS6 and want to upgrade to CC soon.
    AND they offer a 40% discount if you already have the original. BUT when I
    type in my serial nr. it won't register this. I've been trying (no kidding)
    for a year now, if not longer. AND this is not in one of their Q and A's
    Best
    Athena
    >
    >
    2014-05-25 18:50 GMT+02:00 Steve Werner <[email protected]>:
        Why can I not update my CS 6 programs to Mac OS X  created by Steve
    >> Werner <https://forums.adobe.com/people/Steve+Werner> in *Creative
    >> Suites* - View the full discussion<https://forums.adobe.com/message/6407979#6407979>
    >>

  • I get, You're not on the latest version of Firefox. Upgrade today to get the best of the Web! When I go to the update site it tells me that I have the latest version.

    I start the Firefox browser.
    When the start page displays I get just below the Google search box:
    You're not on the latest version of Firefox. Upgrade today to get the best of the Web!
    Not unusual but when I go to the update site it searches for a minute and then tells me that I have the current version of the software.

    If you use the www.google.com/firefox site as home page that previous Firefox 3 versions use as the home page then you can ignore the message about not using the latest Firefox version on that page.<br />
    Google no longer seems to maintain that page.<br />
    Current Firefox 4+ versions no longer use that Google website as the home page, but use the build-in about:home page as the home page.<br />
    Google assumes that you use an older Firefox version if you still visit that site and warns you that you use an older Firefox version and suggests to update.<br />
    You can use another page as the home page like about:home or www.google.com or www.google.com/ig (iGoogle).<br />

  • When I close Photoshop CS6, the following message appears: "Could not save Preferences because the file is locked, you do not have necessary access permissions, or another program is using the file.

    When I quit Photoshop CS6, the following message appears:
    " Could not save Preferences because the file is locked, you do not have necessary access permissions, or another program is using the file. Use the ‘Get Info’ command in the Finder to ensure the file is unlocked and you have permission to access the file. If the problem persists, save the document to a different file or duplicate it in the Finder."
    If I try to change the Workspace in PS6 from Essentials to any other Workspace, the following messsage appears:
    "Could not apply the workspace because the file is locked, you do not have necessary access permissions, or another program is using the file. Use the ‘Get Info’ command in the Finder to ensure the file is unlocked and you have permission to access the file. If the problem persists, save the document to a different file or duplicate it in the Finder."
    I have checked the Sharing and Permissions section of the "Get Info" panel accessed from the Finder and I have set Read and Write Privileges for my user account for Photoshop CS6. System and Admin are also set to Read and Write.
    I have a MacBook Pro with OS X Version 10.9.5 and have all available updates for Photoshop CS6, Lightroom 5 and Bridge CS6.
    I tried uninstalling the program and downloading it again and reinstalling, but nothing changed.
    Can you help?
    Thanks,
    cjpnm

    You may get better help in Photoshop General Discussion
    The Cloud forum is not about using individual programs
    The Cloud forum is about the Cloud as a delivery & install process
    If you will start at the Forums Index https://forums.adobe.com/welcome
    You will be able to select a forum for the specific Adobe product(s) you use
    Click the "down arrow" symbol on the right (where it says All communities) to open the drop down list and scroll
    If FINDER means Mac, read below (and try to give more information when asking a question)
    Mac 10.9.3 workaround https://forums.adobe.com/thread/1489922
    Enable Mac Root User https://forums.adobe.com/thread/1156604
    -more Root User http://forums.adobe.com/thread/879931
    -and more root user http://forums.adobe.com/thread/940869?tstart=0

  • Importing internal table from one program to another program

    Hi everybody,
    i have one small doubt.
    i am using submit statement and passing the values from this program to another program selection screen. in that program logic is written.In that program one internal table values are being exported to the memory id of that program. now i have to import that internal table values into my program by using import statement. i am using the following syntax
    import itab from menory id 'program name'.
    but i am getting an error saying program name is unknown.
    what is the exat syntax for this .
    thanking you,
    giri.

    hi,
    check these statements.
    IMPORT - Get data
    Variants:
    1. IMPORT obj1 ... objn FROM DATA BUFFER f.
    2. IMPORT obj1 ... objn FROM INTERNAL TABLE itab.
    2. IMPORT obj1 ... objn FROM MEMORY.
    3. IMPORT obj1 ... objn FROM SHARED MEMORY itab(ar) ID key.
    4. IMPORT obj1 ... objn FROM SHARED BUFFER itab(ar) ID key.
    5. IMPORT obj1 ... objn FROM DATABASE dbtab(ar) ID key.
    6. IMPORT obj1 ... objn FROM DATASET dsn(ar) ID key.
    7. IMPORT obj1 ... objn FROM LOGFILE ID key.
    8. IMPORT DIRECTORY INTO itab FROM DATABASE dbtab(ar) ID key.
    9. IMPORT (itab) FROM ... .
    In some cases, the syntax rules that apply to Unicode programs are different than those for non-Unicode programs. For more details, see Storing Cluster Tables.
    Variant 1
    IMPORT obj1 ... objn FROM DATA BUFFER f.
    Extras:
    1. ... = f (for each object to be imported)
    2. ... TO f (for each object to be imported)
    3. ... ACCEPTING PADDING
    4. ... ACCEPTING TRUNCATION
    5. ... IGNORING STRUCTURE BOUNDARIES
    6. ... IGNORING CONVERSION ERRORS
    7. ... REPLACEMENT CHARACTER c
    8. ... IN CHAR-TO-HEX MODE
    9. ... CODE PAGE INTO f1
    10. ... ENDIAN INTO f2
    The syntax check performed in an ABAP Objects context is stricter than in other ABAP areas.
    See You Cannot Use Implicit Field Names in Clusters.
    Effect
    Imports the data objects obj1 ... objn from the data buffer declared. The data buffer must be of type XSTRING . The data objects obj1 ... objn can be fields, structures, complex structures, or tables. The system imports all the data that has been stored in the data buffer f using the EXPORT ... TO DATA BUFFER statement and is listed here. It also checks that the structure used in the IMPORT statement matches the one in the EXPORT statement.
    The Return Code is set as follows:
    SY-SUBRC = 0:
    The existing data objects in the data cluster specified were imported. The rest remain unchanged. (In some circumstances, this may mean that no data objects were imported).
    SY-SUBRC = 4:
    The data objects could not be imported. The contents of all the objects remain unchanged.
    Addition 1
    ... = f (for each object to be imported)
    Addition 2
    ... TO f (for each object to be imported)
    Effect
    The object is stored in the field f.
    Addition 3
    ... ACCEPTING PADDING
    Effect
    This addition allows you to append new fields to the end
    of structures, sub-structures, and internal tables. The IMPORT statement fills the additional fields with initial values; make existing fields (C, N, X, P, I1, and I2) longer; map character-type fields to STRING-type fields; or to map byte-type fields to XSTRING-type fields.
    Addition 4
    ... ACCEPTING TRUNCATION
    Effect
    This addition allows you to shorten the last CHAR
    fields, or to omit the last component at the top level. (Until Release 4.6, you could do this without using an addition).
    Addition 5
    ... IGNORING STRUCTURE BOUNDARIES
    Effect
    This addition means that only the fragment sequence is
    relevant - that is, that any sub-structures match. If you use this addition, the system ignores any alignment changes necessitated by Unicode - such as inserting named includes.
    You cannot use this addition with either addition 3 (enlarge structure) or addition 4 (shorten structure), since it specifies that structure and include boundaries are to be ignored.
    From Release 6.10 onwards, the include information is stored in datasets, so that the system can also check that includes match - that is, that sub-structures and includes (named or unnamed) are treated equally. When data is imported in a Release prior to 6.10, includes are not checked.
    Addition 6
    ...IGNORING CONVERSION ERRORS
    Effect
    This addition prevents the system from triggering a
    runtime error, if an error occurs when the character set is converted. '#' is used as a replacement character.
    Addition 7
    ... REPLACEMENT CHARACTER c
    Effect
    The replacement character is used if a particular
    character cannot be converted when the character set is converted.
    This addition can only be used in conjunction with addition 6.
    Addition 8
    ... IN CHAR-TO-HEX MODE
    Effect
    Not all character-type fields are converted. To convert
    a field, you must create a field (or structure) that is identical to the exported field or structure, except that all its character-type components must be replaced with hexadecimal fields.
    You can only use this addition in Unicode programs, to allow you to import camouflaged binary data as single-byte characters.
    Moreover, you cannot use this addition in conjunction with the additions 3, 4, 5, 6, or 7.
    Addition 9
    ... CODE PAGE INTO f1
    Effect
    The code page of the exported data is stored in the
    character-type field f1 - for example, to analyze data that has been imported with the IN CHAR-TO-HEX MODE addition.
    Addition 10
    ... ENDIAN INTO f2
    Effect
    The byte order (LITTLE or BIG) of the
    exported data is stored in the field f2 - for example, to analyze data that has been imported with the IN CHAR-TO-HEX MODE addition. The field f2 must have the type ABAP_ENDIAN, which is defined in the type group ABAP. For this reason, the type group ABAP must be included in the ABAP program using a TYPE-POOLS statement.
    Variant 2
    IMPORT obj1 ... objn FROM INTERNAL TABLE itab.
    Extras:
    1. ... = f (for each object to be imported)
    2. ... TO f (for each object to be imported)
    3. ... ACCEPTING PADDING
    4. ... ACCEPTING TRUNCATION
    5. ... IGNORING STRUCTURE BOUNDARIES
    6. ... IGNORING CONVERSION ERRORS
    7. ... REPLACEMENT CHARACTER c
    8. ... IN CHAR-TO-HEX MODE
    9. ... CODE PAGE INTO f1
    10. ... ENDIAN INTO f2
    The syntax check performed in an ABAP Objects context is stricter than in other ABAP areas. See No implicit field names in cluster.
    Effect
    Imports the data objects obj1 ... objn (fields, structures, complex structures, or tables) from the specified internal table itab. The first column in the internal table must be of the predefined type INT2 and the second must be type X. To define the first column you must refer to a data element in the ABAP Dictionary that has the predefined type INT2.
    All data that was stored in the internal table itab using EXPORT ... TO INTERNAL TABLE and listed, is imported. The system checks that the EXPORT and IMPORT structures match.
    The Return Code is set as follows:
    SY-SUBRC = 0:
    The existing data objects in the specified data cluster were imported, the rest remain unchanged (it is possible that no data object was imported).
    SY-SUBRC = 4:
    The data objects could not be imported.
    The contents of all listed objects remain unchanged
    Addition 1
    ... = f (for each object to be imported)
    Addition 2
    ... TO f (for each object to be imported)
    Effect
    Places the object in the field f.
    Addition 3
    ... ACCEPTING PADDING
    Effect
    This addition allows you to add new fields to the ends
    of structures, even to substructures and internal tables (the additional fields are filled with initial value during the IMPORT). It also allows you to increase the size of existing fields (C, N, X, P, I1, and I2) and to map Char fields to STRING type fields or byte fields to XSTRING type fields.
    Addition 4
    ... ACCEPTING TRUNCATION
    Effect
    This addition allows you to shorten the last CHAR
    field or omit the last component on the highest level (till Release 4.6 this was possible without specifying an addition).
    Addition 5
    ... IGNORING STRUCTURE BOUNDARIES
    Effect
    This addition means that only the page order is
    relevant, that is any substructures match. With this addition, the system also ignores alignment changes arising from the Unicode conversion (for example, due to subsequent insertion of named includes).
    This addition rules out any subsequent structural enhancements (addition 3) or structural shortening (addition 4) because with this addition it is the structural limits and include limits that are to be ignored.
    As from Release 6.10, the include information will also be stored in the dataset, so that it is possible to also check whether the includes match, that is substructures and includes (named or unnamed) are treated the same. When importing data that was exported in a Release lower than 6.10, the includes are not checked.
    Addition 6
    ...IGNORING CONVERSION ERRORS
    Effect
    This addition has the effect that an error in the
    character set conversion does not cause a runtime error. The system uses "#" as a replacement character.
    Addition 7
    ... REPLACEMENT CHARACTER c
    Effect
    The system uses the specified replacement character if a
    character cannot be converted during a character set conversion. If this addition is not specified, the system uses "#" as a replacement character.
    This addition can only be used in conjunction with addition 6.
    Addition 8
    ... IN CHAR-TO-HEX MODE
    Effect
    No character type fields are converted. For this you
    must create a field or structure that is identical to the exported field or exported structure, except that all character type fields must be replaced with hexadecimal fields.
    This addition, which is only allowed in programs with a set Unicode flag, allows you to import binary data disguised as single byte characters. This addition cannot be used in conjunction with additions 3, 4, 5, 6, and 7.
    Addition 9
    ... CODE PAGE INTO f1
    Effect
    The codepage of the exported data is stored in the
    character-type field f1 (for example, to be able to analyze the data imported with the addition IN CHAR-TO-HEX MODE).
    Addition 10
    ... ENDIAN INTO f2
    Effect
    The byte order (LITTLE or BIG) of the
    exported data is stored in the field f2 (for example, to be able analyze the data imported using the addition IN CHAR-TO-HEX MODE). The field f2 must be of type ABAP_ENDIAN, defined in type group ABAP. You must therefore include the type group ABAP in the ABAP program with a TYPE-POOLS statement.
    Variant 3
    IMPORT obj1 ... objn FROM MEMORY.
    Extras:
    1. ... = f (for each object to be imported) 2. ... TO f (for each object to be imported)
    3. ... ID key
    4. ... ACCEPTING PADDING
    5. ... ACCEPTING TRUNCATION
    6. ... IGNORING STRUCTURE BOUNDARIES
    The syntax check performed in an ABAP Objects context is stricter than in other ABAP areas. See You Must Enter Identification and Cannot Use Implicit Field Names inClusters
    Effect
    Imports data objects obj1 ... objn (fields, structures, complex structures or tables) from a data cluster in the ABAP memory (see EXPORT). Reads in all data without an ID that was exported to memory with "EXPORT ... TO MEMORY.". In contrast to the variant IMPORT FROM DATABASE, it does not check that the structure matches in EXPORT and IMPORT.
    The Return Code is set as follows:
    SY-SUBRC = 0:
    The existing data objects in the data cluster specified were imported. The rest remain unchanged (in some circumstances, this may mean that no data objects were imported).
    SY-SUBRC = 4:
    The data objects could not be imported, probably because the ABAP memory was empty.
    The contents of all objects remain unchanged.
    Note
    You should always use the addition 3 (... ID key) with the statement. Otherwise, the effect of the variant is not certain (EXPORT statements in different parts of a program overwrite each other in the ABAP memory), since it exists only for reasons of compatibility with R/2.
    Additional methods for selecting and deleting data clusters in the ABAP memory are provided by the system class CL_ABAP_EXPIMP_MEM.
    Please consult Data Area and Modularization Unit Organization documentation as well.
    Addition 1
    ... = f (for each object to be imported)
    Addition 2
    ... TO f (for each object to be imported)
    Effect
    The object is placed in field f.
    Addition 3
    ... ID key
    Effect
    Imports only data stored in ABAP memory under the ID key.
    Notes
    The key, key, must be a character-type data object (but not a string).
    The Return Code is set as follows:
    SY-SUBRC = 0:
    The existing data objects in the data cluster specified were imported. The rest remain unchanged (in some circumstances, this may mean that no data objects were imported).
    SY-SUBRC = 4:
    The data objects could not be imported, probably because an incorrect ID was used.
    The contents of all objects remain unchanged.
    Addition 4
    ... ACCEPTING PADDING
    Effect
    This addition allows you to append new fields to the end of structures, sub-structures, and internal tables. The IMPORT statement fills the additional fields with initial values; make existing fields (C, N, X, P, I1, and I2) longer; map character-type fields to STRING-type fields; or to map byte-type fields to XSTRING-type fields.
    Addition 5
    ... ACCEPTING TRUNCATION
    Effect
    This addition allows you to shorten the last CHAR field, or to omit the last component at the top level. (Until Release 4.6, you could do this without using an addition).
    Addition 6
    ... IGNORING STRUCTURE BOUNDARIES
    Effect
    This addition means that only the fragment sequence is relevant - that is, that any sub-structures match. If you use this addition, the system ignores any alignment changes necessitated by Unicode - such as inserting named includes.
    You cannot use this addition with either addition 3 (enlarge structure) or addition 4 (shorten structure), since it specifies that structure and include boundaries are to be ignored.
    From Release 6.10 onwards, the include information is stored in datasets, so that the system can also check that includes match - that is, that sub-structures and includes (named or unnamed) are treated equally. When data is imported in a Release prior to 6.10, includes are not checked.
    Related
    EXPORT TO MEMORY, DELETE FROM MEMORY, FREE MEMORY
    Variant 4
    IMPORT obj1 ... objn FROM SHARED MEMORY itab(ar) ID key.
    Extras:
    1. ... = f (for each object to be exported) 2. ... TO f (for each object to be exported)
    3. ... CLIENT g (before ID key)
    4. ... TO wa (after itab(ar) or ID key )
    5. ... ACCEPTING PADDING
    6. ... ACCEPTING TRUNCATION
    7. ... IGNORING STRUCTURE BOUNDARIES
    The syntax check performed in an ABAP Objects context is stricter than in other ABAP areas.
    See You Cannot Use Implicit Field Names in Clusters and You Cannot Use Table Work Areas.
    Effect
    Imports the data objects obj1 ... objn (fields, structures, complex structures, or tables) from shared memory. The data objects are read using the ID key from the area ar in the table itab - c.f. EXPORT TO SHARED MEMORY). You must use itab to specify a database table although the system reads from a memory table with the appropriate structure.
    The Return Code is set as follows:
    SY-SUBRC = 0:
    The existing data objects in the data cluster specified were imported. The rest remain unchanged. (In some circumstances, this may mean that no data objects were imported).
    SY-SUBRC = 4:
    The data objects could not be imported. You may have used the wrong ID. The contents of all the objects remain unchanged.
    Notes
    The table dbtab named according to SHARED MEMORY must be declared using TABLES (except in addition 2).
    The structure of fields (field symbols and internal tables) to be imported must match the structure of the objects exported in the dataset. The objects must be imported under the same names as those under which they were exported. Otherwise, they will not be imported.
    The key length consists of: the client (3 digits, but only if tab is client-specific); area (2 characters); ID; and line number (4 bytes). It must not exceed 64 bytes - that is, the ID must not be longer than 55 characters, if the table is client- specific.
    The key, key, must be a character-type data object (but not a string).
    Additional methods for selecting and deleting data clusters in the shared memory are provided by the system class CL_ABAP_EXPIMP_SHMEM.
    Please consult Data Area and Modularization Unit Organization documentation as well.
    Addition 1
    ... = f (for each object to be imported)
    Addition 2
    ... TO f (for each object to be imported)
    Effect
    The object is stored in the field f.
    Addition 3
    ... CLIENT g (before ID key)
    Effect
    The data is imported from client g (provided the import/export table is tab client-specific). The client, g must be a character-type data object (but not a string).
    Addition 4
    ... TO wa (after itab(ar) or ID key)
    Effect
    You need to use this addition if user data fields have been stored in the application buffer and are to be read from there. The work area wa is used instead of the table work area. The target area must correspond to the structure of the called table tab.
    Addition 5
    ... ACCEPTING PADDING
    Effect
    This addition allows you to: append new fields to the end of structures, sub-structures, and internal tables. The IMPORT statement fills the additional fields with initial values; make existing fields (C, N, X, P, I1, and I2) longer; map character-type fields to STRING-type fields; or to map byte-type fields to XSTRING-type fields.
    Addition 6
    ... ACCEPTING TRUNCATION
    Effect
    This addition allows you to shorten the last CHAR fields, or to omit the last component at the top level. (Until Release 4.6, you could do this without using an addition).
    Addition 7
    ... IGNORING STRUCTURE BOUNDARIES
    Effect
    This addition means that only the fragment sequence is relevant - that is, that any sub-structures match. If you use this addition, the system ignores any alignment changes necessitated by Unicode - such as inserting named includes.
    You cannot use this addition with either addition 4 (enlarge structure) or addition 5 (shorten structure), since it specifies that structure and include boundaries are to be ignored.
    From Release 6.10 onwards, the include information is stored in datasets, so that the system can also check that includes match - that is, that sub-structures and includes (named or unnamed) are treated equally. When data is imported in a Release prior to 6.10, includes are not checked.
    Related
    EXPORT TO SHARED MEMORY, DELETE FROM SHARED MEMORY
    Variant 5
    IMPORT obj1 ... objn FROM SHARED BUFFER itab(ar) ID key.
    Extras:
    1. ... = f (for each object to be exported) 2. ... TO f (for each object to be exported)
    3. ... CLIENT g (before ID key)
    4. ... TO wa (last addition or after itab(ar))
    The syntax check performed in an ABAP Objects context is stricter than in other ABAP areas.
    See Cannot Use Implicit Fieldnames in Clusters und Cannot Use Table Work Areas.
    Effect
    Imports data objects obj1 ... objn (fields or
    tables) from the cross-transaction application buffer. The data objects are read in the application buffer using the ID key of the area ar of the buffer area for the table itab (see EXPORT TO SHARED BUFFER). You must use dbtab to specify a database table although the system reads from a memory table with an appropriate structure.
    The Return Code is set as follows:
    SY-SUBRC = 0:
    The existing data objects in the data cluster specified were imported. The rest remain unchanged (in some circumstances, this means that no data objects were imported).
    SY-SUBRC = 4:
    The data objects could not be imported, probably because an incorrect ID was used.
    The contents of all objects remain unchanged.
    Example
    Import two fields and an internal table from the application buffer with the structure INDX:
    TYPES: BEGIN OF ITAB3_LINE,
             CONT(4),
           END OF ITAB3_LINE.
    DATA: INDXKEY LIKE INDX-SRTFD VALUE 'KEYVALUE',
          F1(4),
          F2(8) TYPE P DECIMALS 0,
          ITAB3 TYPE STANDARD TABLE OF ITAB3_LINE,
          INDX_WA TYPE INDX.
    Import data.
    IMPORT F1 = F1 F2 = F2 ITAB3 = ITAB3
           FROM SHARED BUFFER INDX(ST) ID INDXKEY TO INDX_WA.
    After import, the data fields INDX-AEDAT and
    INDX-USERA in front of CLUSTR are filled with
    the values in the fields before the EXPORT
    statement.
    Notes
    You must declare the table dbtab, named after DATABASE using a TABLES statement.
    The structure of the fields, structures, and internal tables to be imported must match the structure of the objects exported to the dataset. Moreover, the objects must be imported with the same name used to export them. Otherwise, the import is not performed.
    The maximum total key length is 64 bytes. It must include: a client if the table is client-specific (3 characters); an area (2 characters); identification; and line counter (4 bytes). This means that the number of characters available for the identification of a client-specific table is 55 characters.
    The key, key, must be a character-type data object (but not a string).
    Additional methods for selecting and deleting data clusters in the cross-transaction application buffer are provided by the system class CL_ABAP_EXPIMP_SHBUF.
    Please consult Data Area and Modularization Unit Organization documentation as well.
    Addition 1
    ... = f (for each object to be imported)
    Addition 2
    ... TO f (for each object to be imported)
    Effect
    The object is placed in the field f
    Addition 3
    ... CLIENT g (after dbtab(ar))
    Effect
    Takes the data from the client g (if the import/export table dbtab is client-specific). The client g must be a character-type data object (but not a string).
    Addition 4
    ... TO wa (as the last addition or after itab(ar))
    Effect
    You need to use this addition if you want to save user data fields in the application buffer and then read them from there later. The system uses a work area wa instead of a table work area. The target area must have the same structure as the table tab.
    Example
    DATA: INDX_WA TYPE INDX,
          F1.
    IMPORT F1 = F1 FROM SHARED BUFFER INDX(AR)
                   CLIENT '001' ID 'TEST'
                   TO INDX_WA.
    WRITE: / 'AEDAT:', INDX_WA-AEDAT,
           / 'USERA:', INDX_WA-USERA,
           / 'PGMID:', INDX_WA-PGMID.
    Variant 6
    IMPORT obj1 ... objn FROM DATABASE dbtab(ar) ID key.
    Extras:
    1. ... = f (for each object to be imported)
    2. ... TO f (for each object to be imported)
    3. ... CLIENT g (before ID key )
    4. ... USING form
    5. ... TO wa (last addition or after dbtab(ar))
    6. ... MAJOR-ID id1 (instead of ID key)
    7. ... MINOR-ID id2 (with MAJOR-ID id1 )
    8. ... ACCEPTING PADDING
    9. ... ACCEPTING TRUNCATION
    10. ... IGNORING STRUCTURE BOUNDARIES
    11. ... IGNORING CONVERSION ERRORS
    12. ... REPLACEMENT CHARACTER c
    13. ... IN CHAR-TO-HEX MODE
    14. ... CODE PAGE INTO f1
    15. ... ENDIAN INTO f2
    The syntax check performed in an ABAP Objects context is stricter than in other ABAP areas. See Cannot Use Implicit Fieldnames in Clusters and Cannot Use Table Work Areas.
    Effect
    Imports data objects obj1 ... objn (fields, structures, complex structures, or tables) from the data cluster with ID key in area ar of the database table dbtab (see EXPORT TO DATABASE).
    The Return Code is set as follows:
    SY-SUBRC = 0:
    The existing data objects in the data cluster specified were imported. The rest remain unchanged (in some circumstances, this may mean that not data objects were imported).
    SY-SUBRC = 4:
    The data objects could not be imported, probably because an incorrect ID was used.
    The contents of all objects remain unchanged.
    Example
    Import two fields and an internal table:
    TYPES: BEGIN OF TAB3_TYPE,
              CONT(4),
           END OF TAB3_TYPE.
    DATA: INDXKEY LIKE INDX-SRTFD,
          F1(4), F2 TYPE P,
          TAB3 TYPE STANDARD TABLE OF TAB3_TYPE WITH
                    NON-UNIQUE DEFAULT KEY,
          WA_INDX TYPE INDX.
    INDXKEY = 'INDXKEY'.
    IMPORT F1   = F1
           F2   = F2
           TAB3 = TAB3 FROM DATABASE INDX(ST) ID INDXKEY
           TO WA_INDX.
    Notes
    You must declare the table dbtab, named after DATABASE, using the TABLES statement (except in addition 5).
    The structure of fields, field strings and internal tables to be imported must match the structure of the objects exported to the dataset. In addition, the objects must be imported under the same name used to export them. If this is not the case, either a runtime error occurs or no import takes place.
    Exception: You can lengthen or shorten the last field if it is of type CHAR, or add/omit CHAR fields at the end of the structure.
    The key, key, must be a character-type data object (but not a string).
    Additional methods for selecting and deleting data clusters in the database table specified are provided by the system class CL_ABAP_EXPIMP_DB.
    Addition 1
    ... = f (for each object to be imported)
    Addition 2
    ... TO f (for each object to be imported)
    Effect
    The object is placed in field f.
    Addition 3
    ... CLIENT g (before the ID key)
    Effect
    Data is taken from the client g (in client-specific import/export databases only). Client g must be a character-type data object (but not a string).
    Example
    DATA: F1,
          WA_INDX TYPE INDX.
    IMPORT F1 = F1 FROM DATABASE INDX(AR) CLIENT '002' ID 'TEST'
                   TO WA_INDX.
    Addition 4
    ... USING form
    Note
    This statement is for internal use only.
    Incompatible changes or further developments may occur at any time without warning or notice.
    Effect
    Does not read the data from the database. Instead, calls the FORM routine form for each record read from the database without this addition. This routine can take the data key of the data to be retrieved from the database table work area and write the retrieved data to this work area. The name of the routine has the format <name of database table>_<name of form>; it has one parameter which describes the operation (READ, UPDATE or INSERT). The routine must set the field SY-SUBRC in order to show whether the function was successfully performed.
    Addition 5
    ... TO wa (after key or after dbtab(ar))
    Effect
    You need to use this addition if you want to save user data fields in the cluster database and then read from there. The system uses the work area wa instead of a table work area. The target area entered must have the same structure as the table dbtab.
    Example
    DATA WA LIKE INDX.
    DATA F1.
    IMPORT F1 = F1 FROM DATABASE INDX(AR)
                   CLIENT '002' ID 'TEST'
                   TO WA.
    WRITE: / 'AEDAT:', WA-AEDAT,
           / 'USERA:', WA-USERA,
           / 'PGMID:', WA-PGMID.
    Addition 6
    ... MAJOR-ID id1 (instead of the ID key).
    Addition 7
    ... MINOR-ID id2 (with MAJOR-ID id1)
    This addition is not allowed in an ABAP Objects context. See Cannot Use Generic Identification.
    Effect
    Searches for a record the first part of whose ID (length of id1) matches id1 and whose second part - if MINOR-ID id2 is also declared - is greater than or equal to id2.
    Addition 8
    ... ACCEPTING PADDING
    Effect
    This addition allows you to append new fields to the end of structures, sub-structures, and internal tables. The IMPORT statement fills the additional fields with initial values; make existing fields (C, N, X, P, I1, and I2) longer; map character-type fields to STRING-type fields; or to map byte-type fields to XSTRING-type fields.
    Addition 9
    ... ACCEPTING TRUNCATION
    Effect
    This addition allows you to shorten the last CHAR fields, or to omit the last component at the top level. (Until Release 4.6, you could do this without using an addition).
    Addition 10
    ... IGNORING STRUCTURE BOUNDARIES
    Effect
    This addition means that only the fragment sequence is relevant - that is, that any sub-structures match. If you use this addition, the system ignores any alignment changes necessitated by Unicode - such as inserting named includes.
    You cannot use this addition with either addition 8 (enlarge structure) or addition 9 (shorten structure), since it specifies that structure and include boundaries are to be ignored.
    From Release 6.10 onwards, the include information is stored in datasets, so that the system can also check that includes match - that is, that sub-structures and includes (named or unnamed) are treated equally. When data is imported in a Release prior to 6.10, includes are not checked.
    Addition 11
    ...IGNORING CONVERSION ERRORS
    Effect
    This addition prevents the system from triggering a runtime error, if an error occurs when the character set is converted. '#' is used as a replacement character.
    Addition 12
    ... REPLACEMENT CHARACTER c
    Effect
    The replacement character is used if a particular character cannot be converted when the character set is converted. If you do not use this addition, '#' is used as a replacement character.
    This addition can only be used in conjunction with addition 11.
    Addition 13
    ... IN CHAR-TO-HEX MODE
    Effect
    All character-type fields are not converted. To convert a field, you must create a field (or structure) that is identical to the exported field or structure, except that all its character-type components must be replaced with hexadecimal fields.
    You can only use this addition in Unicode programs, to allow you to import camouflaged binary data as single-byte characters. Moreover, you cannot use this addition in conjunction with the additions 8, 9, 10, 11, and 12.
    Addition 14
    ... CODE PAGE INTO f1
    Effect
    The code page of the exported data is stored in the character-type field f1 - for example, to analyze data that has been imported with the IN CHAR-TO-HEX MODE addition.
    Addition 15
    ... ENDIAN INTO f2
    Effect
    The byte order(LITTLE or BIG) of the exported data is stored in the field f2 - for example, to analyze data that has been imported with the IN CHAR-TO-HEX MODE addition. The field f2 must have the type ABAP_ENDIAN, which is defined in the type group ABAP. For this reason, the type group ABAP must be included in the ABAP program using a TYPE-POOLS statement.
    Variant 7
    IMPORT obj1 ... objn FROM DATASET dsn(ar) ID key.
    This variant is not allowed in an ABAP Objects context. See Cannot Use Clusters in Files
    Note
    This variant is no longer supported and cannot be used.
    Variant 8
    IMPORT obj1 ... objn FROM LOGFILE ID key.
    Note
    This statement is for internal use only.
    Incompatible changes or further developments may occur at any time without warning or notice.
    Extras:
    1. ... = f (for each field f to be imported) 2. ... TO f (for each field f to be imported)
    The syntax check performed in an ABAP Objects context is stricter than in other ABAP areas. See Cannot Use Implicit Field Names in Clusters
    Effect
    Imports data objects (fields, field strings or internal tables) from the update data. You must specify the update key assigned by the system (with current request number) as the key.
    The key, key, must be a character-type data object (but not a string).
    The Return Code is set as follows:
    SY-SUBRC = 0:
    The existing data objects in the data cluster specified were imported. The rest remain unchanged (in some circumstances, this may mean that no data objects were imported).
    SY-SUBRC = 4:
    The data objects could not be imported. An incorrect ID may have been used.
    The contents of all objects remain unchanged.
    Addition 1
    ... = f (for each object to be imported)
    Addition 2
    ... TO f (for each object to be imported)
    Effect
    The object is placed in field f.
    Variant 9
    IMPORT DIRECTORY INTO itab FROM DATABASE dbtab(ar) ID key.
    Extras:
    1. ... CLIENT g (after dbtab(ar)) 2. ... TO wa (last addition or after dbtab(ar))
    The syntax check performed in an ABAP Objects context is stricter than in other ABAP areas. See Cannot Use Table Work Areas.
    Effect
    Imports an object directory stored under the specified ID with EXPORT TO DATABASE into the table itab. The internal table itab may not have the type HASHED TABLE or ANY TABLE.
    The key, key, must be a character-type data object (but not a string).
    The Return Code is set as follows:
    SY-SUBRC = 0:
    The directory was successfully imported.
    SY-SUBRC = 4:
    The directory could not be imported, probably because an incorrect ID was used.
    The internal table itab must have the same structure as the Dictionary structure CDIR (INCLUDE STRUCTURE).
    Addition 1
    ... CLIENT g (before ID key)
    Effect
    Takes data from the client g (only with client-specific import/export databases). Client g must be a character-type data object (but not a string).
    Addition 2
    ... TO wa (last addition or after dbtab(ar))
    Effect
    Uses the work area wa instead of the table work area. When you use this addition, you do not need to declare the table dbtab, named after DATABASE using a TABLES statement. The work area entered must have the same structure as the table dbtab.
    Example
    Directory of a cluster consisting of two fields and an internal table:
    TYPES: BEGIN OF TAB3_LINE,
             CONT(4),
           END OF TAB3_LINE,
           BEGIN OF DIRTAB_LINE.
             INCLUDE STRUCTURE CDIR.
    TYPES  END OF DIRTAB_LINE.
    DATA: INDXKEY LIKE INDX-SRTFD,
          F1(4),
          F2(8)   TYPE P decimals 0,
          TAB3    TYPE STANDARD TABLE OF TAB3_LINE,
          DIRTAB  TYPE STANDARD TABLE OF DIRTAB_LINE,
          INDX_WA TYPE INDX.
    INDXKEY = 'INDXKEY'.
    EXPORT F1 = F1
           F2 = F2
           TAB3 = TAB3
           TO DATABASE INDX(ST) ID INDXKEY " TAB3 has 17 entries
           FROM INDX_WA.
    IMPORT DIRECTORY INTO DIRTAB FROM DATABASE INDX(ST) ID INDXKEY
           TO INDX_WA.
    Then, the table DIRTAB contains the following:
    NAME     OTYPE  FTYPE  TFILL  FLENG
    F1         F      C      0      4
    F2         F      P      0      8
    TAB3       T      C      17     4
    The meaning of the individual fields is as follows:
    NAME:
    Name of stored object
    OTYPE:
    Object type (F: Field, R: Field string / Dictionary struc

  • I have an ipod that I have been using for iTunes, when I connect now to sync, and hit the eject ipod, I get a warning it can't eject due to applications being used in another program. I am having trouble disconnecting. Help!

    I am having a problem with the new iTunes store. I can connect my ipod, and it will show that it is syncing. Once the sync is complete on iTunes, my ipod still shows that it is connected, do not eject. I have not had a problem with this until the new verision of iTunes. When I go to eject my ipod, it tells me that it can't eject due to application being used in another program. I did receive an ipad 2 for Christmas, that I also sync with iTunes, but only the ipad shows up in my devices on the site, what happened to my ipod device and how to add it back to devices? Help is greatly appreciated. Thanks.

    Place the iOS device in Recovery Mode and then connect to your computer and restore via iTunes. The iPod will be erased.
    iOS: Wrong passcode results in red disabled screen        
    If recovery mode does not work try DFU mode.
    How to put iPod touch / iPhone into DFU mode « Karthik's scribblings

  • How to read data from a file that is already open by another program

    Hey..
    I have made IV, where I'm trying to read data from a log file, that is being updated by another program while my IV runs.
    To be clear, this program writes data continuously to this file and I want to read from the file in LV at the same time.
    The problem is that LV reports an error when I'm trying to read the log file, even if I use to "read only" mode.
    I believe that the program that is producing the file, have some kind of lock on the file. I have tryed to copy the file and then reading from the copied file, but LV throws already an error when I try to copy the file.
    Has anyone tryed this, and found a solution.?
    Additional info: The program that produces the file is STM Studio 
    Best Regards
    Allan

    Hi Alha,
    when that file is locked by the other program you can't do anything about that - apart from quitting that other program. Probably this isn't an option to you…
    Best regards,
    GerdW
    CLAD, using 2009SP1 + LV2011SP1 + LV2014SP1 on WinXP+Win7+cRIO
    Kudos are welcome

  • My iPod isn't being used by another program!

    So I just got a new, 2nd gen green iPod shuffle today. And I updated it once and I got all my Kelly Clarkson songs on it. Then I synced some MCR songs on iTunes and I plugged my iPod back into the computer via USB dock. It kept on saying 'iPod is being used by another program, not able to update.' I tried this several times and the same message kept on popping up. I got really frustrated.
    Would someone be kind enough to help me?
    iPod 2nd Gen Shuffle   Windows XP  

    Just try restarting your computer first. Your computer has many, many applications running at any one time so its not surprising that your iPod is being used by another programme. If you uploaded your Kelly Clarkson songs then closed iTunes and then opened iTunes up again, without turning your computer off, or even worse - just pulling your iPod out of the USB port without pressing the disconnect button!, then the computer may still think iTunes is using it and iTunes itself may think another programme is using your iPod when actually, iTunes is using it itself! So I suspect that once you have turned your computer off and turned it on again, then when you plug your iPod in again it will work.

  • Webcam being used by another program/Other Person ...

    Okay, here's the problem. I just bought a new windows 7 PC and it came preinstaled with Skype. I tested the webcam and everything seemed fine. Then we got a video call from someone that uses an ipod and the video wouldn't work. I looked and it said that my webcam could not be used because another program must be using it. Only thing is, NO OTHER PROGRAMS ARE RUNNING. Not even Explorer or Firefox.
    So I decided to do some testing. First I tried downloading it on my Android phone to make sure it wasn't related to an iphone/ipod problem, still doesn't work. Then I double checked to make sure my drivers and software were all updated. Everything is up to date. Then I disabled auto-sign-in on startup in case skype was loading before my webcam driver was, still nothing.Then I tried running in compatability mode for windows xp, Skype freezes and wont even start. Now I'm officially out of ideas
    So to sum it up. When I start skype, and go to video, my webcam will work, but as soon as someone tries calling, they can't see any video. I'll list all my stats below. This is very frustrating because this is the same webcam that I was using on an older computer that recently gave me problems, so I bought an entirely new computer and it works great, but now skype won't work. Why can't this stuff ever be simple?
    Windows 7 64bit.
    AMD DUAL CORE 1.3ghz processor
    4 GB of RAM
    Skype 5.9
    Webcam Logitech c110
    Webcam is designed to work with windows 7
    Webcam software and drivers are all up-to-date
    Webcam worked with Skype on windows XP just a week ago
    Webcam works with other programs NONE OF WHICH are ever running in the background. Double, no Tripled checked. No messenger, Oovoo, Explorer, Firefox, Yahoo, or anything.
    Does anyone have ANY ideas? This is really important to me. We recently moved out of state and this is the only way we can see my family. Thank you in advance for any help.

    I am also having the same subject problem.  When I go to Tools->Options->Video settings the video stream is OK.  So what interfering software is running during a video call that is not running when I check the video settings?  I have included some thoughts and observations below.
    My webcam device name in Windows is:  USB Video Device.  The OS is Windows XP Pro SP3.  SKYPE version is 5.9.0.115.  Webcam is Logitech C210 and I am using the Microsoft USB video device driver, not the Logitech drivers. I have uninstalled the other Logitech software a long time ago. 
    When I open My Computer in Windows and click on “USB Video Device” the  USB Video Device window opens with webcam preview video displayed as long as no other programs are using the webcam.  If SKYPE is running and producing video (Tools->Options->Video settings), instead of good video displayed on the USB Video Device window I get the Windows video error message shown below.
    Windows video error message: 
    window title: Video Preview Failure.
    “Creation of the video preview failed.
    Please check the device connection and make sure that the device is not being used by another application or user.”
    Similarly, If I start SKYPE (Tools->Options->Video settings)with no other programs running that use the webcam I get good video.   However, if I start the Windows USB Video Device preview video before I start the SKYPE video, I get the SKYPE video error  message shown below that indicates that SKYPE can’t start the video. 
    SKYPE video error  message: 
    Black window with white exclamation point in red circle. 
    “Can’t start video.  Try closing other programs that might be using your webcam.”
    While this little experiment is completely expected, I have been getting the SKYPE video error  message when I try to make video calls.  Just before the call, Tools->Options->Video settings results in a good, solid video stream.  During the call I can see and hear my contact but my contact can only hear me.  The SKYPE video error  message appears.  The webcam icon shows a red diagonal line through it.  My contact can very briefly see me when I click on the webcam icon temporarily removing the red diagonal line.  But then SKYPE returns to the error state.
    As far as I could tell no other applications were running that could conflict with SKYPE and result in this error condition!  Does anyone have any additional suggestions for identifying the interfering  software or application?  Or is there some other reason this particular SKYPE video error message occurs?
    Thanks in advance for any suggestions.
    P.S.:  It’s too bad the SKYPE program can’t provide some diagnostic clue to help the user identify the offending application software.

  • Unable to disconnect - files used by another program?

    Looking for some help. Last few times I've connected my iPod to my computer, it won't let me eject it after the update is complete. When I click either eject button, I get a message claiming that some of the files are being used by another program and it can not eject the iPod. However, I have no other programs running at anytime will iTunes is running. I end up going into My Computer and ejecting the drive from there, but I really should be able to do it through iTunes.
    Anyway of finding out what the files that are being "shared" are? Should I convert all of my files to one specific format?
    Dell   Windows XP   80 gb iPod (5.5 generation)
    PC   Windows XP  

    Looking for some help. Last few times I've connected my iPod to my computer, it won't let me eject it after the update is complete. When I click either eject button, I get a message claiming that some of the files are being used by another program and it can not eject the iPod. However, I have no other programs running at anytime will iTunes is running. I end up going into My Computer and ejecting the drive from there, but I really should be able to do it through iTunes.
    Anyway of finding out what the files that are being "shared" are? Should I convert all of my files to one specific format?
    Dell   Windows XP   80 gb iPod (5.5 generation)
    PC   Windows XP  

Maybe you are looking for

  • Problem with Form and webutil loading jar and connection

    Can anyone shed light on this. Here is my java console output. I then get FRM-90250 and FRM-92101.... Orion-web.xml <virtual-directory virtual-path="/webutil" real-path="C:\webutil/lib" /> Forms90.conf #Virtual path for WebUtil AliasMatch ^/forms90/w

  • Access local network drive

    I am looking for a way to access any kind of local network drive shuch as samba or nfs. It doesn't seem to be integrated in firefox os and I can't find an application with this functionnality. Please help !

  • Search for a file name by time stamp

    Powershell allows us to append the date faily easily to a file name (eg. "test.txt $(get-date -f dd-MM-yyyy).txt").  I'm looking for a simple script to search for a powershell script by a static name with todays date appended.  I then want to move th

  • Windows feature page blank

    Hi everyone. I got a envy h8-1513c running on windows 8 64-bit. I went on my windows feature page and I mistakenly unchecked all the features. At this time, no applications or programs were working. I paniqued and I went back to the windows features

  • Accessing Secured Web Services fromPL/SQL  Code.

    Hi , This is an urgent requirement.We need to call a Web Sercured which is secured(That we need Authenticate using Digital Signatures).I don't how to call a Secured web service from PL/SQL code.with java it is possible. Can anyone help me in confogur