What is the sequence of starting EPM services for Fusion edition manually?

Hi,
I have installed the entire suite of v11 but couldn't figure out the correct sequence of starting up the services for different products. Does anyone know the start up sequence of Hyperion services?
Thanks.

Please read page 88 of the EPM_Install.pdf documentation from the EPM Documentation also available online.
Here is the excerpt from the pdf
Summary List of Services and Processes
The following EPM System product services and processes are listed below in their recommended
startup order.
1. Databases for repositories. (For a list of EPM System products that require a repository
database, see “System Requirements” in Oracle Hyperion Enterprise Performance
Management System Installation Start Here.)
2. Any corporate user directories that you plan to configure for use with Shared Services.
3. Shared Services OpenLDAP, or Oracle Internet Directory, depending on which is used as
Shared Services Native Directory.
4. Shared Services application server
5. Oracle's Hyperion® Remote Authentication Module
6. EPM Workspace Agent (CMC Agent)
7. EPM Workspace application server
8. EPM Workspace Web server
9. Performance Management Architect Services
10. Essbase Server
11. Administration Services application server
12. Smart Search application server
13. Integration Services Server
14. Essbase Studio Server
15. Provider Services application server
16. Reporting and Analysis (in any order):
a. Financial Reporting Services
b. Web Analysis application server
17. Remaining services or processes (in any order):
● Performance Management Architect application server
● Performance Management Architect Data Synchronizer application server
● Smart Space
● Smart Space Collaborator
● Financial Reporting application server
● Calculation Manager application server
● Planning application server
● Financial Management service
● Strategic Finance service
● Performance Scorecard application server
● Performance Scorecard Alerter application server
● Profitability and Cost Management application server
● Data Relationship Management services
● FDM Task Manager service
● Application Builder for .NET

Similar Messages

  • What is the order of starting the services?

    Hi,
    I have 2 node RAC with ASM. what is the order of starting the services like crs, asm,nodeapps, db, ,listener?
    can you help me?
    Thanks

    The basic steps are asm, crs, db, listener, nodeappsTypo there? First CRS then ASM.
    Also, if you are running ocfs2, then the very 1st step would be ocfs2 (if your voting and OCR disks are on a ocfs2 volume, it needs to mount before CRS can start).

  • What are the sequence steps involved in MM FLOW

    what are the sequence steps involved in MM FLOW?
    please explain.

    Process Flow
    The typical procurement cycle for a service or material consists of the following phases:
    1. Determination of Requirements
    Materials requirements are identified either in the user departments or via materials planning and control. (This can cover both MRP proper and the demand-based approach to inventory control. The regular checking of stock levels of materials defined by master records, use of the order-point method, and forecasting on the basis of past usage are important aspects of the latter.) You can enter purchase requisitions yourself, or they can be generated automatically by the materials planning and control system.
    2. Source Determination
    The Purchasing component helps you identify potential sources of supply based on past orders and existing longer-term purchase agreements. This speeds the process of creating requests for quotation (RFQs), which can be sent to vendors electronically via SAP EDI, if desired.
    3. Vendor Selection and Comparison of Quotations
    The system is capable of simulating pricing scenarios, allowing you to compare a number of different quotations. Rejection letters can be sent automatically.
    4. Purchase Order Processing
    The Purchasing system adopts information from the requisition and the quotation to help you create a purchase order. As with purchase requisitions, you can generate Pos yourself or have the system generate them automatically. Vendor scheduling agreements and contracts (in the SAP System, types of longer-term purchase agreement) are also supported.
    5. Purchase Order Follow-Up
    The system checks the reminder periods you have specified and - if necessary - automatically prints reminders or expediters at the predefined intervals. It also provides you with an up-to-date status of all purchase requisitions, quotations, and purchase orders.
    6. Goods Receiving and Inventory Management
    Goods Receiving personnel can confirm the receipt of goods simply by entering the Po number. By specifying permissible tolerances, buyers can limit over- and under deliveries of ordered goods.
    7. Invoice Verification
    The system supports the checking and matching of invoices. The accounts payable clerk is notified of quantity and price variances because the system has access to PO and goods receipt data. This speeds the process of auditing and clearing invoices for payment.
    Pur info record is nothing but a master data like thing which will be maintained for different materials to determine the prices etc.It Specifies the number that uniquely identifies a record.
    For Example: an info record is based on Plant Vendor and Material
    Based on these three the Material Prices will be calculated
    for different combinations different values are taken into consideration.
    During pricing it brings these values automatically based on this info record.
    Use ME11 Tcode to create this record.
    Common Tables used by SAP MM
    Below are few important Common Tables used in Materials Management Modules:
    EINA Purchasing Info Record- General Data
    EINE Purchasing Info Record- Purchasing Organization Data
    MAKT Material Descriptions
    MARA General Material Data
    MARC Plant Data for Material
    MARD Storage Location Data for Material
    MAST Material to BOM Link
    MBEW Material Valuation
    MKPF Header- Material Document
    MSEG Document Segment- Material
    MVER Material Consumption
    MVKE Sales Data for materials
    RKPF Document Header- Reservation
    T023 Mat. groups
    T024 Purchasing Groups
    T156 Movement Type
    T157H Help Texts for Movement Types
    MOFF Lists what views have not been created
    A501 Plant/Material
    EBAN Purchase Requisition
    EBKN Purchase Requisition Account Assignment
    EKAB Release Documentation
    EKBE History per Purchasing Document
    EKET Scheduling Agreement Schedule Lines
    EKKN Account Assignment in Purchasing Document
    EKKO Purchasing Document Header
    EKPO Purchasing Document Item
    IKPF Header- Physical Inventory Document
    ISEG Physical Inventory Document Items
    LFA1 Vendor Master (General section)
    LFB1 Vendor Master (Company Code)
    NRIV Number range intervals
    RESB Reservation/dependent requirements
    T161T Texts for Purchasing Document Types
    Tcodes:
    RFQ to Vendor - ME41
    Raising Quotation - ME47
    Comparison of Price - ME49
    Creation of PO - ME21N
    Goods Receipt - MIGO
    Invoice (Bill PAssing) - MIRO
    Goods Issue - MB1A
    Physical Inventory - MI01( Create doc)
    MI04 (Enter Count)
    MI07 (Post)
    regards,
    srinivas
    <b>*reward for useful answers*</b>

  • What is the difference between start() and run()

    Hi:
    what is the difference between start() and the run()???
    in my app, i have
    Console.debug( "starting thread to listen for clients" );
    _server = new Server( this );
    _server.start();
    _server extends Thread..
    why everytime i use server.start(); my app will terminate on it is own, even though in my servr.run() method, i have a while loop
    and if i call _server.run() explicitly in my code, that while loop will be in execution
    can someone let me know??
    thnx

    what is the difference between start() and the
    run()???start() is a method on Thread that tells it to start.
    run() is a method in the object that the thread executes.
    why everytime i use _server.start(); my app will
    terminate on it is own, Err.... I'm not convinced this is true. It'll throw an IllegalThreadStateException, if you try to restart an existing thread.
    If that's what you're saying.
    even though in my _servr.run()
    method, i have a while loopI don't see the connection. Are you saying that the while loop never terminates, and you don't see why the thread is terminating?
    and if i call _server.run() explicitly in my code,
    that while loop will be in executionIf you call server.run() explicitly, then run() will be executed in the same thread that you called it in.

  • What is the cost of replacing a battery for an Ipad 2 in India? On asking the service centre, I was informed the entire Ipad would be replaced for 20K which is exorbitant. Is it advisable to buy the Apple protection program in this case?

    What is the cost of replacing a battery for an Ipad 2 in India? On asking the service centre, I was informed the entire Ipad would be replaced for 20K which is exorbitant. The same is done in US for a paltry (comparably) 100 dollars. Is it advisable to buy the Apple protection program in this case?

    Battery Replacement
    http://www.apple.com/batteries/replacements.html

  • What is the use of creating proxy services using WSDL.

    Hi
    Am a beginner in ALSB and i have a basic question. Business services are created using WSDL,thats sounds logical as we need to invoke the actual backend services .
    Proxy services are connected to business services and what is the need that it can be e created using WSDL.
    What is the use of creating proxy services using WSDL.

    Hi,
    I beleive you are confused because of the apparent inclusion of transport information in WSDL (that is the host:port/endpoint where the service is hosted). However, if you refer to the w3c specification of WSDL1.0 ([url http://www.w3.org/TR/wsdl]www.w3.org/TR/wsdl), you will find that WSDL has three separate sections:
    1. The schema information that describes data element(s): specified in types
    2. The message information ie message and port sections that specify the parameters and the operations
    3. The service section that specify the actual protocol and endpoint binding.
    Ideally, a WSDL can be broken down into these three separate components. Any WSDL containing the first two is called an abstract WSDL and is used for a top-down approcah for web services, and if the third part is used, then you get a concrete WSDL, containing invocation end-point also.
    Comming back to your question one can typically use an Abstract WSDL for creating proxy service. This way, the service requester and integration can go on two separate threads where the common denominator or agreement between these two parties in terms of operation name and data element are imposed using the WSDL.
    Thanks and Regards
    Vivek Nandey
    BEA Certified Developer for Integration Solutions

  • Does anyone know why or what is the reason when starting a new iMac with Lion a gray bar sometimes appears when loading software?

    Does anyone know why or what is the reason when starting a new iMac with Lion, sometimes a gray bar appears under the Apple that begins to shade to dark as it loads OS?  It does this on occasion.  One time the system loaded was VERY slow and terrible colors.  Pulled the plug, re-started the computer and it did not do this.  As I say, its only on occasion, not every time.  I noticed in the discussion page there were problems listed for 10.6 nothing for Lion.
    Please advise, if possible.

    You should see this 4 option menu.  Click on Disk Utility:
    In Disk Utility, Select FIRST AID and then VERIFY and then REPAIR the disk.
    Ciao.

  • What is the Sequence of Master data and Transaction data R/3 to APO

    Hi guys,
    What is the Sequence of Master data and Transaction data R/3 to APO  through CIF?

    Hi,
    Master data,
    Material Indipendent data can be sent without any dependency.
    Material Dependent data sequence is as follow.
    Plant,
    MRP areas,
    Supply area,
    Material,
    MRP area material,
    planning material,
    ATP check,
    Purchase info recards,
    schedule agg,
    PPM or PDS (But before PPM or PDS  work center should send to apo) If PDS is sending then BOM should send before PDS.
    Transaction data.
    As per the business requirement what is planning in apo.
    Regards,
    Kishore Reddy.

  • What does the Traffic Setting under Location Services do in iOS 5?

    What does the Traffic Setting under Location Services do in iOS 5?
    Do I loose anything valuable by turning that function off on my 4S?

    No mention of it in the User Manual and Mpas still shows the traffic fine with it switched off.
    Even my TomTom can update Traffic with the setting switched off.
    It's a mystery

  • HT2693 what is the garmin iphone application customer service number?

    what is the garmin iphone application customer service number?
    My GPS that I bought for 60 dollars got erased after i changed my apple id.  I would like a refund or the app back.  Please help
    [email protected]

    Laxman25 wrote:
    Yea because any apps with your "old" id are attached to that Id only. You can log into the iPhone settings, store, and change the apple I'd back to your old one. Redownload it and it will work. It will only work if you are logged in with that I'd. I'm not sure you will get much of an outcome with trying to get a refund. Go to the garmin website and pull support from there.
    It is not correct that it will only work if you are logged in with the original ID. You must sign into the store with your original ID and then redownload the app from the Purchased tab. Once it's downloaded, however, you do not need to remain logged into that account. However, you'll need to enter your password for that account anytime you try to update the app.

  • What are the sequence of function modules executed in payroll result

    Dear all,
    what are the sequence of function modules executed  while retrivieng pryroll result.or
    functionmodule sequence in payroll programming.
    By
    bose

    Hi Bose,
    The sequence of FM executed in payroll result are
    1. cu_read_rgdir ---> from this u will get the country key.
    2. cd_read_last -
    > from this fm u will identify the seqnr for the latest record and finally for the payroll result
    3. pyxx_read_payroll_result.

  • What is the sequence for upgrading from 10.4.11 to lion

    What is the sequence for upgrading from 10.4.11 to lion. Can't use many apps without it. HELP

    Quicken is an example that the OP noted is important to her, too!
    Intuit makes it very difficult to find this link?!
    Everytime I want to find it to post it for someone else, I have to Google: "cnet quicken 2007 for lion" and then in top listed link: Topper Kessler's review for CNET, I find the direct link to Intuit
    This program will work with Quicken 2005, 2006 and 2007 data files directly.  If you have a data file from an older version, such as I did, Quicken Deluxe 2002, you must use the PPC version of either Quicken 2006 or 2007 to update the data first; and then the data will work in Quicken 2007 for Lion.
    For other PPC programs that require Rosetta, I installed Snow Leopard (with Rosetta) into Parallels 7 in Lion:
                             [click on image to enlarge]
    Full Snow Leopard installation instructions here:
    http://forums.macrumors.com/showthread.php?t=1365439

  • What is the best malwear detection and protection for use on a Mac?

    What is the best malwear detection and protection for use on a Mac?

    Mac users often ask whether they should install "anti-virus" software. The answer usually given on ASC is "no." The answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There  is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is foremost a problem of human behavior, and no technological fix alone is going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're better informed than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software.
    ☞ Rogue websites such as Softonic, Soft32, and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission. All "YouTube downloaders" are in this category, though not all are necessarily malicious.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the left side of the address bar when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It's as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • In order to start cable service for this device, please contact your cable provider

    when i try to watch a program on the xfinity part of tivo i get this message.In order to start cable service for this device, please contact your cable provider . what is wrong.

    stormey wrote:
    when i try to watch a program on the xfinity part of tivo i get this message.
    In order to start cable service for this device, please contact your cable provider . what is wrong.
    Apologies for the issue that you described above. I have escalated your issue to the right teams so that we can get On Demand working for you on your TiVo. That team will review your account and contact you directly. Thanks again for your patience.

  • What is the Best Price(Place to Buy) For 13" MB Pro(non-retina display)

    What is the Best Price(Place to Buy) For 13" MB Pro(non-retina display)?
    I am in PA, but close to Delaware, which is tax-free shopping.
    Thanks!

    http://store.apple.com/us/product/FD101/refurbished-133-inch-macBook-pro-25ghz-d ual-core-intel-i5
    You would have to web-order directly from Apple. Retail stores and resellers usually do not stock refurbs. All the Macs in our family that are in current use are refurbs and have provided excellent service. None have arrived with any cosmetic defects.

Maybe you are looking for

  • COLOUR MANAGEMENT IN PHOTOSHOP CS2 AND COLOUR SAMPLE POINTS

    I always place colour sample points on my images in order to monitor colour changes as I adjust. When I soft proof (using using Perceptual rendering),I go to the Information pallette and right click on the colour sample points.I then choose Proof opt

  • Crystal Report XI R2 version 11.5 not run on Windows Vista 64 bit OS

    We have created the Windows Vista 64 bit Development Environment with u201CCrystal Report XI R2u201D version 11.5 .  When we try to run report it gives following error "An error has ocured while attempting to load Crystal Reports runtime. Either the

  • Why do some songs in a playlist not play, or stop after only 1 song?

    I've had several playlists on my ipod that stop after playing 1 song/track, as well as skip over severl songs in that playlist. I know the tracks are good, because I can play them in iTunes, as well as play them one by one manually in the playlist. I

  • To generate PDF using BI APIs and loadjava utility

    Hi All, I am trying to generate PDF using BI APIs(FOProcessor etc). I have generated XML data through the PL/SQl procedure and storing it in a file. This file is loacted in database tier. The APIs is used through a simple java program which is applic

  • Parallel execution for Expression Filters

    I'm looking for any information on whether expression filters are amenable to parallel execution or not. I had a look through the documentation without success, and saw that in the type declarations for supporting objects there is no mention of DETER