What is BI ? How we implement & what is the cost to implement ?

What is BI ? How we implement & what is the cost to implement ?
Thanks,
Sumit.

Hi Sumit,
                    Below is the description according to ur query
Business Intelligence is a process for increasing the competitive advantage of a business by intelligent use of available data in decision making. This process is pictured below.
The five key stages of Business Intelligence:
1.     Data Sourcing
2.     Data Analysis
3.     Situation Awareness
4.     Risk Assessment
5.     Decision Support
Data sourcing
Business Intelligence is about extracting information from multiple sources of data. The data might be: text documents - e.g. memos or reports or email messages; photographs and images; sounds; formatted tables; web pages and URL lists. The key to data sourcing is to obtain the information in electronic form. So typical sources of data might include: scanners; digital cameras; database queries; web searches; computer file access; etcetera.
Data analysis
Business Intelligence is about synthesizing useful knowledge from collections of data. It is about estimating current trends, integrating and summarising disparate information, validating models of understanding, and predicting missing information or future trends. This process of data analysis is also called data mining or knowledge discovery. Typical analysis tools might use:-
u2022     probability theory - e.g. classification, clustering and Bayesian networks; 
u2022     statistical methods - e.g. regression; 
u2022     operations research - e.g. queuing and scheduling; 
u2022     artificial intelligence - e.g. neural networks and fuzzy logic.
Situation awareness
Business Intelligence is about filtering out irrelevant information, and setting the remaining information in the context of the business and its environment. The user needs the key items of information relevant to his or her needs, and summaries that are syntheses of all the relevant data (market forces, government policy etc.).  Situation awareness is the grasp of  the context in which to understand and make decisions.  Algorithms for situation assessment provide such syntheses automatically.
Risk assessment
Business Intelligence is about discovering what plausible actions might be taken, or decisions made, at different times. It is about helping you weigh up the current and future risk, cost or benefit of taking one action over another, or making one decision versus another. It is about inferring and summarising your best options or choices.
Decision support
Business Intelligence is about using information wisely.  It aims to provide warning you of important events, such as takeovers, market changes, and poor staff performance, so that you can take preventative steps. It seeks to help you analyse and make better business decisions, to improve sales or customer satisfaction or staff morale. It presents the information you need, when you need it.
This section describes how we are using extraction, transformation and loading (ETL) processes and a data warehouse architecture to build our enterprise-wide data warehouse in incremental project steps. Before an enterprise-wide data warehouse could be delivered, an integrated architecture and a companion implementation methodology needed to be adopted. A productive and flexible tool set was also required to support ETL processes and the data warehouse architecture in a production service environment. The resulting data warehouse architecture has the following four principal components:
u2022 Data Sources
u2022 Data Warehouses
u2022 Data Marts
u2022 Publication Services
ETL processing occurs between data sources and the data warehouse, between the data warehouse and data marts and may also be used within the data warehouse and data marts.
Data Sources
The university has a multitude of data sources residing in different Data Base Management System (DBMS) tables and non-DBMS data sets. To ensure that all relevant data source candidates were identified, a physical inventory and logical inventory was conducted. The compilation of these inventories ensures that we have an enterprise-wide view of the university data resource.
The physical inventory was comprised of a review of DBMS cataloged tables as well as data sets used by business processes. These data sets had been identified through developing the enterprise-wide information needs model.
3
SUGI 30 Focus Session
The logical inventory was constructed from u201Cbrain-stormingu201D sessions which focused on common key business terms which must be referenced when articulating the institutionu2019s vision and mission (strategic direction, goals, strategies, objectives and activities). Once the primary terms were identified, they were organized into directories such as u201CProjectu201D, u201CLocationu201D, u201CAcademic Entityu201D, u201CUniversity Personu201D, u201CBudget Envelopeu201D etc. Relationships were identified by recognizing u201Cnatural linkagesu201D within and among directories, and the u201Cdrill-downsu201D and u201Croll-upsu201D that were required to support u201Creport byu201D and u201Creport onu201D information hierarchies. This exercise allowed the directories to be sub-divided into hierarchies of business terms which were useful for presentation and validation purposes.
We called this important deliverable the u201CConceptual Data Modelu201D (CDM) and it was used as the consolidated conceptual (paper) view of all of the Universityu2019s diverse data sources. The CDM was then subjected to a university-wide consultative process to solicit feedback and communicate to the university community that this model would be adopted by the Business Intelligence (BI) project as a governance model in managing the incremental development of its enterprise-wide data warehousing project.
Data Warehouse
This component of our data warehouse architecture (DWA) is used to supply quality data to the many different data marts in a flexible, consistent and cohesive manner. It is a u2018landing zoneu2019 for inbound data sources and an organizational and re-structuring area for implementing data, information and statistical modeling. This is where business rules which measure and enforce data quality standards for data collection in the source systems are tested and evaluated against appropriate data quality business rules/standards which are required to perform the data, information and statistical modeling described previously.
Inbound data that does not meet data warehouse data quality business rules is not loaded into the data warehouse (for example, if a hierarchy is incomplete). While it is desirable for rejected and corrected records to occur in the operational system, if this is not possible then start dates for when the data can begin to be collected into the data warehouse may need to be adjusted in order to accommodate necessary source systems data entry u201Cre-worku201D. Existing systems and procedures may need modification in order to permanently accommodate required data warehouse data quality measures. Severe situations may occur in which new data entry collection transactions or entire systems will need to be either built or acquired.
We have found that a powerful and flexible extraction, transformation and loading (ETL) process is to use Structured Query Language (SQL) views on host database management systems (DBMS) in conjunction with a good ETL tool such as SAS® ETL Studio. This tool enables you to perform the following tasks:
u2022 The extraction of data from operational data stores
u2022 The transformation of this data
u2022 The loading of the extracted data into your data warehouse or data mart
When the data source is a u201Cnon-DBMSu201D data set it may be advantageous to pre-convert this into a SAS® data set to standardize data warehouse metadata definitions. Then it may be captured by SAS® ETL Studio and included in the data warehouse along with any DBMS source tables using consistent metadata terms. SAS® data sets, non-SAS® data sets, and any DBMS table will provide the SAS® ETL tool with all of the necessary metadata required to facilitate productive extraction, transformation and loading (ETL) work.
Having the ability to utilize standard structured query language (SQL) views on host DBMS systems and within SAS® is a great advantage for ETL processing. The views can serve as data quality filters without having to write any procedural code. The option exists to u201Cmaterializeu201D these views on the host systems or leave them u201Cun-materializedu201D on the hosts and u201Cmaterializeu201D them on the target data structure defined in the SAS® ETL process. These choices may be applied differentially depending upon whether you are working with u201Ccurrent onlyu201D or u201Ctime seriesu201D data. Different deployment configurations may be chosen based upon performance issues or cost considerations. The flexibility of choosing different deployment options based upon these factors is a considerable advantage.
4
SUGI 30 Focus Session
Data Marts
This component of the data warehouse architecture may manifest as the following:
u2022 Customer u201Cvisibleu201D relational tables
u2022 OLAP cubes
u2022 Pre-determined parameterized and non-parameterized reports
u2022 Ad-hoc reports
u2022 Spreadsheet applications with pre-populated work sheets and pivot tables
u2022 Data visualization graphics
u2022 Dashboard/scorecards for performance indicator applications
Typically a business intelligence (BI) project may be scoped to deliver an agreed upon set of data marts in a project. Once these have been well specified, the conceptual data model (CDM) is used to determine what parts need to be built or used as a reference to conform the inbound data from any new project. After the detailed data mart specifications (DDMS) have been verified and the conceptual data model (CDM) components determined, a source and target logical data model (LDM) can be designed to integrate the detailed data mart specification (DDMS) and conceptual data model (CMD). An extraction, transformation and loading (ETL) process can then be set up and scheduled to populate the logical data models (LDM) from the required data sources and assist with any time series and data audit change control requirements.
Over time as more and more data marts and logical data models (LDMu2019s) are built the conceptual data model (CDM) becomes more complete. One very important advantage to this implementation methodology is that the order of the data marts and logical data models can be entirely driven by project priority, project budget allocation and time-to-completion constraints/requirements. This data warehouse architecture implementation methodology does not need to dictate project priorities or project scope as long as the conceptual data model (CDM) exercise has been successfully completed before the first project request is initiated.
McMasteru2019s Data Warehouse design
DevelopmentTestProductionWarehouseWarehouseWarehouseOtherDB2 OperationalOracle OperationalETLETLETLETLETLETLETLETLETLDataMartsETLETLETLDataMartsDataMartsDB2/Oracle BIToolBIToolBIToolNoNoUserUserAccessAccessUserUserAccessAccess(SAS (SAS Data sets)Data sets)Staging Area 5
SUGI 30 Focus Session
Publication Services
This is the visible presentation environment that business intelligence (BI) customers will use to interact with the published data mart deliverables. The SAS® Information Delivery Portal will be utilized as a web delivery channel to deliver a u201Cone-stop information shoppingu201D solution. This software solution provides an interface to access enterprise data, applications and information. It is built on top of the SAS Business Intelligence Architecture, provides a single point of entry and provides a Portal API for application development. All of our canned reports generated through SAS® Enterprise Guide, along with a web-based query and reporting tool (SAS® Web Report Studio) will be accessed through this publication channel.
Using the portalu2019s personalization features we have customized it for a McMaster u201Clook and feelu201D. Information is organized using pages and portlets and our stakeholders will have access to public pages along with private portlets based on role authorization rules. Stakeholders will also be able to access SAS® data sets from within Microsoft Word and Microsoft Excel using the SAS® Add-In for Microsoft Office. This tool will enable our stakeholders to execute stored processes (a SAS® program which is hosted on a server) and embed the results in their documents and spreadsheets. Within Excel, the SAS® Add-In can:
u2022 Access and view SAS® data sources
u2022 Access and view any other data source that is available from a SAS® server
u2022 Analyze SAS® or Excel data using analytic tasks
The SAS® Add-In for Microsoft Office will not be accessed through the SAS® Information Delivery Portal as this is a client component which will be installed on individual personal computers by members of our Client Services group. Future stages of the project will include interactive reports (drill-down through OLAP cubes) as well as balanced scorecards to measure performance indicators (through SAS® Strategic Performance Management software). This, along with event notification messages, will all be delivered through the SAS® Information Delivery Portal.
Publication is also channeled according to audience with appropriate security and privacy rules.
SECURITY u2013 AUTHENTICATION AND AUTHORIZATION
The business value derived from using the SAS® Value Chain Analytics includes an authoritative and secure environment for data management and reporting. A data warehouse may be categorized as a u201Ccollection of integrated databases designed to support managerial decision making and problem solving functionsu201D and u201Ccontains both highly detailed and summarized historical data relating to various categories, subjects, or areasu201D. Implementation of the research funding data mart at McMaster has meant that our stakeholders now have electronic access to data which previously was not widely disseminated. Stakeholders are now able to gain timely access to this data in the form that best matches their current information needs. Security requirements are being addressed taking into consideration the following:
u2022 Data identification
u2022 Data classification
u2022 Value of the data
u2022 Identifying any data security vulnerabilities
u2022 Identifying data protection measures and associated costs
u2022 Selection of cost-effective security measures
u2022 Evaluation of effectiveness of security measures
At McMaster access to data involves both authentication and authorization. Authentication may be defined as the process of verifying the identity of a person or process within the guidelines of a specific
6
SUGI 30 Focus Session
security policy (who you are). Authorization is the process of determining which permissions the user has for which resources (permissions). Authentication is also a prerequisite for authorization. At McMaster business intelligence (BI) services that are not public require a sign on with a single university-wide login identifier which is currently authenticated using the Microsoft Active Directory. After a successful authentication the SAS® university login identifier can be used by the SAS® Meta data server. No passwords are ever stored in SAS®. Future plans at the university call for this authentication to be done using Kerberos.
At McMaster aggregate information will be open to all. Granular security is being implemented as required through a combination of SAS® Information Maps and stored processes. SAS® Information Maps consist of metadata that describe a data warehouse in business terms. Through using SAS® Information Map Studio which is an application used to create, edit and manage SAS® Information Maps, we will determine what data our stakeholders will be accessing through either SAS® Web Report Studio (ability to create reports) or SAS® Information Delivery Portal (ability to view only). Previously access to data residing in DB-2 tables was granted by creating views using structured query language (SQL). Information maps are much more powerful as they capture metadata about allowable usage and query generation rules. They also describe what can be done, are database independent and can cross databases and they hide the physical structure of the data from the business user. Since query code is generated in the background, the business user does not need to know structured query language (SQL). As well as using Information Maps, we will also be using SAS® stored processes to implement role based granular security.
At the university some business intelligence (BI) services are targeted for particular roles such as researchers. The primary investigator role of a research project needs access to current and past research funding data at both the summary and detail levels for their research project. A SAS® stored process (a SAS® program which is hosted on a server) is used to determine the employee number of the login by checking a common university directory and then filtering the research data mart to selectively provide only the data that is relevant for the researcher who has signed onto the decision support portal.
Other business intelligence (BI) services are targeted for particular roles such as Vice-Presidents, Deans, Chairs, Directors, Managers and their Staff. SAS® stored processes are used as described above with the exception that they filter data on the basis of positions and organizational affiliations. When individuals change jobs or new appointments occur the authorized business intelligence (BI) data will always be correctly presented.
As the SAS® stored process can be executed from many environments (for example, SAS® Web Report Studio, SAS® Add-In for Microsoft Office, SAS® Enterprise Guide) authorization rules are consistently applied across all environments on a timely basis. There is also potential in the future to automatically customize web portals and event notifications based upon the particular role of the person who has signed onto the SAS® Information Delivery Portal.
ARCHITECTURE (PRODUCTION ENVIRONMENT)
We are currently in the planning stages for building a scalable, sustainable infrastructure which will support a scaled deployment of the SAS® Value Chain Analytics. We are considering implementing the following three-tier platform which will allow us to scale horizontally in the future:
Our development environment consists of a server with 2 x Intel Xeon 2.8GHz Processors, 2GB of RAM and is running Windows 2000 u2013 Service Pack 4.
We are considering the following for the scaled roll-out of our production environment.
A. Hardware
1. Server 1 - SAS® Data Server
- 4 way 64 bit 1.5Ghz Itanium2 server
7
SUGI 30 Focus Session
- 16 Gb RAM
- 2 73 Gb Drives (RAID 1) for the OS
- 1 10/100/1Gb Cu Ethernet card
- 1 Windows 2003 Enterprise Edition for Itanium
2 Mid-Tier (Web) Server
- 2 way 32 bit 3Ghz Xeon Server
- 4 Gb RAM
- 1 10/100/1Gb Cu Ethernet card
- 1 Windows 2003 Enterprise Edition for x86
3. SAN Drive Array (modular and can grow with the warehouse)
- 6 u2013 72GB Drives (RAID 5) total 360GB for SAS® and Data
B. Software
1. Server 1 - SAS® Data Server
- SAS® 9.1.3
- SAS® Metadata Server
- SAS® WorkSpace Server
- SAS® Stored Process Server
- Platform JobScheduler
2. Mid -Tier Server
- SAS® Web Report Studio
- SAS® Information Delivery Portal
- BEA Web Logic for future SAS® SPM Platform
- Xythos Web File System (WFS)
3. Client u2013Tier Server
- SAS® Enterprise Guide
- SAS® Add-In for Microsoft Office
REPORTING
We have created a number of parameterized stored processes using SAS® Enterprise Guide, which our stakeholders will access as both static (HTML as well as PDF documents) and interactive reports (drill-down) through SAS® Web Report Studio and the SAS® Add-In for Microsoft Office. All canned reports along with SAS® Web Report Studio will be accessed through the SAS® Information Delivery Portal.
NEXT STEPS
Next steps of the project include development of a financial data mart along with appropriate data quality standards, monthly frozen snapshots and implementation of university-wide financial reporting standards. This will facilitate electronic access to integrated financial information necessary for the development and maintenance of an integrated, multi-year financial planning framework. Canned reports to include monthly web-based financial statements, with drill-down capability along with budget templates automatically populated with data values and saved in different workbooks for different subgroups (for example by Department). The later will be accomplished using Microsoft Direct Data Exchange (DDE).
8
SUGI 30 Focus Session
As well, we will begin the implementation of SAS® Strategic Performance Management Software to support the performance measurement and monitoring initiative that is a fundamental component of McMasteru2019s strategic plan. This tool will assist in critically assessing and identifying meaningful and statistically relevant measures and indicators. This software can perform causal analyses among various measures within and across areas providing useful information on inter-relationships between factors and measures. As well as demonstrating how decisions in one area affect other areas, these cause-and-effect analyses can reveal both good performance drivers and also possible detractors and enable u2018evidenced-basedu2019 decision-making. Finally, the tool provides a balanced scorecard reporting format, designed to identify statistically significant trends and results that can be tailored to the specific goals, objectives and measures of the various operational areas of the University.
LESSONS LEARNED
Lessons learned include the importance of taking a consultative approach not only in assessing information needs, but also in building data hierarchies, understanding subject matter, and in prioritizing tasks to best support decision making and inform senior management. We found that a combination of training and mentoring (knowledge transfer) helped us accelerate learning the new tools. It was very important to ensure that time and resources were committed to complete the necessary planning and data quality initiatives prior to initiating the first project. When developing a project plan, it is important to

Similar Messages

  • Three part blog about Reducing the Cost to Implement a Security Plan

    Part 3 of a great blog done by in AlienVault Support who has "heard it all" about the problems SMBs have in implementing a security plan with small budgets. Kenneth offers lots of practical and helpful advice for IT and security practitioners.
    https://www.alienvault.com/blogs/security-essentials/third-step-in-reducing-the-cost-to-implement-a-...
    This topic first appeared in the Spiceworks Community

    hi Elistariel -
    With no texting plan, it is 25 cents per picture message. The LG VX5500 (same phone my daughter has) does not use a memory card, so you can try two different programs on your computer (both free) and see if either one will get the pics off and saved on your computer; from there you can upload to your online album without a per picture charge.
    You can try Verizon's VCast media manager - download and install it on your computer, then use the USB cable to link the phone to the computer and transfer the pics with VCast.
    Here's a link
    A third party program called BitPim will also work, but it's more technical and does a lot more than just transfer your media. It can also brick your phone if you don't know what you are doing, so it's "use at your own risk", as Verizon won't cover any losses due to using BitPim. It does work though--I have used it, very cautiously!

  • How to know whether recalculate the cost of production order?

    Hi Masters
                    We know, the valuation of  goods receipt is determined by the plan cost of the production order for production order. But often, production order was recalculated after partial delivery to stock.
    So I want to know when was the PO recalculated?

    HI,
    You can go to Administration tab in production order, you can find who has changed last the production order.
    I still doubt, is it possible to recalculate the production order after partial delivery.
    Vijay

  • How to train endusers on the products we created ?

    helo experts pls answer this question how to train the enduser on the products we created?

    For the purpose of preparing enduser manuals the functional guys understand the requirements of the endusers as to who will be doing what transactions and accordingly the manuals are prepared and have them trained. Like if an enduser is going work on sales cycle then those corresponding activities are identified and someone who works on master data maintenance for the relevant information is prepared as to how that particular is to be carried out. The Business Process Master Lists are used for this purpose taken from the standard ASAP installation where it identifies the work by T.code as how what to enter, how to enter and transact the information.
    Now the enduser would have information with regards to his working routine. These manuals are developed using PPT's or some software like MS visio or even a word.
    basic user guide
    http://help.sap.com/saphelp_nw04/helpdata/en/7b/7998403de08368e10000000a1550b0/frameset.htm
    for portals roles:
    http://help.sap.com/saphelp_nw04/helpdata/en/a5/4b0b40c6c01961e10000000a155106/frameset.htm
    http://wiki.ehow.com/User_talk:Mandrakescreams
    some Pdf's about BeX
    http://help.sap.com/saphelp_nw04/helpdata/en/a5/4b0b40c6c01961e10000000a155106/frameset.htm
    http://searchsap.techtarget.com/searchSAP/downloads/chapter-august.pdf

  • How to identify what to change with a BADI

    I have to implement a BADI for the first time. I have no big problem with the general concept, but I am having a major problem with knowing what data structures can be modified.
    I am implementing the BADI PARTNER_UPDATE in CRM. I have a break point in my implementation, but I cannot explicitly see what structures are available for me to modify.
    The documentation for the BADI (which SAP expressly state must be comprehensively maintained) is non-existent in english. There are no structures passed in with the method, and when I look at the implementing object in the debugger I cannot see any of the atributes, public, statis or private.
    So how can I find out what are the structures that can/should be updated in the BADI? This is irritating; at least function modules are self-documenting with respect to structures that can be used (provided that they are passed into the FM). Methods too, if they have parameters, but this BADI is not very helpful at all.
    Kind regards,
    Tony.

    Hi,
    even  i' am not able to find any thing.
    it doesn't need any thing to pass..
    but there is a sample implementation check it.
    <b>CL_EX_PARTNER_UPDATE</b> in SE24.
    two methods are implemented.
    you can see the code also.
    regards
    vijay
    Message was edited by: Vijay Babu Dudla

  • What are the dependencies to implement SAP PM module form Financials?

    Hi Experts,
    Requirement is that the client does not have SAP and now asking for only SAP PM module to be implemented. Can you please suggest me what are all the dependencies we need to consider from FICO and MM  point of view?
    Thank you very much
    Ganesh.

    If a company has implemented SAP without the HR module & now they want to implement SAP HR, will they have to buy a license for that? - Yes they will have to get licences for this.
    If yes, what will they have to pay? - They will have to contact SAP for this and negotiate with them.
    The number of employees working are 500. - The company will have to decide how many ESS licences they want to get and how many MSS licences they want to get. Again for all these ESS/MSS licences they wil have to pay separately apart from the HR licences.

  • I found My iPhone contacts on my friends Iphone we both have 4s! But we use the same apple ID and ICloud ID! How can undo what happened? all my private stuff is now on his phone!!! help me plz!!?

    I found My iPhone contacts on my friends Iphone we both have 4s! But we use the same apple ID and ICloud ID! How can undo what happened? all my private stuff is now on his phone!!! help me plz!!?

    Of course if you are both connected to the same iCloud account you have the same contacts - what did you expect?. The contacts live on the server and are read from there by the devices; so as you've both managed to sync your contacts up to iCloud they are now inextricably mixed. You can only delete your contacts by deleting individual ones, and doing that will delete them from your phone as well.
    You can only unravel this by
    1. In the iCloud contacts page at http://icloud.com, select all the contacts, click on the cogwheel icon at bottom left and choose 'Export vCard'.
    2. Sign out of System Preferences>iCloud
    3. Create a new Apple ID and open a new iCloud account with it for your own use.
    4. Import the vCard back into the iCloud contacts page.
    5. Go to http://icloud.com and sign in with the original ID. This is now his ID. Work through the contacts individually deleting the ones you don't want him to have. When done sign out and advise him to change his password.
    6. Go to the new iCloud account and delete his contacts individually.
    Of course if you have also been syncing calendars and using the same email address there are problems with doing this.

  • I am running out of memory on my hard drive and need to delete files. How can I see all the files/applications on my hard drive so I can see what is taking up a lot of room?

    I am running out of memory on my hard drive and need to delete files. How can I see all the files/applications on my hard drive so I can see what is taking up a lot of room?
    Thanks!
    David

    Either of these should help.
    http://grandperspectiv.sourceforge.net/
    http://www.whatsizemac.com/
    Or search 'disk size' in the App Store.
    Be carefull with what you delete & have a backup BEFORE you start, you may also want to reboot to try to free any memory that may have been written to disk.

  • HT1438 dont i have to submit a slip before giving back in my ipod for fixing? what do i do? how do i fill in the form?

    how do i fill in the form to give back my ipod and get a new one? whats the website i go to and what do i type in? can i change the color of my ipod from black to white?

    Follow the instructions here:
    Apple - Support - iPod - Service FAQ
    I do not think you can change the color but you can ask.

  • I am traveling to India, north and south, with my ipad 2, G-3. It is activated by AT and T. How do I use it in India? Do I need to purchase a sim card there and if so what kind? Would they be available in the Delhi airport or where else in central Delhi?

    I am traveling to India, north and south, with my ipad 2, G-3. It is activated by AT and T. How do I use it in India? Do I need to purchase a sim card there and if so what kind? Would they be available in the Delhi airport or where else in central Delhi?

    Also in order not to pay a fortune for the service is it better to acquire if needed a SIM card only once there?
    Check with your carrier about roaming charges.  They are usually prohibitive.  Best to get a local SIM.

  • Firefox has remberd a password to a website ... chessatwork and I get loged in to my main page and when I click on any link it takes me right back to my log in page, where it has it stored.... password and user name,,, whats up and how do I turn that off?

    Firefox has remberd a password to a website ... chessatwork and I get loged in to my main page and when I click on any link it takes me right back to my log in page, where it has it stored.... password and user name,,, whats up and how do I turn that off? chessatwork has ran great for me for many yrs, then one day I down loaded firefox and went to play chess on this site chessatwork.com, well the window popped up asking to remember the log in and pass word and so I said ok, and it did, but now when I click log in and I go to my main page (home) and click on any link, say to play game I return right back to log in

    See http://kb.mozillazine.org/Deleting_autocomplete_entries<br />
    Remove a saved password here: Tools > Options > Security: Passwords: "Saved Passwords" > "Show Passwords"
    You may also need to remove the cookies from that website.<br />
    * Tools > Options > Privacy > Cookies: "Show Cookies"

  • Something keeps trying to download on my mac and I don't know what it is. It is not in the apple store and just comes out nowhere and request for my password to download something and I don't know what it is. How to make this stop?

    Something keeps trying to download on my mac and I don't know what it is. It is not in the apple store and just comes out nowhere and request for my password to download something and I don't know what it is. How to make this stop? It pops up every single day.

    Erica,
         I can, with 99.99% certainty, tell you that you are absolutely right in not wanting to download or install this "Helper," whatever it is (but we can be equally certain it would not "help" anything).
         I cannot comment as to Oglethorpe's recommendation of 'adwaremedic'; I am unfamiliar with it.  His links to the Apple discussion and support pages warrant your time and attention.
         It might be really simple -- Trying looking in your Downloads folder, trash anything that you don't know with certainty is something you want to keep, and then Secure Empty your Trash. Then remove the AdBlock extension, LastPass, and Web of Trust extensions to Safari and re-boot. If the issue goes away, still be extraordinarily careful in the future.
         Unfortunately, it's probably not going to be that simple to get rid of, in which case I'd then try the line by line editing in HT203987. 
         I have no further suggestions (other than a complete wipe and re-install...but that's a pain because trying to restore from Time Machine would simply ... restore the Mal).
       For the rest of us, please post when you find a solution.
         Best.
         BPW
      (Also, try to edit your second post -- black out your last name on the screenshot and re-post it for others)

  • How to tell what was the latest patch installed on VMware ESX Server 3i, 3.5.0, 207095

    Hello Guys,
    I have been running an old server that was installed as a test system on a DELL workstation - Optiplex GX620 (32 bit).
    During the installation I had to confirgure the file: /usr/lib/vmware/installer/Core/TargetFilter.py to change the following line:
    "return interface.GetInterfaceType() == ScsiInterface.SCSI_IFACE_TYPE_IDE" to read:
    "return interface.GetInterfaceType() == ScsiInterface.SCSI_IFACE_TYPE_ISCSI" this made it worked and I have been using it for 3 years now. However, at this time I was hoping to update it with the latest patches and updates and I cannot figure out if I have ESXi or just ESX, nor what was my last update and what is required next.
    I have used this command to get the following output:
    # vmware -v
    VMware ESX Server 3i 3.5.0 build-207095
    ... I believe the 3i indicates that I have an ESXi 3.5.0 but is build-207095 the same buid as ESXi 3.5.0 Update 5?
    If not, how do I go about updating it? What is the KB # I should download?
    I can manage it using vSphere Client 5.5 and I can SSH into it using Putty.
    Note: When I run... "# esxupdate --bundle=ESXe350-201302401-I-SG.zip update" from within the folder where its at in the datastore, nothing happens... just a new line is scrolled.
    Also...
    # esxupdate query
    <?xml version="1.0"?>
    <query-response>
      <installed-packages>
        <package ID="ESX-207095">
          <name>firmware</name>
          <version>3.5.0</version>
          <rel>207095</rel>
        </package>
        <package ID="ESX-CLIENT-204907">
          <name>viclient</name>
          <version>2.5.0</version>
          <rel>204907</rel>
        </package>
        <package ID="ESX-TOOLS-207095">
          <name>tools</name>
          <version>3.5.0</version>
          <rel>207095</rel>
        </package>
      </installed-packages>
    </query-response>
    /vmfs/volumes/525300ce-5ff6ad3d-e2ed-0014222aedb7/Patches/ESXe350-201302401-O-SG #
    ... is there any further update for this system? I believe so as the Heartbleed patch etc. was not around when I was installing this server back in 2010.

    Hello Richardson Porto,
    I wanted to tell you that I appreciate the help so far.
    Also wanted to point out to you, that the KB indicated above is older than Update 5, which from your instructions is what I have installed. That KB is for U2.
    Now, the document definitely has step by step instructions on installing, querying etc. But my problem is ... NOT ALL COMMANDS WORK FOR ME!
    This is why I am here because all the instructions I have been reading does not work with my flavor of ESX 3.5.0, 207095... WHY? It has me stumped.
    For example, here are some commands the doc asked me to do and they failed: (Note that I had to unzip the folder on my windows box and upload it to /tmp using vSphere Client)
    /tmp # ls
    ESX350-201302402-BG      ESX350-201302402-BG.zip  vmhsdaemon-0
    /tmp # unzip ESX350-201302402-BG.zip
    -ash: unzip: not found                                                                                          -----------------------THIS COMMAND WAS NOT FOUND ?
    /tmp # cd ESX350-201302402-BG
    /tmp/ESX350-201302402-BG # esxupdate info
    Invalid command info                                                                                          -----------------------THIS COMMAND WAS INVALID ?
    /tmp/ESX350-201302402-BG # esxupdate update                                       -----------------------NOTHING HAPPENED HERE ?
    /tmp/ESX350-201302402-BG # ls -lh
    -rw-------    1 root     root       321.3k Dec 13 15:24 VMware-esx-scripts-3.5.0-988599.i386.rpm
    -rw-------    1 root     root         1.6k Dec 13 15:24 contents.xml
    -rw-------    1 root     root          701 Dec 13 15:24 contents.xml.sig
    -rw-------    1 root     root         1.4k Dec 13 15:24 descriptor.xml
    drwxr-xr-x    1 root     root          512 Dec 13 15:24 headers
    /tmp/ESX350-201302402-BG #
    NOTE: All these commands were run sequentially and I just copied and paste it from my SSH Client (PuTTy.exe)
    Is there a toolkit I need to install to have these commands or what really am I missing here? Host is in Maintenance Mode and the 1 VM that's on it is off!
    I am going to start a new discussion with this NEW ISSUE, since the Heading of this DISCUSSION has already been SOLVED! Thanks again!

  • Factory reset - the what, why, and how for Gingerbread

    I wanted to share this information regarding a Factory Reset and how it is used for Gingerbread - both the what, why, and how - in case anyone is interested in the details. If you embark on this process, this thread is worth a close read. thanks to d.harris for writing this up for the SOAK group. good luck everyone and remember, YMMV.
    First, what does a "factory reset" do? The short answer is: it will return your phone to the condition it was in when you first purchased it EXCEPT the Android version will match your phone's latest update. For example, I had Android 2.2.1 (Froyo) on my phone before the "soak". My phone was updated to Android 2.3.3 (Gingerbread or "GB") during the "soak". I had some trouble with video performance in the Fox News app and missing album cover art in the Google Music app. So I decided to do the factory reset. After the reset was finished, my Droid X still had Android 2.3.3 on it but all of the settings had been restored to their factory defaults. And presumably, all Android operating system (OS) caches had been flushed. All of the data that was stored in my phone's memory was cleared. So my contacts were all gone. And I had to reactivate my phone (*228 1) just like a new phone and reenter my Google account info.
    Does a factory reset actually clear the entire contents of the phone's memory and re-install Android from scratch? (That's what I wish it did.) But I'm not sure that it does that because the entire process seems to go too fast for that. However, a factory reset does seem to do a better job of cleaning out the remnants of the previous OS (Froyo 2.2.1) than a standard "update" does. But that's not all.
    The factory reset also clears all of the apps that were installed in the phone's memory. And it clears all of the app data that was installed in the phone's memory. So you will have to reinstall all of your apps from the Android Market (or wherever they came from). Normally, you do not have to pay for them again because the Android Market remembers your previous purchases as long as you register your phone with the same Google account.
    However, the Android Market does not remember the free apps that you installed---so you should make a list of all your apps before you reset your phone so you won't forget the free ones. The reason I wrote "installed in the phone's memory" above is because a factory reset gives you a choice whether or not to clear your phone's micro SD memory card. If desired, it will leave it alone. So any apps or data will still be present on your card after the reset. However, your phone will not be aware of the apps on the memory card because all "knowledge" of them will have been erased from your phone's internal memory---you'll still have to reinstall ALL of your apps. But the data files will still be there. Regarding the "built-in" apps that come pre-installed with Android, they will also be restored to their original state and version when you do a factory reset. So you'll need to update some of them (like updating Google Maps and updating Adobe Flash from 10.1 to 10.3).
    Before you do a factory reset, you should have a fully charged battery becaues you do NOT want to run out of power in the middle of a reset---that could "brick" your phone. I always take an extra precaution: in addition to a fully charged battery, I also connect my phone to AC with the Motorola AC-to-USB charging adapter that came with it. Not only does it insure that I won't run out of power, it also keeps my battery fully charged so I have a 100% charge after the factory reset (you'll have a lot of work to do afterward to reinstall your apps and restore all of your Android and app settings back to your preferences).
    Here's a pre reset checklist:
    • Export your contacts to your SD card so you can easily restore them later (Contacts/Dialer menu > Import/Export > Export contacts to: SD card).
    • Make a list of all of the apps that you installed (Android menu > Manage Apps > Downloaded tab).
    • Get a copy of your Google account login info (user name and password).
    • Get a copy of your Verizon Backup Assistant PIN (if you use this service).
    • Turn off your phone and pull its battery. Wait 30 seconds or more and reinstall the battery and turn the phone back on. This will make sure that there is nothing hinky in your phone's volatile memory as the factory reset begins.
    • Fully charge your phone's battery and plug the AC charging adapter into the phone.
    Now you're ready to do the deed. Follow these steps:
    1. If it's not already on, turn on Google's "back up my data" option with Android menu > Settings > Privacy > Back up my data. This is required for the next step.
    2. Turn off the "automatic restore" option with Android menu > Settings > Privacy > Automatic restore. This will prevent your phone from trying to download every paid app that was previously on your phone all at once. It is much better---especially if you have a lot of apps---to install them one at a time. Plus, you may not want some of them to be reinstalled right away if you are trying to determine if one of them is causing trouble under GB 2.3.3.
    3 If you do not want to use Google's "back up my data" service to restore your wi-fi passwords and such, then return to Step 1 and turn it off.
    4. Begin the factory reset with Android menu > Settings > Privacy > Factory Data Reset. You'll be asked to confirm that you really want to do a factory reset and you'll be given the opportunity to clear your micro SD memory card as a part of the process. I chose not to clear my memory card because I have a 32 GB card with "tons" of music and other files that I do not want to have to restore (it would take hours).
    When should you do a factory reset? Everyone should do it before they give their phone away, sell it, or discard it. You don't want someone else to have access to your personal data! And, a factory reset can be a helpful troubleshooting tool when faced with problems.
    By the way, my factory reset did not help the video problem I was having with the Fox News app nor did it enable Google's Music app to find all of the album art on my micro SD card. Both problems persisted after the reset under GB 2.3.3.
    Finally, there are other things you can do to flush old data from your phone such as clearing the cache partition of your phone's built-in memory. This requires the use of its "Android system recover" menu. Even though I expect this cache data to be cleared during a factory reset, I did it after my reset just to make sure. Clearing the cache partition is usually what folks try before a factory rest so they can (hopefully) avoid the factory reset. I'll leave it to a Motorola staff person to go into that.

    OK, got it ...  the Power ON Factory reset procedures might have changed with GB ... 
    To get to a Factory reset using the Power up method:
    1.  Power Off phone
    2. Press & Hold the HOME Button
    3. Press and Hold the Power ON button.
    You come up to the Triangle with the Exclamation mark & android guy.
    Press BOTH the Up and Down Buttons at the same time.  This brings up the Blue menu of options.
    use the Up/Down arrows to scroll thru the choices. Press the POWER Button to Select the menu item you choose.
    You can harmlessly test this and just choose to Reboot without doing anything, just to see how it works in case you ever need to do this in the future.
    edit:  It was concluded in the test group that they changed this process to align it with the new DX2 as the camera button isn't hard-wired like it is in the DX. So likely they just wanted to make this process the same for both platforms.  At least it sounds like a good reason...

  • Not printing text-only graphics on Canon. Not printer problem-print ok on Brother and another network Apple prints ok on Canon. Believe a computer setting was inadvertently reset. What setting and how do I reset?

    Not printing text only on Canon--grahics print ok.  Not printer problem.  Prints ok on a Brother and another network Apple prints ok on Canon.  Believe a computer setting was inadvertently reset.  What setting and how do I reset?

    Without your printer model numbers, readers can only give you vague general directions.
    System Preferences > Print&Fax > ...
    ... shows a list of all set-up printers.
    If you are having serious problems, it makes sense to "Reset the Printing System" (which also removes all printer set-ups) and add back each printer. It only takes a few minutes.
    Mac OS X 10.6 Help: Resetting the printing system

Maybe you are looking for

  • Batch specific unit of measure in process order

    Hello, I have a BOM with a component with active ingredient. Batches are classified and transaction MMBE shown stock correctly in both units. But when creating the process order I get two items with same item numer in the material list. One for batch

  • I have problems uploading movies onto Facebook. What do I do?

    Hi all I have the app iMovie for MacBooks but when I try to upload a video onto Facebook sometime during the upload. The app quits unexpectedly. I need help what am I supposed to do?

  • Does hplip actually require foomatic-db?

    Hi, I struggled for an hour to set up an HP Deskjet 3050 J610a connected via WiFi. I had hplip installed, but http://localhost:631/admin gave the cryptic message "Unable to get list of printer drivers: Success". Finally I ran `sudo pacman -Rdd foomat

  • Is it possible to setup a bootable environment for a USB-6212 application written in LabVIEW?

    I have an application that uses a USB-6212 and involves both motion control and DAQ functions.  I would like to create a bootable external hard drive that has the compiled program, LabVIEW runtime and DAQ all installed and stable under some version o

  • BT broadband performance issues - driven insane an...

    Please can you check broadband in Perth area, so incredibly slow and means I cannot do online course I need to do for my career. Have reached end of line and if cannot resolve this time am looking for alternative provider. Problem seems to have stemm