What is Analytics -- is this BI Part - who has to do this.

Dear All,
I want to know, what is Analytics, I red many SDN Links but I did not understand the Analytics.
If I want to use Analytics what exactly I need , it will come with SAP BI ?
Are we need any additional software / Licenses.
I read some were , for this we need Visual Composer and EP6.
I want to know that Analytics is part of SAP BI Implementation ?.
I donu2019t know Visual Composer, is BI consultant has to do Visual Composer also.
If Clients wants Analytics , who has to configure, for this there is Another consultant are BI consultant has to do.
I appreciate for your repalyu2026
Regards,
@SHAIK

Need Help on this topic.....
it is a separate Installation, is we need separate Licenses.
this analytic is part of BI Implementation, BI consultant has to do?
Thanks
@SHAIK...

Similar Messages

  • I've just downloaded Sophos (yesterday) and commenced the scan. It keeps stopping part way through, the 2nd time when it was about 98% completed after 4 hours!!!! I've had to start again. What could be causing this? I have Mountain Lion.

    I've just downloaded Sophos (yesterday) and commenced the scan. It keeps stopping part way through, the 2nd time when it was about 98% completed after 4 hours!!!! I've had to start again. What could be causing this? I have Mountain Lion.

    Thomas A Reed wrote:
    You will be advised by people here that Sophos is "junk" and should be removed {...} Sophos actually works pretty well, in my testing, and so I would suspect that there may be an underlying problem with your file system that needs to be repaired.
    FWIW, I have used Sophos regularly for several years now (including on my new iMac running Mountain Lion versions 10.8.2 & now 10.8.3) & never had any problems with it on any of the half dozen or so Macs I have installed it on.
    Quite a few people automatically assume all Mac A-V software is troublesome junk, & many will leap to the conclusion it is the cause of some problem without considering other potential (& often much more likely) causes, regardless of which A-V product is installed.
    Obviously I hope, not all A-V products are alike, so it doesn't make a lot of sense to me to condemn them all because of problems with one of them. Regarding Sophos in particular, finding first hand reports of it causing problems is quite difficult -- typically, if you ask for the details it turns out to be a second or third hand report & there isn't enough info available to know for certain if it is the real cause or not.
    This is not to say it is impossible for it to cause problems, just that it is prudent to consider all the possibilities before concluding that any one of them is the cause.

  • Keep getting an error pop-up in Firefox says "rappino.exe has encountered a problem and will close". What is rappino.exe, is it part of FireFox, is this important?

    I keep getting an error dialogue when running FireFox, it says "rappino.exe has encountered a problem and will close" What is rappino.exe, is it part of FireFox, should I worry"
    == This happened ==
    A few times a week

    See:
    * https://support.mozilla.com/en-US/kb/Firefox%20crashes%20when%20you%20open%20it

  • HT4623 When I was updating my iphone to the new iOS at the final part (when the syncronization is beind done in iTunes), it never finshed. It's been more than 1 hour and it says "syncronizing step 2 of 4". What to do in this case?

    When I was updating my iphone to the new iOS at the final part (when the syncronization is beind done in iTunes), it never finshed. It's been more than 1 hour and it says "syncronizing step 2 of 4". What to do in this case?

    Hi lucaloo,
    Welcome to the Support Communities!
    The article below may be able to help you with this.
    If you can't update or restore your iOS device
    http://support.apple.com/kb/ht1808
    Cheers,
    - Judy

  • I received a second iPad Air as a gift and sold on Ebay.  The person who bought it asked if is a Oem pad.  Not sure what that means.  The model part number is PF004LL/A

    I received a second iPad Air as a gift and sold on Ebay.  The person who bought it asked if is a Oem pad.  Not sure what that means.  The model part number is PF004LL/A.

    You can see the model number in Settings>General>About>Model. The model number has a two-letter code, a number and some more letters. The last part stands for the country/region. The first letter can be "F" (refurbished), "M" (normal retail), or "P" (personalized / engraved). For example MC605B is the model MC605 and B is for the region.
    What country does my device belong to?
    http://www.jbfaq.com/article.asp?id=63
     Cheers, Tom

  • Could someone who has dns set up correctly confirm that this test works?

    The test that's here http://docs.info.apple.com/article.html?artnum=106798 says if you attempt to visit this link:
    http://17.254.0.91
    and you are taken to Apple's page then you probably don't have your DNS set up correctly.
    Can anyone confirm, who has their DNS set up correctly, that attempting to visit that link does not work for them please?
    TIA

    Right, thanks for that info. I don't understand what all the code stuff is at all, but I do understand this:
    If you type in the link stated and you are taken to Apple’s page then DNS IS SET UP CORRECTLY.
    I'm still confused though. In that article/test in part of its explanation of DNS it says:
    If you encounter some applications that continue to work, it may be because they are set up to go directly to an IP address, bypassing the need for DNS service.
    Surely typing in http://17.254.0.91 into your browser is a way of making your browser access apple's site *bypassing DNS*? -- because you're using the IP address irradicating the need for changing a name into an IP address. The way to test if DNS is working, surely, is to try and access apple's site via www.apple.com? Not http://17.254.0.91.
    Thanks.

  • I don't know what to do in this situation.. I'm in the rural area

    currently I own 2 iphones, iphone 4 and iphone 5 and both are destroyed unexpectedly.
    our family is not a rich family but my father tried his best to give those phones to me as a present,
    so those are really precious and I really took care of it.
    my iphone 4 had a battery problem and the button problems as well, idk why this is always happening...
    however, sad things happend for both phones. there was sudden lcd problems like there was a line in the bottom part of the phone and it got bigger.
    and one day, it just shut down unexpectedly. I was just holding a phone, but the screen got blurred and it shut down. and I can't even open it until now.
    I tried my best to repair the phone, that since I'm living in a rural area, I asked my friend who goes to urbane area for the repair, and they said
    it can't be repair cause this phone is from hongkong. (it happened in the philippines and I was disappointed much ) and they just sent it back.
    but I had to fix this phone. maybe for others it's just an Iphone, but because this is such a meaningful gift from my father from his hard working.
    I asked my another friend who goes to korea to give this phone to apple center again cause I thought they are way better than the philippines center.
    however, their answer was shocking. apple center in korea said that, some part of the phone is removed so they can't repair it anymore.
    definitely, it had to be gotten from the philippines apple center. I was so terrified who could they do that to the customer..
    and I wanted to send an email to apple about this situation, and sadly it has to be approved to send an email I guess form the phone, but how can I do that with the destroyed phone? so I really have no idea what to do with this situation. It has been so long already living without phone... I really need help from apple..

    This is a user-to-user technical support forum. Apple is not here. You can find contact information from Apple by using the Contact Us link at the bottom right of every page.
    iPhones do not have international warranties. The only place in which you can get Apple service on your phones would be Hong Kong. Unless you have AppleCare, neither of these phones is under warranty. It is likely that the best Apple could offer you is an out-of-warranty replacement.

  • My Bootstrap nav conundrum: Does anyone who has used a bootstrap nav in BC had this issue...

    My Bootstrap nav conundrum: Does anyone who has used a bootstrap nav in BC had this issue or know the fix: If you look at any page on http://www.aerotype.com, the first two clicks on almost any part of the page (like the rotator image left or right arrow) cause the page to jump, and you open the inspector on the top nav area and look at the div with the class="navbar-collapse collapse navbar-right navbar-ex1-collapse" you'll see that an additional class, .in, is added and .collapse is removed on the first click, and a style="height: auto;" is added, then on the second click it's changed to style="height: 0;"... I can't figure our what is causing 'in' to be added to the class (or .collapse removed), what it's for, or how to change it, if that is the issue... the his doesn't happen when the class: navbar-collapse is removed, so I think is has something to do with that but of course the collapse doesn't function without it. If anyone can enlighten me on what is going on I would Greatly appreciate it.

    You have this click function on the top'ish part of your site.js that is causing this issue!
    // collapse navbar in phone mode on click $(document).on('click',function(){ $('.navbar-collapse').collapse('hide'); }) // end collapse navbar in phone mode on click
    Your are better off just deleting it (the click function) as it is not doing what the code comment says it does.

  • My iMac running 10.10.2 keeps crashing several times a day. It does a automatic restart and gives me a option to send in a report. Any ideas what might be causing this?

    My iMac does an automatic restart several times a day. It gives me a option to send in a "panic" report. This happens randomly during the day and night. Any idea of anything new that might be causing this? I am up to date on all applications.

    Mac users often ask whether they should install "anti-virus" (AV) software. The usual answer is "no." That answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions.
    It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to take control of it remotely. That threat is in a different category, and there's no easy way to defend against it. AV software is not intended to, and does not, defend against such attacks.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't been checked for security by Apple unless it comes from the App Store, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has taken far too long to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. Those lapses don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, not machine behavior, and no technological fix alone is going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're better informed than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software. A genuine alert that Flash is outdated and blocked is shown on this support page. Follow the instructions on the support page in that case. Otherwise, assume that the alert is fake and someone is trying to scam you into installing malware. If you see such alerts on more than one website, ask for instructions.
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Rogue websites such as Softonic, Soft32, and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission. All "YouTube downloaders" are in this category, though not all are necessarily malicious.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a padlock icon in the address bar when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial AV or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It can be as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • What do you call this basic technique?

    Request: Is there a name for the technique I'm using below, because I
    know I've seen it and done it before.
    Context: I'd like to allow the user to resize images, while preserving
    their width:height aspect ratio. My GUI has a pair of JSpinners, for width
    and height, and when one is adjusted, the other should change.
    Example: if the aspect ratio is 2:1, setting the width spinner to 201
    should cause the height spinner to change to 100 (I truncate), whilst setting
    the height spinner to 100 should cause the width spinner to change to 200.
    But: I don't want those reactions to cascade: from the example, if the
    user sets the width spinner to 201, the height spinner should change to 100,
    but that is where it should stop -- the width spinner shouldn't itself react
    and change to 200.
    My solution: I'm a fan of fixing it in the model, and here is my tweak for
    SpinnerNumberModel: public class SafeSpinnerNumberModel extends SpinnerNumberModel {
         public SafeSpinnerNumberModel(int value, int minimum, int maximum, int stepSize) {
             super(value, minimum, maximum, stepSize);
         public void setValue(Object value) {
             if (!inSetValue) {
                 inSetValue = true;
                 super.setValue(value);
                 inSetValue = false;
         private boolean inSetValue;
    In my code, there are two JSpinners (with SafeSpinnerNumberModels),
    and each model has a ChangeListener that reacts by adjusting the other model.
    The flag stops the potential feedback loop.
    So, again, what would you call this technique?
    Thanks,
    BDLH

    Me too. And they love all those visual little
    thingies so much: ooh, when
    the number is positive it's displayed in black,
    otherwise it's red. I'm a
    genius! No lemme put 90 percent profit in here, just
    for the "what-if"
    question part. Yay! It's black!You should see some of the spreadhseets we have here. Risk management, process compliance, earned value management... I have no idea what any of this is, but its all thousands of rows of red-green-yellow, telling who's not doing any work. And if you change one value all the colors change all over the place. I bet they have Tetris encoded in there.
    I attempted to finish my bookkeeping for Q3 last
    Sunday but I was
    distracted by myself attempting to do the Towers of
    Hanoi puzzle
    using Excel. I managed to make it work, but it was so
    awful (using
    additional cells etc) I deleted it all. I still have
    to finish up Q3 ...Hmm, I believe I'll start short-selling JosAH Industries ;-)

  • What is Analytics? We say, you say...

    This is a comment that many customers, potential clients and SAP Partners are asking.  It's a fair question because each SAP product release comes with a whole set of acronyms, slang, lingo, mini-language that is often confusing to new users.
    Take Business Intelligence (BI).  Any software vendor who provides a reporting tool will say that they now also have BI.  But is this really true?  Does slapping a user friendly front end to access a couple of joined relational database tables constitute a BI tool/environment? And is BI defined by the tools and data it accesses? Or is BI really a data universe that was thoughtfully created with astuteness, wisdom and good judgment of the business processes being supported by the BI data universe.
    So back to the title: <b>What is Analytics</b> and who has the most simple concise, easy to understand definition?
    Potential users are asking for a "walk thru" of how an Analytics solution is built using xAPP Analytics and Business Intelligence of SAP.  Jaded BI users are sending SAP messages showing immediate disdain for the touted simplicity of Visual Composer's ability to seamlessly bring any kind of data into the Analytics data space. IT users are right to be skeptical. They have to actually implement a real world solution that will impress their executives and keep it inexpensive (relatively). The information landscape is increasing in complexity at an exponential rate. Global corporations are using the SAP ERP and NetWeaver umbrella to encapsulate in transactional and operational data from newly acquired companies and plants. All corporations want to harmonize the disparate islands of transactions and islands of information that have yet to be globally joined.
    <b>We say, you say</b>.  What do <b>YOU SAY about Analytics</b>? We’d like to hear from you.

    BI always been about enabling analysis and reporting. When business users look at a BI report, they slice it and dice it, use it to analyze the business.  And BI has always been utilized to analyze business processes, including accessing data in operational systems to do just that.
    So, what is analytics?  An aspect of BI, in reality.  Marekting may tell you someting different.  Of course SAP's BI application has the ability to readily utilize any kind of data in the analysis capabilities delviered.
    Agreed, BI is a universe, that is not defined by the tool utilized nor the data that is accessed.  So why does it seem that there seems to be some delineation which apparently is  based on which tool is being utilized?
    Originally, the differentiator between the new "analytics" and BI, was that analytical applications provide the "closed loop" scenarios - where you can analyze information, then through the application, initiate action in an operational system in an automated manner.  That aspect of analytics has kind of "disappeared", as the difficulty of actually implementing that type of functionality has been shown to be extremely difficult.
    Certainly, SAP's BI solution has extensive abilities to "to harmonize the disparate islands of transactions and islands of information that have yet to be globally joined".  Features such as UDI, DBconnect, remote query scenarios, VirtualProvider make this concept not only possible, but are already utilized heavily by SAP customers.
    What is the difference between BI from SAP and analytics?  Well, one is that the applications are developed by different groups with very little collaboration.  BI is mainly developed in Walldorf, analytics is mainly developed in Israel. 
    One difference (in the tools, not the concepts) is that the BI application features only limited abilities to integrate non-SAP data at the front-end (the Web Analyzer in BI in SAP NetWeaver 2004s has this feature, for example), while SAP Analyics has extensive functionality for this purpose.  With SAP analytics, users can model data integration scenarios from multiple applications on the front-end, while typically with the BI application this modeling is done on the back-end (and then the data can be used on the front-end). However, surely back-end modeling vs. front-end modeling is not a differentiator between BI and analytics.
    When thinking about the concepts however, analytics is just one aspect of BI, despite the somewhat arbitrary attempts to differentiate them, mainly based on differences in tools and in marketing messaging.

  • Hey What's Up With THIS!    I attempted to disconnect from iCloud from my Mac Book Pro the system said I'd loose anything on my computer which had already been uploaded to the iCloud.    When I did the same with my iPhone a message came up asking me IF I

    Hey! What's Up With THIS!?
    I've been working on a Keynote Presentation for some time now.
    Once I added the iCloud.
    The system kep going into Storage Mode every 3-4 click on the keyboard or mouse.
    So I decided to shut the iCloud down from my computer.
    Oh Yeah... Here's the FUN Part.
    The system stated 'IF I did..... Everything loaded into theiCloud would be removed from my computer
    (MacBook Pro).
    So soon after (I obviously didn't disconnect the iCloud, can't afford to losse 'who knows what')
    So soon after I went into my iPhone to turn it off as well...
    There I received the message/question "Do you want items left on your iPhone?"
    Huh!     I didn't even receive that option on the Mac.

    Sweet!   Thank You Very Much!
    You should be a Tech!
    You explained it as simple as any Apple Tech I've spoken to.
    I'm in Alaska.
    We just received our first Apple Store 2 months ago.
    During their third week of operation, I mistakenly walked in assuming it was a
    contract Apple store (I heard a New branch/store of an Apple sub had opened a new store in
    Anchorage).  Needless to say, I bet I took 15 -20 classes in that week. Tuesday through Monday.
    Yep! I cancelled everything and just nailed everyone I could.
    I live near Fairbanks approximately 7+ hrs away.
    I had never had any instruction on Apple/Mac since becoming a PC convert just before Christmas of 2008.
    The Crew of Trainers Apple brought in, and New one's still in training are Exceptional!
    I've been like a five year old with a Ferrari until these Awesome Folks and Kids trained me in at
    That Apple Store.    They even assisted me in tweeking a Keynote Presentation prior to going into a 6 day
    Engineering Show also in Anchorage three weeks ago.

  • My facebook profile photo shows up on an email to a friend who has a yahoo email address, but is not my Facebook friend. All my FB privacy settings are at the max. Is this a Yahoo privacy issue? I don't want my photo to go to other than FB friends.

    I recently sent an email to a friend, who is NOT a Facebook friend, who has a yahoo email account, and my Facebook profile picture appeared next to the email. My privacy settings on FB only allow FB friends to see my photo. Why is another yahoo account that is not a FB friend seeing my profile photo and is there a Yahoo privacy setting that will eliminate this from happening? Thank you.
    == This happened ==
    Just once or twice
    == this week

    Did you check that your Facebook settings haven't changed?
    Facebook may have changed them as part of a software update.
    Is there a link in that email (signature) with a link to that picture?
    Try to send an email to yourself.

  • How can I find out this person who has been emailing me every few months. I have one of the emails full header that I retrieved on my iPhone.

    How can I find out this person who has been emailing me every few months. I have one of the emails full header that I retrieved on my iPhone. I omitted my email address for privacy, but mostly it is original. Is this email a scam? I don't know who this person is. Thanks in advance!
    Delivered-To: myemailaddress
    Received: by 10.194.200.42 with SMTP id jp10csp681530wjc;
            Sat, 5 Jul 2014 14:14:16 -0700 (PDT)
    X-Received: by 10.50.56.84 with SMTP id y20mr28216830igp.8.1404594856368;
            Sat, 05 Jul 2014 14:14:16 -0700 (PDT)
    Return-Path: <[email protected]>
    Received: from nm33.bullet.mail.ne1.yahoo.com (nm33.bullet.mail.ne1.yahoo.com. [98.138.229.26])
            by mx.google.com with ESMTPS id m3si35722810igx.17.2014.07.05.14.14.15
            for <myemailaddress>
            (version=TLSv1 cipher=RC4-SHA bits=128/128);
            Sat, 05 Jul 2014 14:14:16 -0700 (PDT)
    Received-SPF: none (google.com: [email protected] does not designate permitted sender hosts) client-ip=98.138.229.26;
    Authentication-Results: mx.google.com;
           spf=neutral (google.com: [email protected] does not designate permitted sender hosts) [email protected];
           dkim=pass (test mode) [email protected]
    Received: from [127.0.0.1] by nm33.bullet.mail.ne1.yahoo.com with NNFMP; 05 Jul 2014 21:14:14 -0000
    Received: from [98.138.226.180] by nm33.bullet.mail.ne1.yahoo.com with NNFMP; 05 Jul 2014 21:11:31 -0000
    Received: from [216.39.60.172] by tm15.bullet.mail.ne1.yahoo.com with NNFMP; 05 Jul 2014 21:11:31 -0000
    Received: from [216.39.60.235] by tm8.access.bullet.mail.gq1.yahoo.com with NNFMP; 05 Jul 2014 21:11:31 -0000
    Received: from [127.0.0.1] by omp1006.access.mail.gq1.yahoo.com with NNFMP; 05 Jul 2014 21:11:31 -0000
    X-Yahoo-Newman-Property: ymail-4
    X-Yahoo-Newman-Id: [email protected]
    Received: (qmail 10573 invoked by uid 60001); 5 Jul 2014 21:11:30 -0000
    DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bellsouth.net; s=s1024; t=1404594690; bh=8lP9IZEfjYYvkNMfRPgse4H7Tdyw/p0f3ooOSB7OIWQ=; h=References:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=cPhLMVvHd7njmUyKFL8pNlQ0EXM+UFVsNWmHYcJMzKp4uWRlYckCEh+YQ+bkGMfCSgyUf5wEagOx6V4yIZ/7exoVJ0o1Njv7B/MbasfBtay6mz78OZH+NpblaoXu4sCVOzWEac1D4V5C4IZkrw+gs6YR8j7r69MTbDiIgkNx+M8=
    X-YMail-OSG: YIV3Og8VM1n.PMXdFiukRw_37cXcu7K4JqrkCRRAd4uAIqh
    7bDt6_LpjPVNd_7061V2HtSOshQ5IhAM6cHrANh11vcCPels0RxQAo42gFw9
    WqvBpNbW47_ShV.gbS7FEh2bp01k38s9DF9rDZE2yfMoZx145AsWCJcHwL_B
    OzdCrD.IeJPFFPTfbumbwibDSriFOpkX32K6QCbITIE0eK9XEDBW87UqBh1N
    H8dHrTTUp7SCHa6WVIXbcn93Zvk6DdM4gqypxDqeEIsFcRcXWIp_yP_5E2zr
    VCeW6CYrGgYukU8H1Xv2kIDdJDa2ohHmPGgme44wJjk6PbhBZ_V_nsTYiOsi
    YY0FB5vwVlif7rw7EWozVUVXst_YOjpr1M0QQc.aztb8O_5DgdzSLXLj1bcy
    UgTvu9dknKMzu4CfYIYOOag_8iCQS6B9t8750NRn2XEdreWAsIcjvOmuRZ5p
    G.1hOcP0e2pKM6ZXkfDcLesDpTyRX2k39kkhaOQLKjQfu15v5vgSkHAdaGR5
    vlEqufGG0mUygckQ4whX29pjbiKAwltm9C8Kwv98PCCt4o1k6GEjShLJ7lze
    u2HthiVEBWHEWxCluIQ0zoV6euEyjyHcFPMsNalbM.Wf6GyL4w.Eb7L.kxIC
    IY4qCJMW8byI5myLQtE6CuqPpVOPuUrXM3sksYCsKO2OJ5sJBJ99DuZ8TbYG
    pWDoaGQhSnuokIjgV_9qFYH5JX17XGUvcFTwc3Bt8lUpihXKpnGNjAD2Ix14
    tOYJwOGqsgm97ELPLKPN0hUVslr7bWcv81fuWkCwBYFOlwqJWaGY-
    Received: from [69.197.222.248] by web181604.mail.ne1.yahoo.com via HTTP; Sat, 05 Jul 2014 14:11:30 PDT
    X-Rocket-MIMEInfo: 002.001,CgogCk9uIFNhdHVyZGF5LCBKdWx5IDUsIDIwMTQgMzo0NyBQTSwgRSBMIEpSIEhFUk1BTk4gPGVoZXJtYW5uOTE0OEBiZWxsc291dGgubmV0PiB3cm90ZToKICAKCgpUSEFUIFdBUyBHUkVBVCBJVCBSRUFMTFkgR0lUUyBUSEUgUE9JTlQgQUNST1NTIQrCoApJIHNlbmRpbmcgaXQgdG8gYWxsIG9uIG15IGUtbWFpbCBsaXN0LiBIT1BFIFlPVSBETyBUSEUgU0FNRS4KwqAKQWwgSGVybWFubiAKCgpPbiBXZWRuZXNkYXksIEp1bHkgMiwgMjAxNCAxMDoxNCBBTSwgQm9iYmllIFJhZ3NkYWxlIDxicmFnczI4MDRAYXQBMAEBAQE-
    X-Mailer: YahooMailWebService/0.8.191.1
    References: <DCB3F2E14C7D47B8AC60CB1A86EE0D75@RaleighHP3> <[email protected]> <[email protected]>
    Message-ID: <[email protected]>
    Date: Sat, 5 Jul 2014 14:11:30 -0700
    From: E L JR HERMANN <[email protected]>
    Reply-To: E L JR HERMANN <[email protected]>
    Subject: Fw: Volkswagen Ad     (FROM AL HERMANN, PLEASE WATCH THIS ONE)
    To: undisclosed recipients: ;
    In-Reply-To: <[email protected]>
    MIME-Version: 1.0
    Content-Type: multipart/alternative; boundary="2017413661-1636348801-1404594690=:35141"
    --2017413661-1636348801-1404594690=:35141
    Content-Type: text/plain; charset=iso-8859-1
    Content-Transfer-Encoding: quoted-printable
    =0A=0A =0AOn Saturday, July 5, 2014 3:47 PM, E L JR HERMANN <ehermann9148@b=
    ellsouth.net> wrote:=0A  =0A=0A=0ATHAT WAS GREAT IT REALLY GITS THE POINT A=
    CROSS!=0A=A0=0AI sending it to all on my e-mail list. HOPE YOU DO THE SAME.=
    =0A=A0=0AAl Hermann =0A=0A=0AOn Wednesday, July 2, 2014 10:14 AM, Bobbie Ra=
    gsdale <[email protected]> wrote:=0A  =0A=0A=0A=0A=0A=0A =0A=0A  =0A=0A=0A =
    =0A=0A =0A=0A =A0          =0A=0A =0A=A0 =0A>>>=A0 =0A>>>What a brilliant =
    way to communicate  how risky it is to use mobile phones while driving! Mor=
    e than  1.5 million views in 3 days! =0A>>> =0A>>>https://www.youtube.com/e=
    mbed/JHixeIr_6BM?rel=3D0&autoplay=3D1&iv_load_policy=3D3
    --2017413661-1636348801-1404594690=:35141
    Content-Type: multipart/related; boundary="2017413661-447096318-1404594690=:35141"
    --2017413661-447096318-1404594690=:35141
    Content-Type: text/html; charset=iso-8859-1
    Content-Transfer-Encoding: quoted-printable
    <html><body><div style=3D"color:#000; background-color:#fff; font-family:He=
    lveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;fo=
    nt-size:18pt"><div><span></span></div><div class="3D""qtdSeparateBR"><br><br>=
    </div>  <div class="3D""yahoo_quoted" style=3D"display: block;"> <div style=
    =3D"font-family: HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Gr=
    ande, sans-serif; font-size: 18pt;"> <div style=3D"font-family: HelveticaNe=
    ue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif; font-size:=
    12pt;"> <div dir=3D"ltr"> <font face=3D"Arial" size=3D"2"> On Saturday, Ju=
    ly 5, 2014 3:47 PM, E L JR HERMANN &lt;[email protected]&gt; wrote=
    :<br> </font> </div>  <br><br> <div class="3D""y_msg_container"><div id=3D"yi=
    v2053837142"><div><div style=3D"color: rgb(0, 0, 0); font-family: Helvetica=
    Neue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif; font-siz=
    e: 18pt; background-color: rgb(255, 255, 255);"><div><span>THAT WAS GREAT I=
    T REALLY GITS THE
    POINT ACROSS!</span></div><div><span></span> </div><div><span>I sendi=
    ng it to all on my e-mail list. HOPE YOU DO THE SAME.</span></div><div><spa=
    n></span> </div><div><span>Al Hermann</span></div> <div class="3D""yiv20=
    53837142qtdSeparateBR"><br clear=3D"none"><br clear=3D"none"></div><div cla=
    ss=3D"yiv2053837142yqt7474766236" id=3D"yiv2053837142yqt52974"><div class=
    =3D"yiv2053837142yahoo_quoted" style=3D"display: block;"> <div style=3D"fon=
    t-family: HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, s=
    ans-serif; font-size: 18pt;"> <div style=3D"font-family: HelveticaNeue, Hel=
    vetica Neue, Helvetica, Arial, Lucida Grande, sans-serif; font-size: 12pt;"=
    > <div dir=3D"ltr"> <font face=3D"Arial" size=3D"2"> On Wednesday, July 2, =
    2014 10:14 AM, Bobbie Ragsdale &lt;[email protected]&gt; wrote:<br clear=3D=
    "none"> </font> </div>  <br clear=3D"none"><br clear=3D"none"> <div class=
    =3D"yiv2053837142y_msg_container"><div id=3D"yiv2053837142"><div><div style=
    =3D"color: rgb(0, 0, 0);
    font-family: HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grand=
    e, sans-serif; font-size: 14pt; background-color: rgb(255, 255, 255);"><div=
    ><span><br clear=3D"none"></span></div><div class="3D""yiv2053837142qtdSepara=
    teBR"><br clear=3D"none"><br clear=3D"none"></div>  <div class="3D""yiv205383=
    7142yahoo_quoted" style=3D"display: block;"> <div style=3D"font-family: Hel=
    veticaNeue,;"> <div style=3D"font-family: HelveticaNeue,;"> <div dir=3D"ltr=
    "><font face=3D"Arial" size=3D"2"><br clear=3D"none"> </font> </div>  <br c=
    lear=3D"none"><br clear=3D"none"> <div class="3D""yiv2053837142y_msg_containe=
    r"><div id=3D"yiv2053837142">=0A =0A =0A<style>#yiv2053837142   v\00003a* {=
    }=0A#yiv2053837142   o\00003a* {}=0A#yiv2053837142   w\00003a* {}=0A#yiv205=
    3837142   .yiv2053837142shape {}=0A</style>=0A=0A<style>#yiv2053837142 #yiv=
    2053837142 --=0A   =0A filtered  {panose-1:2 4 5 3 5 4 6 3 2 4;}=0A#yiv2053=
    837142  filtered  {font-family:Calibri;panose-1:2 15 5 2 2 2 4 3 2 4;}=0A#y=
    iv2053837142  filtered  {font-family:Tahoma;panose-1:2 11 6 4 3 5 4 4 2 4;}=
    =0A#yiv2053837142  filtered  {panose-1:0 0 0 0 0 0 0 0 0 0;}=0A#yiv20538371=
    42    =0A p.yiv2053837142MsoNormal, #yiv2053837142   li.yiv2053837142MsoNor=
    mal, #yiv2053837142   div.yiv2053837142MsoNormal=0A=09{margin:0in;margin-bo=
    ttom:.0001pt;font-size:12.0pt;color:black;}=0A#yiv2053837142   a:link, #yiv=
    2053837142   span.yiv2053837142MsoHyperlink=0A=09{color:blue;text-decoratio=
    n:underline;}=0A#yiv2053837142   a:visited, #yiv2053837142   span.yiv205383=
    7142MsoHyperlinkFollowed=0A=09{color:purple;text-decoration:underline;}=0A#=
    yiv2053837142   p=0A=09{margin-right:0in;margin-left:0in;font-size:12.0pt;c=
    olor:black;}=0A#yiv2053837142   p.yiv2053837142MsoAcetate, #yiv2053837142  =
    li.yiv2053837142MsoAcetate, #yiv2053837142   div.yiv2053837142MsoAcetate=
    =0A=09{margin:0in;margin-bottom:.0001pt;font-size:8.0pt;color:black;}=0A#yi=
    v2053837142   span.yiv2053837142BalloonTextChar=0A=09{}=0A#yiv2053837142   =
    p.yiv2053837142ecxmsonormal, #yiv2053837142   li.yiv2053837142ecxmsonormal,=
    #yiv2053837142   div.yiv2053837142ecxmsonormal=0A=09{margin-right:0in;marg=
    in-left:0in;font-size:12.0pt;color:black;}=0A#yiv2053837142   p.yiv20538371=
    42ecxmsoacetate, #yiv2053837142   li.yiv2053837142ecxmsoacetate, #yiv205383=
    7142   div.yiv2053837142ecxmsoacetate=0A=09{margin-right:0in;margin-left:0i=
    n;font-size:12.0pt;color:black;}=0A#yiv2053837142   p.yiv2053837142ecxmsoch=
    pdefault, #yiv2053837142   li.yiv2053837142ecxmsochpdefault, #yiv2053837142=
       div.yiv2053837142ecxmsochpdefault=0A=09{margin-right:0in;margin-left:0in=
    ;font-size:12.0pt;color:black;}=0A#yiv2053837142   p.yiv2053837142ecxmsonor=
    mal1, #yiv2053837142   li.yiv2053837142ecxmsonormal1, #yiv2053837142   div.=
    yiv2053837142ecxmsonormal1=0A=09{margin-right:0in;margin-left:0in;font-size=
    :12.0pt;color:black;}=0A#yiv2053837142   p.yiv2053837142ecxmsoacetate1, #yi=
    v2053837142   li.yiv2053837142ecxmsoacetate1, #yiv2053837142   div.yiv20538=
    37142ecxmsoacetate1=0A=09{margin-right:0in;margin-left:0in;font-size:8.0pt;=
    color:black;}=0A#yiv2053837142   p.yiv2053837142ecxmsochpdefault1, #yiv2053=
    837142   li.yiv2053837142ecxmsochpdefault1, #yiv2053837142   div.yiv2053837=
    142ecxmsochpdefault1=0A=09{margin-right:0in;margin-left:0in;font-size:10.0p=
    t;color:black;}=0A#yiv2053837142   span.yiv2053837142ecxmsohyperlink=0A=09{=
    }=0A#yiv2053837142   span.yiv2053837142ecxmsohyperlinkfollowed=0A=09{}=0A#y=
    iv2053837142   span.yiv2053837142ecxballoontextchar=0A=09{}=0A#yiv205383714=
    2   span.yiv2053837142ecxemailstyle21=0A=09{}=0A#yiv2053837142   span.yiv20=
    53837142ecxemailstyle22=0A=09{}=0A#yiv2053837142   span.yiv2053837142ecxema=
    ilstyle23=0A=09{}=0A#yiv2053837142   span.yiv2053837142ecxmsohyperlink1=0A=
    =09{color:blue;text-decoration:underline;}=0A#yiv2053837142   span.yiv20538=
    37142ecxmsohyperlinkfollowed1=0A=09{color:purple;text-decoration:underline;=
    }=0A#yiv2053837142   span.yiv2053837142ecxballoontextchar1=0A=09{}=0A#yiv20=
    53837142   span.yiv2053837142ecxemailstyle211=0A=09{color:#1F497D;}=0A#yiv2=
    053837142   span.yiv2053837142ecxemailstyle221=0A=09{color:#1F497D;}=0A#yiv=
    2053837142   span.yiv2053837142ecxemailstyle231=0A=09{color:#1F497D;}=0A#yi=
    v2053837142   span.yiv2053837142ecxapple-converted-space=0A=09{}=0A#yiv2053=
    837142   span.yiv2053837142EmailStyle39=0A=09{color:#1F497D;font-weight:nor=
    mal;font-style:normal;}=0A#yiv2053837142   span.yiv2053837142EmailStyle40=
    =0A=09{color:#1F497D;}=0A#yiv2053837142   .yiv2053837142MsoChpDefault=0A=09=
    {font-size:10.0pt;}=0A#yiv2053837142  filtered  {margin:1.0in 1.0in 1.0in 1=
    .0in;}=0A#yiv2053837142   div.yiv2053837142WordSection1=0A=09{}=0A#yiv20538=
    37142 </style>=0A=0A<div dir=3D"ltr">=0A<div dir=3D"ltr">=0A<div style=3D"c=
    olor: rgb(0, 0, 0);">=0A<div>=0A<div style=3D"color: rgb(0, 0, 0); font-fam=
    ily: Calibri; font-size: small; font-style: normal; font-weight: normal; te=
    xt-decoration: none; display: inline;"><font face=3D"Times New Roman" size=
    =3D"4"></font><br clear=3D"none"></div> =0A<div class="3D""yiv2053837142WordS=
    ection1">=0A<div>=0A<table class="3D""yiv2053837142MsoNormalTable" style=3D"c=
    olor: rgb(0, 0, 0);" border=3D"0" cellspacing=3D"0" cellpadding=3D"0"><tbod=
    y><tr><td nowrap=3D"" valign=3D"top" style=3D"padding: 0in;" rowspan=3D"1" =
    colspan=3D"1">=0A      <div align=3D"right" class="3D""yiv2053837142MsoNormal=
    " style=3D"text-align: right;"> </div></td><td style=3D"padding: 0in;"=
    rowspan=3D"1" colspan=3D"1">=0A      <div class="3D""yiv2053837142MsoNormal"=
    ><font size=3D"4"></font> </div></td></tr><tr><td nowrap=3D"" valign=
    =3D"top" style=3D"padding: 0in;" rowspan=3D"1" colspan=3D"1"><font face=3D"=
    Times New Roman" size=3D"4"></font></td><td style=3D"padding: 0in;" rowspan=
    =3D"1" colspan=3D"1"><font face=3D"Times New Roman" size=3D"4"></font></td>=
    </tr><tr><td nowrap=3D"" valign=3D"top" style=3D"padding: 0in;" rowspan=3D"=
    1" colspan=3D"1"></td><td style=3D"padding: 0in;" rowspan=3D"1" colspan=3D"=
    1"><font face=3D"Times New Roman" size=3D"4"></font></td></tr><tr><td nowra=
    p=3D"" valign=3D"top" style=3D"padding: 0in;" rowspan=3D"1" colspan=3D"1"><=
    /td><td style=3D"padding: 0in;" rowspan=3D"1" colspan=3D"1"></td></tr><tr><=
    td nowrap=3D"" valign=3D"top" style=3D"padding: 0in;" rowspan=3D"1" colspan=
    =3D"1"></td><td style=3D"padding: 0in;" rowspan=3D"1" colspan=3D"1"><font f=
    ace=3D"Times New Roman" size=3D"4"></font></td></tr></tbody></table>=0A<div=
    class=3D"yiv2053837142MsoNormal"><font size=3D"4"></font><font size=3D"4">=
    </font><font size=3D"4"></font><font size=3D"4"></font><font size=3D"4"></f=
    ont><br clear=3D"none"><br clear=3D"none"></div> =0A<div>=0A<div>=0A<div>=
    =0A<blockquote style=3D"margin-top: 5pt; margin-bottom: 5pt;">=0A  <blockqu=
    ote style=3D"margin-top: 5pt; margin-bottom: 5pt;">=0A    <blockquote style=
    =3D"margin-top: 5pt; margin-bottom: 5pt;">=0A      <div>=0A      <div>=0A  =
        <table width=3D"100%" class="3D""yiv2053837142MsoNormalTable" style=3D"wi=
    dth: 100%; color: rgb(0, 0, 0);" border=3D"0" cellspacing=3D"0" cellpadding=
    =3D"0"><tbody><tr><td width=3D"100%" style=3D"padding: 1.5pt; width: 100%;"=
    rowspan=3D"1" colspan=3D"1">=0A            <div>=0A            <div class=
    =3D"yiv2053837142MsoNormal">  </div></div>=0A            <div>=0A     =
           <table width=3D"100%" class="3D""yiv2053837142MsoNormalTable" style=3D=
    "width: 100%; color: rgb(0, 0, 0);" border=3D"0" cellspacing=3D"0" cellpadd=
    ing=3D"0"><tbody><tr><td width=3D"100%" style=3D"padding: 1.5pt; width: 100=
    %;" rowspan=3D"1" colspan=3D"1">=0A                  <div>=0A              =
        <div>=0A                  <div class="3D""yiv2053837142MsoNormal">  =
    </div></div>=0A                  <div>=0A                  <div class="3D""yi=
    v2053837142MsoNormal"><span style=3D"font-size: 18pt;">What a brilliant way=
    to communicate =0A                  how risky it is to use mobile phones w=
    hile driving! More than =0A                  1.5 million views in 3 days!</=
    span></div></div></div> =0A                  <div>=0A                  <div=
    >=0A                  <div>=0A                  <div class="3D""yiv2053837142=
    MsoNormal"><span style=3D"font-size: 18pt;"><img width=3D"119" height=3D"61=
    " id=3D"yiv2053837142ecx0FC17514-10D6-4769-AAAF-4EC172FC576B" src=3D"cid:1.=
    [email protected]"></span></div></div> =0A           =
           <div>=0A                  <div class="3D""yiv2053837142MsoNormal"><spa=
    n style=3D"font-size: 18pt;"><a href=3D"https://www.youtube.com/embed/JHixe=
    Ir_6BM?rel=3D0&amp;autoplay=3D1&amp;iv_load_policy=3D3" target=3D"_blank" r=
    el=3D"nofollow" shape=3D"rect"><span style=3D"color: purple;">https://www.y=
    outube.com/embed/JHixeIr_6BM?rel=3D0&amp;autoplay=3D1&amp;iv_load_policy=3D=
    3</span></a></span></div></div></div></div></td></tr></tbody></table></div>=
    </td></tr></tbody></table></div></div></blockquote></blockquote></blockquot=
    e></div></div> =0A<div class="3D""yiv2053837142MsoNormal"><span style=3D"font=
    -family: serif;"><br clear=3D"none"><br clear=3D"none"><br clear=3D"none"><=
    br clear=3D"none"></span></div></div> =0A<div class="3D""yiv2053837142MsoNorm=
    al">  </div></div>=0A<div class="3D""yiv2053837142MsoNormal">  </di=
    v></div></div></div></div></div></div><br clear=3D"none"><br clear=3D"none"=
    ></div>  </div> </div>  </div> </div></div></div><br clear=3D"none"><br cle=
    ar=3D"none"></div>  </div> </div>  </div></div> </div></div></div><br><br><=
    /div>  </div> </div>  </div> </div></body></html>
    --2017413661-447096318-1404594690=:35141
    Content-Type: image/gif; name="ATT00001.gif"
    Content-Transfer-Encoding: base64
    Content-Id: <[email protected]>
    R0lGODlhdwA9ANU8AAEBATMAADQ0NEESEmYAAGgDNmYzM0ZGRlhXV3JDQ31RUXVHdVdXgZkAAJkA
    M5kzM4FXV8wAAMwAM8wzAMwzM/8AAP8AM/8zAP8zM8wzZv8zZsxmM/9mM8xmZv9mZoxmjMxmmf9m
    mcyZZv+ZZoaGhpCPj5iXl7uZmaOioqbDw7HKysyZmcKkpP+ZmcyZzP+ZzMzMmf/MmcvLy9HQ0NXU
    6dTo09zs7P/MzP/M////zODu7v38/P79/QAAAAAAAP79/SH/C05FVFNDQVBFMi4wAwEAAAAh+QQJ
    MgA8ACwAAAAAdwA9AAAG/kCecEgk7orCI1JZZCKf0Kh0Sq1ar9isdsud6mQynrNLLpu5MkMiMdOd
    3/D4U+CIUAiQ0s69fI6TfnKCWjMKDRUVEQ0FBid8g5CRUTomBBgRl5cSeCQ6f5KgcjYGh5eIlxER
    DwQmYaGvcEckD5i1mbUUDQoKM0yfv4GwkDSGFhEWFaYRiYiJDQQKMo/C1FY7MwQUtrXGGhS3ig8H
    bWLV5pOky8nqFRIhN/AtGM2pnJ7n+ESz27ctMjEb/MXg12AVizBjgPVZmE/KjhKHaiXq9iLGhHY3
    YmDw0IICImOKFLD51DCSjGz8MGW40SETBQ8SMnLYluiOiRPlSoI6QABT/jNTFTzcmCkhVYR3IyoY
    SzYPkaICbKbplLNDxoAHDW65vLECgwQPdlzc+IZJwgt5x5zegdDpiFRADI1MLaKDBAQCDdKa6gAP
    RwwPK0dMMIoUkwYN84w+MEBixtxBNmYkwJrKZYwVI8zCmKkNw4ocFFrcyAGPbE08Cu49jvOFRDpU
    duzc+LHB6MoW72JwENriAlBnjKWt1gLsy668WWu1WMEV5osbHlxYTPRi88oJ4AqOc+MrWBPvOme4
    dpDXKAW+I0R3xDHCPAYKFWdimO80gr0fw994IlGpQfJUgI3lgQwjNKBNKiEQOEEIzG2gVUEBsOAY
    SfllUVUC6Rj13gQx/sVAwUsRSLDCDy08B11TPoGkS2MUVpjTd3TxRwBWndmx0ojQZfDDbDK0sI0G
    IMi3jCqsTAjeEArBmE9VC9yV14GhieBBaDeMQAF7g11iQQg/cJAIiiFF5WIZR8xQQgE0ahiBBtKF
    dUNsXuHQgnwd+KilHay0NSYZe9iFV3nadEDBBA78c6A7GV10ZQsaZECfYoy9VWGScgkxg2SrFHWJ
    NhSAAJo2bP4gA0v+jKBjj2RtiocJqr1YqZKvTlVXfw0UpU0GgoaYAXseMEdiBs+ldwNa9DQQXIt7
    UlHVAQpkkxynZulmBwi0Jdjeex2F0FIt4Rwgwxg6mJmsFeKRAmiI/h6AJVsLHVA7LAXdzHYimNBI
    o8QOAgCAgKTVUIrkE56U4GRyNTXQgZw6irDcDy11wLA/oN1SQUEGyOBYCgL0EMC+/sIFaz42uJah
    MR+2kAG1GxjYwQYr3XCJUElNCeaKCPRQBwEC8DvuErPOaCAufK3QEYI8euCwlC78sAJYWkJYACbP
    HIDszkbI0CRe3GawHEsZiDXCaBlhAMKwMcDDAYoHrkOAt1Of0/GLZVaSpgQGdwAYbZ3msAEFMcHw
    sgjXpoTBMzm//XZDVfnpX1GpaH0JtTONTaLExwwJ1CU4u0I1FuWuUllsFCScAXN8/SM4QWu3vbkR
    dTkZWyoUrNDu/g8i2NFBrspcrg7mB9Sg+lSG8xDuAavksmkEA3LVwc9anT44zq3G+u/qwsvgmn9G
    2cEcqkVpOqQxyOiOMw3Ub2HcwKiEtm3z7NsS9e/lF1Eu1uapecru+N+/tg3wlxQ86yb4AAHIU6P2
    GRBq0Dtc/KpmgAwpYynrmIg6wKc2AdRggVzoE60OyMH3YbALy8KL7u5Hwgiq7QA2+KDHXtUdHswA
    ALTgoPOiFr3pqRBgKAiAXpqBjPANiRkRrBzOUnjDK8xAAAFYBY1qJbh1sM+DRayCDgRAxYwhMQBY
    DAABtIiXP2GPWyfs36SOlIRwVSVcMzCBCkxgggOUgIoBQGLGQAwQADoSAC8B6AEC9hDFMuDHE4D8
    gnjEw0YGHAACCEAACvooie6UiY+MjKT/yOgqG0pPkpjMpCY3OZf/fewJQQAAIfkEBTIAPAAsAAAA
    AHcAPQAABv5AnnBILBqPyKRyyWw6n9CodEqtWq/YrHZb3B29RnCXSy6bz2itTibjidPwuFFmSCRm
    OrleL3BEKAQQJTt5YV+HhntyMwoNFRURDQUGJ4WKl1g6JgQYEZ2dEoEkOm+Ypk82Bo6dj50REQ8E
    Jm2ntUteJA+eu5+7FA0KCjNipULFboi2VzSNFhEWFawRkI+QDQQKMpbKtjszBBS8u84aFL2RDwd4
    yNymOqrT0fEVEiE39y0Y1a+ipO2YucT1aiEjxgaCMQQ2iMWiTaljEJP9I7KjhKNdkMi9iDGB3o0Y
    GDy0oPDIWSQFd45N5CIDnEBPGW50+ETBg4SPHMRBAmTiBP67lWQOEPBUjVUFDzdySngVwd6ICs6i
    6XsUqcCdbUCx7JAx4EGDXjRvrMAgwcMfFzfMeZLwIt8zqoAgjPKC1ZjEISpt6SABgUCDt6w63MMR
    w0PMEROYOvWkQYM+pg8MkJiRdYuNGQm8vqIZY8UItjByhsOwIgeFFjdy3FO7M5ACf5UzySABz9Wf
    Pzd+bGAas4W9GByQtrhg1JpkbbGdRFwT7O/XXS1WiLX54oYHFxwhvQgdc8K5heryELtrN1G7GbQd
    /GVKQfAI1CNxjGCPgcLGnBjyU43Q70dyK6SQsEkDz71iWFoeyDBCA+

    If you don't know the sender, then it is most likely a scam or spam email. I get them every day - I just delete them. I also get daily notices from Facebook or someone called Adriana at Facebook even though i do not have an account there. Can't do anything about it - just delete it.

  • I can't figure out what's wrong with this code

    First i want this program to allow me to enter a number with the EasyReader class and depending on the number entered it will show that specific line of this peom:
    One two buckle your shoe
    Three four shut the door
    Five six pick up sticks
    Seven eight lay them straight
    Nine ten this is the end.
    The error message i got was an illegal start of expression. I can't figure out why it is giving me this error because i have if (n = 1) || (n = 2) statements. My code is:
    public class PoemSeventeen
    public static void main(String[] args)
    EasyReader console = new EasyReader();
    System.out.println("Enter a number for the poem (0 to quit): ");
    int n = console.readInt();
    if (n = 1) || (n = 2)
    System.out.println("One, two, buckle your shoe");
    else if (n = 3) || (n = 4)
    System.out.println("Three, four, shut the door");
    else if (n = 5) || (n = 6)
    System.out.println("Five, six, pick up sticks");
    else if (n = 7) || (n = 8)
    System.out.println("Seven, eight, lay them straight");
    else if (n = 9) || (n = 10)
    System.out.println("Nine, ten, this is the end");
    else if (n = 0)
    System.out.println("You may exit now");
    else
    System.out.println("Put in a number between 0 and 10");
    I messed around with a few other thing because i had some weird errors before but now i have narrowed it down to just this 1 error.
    The EasyReader class code:
    // package com.skylit.io;
    import java.io.*;
    * @author Gary Litvin
    * @version 1.2, 5/30/02
    * Written as part of
    * <i>Java Methods: An Introduction to Object-Oriented Programming</i>
    * (Skylight Publishing 2001, ISBN 0-9654853-7-4)
    * and
    * <i>Java Methods AB: Data Structures</i>
    * (Skylight Publishing 2003, ISBN 0-9654853-1-5)
    * EasyReader provides simple methods for reading the console and
    * for opening and reading text files. All exceptions are handled
    * inside the class and are hidden from the user.
    * <xmp>
    * Example:
    * =======
    * EasyReader console = new EasyReader();
    * System.out.print("Enter input file name: ");
    * String fileName = console.readLine();
    * EasyReader inFile = new EasyReader(fileName);
    * if (inFile.bad())
    * System.err.println("Can't open " + fileName);
    * System.exit(1);
    * String firstLine = inFile.readLine();
    * if (!inFile.eof()) // or: if (firstLine != null)
    * System.out.println("The first line is : " + firstLine);
    * System.out.print("Enter the maximum number of integers to read: ");
    * int maxCount = console.readInt();
    * int k, count = 0;
    * while (count < maxCount && !inFile.eof())
    * k = inFile.readInt();
    * if (!inFile.eof())
    * // process or store this number
    * count++;
    * inFile.close(); // optional
    * System.out.println(count + " numbers read");
    * </xmp>
    public class EasyReader
    protected String myFileName;
    protected BufferedReader myInFile;
    protected int myErrorFlags = 0;
    protected static final int OPENERROR = 0x0001;
    protected static final int CLOSEERROR = 0x0002;
    protected static final int READERROR = 0x0004;
    protected static final int EOF = 0x0100;
    * Constructor. Prepares console (System.in) for reading
    public EasyReader()
    myFileName = null;
    myErrorFlags = 0;
    myInFile = new BufferedReader(
    new InputStreamReader(System.in), 128);
    * Constructor. opens a file for reading
    * @param fileName the name or pathname of the file
    public EasyReader(String fileName)
    myFileName = fileName;
    myErrorFlags = 0;
    try
    myInFile = new BufferedReader(new FileReader(fileName), 1024);
    catch (FileNotFoundException e)
    myErrorFlags |= OPENERROR;
    myFileName = null;
    * Closes the file
    public void close()
    if (myFileName == null)
    return;
    try
    myInFile.close();
    catch (IOException e)
    System.err.println("Error closing " + myFileName + "\n");
    myErrorFlags |= CLOSEERROR;
    * Checks the status of the file
    * @return true if en error occurred opening or reading the file,
    * false otherwise
    public boolean bad()
    return myErrorFlags != 0;
    * Checks the EOF status of the file
    * @return true if EOF was encountered in the previous read
    * operation, false otherwise
    public boolean eof()
    return (myErrorFlags & EOF) != 0;
    private boolean ready() throws IOException
    return myFileName == null || myInFile.ready();
    * Reads the next character from a file (any character including
    * a space or a newline character).
    * @return character read or <code>null</code> character
    * (Unicode 0) if trying to read beyond the EOF
    public char readChar()
    char ch = '\u0000';
    try
    if (ready())
    ch = (char)myInFile.read();
    catch (IOException e)
    if (myFileName != null)
    System.err.println("Error reading " + myFileName + "\n");
    myErrorFlags |= READERROR;
    if (ch == '\u0000')
    myErrorFlags |= EOF;
    return ch;
    * Reads from the current position in the file up to and including
    * the next newline character. The newline character is thrown away
    * @return the read string (excluding the newline character) or
    * null if trying to read beyond the EOF
    public String readLine()
    String s = null;
    try
    s = myInFile.readLine();
    catch (IOException e)
    if (myFileName != null)
    System.err.println("Error reading " + myFileName + "\n");
    myErrorFlags |= READERROR;
    if (s == null)
    myErrorFlags |= EOF;
    return s;
    * Skips whitespace and reads the next word (a string of consecutive
    * non-whitespace characters (up to but excluding the next space,
    * newline, etc.)
    * @return the read string or null if trying to read beyond the EOF
    public String readWord()
    StringBuffer buffer = new StringBuffer(128);
    char ch = ' ';
    int count = 0;
    String s = null;
    try
    while (ready() && Character.isWhitespace(ch))
    ch = (char)myInFile.read();
    while (ready() && !Character.isWhitespace(ch))
    count++;
    buffer.append(ch);
    myInFile.mark(1);
    ch = (char)myInFile.read();
    if (count > 0)
    myInFile.reset();
    s = buffer.toString();
    else
    myErrorFlags |= EOF;
    catch (IOException e)
    if (myFileName != null)
    System.err.println("Error reading " + myFileName + "\n");
    myErrorFlags |= READERROR;
    return s;
    * Reads the next integer (without validating its format)
    * @return the integer read or 0 if trying to read beyond the EOF
    public int readInt()
    String s = readWord();
    if (s != null)
    return Integer.parseInt(s);
    else
    return 0;
    * Reads the next double (without validating its format)
    * @return the number read or 0 if trying to read beyond the EOF
    public double readDouble()
    String s = readWord();
    if (s != null)
    return Double.parseDouble(s);
    // in Java 1, use: return Double.valueOf(s).doubleValue();
    else
    return 0.0;
    Can anybody please tell me what's wrong with this code? Thanks

    String[] message = {
        "One, two, buckle your shoe",
        "One, two, buckle your shoe",
        "Three, four, shut the door",
        "Three, four, shut the door",
        "Five, six, pick up sticks",
        "Five, six, pick up sticks",
        "Seven, eight, lay them straight",
        "Seven, eight, lay them straight",
        "Nine, ten, this is the end",
        "Nine, ten, this is the end"
    if(n>0)
        System.out.println(message[n]);
    else
        System.exit(0);

Maybe you are looking for

  • Print Sharing Permission Issue???

    I am setting up print sharing with a Lexmark X5400 series printer. Workss fine on the local machine and connectivity to the share seems fine as well. When I print from any other machine (in this case Win XP) there is no error but it does not print. I

  • Database list in rsp database setting configuration

    Dear Experts When I see the Databases list in RSP under Configuration -> Databases -> Databases tab, it shows me already not existing and old version databases. I did an upgrade from SBO 2004.2B PL75 ,an old fashioned version to 8.81 PL09. When I see

  • Iphone 5 WiFi bug....

    My Iphone 5 will not connect to my wifi at work, any ideas of how to fix this?

  • Calendar not available on web

    Hi, We've done a fresh install of 10.6 Server on our Xserve and are currently setting up users on the machine. One thing I've run into with some of our test users is that although they can connect to their calendar through iCal, when they go to the w

  • How do you restore Safari version 8 Stored Passwords from Time machine?

    Yosemite Have tried restoring Keychain files. Is a complete restore of OS X necessary?