What is serialization? and how to implement it?

what is serialization? and how to implement it?

why not try googling rather than spamming the forum with your homework questions? This spitting out questions without showing that you've done any work (even if you have done the work) is guaranteed to piss us off. Please learn to ask a question the smart way:
http://www.catb.org/~esr/faqs/smart-questions.html

Similar Messages

  • "Daily Business Intelligence". what is it and how to implement it?

    Dear Experts,
    I want to implement daily business intelligence but does not know how to do it and what are benefits of implementing it. Please help me on this one.
    Regards
    Muhammad Noman Shafique

    I want to implement daily business intelligence but does not know how to do it and what are benefits of implementing it. Please help me on this one.Oracle Daily Business Intelligence Implementation Guide Release 11i [ID 246548.1]
    Oracle Daily Business Intelligence Implementation Guide Supplement for e-Business Suite 11i [ID 352804.1]
    Oracle Daily Business Intelligence User Guide Supplement [ID 352805.1]
    Oracle Human Resources Intelligence (HRI) Daily Business Intelligence (DBI) Frequently Asked Questions (FAQ) [ID 291602.1]
    How to Find Out What Version Of Daily Business Intelligence (DBI) Is Running? [ID 437904.1]
    11i E-Business Intelligence
    http://docs.oracle.com/cd/B25516_18/current/html/docset.html
    R12 Intelligence
    http://docs.oracle.com/cd/B53825_08/current/html/docset.html
    Thanks,
    Hussein

  • SSD. What to do and how to implement?

    Dear All!
    I would like to add SSD memory to my MBPI have a 2009 MBP 2,26 GHz Intel Core 2 Duo, 4 GB 1067 MHz DDR3, 500 GB HD. It always ran fine but since a couple of months it's starting to slow down. I heard some things about that taking out your regular harddrive and replacing it with SSD memory really speeds up the performance of your mac.
    My problem is that it's expensive, so my questions are:
    - what is the best and cheapest solution to speed up my mac?
    - where can i buy good and cheap SSD memort?
    - how can i install SSD memory?
    Thanks very much!

    See my one and only user tip - Upgrading your MacBook Pro with a Solid State Drive.
    Good luck - call back with any questions.
    Clinton

  • What is CPPS and how is it realted to BW?

    HI can some one let me know
    a) What is CPPS and how is it related to BW
    b) CPPS Design: can we start on an InfoObject for the BDW? Can we use SAP names?
    Thank You,
    Kris

    Hi,
    The JavaTM Authentication and Authorization Service (JAAS) is a
    Java package that enables services to authenticate and enforce
    access controls upon users.
    JAZN is a JAAS provider, which provides both Authentication and
    Authorization Services.
    Oracle9iAS JAAS (a.k.a. "JAZN"), is Oracle's implementation of
    the Java Authentication and Authorization Service (JAAS)
    standard, which adds PAM-based pluggable authentication and
    Subject-based, fine-grained authorization to the Java2 platform.
    Andy

  • What is XI and How it can be useful

    Hi,
    I am new to XI i saw many information about xi in blogs and every thing.. but i need to know simply what is XI and how is it useful for business. what is the backgroud required. how oppertunities for xi in future. Most of the companies requires that one or its optional or mandatory.  I femiliar with java i want to move to XI is it good suggition i need any other technologies to update..Is it useful for me..
    Thanks,
    Kishore

    Hi Kishore,
    Purpose
    SAP Exchange Infrastructure (SAP XI) enables you to implement cross-system processes. It enables you to connect systems from different vendors (non-SAP and SAP) in different versions and implemented in different programming languages (Java, ABAP, and so on) to each other. SAP Exchange Infrastructure is based on an open architecture, uses open standards (in particular those from the XML and Java environments) and offers those services that are essential in a heterogeneous and complex system landscape:
    ●     Modeling and design of messages, transformations, and cross-component integration processes
    ●     Configuration options for managing collaborative processes and message flow
    ●     Runtime for message and process management
    ●     Adapter Engine for integrating heterogeneous system components
    ●     Central monitoring for monitoring message flow and processes
    SAP XI supports internal company scenarios and cross-company scenarios.
    Features
    SAP XI is based on general standards so as to enable external systems to be integrated. At the center of the infrastructure is an XML-based communication that uses HTTP (Hyper Text Transfer Protocol). The application-specific contents are transferred in messages in user-defined XML (eXtensible Markup Language) schema from the sender to the receiver using the Integration Server.
    In the above graphic, Integration Broker is an SAP NetWeaver capability (that is, the features for a technological area of SAP NetWeaver) that is supported by SAP XI. The Integration Server, on the other hand, is an XI runtime component.
    Senders and receivers that exchange messages using the Integration Server are separated from one another. This separation makes it easier to connect systems that are technologically different. Every system that can exchange messages with the Integration Server can also exchange messages with all other systems that are connected to the Integration Server. SAP XI supports the following methods of communication with the Integration Server:
    ●     Direct communication using proxies, which you generate in the application systems using a description in WSDL (Web Service Description Language).
    ●     Communication using adapters. In this case, you create interfaces for message exchange in the application system, or use existing interfaces.
    Simple message processing on the Integration Server is stateless. This means that the Integration Server does not know of any connections between various messages. Cross-component integration processes, on the other hand, describe related processes, which can use the knowledge about messages that have already been processed to further control the process (for example, waiting for the corresponding response for a message in order to start further actions). You can use SAP XI to model, change, and manage these cross-component integration processes centrally. These processes are executed on the Integration Server and are included in message processing by configuration.
    As with cross-component integration processes, you save the entire integration knowledge of a collaborative process centrally in SAP XI: Objects at design time in the Integration Repository and objects at configuration time in the Integration Directory. In this way, SAP Exchange Infrastructure follows the principle of shared collaboration knowledge: You no longer need to search for information about a collaborative process in each of the systems involved, but can call this information centrally instead. This procedure considerably reduces the costs for the development and maintenance of the shared applications.

  • What is serialization and serializable

    what is serialization and serializable,Can any body explain me please.

    hi
    Serialization in java is the process of making the object flat which can later be stored on your disk like a normal flat file. the serailized object can be found useful mainly when using RMI and EJB where we persist cobjects so that they can be sent online (thru cable) by this we mean for objects to be distributed the prerequiste is tht they should be serialized. For this we have a interfacein java called "Serializable". the class tht needs serialization of its object should implement this class. this is a marker interface(the interface tht contains nmo methods)
    hope the concept is clear if not please mail me to : [email protected]
    bye
    thnx and regards
    bhaskara navuluri

  • What is BI ? How we implement & what is the cost to implement ?

    What is BI ? How we implement & what is the cost to implement ?
    Thanks,
    Sumit.

    Hi Sumit,
                        Below is the description according to ur query
    Business Intelligence is a process for increasing the competitive advantage of a business by intelligent use of available data in decision making. This process is pictured below.
    The five key stages of Business Intelligence:
    1.     Data Sourcing
    2.     Data Analysis
    3.     Situation Awareness
    4.     Risk Assessment
    5.     Decision Support
    Data sourcing
    Business Intelligence is about extracting information from multiple sources of data. The data might be: text documents - e.g. memos or reports or email messages; photographs and images; sounds; formatted tables; web pages and URL lists. The key to data sourcing is to obtain the information in electronic form. So typical sources of data might include: scanners; digital cameras; database queries; web searches; computer file access; etcetera.
    Data analysis
    Business Intelligence is about synthesizing useful knowledge from collections of data. It is about estimating current trends, integrating and summarising disparate information, validating models of understanding, and predicting missing information or future trends. This process of data analysis is also called data mining or knowledge discovery. Typical analysis tools might use:-
    u2022     probability theory - e.g. classification, clustering and Bayesian networks; 
    u2022     statistical methods - e.g. regression; 
    u2022     operations research - e.g. queuing and scheduling; 
    u2022     artificial intelligence - e.g. neural networks and fuzzy logic.
    Situation awareness
    Business Intelligence is about filtering out irrelevant information, and setting the remaining information in the context of the business and its environment. The user needs the key items of information relevant to his or her needs, and summaries that are syntheses of all the relevant data (market forces, government policy etc.).  Situation awareness is the grasp of  the context in which to understand and make decisions.  Algorithms for situation assessment provide such syntheses automatically.
    Risk assessment
    Business Intelligence is about discovering what plausible actions might be taken, or decisions made, at different times. It is about helping you weigh up the current and future risk, cost or benefit of taking one action over another, or making one decision versus another. It is about inferring and summarising your best options or choices.
    Decision support
    Business Intelligence is about using information wisely.  It aims to provide warning you of important events, such as takeovers, market changes, and poor staff performance, so that you can take preventative steps. It seeks to help you analyse and make better business decisions, to improve sales or customer satisfaction or staff morale. It presents the information you need, when you need it.
    This section describes how we are using extraction, transformation and loading (ETL) processes and a data warehouse architecture to build our enterprise-wide data warehouse in incremental project steps. Before an enterprise-wide data warehouse could be delivered, an integrated architecture and a companion implementation methodology needed to be adopted. A productive and flexible tool set was also required to support ETL processes and the data warehouse architecture in a production service environment. The resulting data warehouse architecture has the following four principal components:
    u2022 Data Sources
    u2022 Data Warehouses
    u2022 Data Marts
    u2022 Publication Services
    ETL processing occurs between data sources and the data warehouse, between the data warehouse and data marts and may also be used within the data warehouse and data marts.
    Data Sources
    The university has a multitude of data sources residing in different Data Base Management System (DBMS) tables and non-DBMS data sets. To ensure that all relevant data source candidates were identified, a physical inventory and logical inventory was conducted. The compilation of these inventories ensures that we have an enterprise-wide view of the university data resource.
    The physical inventory was comprised of a review of DBMS cataloged tables as well as data sets used by business processes. These data sets had been identified through developing the enterprise-wide information needs model.
    3
    SUGI 30 Focus Session
    The logical inventory was constructed from u201Cbrain-stormingu201D sessions which focused on common key business terms which must be referenced when articulating the institutionu2019s vision and mission (strategic direction, goals, strategies, objectives and activities). Once the primary terms were identified, they were organized into directories such as u201CProjectu201D, u201CLocationu201D, u201CAcademic Entityu201D, u201CUniversity Personu201D, u201CBudget Envelopeu201D etc. Relationships were identified by recognizing u201Cnatural linkagesu201D within and among directories, and the u201Cdrill-downsu201D and u201Croll-upsu201D that were required to support u201Creport byu201D and u201Creport onu201D information hierarchies. This exercise allowed the directories to be sub-divided into hierarchies of business terms which were useful for presentation and validation purposes.
    We called this important deliverable the u201CConceptual Data Modelu201D (CDM) and it was used as the consolidated conceptual (paper) view of all of the Universityu2019s diverse data sources. The CDM was then subjected to a university-wide consultative process to solicit feedback and communicate to the university community that this model would be adopted by the Business Intelligence (BI) project as a governance model in managing the incremental development of its enterprise-wide data warehousing project.
    Data Warehouse
    This component of our data warehouse architecture (DWA) is used to supply quality data to the many different data marts in a flexible, consistent and cohesive manner. It is a u2018landing zoneu2019 for inbound data sources and an organizational and re-structuring area for implementing data, information and statistical modeling. This is where business rules which measure and enforce data quality standards for data collection in the source systems are tested and evaluated against appropriate data quality business rules/standards which are required to perform the data, information and statistical modeling described previously.
    Inbound data that does not meet data warehouse data quality business rules is not loaded into the data warehouse (for example, if a hierarchy is incomplete). While it is desirable for rejected and corrected records to occur in the operational system, if this is not possible then start dates for when the data can begin to be collected into the data warehouse may need to be adjusted in order to accommodate necessary source systems data entry u201Cre-worku201D. Existing systems and procedures may need modification in order to permanently accommodate required data warehouse data quality measures. Severe situations may occur in which new data entry collection transactions or entire systems will need to be either built or acquired.
    We have found that a powerful and flexible extraction, transformation and loading (ETL) process is to use Structured Query Language (SQL) views on host database management systems (DBMS) in conjunction with a good ETL tool such as SAS® ETL Studio. This tool enables you to perform the following tasks:
    u2022 The extraction of data from operational data stores
    u2022 The transformation of this data
    u2022 The loading of the extracted data into your data warehouse or data mart
    When the data source is a u201Cnon-DBMSu201D data set it may be advantageous to pre-convert this into a SAS® data set to standardize data warehouse metadata definitions. Then it may be captured by SAS® ETL Studio and included in the data warehouse along with any DBMS source tables using consistent metadata terms. SAS® data sets, non-SAS® data sets, and any DBMS table will provide the SAS® ETL tool with all of the necessary metadata required to facilitate productive extraction, transformation and loading (ETL) work.
    Having the ability to utilize standard structured query language (SQL) views on host DBMS systems and within SAS® is a great advantage for ETL processing. The views can serve as data quality filters without having to write any procedural code. The option exists to u201Cmaterializeu201D these views on the host systems or leave them u201Cun-materializedu201D on the hosts and u201Cmaterializeu201D them on the target data structure defined in the SAS® ETL process. These choices may be applied differentially depending upon whether you are working with u201Ccurrent onlyu201D or u201Ctime seriesu201D data. Different deployment configurations may be chosen based upon performance issues or cost considerations. The flexibility of choosing different deployment options based upon these factors is a considerable advantage.
    4
    SUGI 30 Focus Session
    Data Marts
    This component of the data warehouse architecture may manifest as the following:
    u2022 Customer u201Cvisibleu201D relational tables
    u2022 OLAP cubes
    u2022 Pre-determined parameterized and non-parameterized reports
    u2022 Ad-hoc reports
    u2022 Spreadsheet applications with pre-populated work sheets and pivot tables
    u2022 Data visualization graphics
    u2022 Dashboard/scorecards for performance indicator applications
    Typically a business intelligence (BI) project may be scoped to deliver an agreed upon set of data marts in a project. Once these have been well specified, the conceptual data model (CDM) is used to determine what parts need to be built or used as a reference to conform the inbound data from any new project. After the detailed data mart specifications (DDMS) have been verified and the conceptual data model (CDM) components determined, a source and target logical data model (LDM) can be designed to integrate the detailed data mart specification (DDMS) and conceptual data model (CMD). An extraction, transformation and loading (ETL) process can then be set up and scheduled to populate the logical data models (LDM) from the required data sources and assist with any time series and data audit change control requirements.
    Over time as more and more data marts and logical data models (LDMu2019s) are built the conceptual data model (CDM) becomes more complete. One very important advantage to this implementation methodology is that the order of the data marts and logical data models can be entirely driven by project priority, project budget allocation and time-to-completion constraints/requirements. This data warehouse architecture implementation methodology does not need to dictate project priorities or project scope as long as the conceptual data model (CDM) exercise has been successfully completed before the first project request is initiated.
    McMasteru2019s Data Warehouse design
    DevelopmentTestProductionWarehouseWarehouseWarehouseOtherDB2 OperationalOracle OperationalETLETLETLETLETLETLETLETLETLDataMartsETLETLETLDataMartsDataMartsDB2/Oracle BIToolBIToolBIToolNoNoUserUserAccessAccessUserUserAccessAccess(SAS (SAS Data sets)Data sets)Staging Area 5
    SUGI 30 Focus Session
    Publication Services
    This is the visible presentation environment that business intelligence (BI) customers will use to interact with the published data mart deliverables. The SAS® Information Delivery Portal will be utilized as a web delivery channel to deliver a u201Cone-stop information shoppingu201D solution. This software solution provides an interface to access enterprise data, applications and information. It is built on top of the SAS Business Intelligence Architecture, provides a single point of entry and provides a Portal API for application development. All of our canned reports generated through SAS® Enterprise Guide, along with a web-based query and reporting tool (SAS® Web Report Studio) will be accessed through this publication channel.
    Using the portalu2019s personalization features we have customized it for a McMaster u201Clook and feelu201D. Information is organized using pages and portlets and our stakeholders will have access to public pages along with private portlets based on role authorization rules. Stakeholders will also be able to access SAS® data sets from within Microsoft Word and Microsoft Excel using the SAS® Add-In for Microsoft Office. This tool will enable our stakeholders to execute stored processes (a SAS® program which is hosted on a server) and embed the results in their documents and spreadsheets. Within Excel, the SAS® Add-In can:
    u2022 Access and view SAS® data sources
    u2022 Access and view any other data source that is available from a SAS® server
    u2022 Analyze SAS® or Excel data using analytic tasks
    The SAS® Add-In for Microsoft Office will not be accessed through the SAS® Information Delivery Portal as this is a client component which will be installed on individual personal computers by members of our Client Services group. Future stages of the project will include interactive reports (drill-down through OLAP cubes) as well as balanced scorecards to measure performance indicators (through SAS® Strategic Performance Management software). This, along with event notification messages, will all be delivered through the SAS® Information Delivery Portal.
    Publication is also channeled according to audience with appropriate security and privacy rules.
    SECURITY u2013 AUTHENTICATION AND AUTHORIZATION
    The business value derived from using the SAS® Value Chain Analytics includes an authoritative and secure environment for data management and reporting. A data warehouse may be categorized as a u201Ccollection of integrated databases designed to support managerial decision making and problem solving functionsu201D and u201Ccontains both highly detailed and summarized historical data relating to various categories, subjects, or areasu201D. Implementation of the research funding data mart at McMaster has meant that our stakeholders now have electronic access to data which previously was not widely disseminated. Stakeholders are now able to gain timely access to this data in the form that best matches their current information needs. Security requirements are being addressed taking into consideration the following:
    u2022 Data identification
    u2022 Data classification
    u2022 Value of the data
    u2022 Identifying any data security vulnerabilities
    u2022 Identifying data protection measures and associated costs
    u2022 Selection of cost-effective security measures
    u2022 Evaluation of effectiveness of security measures
    At McMaster access to data involves both authentication and authorization. Authentication may be defined as the process of verifying the identity of a person or process within the guidelines of a specific
    6
    SUGI 30 Focus Session
    security policy (who you are). Authorization is the process of determining which permissions the user has for which resources (permissions). Authentication is also a prerequisite for authorization. At McMaster business intelligence (BI) services that are not public require a sign on with a single university-wide login identifier which is currently authenticated using the Microsoft Active Directory. After a successful authentication the SAS® university login identifier can be used by the SAS® Meta data server. No passwords are ever stored in SAS®. Future plans at the university call for this authentication to be done using Kerberos.
    At McMaster aggregate information will be open to all. Granular security is being implemented as required through a combination of SAS® Information Maps and stored processes. SAS® Information Maps consist of metadata that describe a data warehouse in business terms. Through using SAS® Information Map Studio which is an application used to create, edit and manage SAS® Information Maps, we will determine what data our stakeholders will be accessing through either SAS® Web Report Studio (ability to create reports) or SAS® Information Delivery Portal (ability to view only). Previously access to data residing in DB-2 tables was granted by creating views using structured query language (SQL). Information maps are much more powerful as they capture metadata about allowable usage and query generation rules. They also describe what can be done, are database independent and can cross databases and they hide the physical structure of the data from the business user. Since query code is generated in the background, the business user does not need to know structured query language (SQL). As well as using Information Maps, we will also be using SAS® stored processes to implement role based granular security.
    At the university some business intelligence (BI) services are targeted for particular roles such as researchers. The primary investigator role of a research project needs access to current and past research funding data at both the summary and detail levels for their research project. A SAS® stored process (a SAS® program which is hosted on a server) is used to determine the employee number of the login by checking a common university directory and then filtering the research data mart to selectively provide only the data that is relevant for the researcher who has signed onto the decision support portal.
    Other business intelligence (BI) services are targeted for particular roles such as Vice-Presidents, Deans, Chairs, Directors, Managers and their Staff. SAS® stored processes are used as described above with the exception that they filter data on the basis of positions and organizational affiliations. When individuals change jobs or new appointments occur the authorized business intelligence (BI) data will always be correctly presented.
    As the SAS® stored process can be executed from many environments (for example, SAS® Web Report Studio, SAS® Add-In for Microsoft Office, SAS® Enterprise Guide) authorization rules are consistently applied across all environments on a timely basis. There is also potential in the future to automatically customize web portals and event notifications based upon the particular role of the person who has signed onto the SAS® Information Delivery Portal.
    ARCHITECTURE (PRODUCTION ENVIRONMENT)
    We are currently in the planning stages for building a scalable, sustainable infrastructure which will support a scaled deployment of the SAS® Value Chain Analytics. We are considering implementing the following three-tier platform which will allow us to scale horizontally in the future:
    Our development environment consists of a server with 2 x Intel Xeon 2.8GHz Processors, 2GB of RAM and is running Windows 2000 u2013 Service Pack 4.
    We are considering the following for the scaled roll-out of our production environment.
    A. Hardware
    1. Server 1 - SAS® Data Server
    - 4 way 64 bit 1.5Ghz Itanium2 server
    7
    SUGI 30 Focus Session
    - 16 Gb RAM
    - 2 73 Gb Drives (RAID 1) for the OS
    - 1 10/100/1Gb Cu Ethernet card
    - 1 Windows 2003 Enterprise Edition for Itanium
    2 Mid-Tier (Web) Server
    - 2 way 32 bit 3Ghz Xeon Server
    - 4 Gb RAM
    - 1 10/100/1Gb Cu Ethernet card
    - 1 Windows 2003 Enterprise Edition for x86
    3. SAN Drive Array (modular and can grow with the warehouse)
    - 6 u2013 72GB Drives (RAID 5) total 360GB for SAS® and Data
    B. Software
    1. Server 1 - SAS® Data Server
    - SAS® 9.1.3
    - SAS® Metadata Server
    - SAS® WorkSpace Server
    - SAS® Stored Process Server
    - Platform JobScheduler
    2. Mid -Tier Server
    - SAS® Web Report Studio
    - SAS® Information Delivery Portal
    - BEA Web Logic for future SAS® SPM Platform
    - Xythos Web File System (WFS)
    3. Client u2013Tier Server
    - SAS® Enterprise Guide
    - SAS® Add-In for Microsoft Office
    REPORTING
    We have created a number of parameterized stored processes using SAS® Enterprise Guide, which our stakeholders will access as both static (HTML as well as PDF documents) and interactive reports (drill-down) through SAS® Web Report Studio and the SAS® Add-In for Microsoft Office. All canned reports along with SAS® Web Report Studio will be accessed through the SAS® Information Delivery Portal.
    NEXT STEPS
    Next steps of the project include development of a financial data mart along with appropriate data quality standards, monthly frozen snapshots and implementation of university-wide financial reporting standards. This will facilitate electronic access to integrated financial information necessary for the development and maintenance of an integrated, multi-year financial planning framework. Canned reports to include monthly web-based financial statements, with drill-down capability along with budget templates automatically populated with data values and saved in different workbooks for different subgroups (for example by Department). The later will be accomplished using Microsoft Direct Data Exchange (DDE).
    8
    SUGI 30 Focus Session
    As well, we will begin the implementation of SAS® Strategic Performance Management Software to support the performance measurement and monitoring initiative that is a fundamental component of McMasteru2019s strategic plan. This tool will assist in critically assessing and identifying meaningful and statistically relevant measures and indicators. This software can perform causal analyses among various measures within and across areas providing useful information on inter-relationships between factors and measures. As well as demonstrating how decisions in one area affect other areas, these cause-and-effect analyses can reveal both good performance drivers and also possible detractors and enable u2018evidenced-basedu2019 decision-making. Finally, the tool provides a balanced scorecard reporting format, designed to identify statistically significant trends and results that can be tailored to the specific goals, objectives and measures of the various operational areas of the University.
    LESSONS LEARNED
    Lessons learned include the importance of taking a consultative approach not only in assessing information needs, but also in building data hierarchies, understanding subject matter, and in prioritizing tasks to best support decision making and inform senior management. We found that a combination of training and mentoring (knowledge transfer) helped us accelerate learning the new tools. It was very important to ensure that time and resources were committed to complete the necessary planning and data quality initiatives prior to initiating the first project. When developing a project plan, it is important to

  • My 10.8.3 update did not install properly citing an 'Unknown Error'. Now, my Mail and Mac App Store aren't working. What went wrong and how do i fix it ?

    My 10.8.3 update did not install properly citing an 'Unknown Error'. Now, my Mail and Mac App Store aren't working. What went wrong and how do i fix it ?

    I tried this and still have the same problems. If I open Address book or the Mac App Store I get the library rebuild popup and a hang. I created a fresh user and then things are better apart from the printing issue. Its clearly some 3rd party software issue but the crash logs are meningless to me. I used the excellent Etre check app from http://www.etresoft.com/etrecheck so I have a list of what is being loaded and can compare clean and crashed user info but as I cant work out which of the startup items, launch agents, launch daemons etc that  are causing the problem.
    I have eliminated Dropbox, Mac Keeper and Witness, and it isnt related to my exterrnal LED cinema dispay or my external thunderbolt drives, or any USB devices if thats any help to anyone else. Info from Etrecheck follows -
    Kernel Extensions:
              com.oxsemi.driver.OxsemiDeviceType00          Version: 1.28.7
              com.rogueamoeba.InstantOn          Version: 6.0.2
              com.rogueamoeba.InstantOnCore          Version: 6.0.2
              com.Cycling74.driver.Soundflower          Version: 1.5.3
    Problem System Launch Daemons:
    Problem System Launch Agents:
    Launch Daemons:
                 [not loaded] com.adobe.fpsaud.plist
                 [not loaded] com.adobe.SwitchBoard.plist
                 [not loaded] com.bombich.ccc.plist
                 [not loaded] com.dymo.pnpd.plist
                 [not loaded] com.intego.BackupManagerPro.daemon.plist
                 [not loaded] com.micromat.TechToolProDaemon.plist
                 [not loaded] com.microsoft.office.licensing.helper.plist
                 [not loaded] com.orbicule.witnessd.plist
                 [not loaded] com.sierrawireless.SwitchTool.plist
                 [not loaded] com.stclairsoft.AppTamerAgent.plist
                 [not loaded] org.macosforge.xquartz.privileged_startx.plist
                 [not loaded]          pcloudd.plist
    Launch Agents:
                     [loaded] com.divx.dms.agent.plist
                     [loaded] com.divx.update.agent.plist
                     [loaded] com.epson.epw.agent.plist
                     [loaded] com.lacie.raidmonitor.daemon.plist
                     [loaded] com.lacie.safemanager.daemon.plist
                     [loaded] com.micromat.TechToolProAgent.plist
                     [loaded] com.orbicule.WitnessUserAgent.plist
                     [loaded] org.macosforge.xquartz.startx.plist
    User Launch Agents:
                 [not loaded]          .DS_Store
                     [loaded] com.adobe.AAM.Updater-1.0.plist
                     [loaded] com.adobe.ARM.202f4087f2bbde52e3ac2df389f53a4f123223c9cc56a8fd83a6f7ae.plist
                     [loaded] com.digitalrebellion.SoftwareUpdateAutoCheck.plist
                     [loaded] com.divx.agent.postinstall.plist
                     [loaded] com.google.keystone.agent.plist
                     [loaded] com.propaganda.dejavu.dvmonitor.plist
                     [loaded] com.valvesoftware.steamclean.plist
                     [loaded] com.zeobit.MacKeeper.Helper.plist
    User Login Items:
              iTunesHelper
              Synergy
              TomTomHOMERunner
              Dropbox
    3rd Party Preference Panes:
              Déjà Vu
              Flash Player
              Flip4Mac WMV
              GR-55
              Paragon NTFS for Mac ® OS X
              Perian
              Printopia
              TechTool Protection
              Witness

  • Installed the update tonight and now my phone (Lumia 928) won't power up.  I've tried a soft reset, but the screen goes from the Nokia logo to a red Verizon screen to a black screen.  What's wrong and how do I fix it?  Help!

    Installed the update tonight and now my phone (Lumia 928) won't power up.  I've tried a soft reset, but the screen goes from the Nokia logo to a red Verizon screen to a black screen.  Tried it 10 times with the same result.  What's wrong and how do I fix it?  Help!

        Oh no Mr.Ected!
    I can see if we can get your phone back on! I understand how important it is to have a phone. Have you tried this to see if we can get it back on? http://vz.to/1DZhteH . If it is still goes to a red Verizon screen and then to black we might need to do a master reset. While the phone is off try this:http://vz.to/1DZhXkU Be mindful this is the last resort because it will erase everything on the phone. If you have done back up assistant in the past you will be able to get you contacts back. Please let me know if you need any more help.
    AmberF_VZW
    Follow us on Twitter @VZWSupport

  • Recently loaded Lion on my laptop and now my computer crashes often. Black screen and keyboard lights up. Any ideas on what's wrong and how to fix this?

    Recently loaded Lion on my laptop and now my computer crashes often. Black screen and keyboard lights up. Any ideas on what's wrong and how to fix this?

    Everytime this happens Ihave to power down and restart! Any ideas would be appreciated!

  • How many types of authentications in sharepoint and how to implement those authentication in sharepoint?

    Hi All,
    How many types of authentications in sharepoint and how to implement those authentication in sharepoint?
    can any one explain the above things with examples?
    Thanks in Advance!

    In addition to
    A Sai Gunaranjan you can also check this URL for Sharepoint 2010:
    http://technet.microsoft.com/en-us/library/cc288475(v=office.14).aspx
    http://www.codeproject.com/Tips/382312/SharePoint-2010-Form-Based-Authentication
    ***If my post is answer for your query please mark as answer***
    ***If my answer is helpful please vote***

  • When i try to update my apps from the app store some of the apps wont update and ask for an Apple ID that isn't mine. Whats the problem and how do i fix it?

    When i try to update my apps from the app store some of the apps wont update and ask for an Apple ID that isn't mine. Whats the problem and how do i fix it? All im trying to do is update my apps and its asking for these random apple ID's.

    The apps were purchased by another user with a different Apple ID. You will have to erase them and repurchase them using your Apple ID.

  • Safari and calendar won't open due to 'calendar persistence plug in' problem.  Anyone know what this means and how to resolve it please?

    Safari and calendar won't open due to 'calendar persistence plug- in problems'.  Does anyone know what this means and how to resolve it please?
    mac book pro with Mavericks 10.9.5

    Launch the Console application in any of the following ways:
    ☞ Enter the first few letters of its name into a Spotlight search. Select it in the results (it should be at the top.)
    ☞ In the Finder, select Go ▹ Utilities from the menu bar, or press the key combination shift-command-U. The application is in the folder that opens.
    ☞ Open LaunchPad. Click Utilities, then Console in the icon grid.
    Step 1
    For this step, the title of the Console window should be All Messages. If it isn't, select
              SYSTEM LOG QUERIES ▹ All Messages
    from the log list on the left. If you don't see that list, select
              View ▹ Show Log List
    from the menu bar at the top of the screen.
    In the top right corner of the Console window, there's a search box labeled Filter. Initially the words "String Matching" are shown in that box. Enter the name of the crashed application or process. For example, if iTunes crashed, you would enter "iTunes" (without the quotes.)
    Each message in the log begins with the date and time when it was entered. Select the messages from the time of the last crash, if any. Copy them to the Clipboard by pressing the key combination command-C. Paste into a reply to this message by pressing command-V.
    ☞ The log contains a vast amount of information, almost all of which is irrelevant to solving any particular problem. When posting a log extract, be selective. A few dozen lines are almost always more than enough.
    Please don't indiscriminately dump thousands of lines from the log into this discussion.
    Please don't post screenshots of log messages—post the text.
    ☞ Some private information, such as your name, may appear in the log. Anonymize before posting.
    Step 2
    In the Console window, select
              DIAGNOSTIC AND USAGE INFORMATION ▹ User Diagnostic Reports
    (not Diagnostic and Usage Messages) from the log list on the left. There is a disclosure triangle to the left of the list item. If the triangle is pointing to the right, click it so that it points down. You'll see a list of crash reports. The name of each report starts with the name of the process, and ends with ".crash". Select the most recent report related to the process in question. The contents of the report will appear on the right. Use copy and paste to post the entire contents—the text, not a screenshot.
    I know the report is long, maybe several hundred lines. Please post all of it anyway.
    If you don't see any reports listed, but you know there was a crash, you may have chosen Diagnostic and Usage Messages from the log list. Choose DIAGNOSTIC AND USAGE INFORMATION instead.
    In the interest of privacy, I suggest that, before posting, you edit out the “Anonymous UUID,” a long string of letters, numbers, and dashes in the header of the report, if it’s present (it may not be.)
    Please don’t post other kinds of diagnostic report—they're very long and rarely helpful.

  • HT5625 I'm trying to create a new Apple ID but when I was putting on my information, there's a box asking for an ITunes gift code. What's this and how can I get one?

    I'm trying to create a new Apple ID but when I was putting on my information, there's a box asking for an ITunes gift code. What's this and how can I get one?

    You're not obligated to insert a gift code. But you can purchase gift codes on the Apple online store (gift cards or certificates) or Apple Retail store
    Gift codes are pre paid cards so you can use credit on the iTunes Store to purchase content
    To create apple ID without payment method:
    http://support.apple.com/kb/HT2534?viewlocale=pt_PT

  • HT5487 my ipod touch is stuck with an I tunes logo and a usb chord with an arrow pointing to the logo. What is this and how do I fix it?

    My Ipod is stuck with a picture of a USB chord with an arrow pointing to an itunes logo....what is this and how do I fix it? I did look at the "printers and devices" section on my computer. It shows an un identified "apple" device that is in "recovery mode" but that is. I tried to trouble shoot it there but no help....

    Connect to iTunes on the computer you usually Sync with and “ Restore “...
    http://support.apple.com/kb/HT1414
    If necessary Place the Device into Recovery mode...
    http://support.apple.com/kb/HT1808

Maybe you are looking for

  • IPhone 5 w/6.1 now unable to connect to Chevy vehicle

    iPhone 5 with 6.1 is unable to connect to 2012 Chevy Silverado.  using lighting to USB cable shows USB device then shows no USB device charges just fine bluetooth for phone calls works fine it was worked with since August 2012 from iOS 6 up through 6

  • Problem configuring vRealize Operations Manager

    Hi there, I have installed VRealize operations manager version 6.0 (trial version for 60 days) and ever since I have installed it, it says collecting data but not able to see any details of my vmware infrastructure in there. When I click on reports,

  • RMAN archive logs backup and restore in RAC environment.

    Hello All, I have a 8 node RAC using ASM production database and a single node standby database using ASM. I have archive log gap on the standby database and the archive logs on the primary database is backed up and removed. I need to resync the stan

  • How to implement the search help exit to MM01 for Material by product hiera

    Hi, How to implement the search help exit to MM01 T-code for Material by product hierarchy, but system default it gives the data from MVKE table, my client wants from MARA table, i created the one Function Module, write this code in that FM. IF CALLC

  • Why is my satrt up disk telling me it's full...and what is it?

    Hi guys, I'm pretty much new to Mac and have an imac 27" which I bought myself for my 40th on a whim of self indulgence. I must say I'm pleased with it.....although I have an message telling me on screen whenever I try to load any new software or put