Scenarios

Hi, please I need the same information because my order was cancelled by the HP store.

Please when they return back my money?

Hey @jonida,

Welcome to the Forums of HP Support!

I see you are having some problems with an order placed through HP Shopping. For that matter, I suggest to contact HP Shopping. You can do so by clicking on this link.

Please let me know the results after following the above. If you are able to contact technical support, please click on accept solution. If you appreciate my help, please click on the thumbs up icon. The two icons are below this post.

Tags: HP Printers

Similar Questions

  • Summary of complex scenario (counties)

    Hi all

    Looking for inspiration and ideas with this little teaser

    I'm trying to find a common approach to the production of four counts (A, B, C and D) indicated in lines 1 to 5 below. This function of a table that contains about 4 000 entries.

    In affect, I try to summarize the different permutations in the classifications of four cells show in the image above, using a common approach. I might add a column for each company and use wild-card account, but I'd rather keep the table of (imported) origin of tact - I know that I could build a table of distinct society in another piece of work, but there must be a smarter way to achieve this.

    The legend below presents an overview of how the data looks like with different options (style truth table). The reference column contains a master list starting with RE - unique references.

    NC and P columns contain company names. There are two additional columns and the television that contain one or more numbers starting with- and TV - respectively.

    The idea is to check that the RE has a link to references or TV in the respective columns when there is a company name in the naming context and / column P

    There are a number of scenarios based on conditional counts in two columns: following NC and P with the possible permutations:

    Swap 1: Where there is a company name in the column "NC" count the number of:

    • RE links to OF
    • RE TV links
    • RE links to OF and TV
    • RE completely unrelated
    • More than one company with no link

    Swap 2: Where there is a company name in the column 'P' count the number of:

    • RE links to OF
    • RE TV links
    • RE links to OF and TV
    • RE completely unrelated
    • More than one company with no link

    Switch 3: When there is an entry in the column "NC" both "P":

    • RE links to OF
    • RE TV links
    • RE links to OF and TV
    • RE completely unrelated
    • More than one company with no link

    At this point, my head began to ache - would be very grateful and ideas on how this could be done.

    Thanks in advance

    Perry

    If I understand correctly, you can compile your different counts using COUNTIF with the * wildcard, something like this:

    For more convenience in formulas to set up your data in a table and your account in another.

    Here are the formulas in the table 'Account':

    B2: = COUNTIFS(Data::$B,"*RE*",Data::C,"<>"&"",Data::$F,"*DE*")
    C2: = COUNTIFS(Data::$B,"*RE*",Data::D,"<>"&"",Data::$F,"*DE*")
    D2: = SUM(B2:C2)
    B3: = COUNTIFS(Data::$B,"*RE*",Data::C,"<>"&"",Data::$G,"*TV*")
    C3: = COUNTIFS(Data::$B,"*RE*",Data::D,"<>"&"",Data::$G,"*TV*")
    D3: = SUM(B3:C3)
    B4: = COUNTIFS(Data::$B,"*RE*",Data::C,"<>"&"",Data::$F,"*DE*",Data::$G,"*TV*")
    C4: = COUNTIFS(Data::$B,"*RE*",Data::D,"<>"&"",Data::$F,"*DE*",Data::$G,"*TV*")
    D4: = SUM(B4:C4)
    B5: = COUNTIFS(Data::$B,"*RE*",Data::C,"<>"&"",Data::$F,"",Data::$G,"")
    C5: = COUNTIFS(Data::$B,"*RE*",Data::D,"<>"&"",Data::$F,"",Data::$G,"")
    D5: = SUM(B5:C5)

    You can learn more about COUNTIF here (you can also access it via help > formulas & functions help menu.)

    For more information on the search for wildcards of 'wild' in help > formulas & functions help

    The function works with pairs of columns-condition, where you add a reference to a beach (usually a column because it's more convenient) and then apply a 'condition' against it, indeed the application of several filters.

    You can add pairs more than necessary.

    SG

  • A potential loss scenario

    Hello world. Thank you in advanced for your time.

    What I'm trying to understand is this hypothetical scenario.

    I have a s 6 of the iPhone with the most updated to iOS version.

    I find my iPhone is turned on.

    I have a defined authentication code.

    I put on location Services.

    I have the control center hidden when the iPhone is locked.

    I lose my device at the Mall. Someone finds it and quickly notice there is a) any identifyable as my name info can. (b) the phone is password locked. (c) I'm nowhere in sight and probably do not know I lost it or do and have no idea where.

    At this point, the finder has good or bad intentions.

    Good... I have a chance. Bad intnentions, phone gets probably turned off and chances got thinner.

    I want to first focus on the good finder.

    They take my phone with them because, as many good intentions finders, they are afraid of the return exceeds any member of questionable personnel, they may keep it for themselves. So they take the tasks themselves.

    Battery dies on them and they do not have an Apple device and therefore not (yet) charger. Or maybe it was actually left on the roof of my car and the broken screen and can not be read.

    They go to an Apple store, is summoned to give it to law enforcement (Finder believes that, "Yes, they will get right on it.")

    In the meantime, I try to use Find My iPhone app and freaked out about what to do. Put lost Mode, send a Message, followed by its location and perhaps even given to erase distance etc. But my phone is off and nothing can really take place in any case for this reason.

    Time passes. I need my phone for personal and professional reasons.

    How long should I wait before I take serious acts as the caller my carrier and report lost/stolen and then pulling my pocket book or by calling my insurance?

    Let's say that I give a week that we all know is eternity. Meanwhile, the finder's ad on CL they found my phone completely unbeknownst to me. They went to Apple and the police station and have not given up on me still.

    But I give in and suspend my service with Verizon and BAMMM, I kill my cellular data connection.

    NOW, the network connection based on everything I have read and understood, a "known" wifi is my only hope if this phone is able to load and turned back on... that active things with, I found my iPhone right?

    Here are the important questions:

    -What exactly is the scope of networks wifi "known"? They are not just networks I joined physically, but also wifi phone networks comes in contact with who are not locked and not me necessarily to accept its use as a Starbucks?

    -How this detector can help get my device on a network that is known when they cannot get in it to do?

    There's a part of what Apple is talking about here (on privacy and location - Apple Support Services) that contributes to the situation and the finder on my iPhone?

    -Are there applications that take advantage of the hardware of the iPhone and the software better than Apple does?

    D ' other thoughts?

    Thanks for making it through all these words!

    thassaright wrote:

    Here are the important questions:

    -What exactly is the scope of networks wifi "known"? They are not just networks I joined physically, but also wifi phone networks comes in contact with who are not locked and not me necessarily to accept its use as a Starbucks?

    -How this detector can help get my device on a network that is known when they cannot get in it to do?

    There's a part of what Apple is talking about here (on privacy and location - Apple Support Services) that contributes to the situation and the finder on my iPhone?

    -Are there applications that take advantage of the hardware of the iPhone and the software better than Apple does?

    D ' other thoughts?

    Thanks for making it through all these words!

    First of all, to find my iPhone work correctly, the following must occur. The device must have find my iPhone activated prior to the loss, the device must be turned on and have enough power, and the device must have an active connection to the internet, cell phones or wi - fi. If none of these things are not in place, then you can not follow the device.

    In this context, to answer your questions:

    Known wi - fi networks are those that you connected to in the past. It may be those that you have the password registered for, or public wi - fi you have agreed to sign in the past. IPhone will not connect, even to a WiFi unprotected, if you have not agreed to join her in the past.

    There is no way for the person to agree to your device to connect to a wi - fi network if you have not agreed to it in the past, since they cannot access the device to agree to join.

    Your location service must were lit before the disaster, and it is automatic to find my iPhone If you have enabled.

    There are no applications to help you locate your device, and other applications are not accessible outside the iPhone and then be able to follow the iPhone. While you can connect to www.icloud.com on the computer, it is only if your device is connected as in what I described at the beginning.

  • Closed the scenario or not

    After a few years that I use FCPX, even now I do not understand the reason why sometimes some clips are locked up in a storyline of 'farm' like this

    and sometimes not (However, in the following example there are transitions and other complex sequences as in the first example...)

    Connected clips linked by transitions must be in a storyline. Clips on the main timeline need not be tied to a Tablet because they are already on a scenario and are related to each other by magnetism.

  • Director of scenario: firmware update?

    Hi, is there somewhere a page where I can see versions of firmware available Director scenario?

    Hello

    I do not have this feature, or have something good about it.

    Here, seems to be the assistance of IOmega's LenovoEMC site

    https://Lenovo-na-en.custhelp.com/app/subproduct/p/991

    Also the product specific:

    https://Lenovo-na-en.custhelp.com/app/cust_alp/p/991, 1077

    I noticed other forums post that can give you a few lights

    https://forums.Lenovo.com/T5/Iomega-Desktop-Network-Storage/Iomega-screenplay-TV-link-Director-quot-...

    Here, I also found that there is a firmware 1.4.0.70 version, but I don't know if it's later.

    https://Lenovo-na-en.custhelp.com/app/answers/detail/A_ID/23148/related/1/session/L2F2LzEvdGltZS8xND...

    Concerning

  • How to test a scenario of upgrading an application of Cascades with a database?

    I want to assure you that I have not destroy user data when I release versions updates to my applications. Is there a documentation available explaining an upgrade of the life cycle? I would like to make a few updates to test once I understood this process.

    When I search the forums for "upgrade", I tend to see the messages around updated the BB SDK itself rather than the App upgrade scenarios.

    You can simulate this.  First of all, to export a signed release.  To click directly on your project, choose export-> BlackBerry-> Release Build.  The BAR file should appear in your project in the folder that you selected in the name of the file with the version of the app.  Right click on this bar file and choose BlackBerry-> Install.  This will install a signed release on your device.

    Then, to increment the version number in your application and follow the same process above to install the new version.

  • How to plan the failover for the following scenarios in Flex-connect mode.

    The following queries are against the AP high availability (no SSO failover or controller HA), which means that if a controller fails, the AP will be failover to the secondary controller that is in a different location than Geo. the AP will be to connect Flex with local switching and local authorization mode: in this scenario, here are my questions

    1: if I have a SSID that has a set of interfaces that are connected to him, can I switch it on the other controller where there may be a single WLAN connected. ?

    2:do, we need to subnet masks to match both ends?

    3: if I have a SSID with open authentication, can I configure the SSID of the remote network without authentication?

    4: can someone link me to the top with a document that explains the configuration of the case study of the flex-connect mode fail on scenarios.

    Any help given would be really appreciated.

    Thank you.

    1: if I have a SSID that has a set of interfaces that are connected to him, can I switch it on the other controller where there may be a single WLAN connected. ?

    The groups interface works only for centrally switch not locally

    2:do, we need to subnet masks to match both ends?

    See #1

    3: if I have a SSID with open authentication, can I configure the SSID of the remote network without authentication?

    If you configure an SSID with open authentication, then the all having APs SSID assigned to it will use.  Open authentication is identical to no authentication.

    4: can someone link me to the top with a document that explains the configuration of the case study of the flex-connect mode fail on scenarios.

    Do a search on Google for 'FlexConnect deployment guide It will have links to failover.

    -Scott

  • Example of Script for UCCX 8.5 deployment for a scenario of office help

    Hi all

    I'm looking to implement UCCX 8.5 initially for our help desk call center.   I wanted to see if anyone had an example script that I would be able to watch.

    The scenario is an extension of the calling party calls 3333

    The message that you have reached the IT Helpdesk

    Press 1 for a State of the system systems

    Press 2 to speak to a support Office Specialist, if all agents number our busy he would turn outward, outward services.

    Press 3 for more specific support questions.

    Any help would be greatly appreciated.

    This is a high-level script that does what you want.  You would need to change the details of how you want it to work, but this should help you in the right direction.

  • Tide during the night planning scenario

    Hi all

    I have a specific day after scheduling scenario I could use some help, with details of this example are below:

    (1) job A runs every day, from 10 minutes after midnight (12:10)

    (2) positions B, C and D every Wednesday and Friday, starting at 21:00 and track in a sequence B > C > D

    B job runs in 1 hour (9-10 am), C work is performed in 1 hour (10-23:00), but job D runs 3 hours (23:00 to 02:00 the next day)

    Tidal 2) is set to cut classes to schedule the next day at midnight, which means that on Wednesday and Friday, job D still will run at the start of the next day calendar

    (3) if job B work ever since the day before, I don't want my day job (A Job) to start the next day until the work of the eve B

    If I schedule task A to start every day at 02:00 to avoid this conflict, then every Monday, Tuesday and Thursday I'm wasting 2 hours of our schedule between 12: 00 and 02:00 day this job does not work.

    Is it possible to configure dependencies like this, where a my current day job depends on D of the previous day job?

    Thanks in advance for the help!

    Best regards

    Doug M.

    Since the definition of dependent employment screen, change your dependency and select the last occurrence (instead of the Match occurrence) and Date Offset 1 - this will look at the standby

  • IPCC Enterprise - Server Cti failover: scenario

    Hi, I have a duplex scales environment (loggerA, routerA, PG1A, CG1A and CTIOSServerA)

    B-side: (loggerB, routerB, PG1B, CG1B and CTIOSServerB)

    AW, Distributor and HDS are on a stand-alone server.

    I tried the script to fail in the next and both CTIServer (CG1A and CG1B) did not CTIOSServer (AorB) to connect (based on the scenario of Services running).

    My failover of the scenario:

    -On the scales I m running services: LoggerA, RouterA, PG1A, and CTIOSA

    -On the b-side: I m running only the services of CG1B

    All Ports or IP are well done I m wondering if the failover scenario is supported, because until the PG1B has not elapsed the CG1B does not CTIOSA you want to connect.

    Reading of the CSCma27627 case (symptom: no documentation published, noting a specific configuration)

    requirements at the CTI server on dedicated platform installation/deployment

    independent of the same instance of PG.

    Condition: PG and CTI Server is installed on a separate server platforms

    Workaround: No. This configuration is not permitted.)

    So do you mean CG1B is not able to connect to a PG1A?

    Concerning

    The system is designed such that one side of the CG A and B aren't only for the PG on his own side. The current process of mutual FUNDS on the PG will not support 2 servers CTI pointing to it to any side. CTI servers can be independent active on the side of the PIM is enabled when the two CSPs are online.

    So in your example, you must add mutual FUND and PIM next B in order to make it able to communcate with PIM on the a-side.

  • If I put more lower memory card on a computer that has the memory card fast (just for the diagnosis of scenario) can damage the computer?

    Hello

    If I put a memory ddr3 or ddr2 has a speed lower than the an origin whch is on the motherboard (just to diagnose the scenario), which would damage the computer?

    Thank you

    Johan

    Hi Johan,.

    DDR2-400 has a transfer rate of 3200 MB/s. DDR2-533 has a transfer rate of 4266 MB/s.

    High speed DDR2 DIMMS are compatible with low speed DDR2 DIMM, although the motherboard or controller memory CPU will be bound to the limits of the low-performance modules.

  • CVP: Survivability on a stand-alone scenario

    Hello

    According to CVP 3.1 SRND survival is not supported on a stand-alone scenario.

    In any case, if the CVP is down or unreachable.

    I should be able to get in touch with a

    predefined IP phone extension.

    Is this something we can do on the voice gateway configuration?

    Survivability.Tcl can be used as well?

    Any help will be apreciated.

    Christian

    Hi Christian,

    first of all, you have the option of deploying a doorman and if the CVP doesn't return the call to the custodian to send it directly to an extension of call manager.

    If I recall right in your scenario, you have a GK, I think you can try to play with the priority of dialpeers and have a second available dialpeer in which case the SVC is not, this has some issues that you need to monitor closely, if your solution is to take more calls, you designed for summits, then this lower dialpeer will try to route the calls that would be otherwise treated alongside in CVP.

    Third alternative uses a tcl script custom as you suggest, but it would not be easy to overcome the limitation even recommend do not deploy in a stand-alone environment.

    Kind regards

    Riccardo

  • troubleshooting scenario 1131

    I have the following scenario to solve Monday and I'm hoping to collect some useful comments before this date. I appreciate your comments.

    • I have four 1131 autonomous AP who do not get their ip addresses from a dhcp server to the Public ssid. Tested on multiple clients.
    • The private ssid seems to work very well, of course, they get their from another internal server ip addresses.
    • The dhcp server is a cisco router 1811 old code running since 2005. It uses vlan999 on int f9 to distribute ip addresses to the wlan clients.
    • Tracing of the AP, the packets go to the router instead of the 1811 1711, so vlan999 does not work
    • APs use vlan999 for the Public ssid and I said that's not serious if bridge groups only go as high as 255, so the number of 0.999 subinterface and the number of vlan 999 and the 255 bridge group number do not match in the subinterface AP configs as they normally would.

    interface Dot11Radio0.999

    encapsulation dot1Q 999

    no ip route-cache

    bridge-group 255

    bridge-group 255 subscriber-loop-control

    bridge-group 255 block-unknown-source

    no bridge-group 255 source-learning

    no bridge-group 255 unicast-flooding

    bridge-group 255 spanning-disabled

    • A cisco WS-C2960-24LT running 12.2 (44) SE2 lies between the EPA and the dhcp server. Network diagram is attached (not my design).
    • I have access to the APs and the router. I will be entering Monday swtich to see its config.

    So my question is what to do if after graduating in this passage, I find that the APs are connected physically as it is 1811 router and trunking seems to be configured correctly?

    Hello

    The Switchport should be a trumk port, allowing all the VLANS that you use...

    for example...

    If you use vlan 100 and 999 for wireless and the management as 1, then

    switch # en

    conf t

    int fa 9

    switchport mode trunk

    switchport trunk encapsulation dot1Q

    switchport trunk vlan 1 native

    end

    Make sure you hv allowed all valns on the trunk port and make sure connectivity to the switch to the 999 interface vlan network to the heart.

    and also IP for assistance under int valn 999 if necessary...

    Let me know if that answers your question...

    Concerning
    Surendra
    ====
    Please do not forget to note positions that answered your question and mark as answer or was useful

  • Minimum hardware requirements for the scenario of VPDN (LAKE &amp; LNS)

    Hello

    I need assistance with selection of the hardware platform for the scenario of vpdn. This deployment will serve up to 20 users Max can you tell me which is the minimum routing platform and version of IOS to use to the LAKE? And for LNS?

    Thank you.

    Best regards.

    28xx and 29erxx do not need DRY license, 880 can handle it too, but I don't know if the ordinary license is ok.

    Michael

    Please note all useful posts

  • Strange AnyConnect IPv6 interfere with IPv4 scenario

    I ran across this scenario last week and I don't know if I am missing something simple or if it is a real problem.

    Problem: It seems that ip6 can interfere with the IP4 VPN connections.

    My network is an extensive network of all the State affecting other agencies of the State (usually by having the firewall between us and them have VPN outside our firewall). Last week I set up a VPN connection to one of these organizations and connect them. The VPN configuration is a scenario of tunnel of split where they use the VPN tunnel for a specific application and all other traffic remains local.

    During testing, I noticed that the user could achieve some of their local resources, but not all. After a few basic troubleshooting, we determined that any time the user tried to achieve a local resource who had the ability of the IP6 (Please note that IP6 has not been configured, just cooked in the operating system) that they were not able to access this resource. However, they could reach IP4 resources without any problem. Ip6 was "unchecked" to the NETWORK card on the client and the resource server. Another resource told me that IP6 is impossible to be cut in 2008 and newer because microsoft has linked the many features and services OS inside.

    Simple ping tests proved that when the user attempted to reach resources with IP6 "built in" all traffic was trying to use IP6 by default (unless we used the switch-4 to force the IP4). The command prompt window would show a "General failure" when trying to ping any of these resources IP6.

    I was able to reproduce this problem in a different environment where a user VPN connects, try to ping several domain controllers and those who are 2008 and most recent attempt to answer over the IP6, then the old boxes answer on IP4. Needless to say that I'm getting nervous because it could alter a ton of services if/when the old domain controllers are upgraded.

    Does anyone have experience with this? I'm afraid that IP6 is the Protocol 'default' even when it is not configured and it is originally the users connected with Any Connect unable to access these resources even if the latter running IP4 and.

    Looks like that when you prefer IPv4 to IPv6 in Windows 2008 or Windows 8 and restart solve you the problem.

    Thank you

  • NAT scenario

    Dear,

    I'm looking for some help under the IPSEC VPN scenario: -.

    • Please note this application on both sides without Private IP allowed, meaning that VPN configuration will need to both Server and remote server using public ips and public ips to establish the tunnel as well. in any case in the below all I care about is the local side of the server not the remote.

    Server (172.16.5.8)-(172.16.5.1)core switch(172.16.55.2) -L2 switch---(172.16.55.1)VPN concentrator(192.168.3.2) -L2 switch---(192.168.3.1)PIX(Public Peer VPN: x.x.x.x)-Internet---(Public Peer VPN: y.y.y.y)remote---(adresse IP publique f.f.f.f)remote server

    (1) the VPN configuration will be on the VPN concentrator as PIX is running using context so VPN termination is not permitted.

    (2) given that the vpn tunnel is configured on the VPN concentrator using the interface with ip 192.168.3.2 a NAT will be on the PIX for the public IP x.x.x.x (Tunnel VPN estabilished without any problem)

    (3) a part of the public ip address of x.x.x.x who will establish the vpn tunnel, I have another another z.z.z.z of the public ip address that is available as there are the PIX interface, my question is that I can here 172.16.5.8 to the IP nat public z.z.z.z. (speak ipsec traffic do not forget both side limit that traffic must come from the public IP address)

    Conculsion

    I think that it won't work because package when its goes 1) VPN concentrator will be source: 172.16.5.8 and the destination: f.f.f.f, 2)
    When the outbound traffic of VPN to PIX the package has source: 192.168.3.2 and the remote server IP public y.y.y.y 3) when it gets to the pix configured 192.168.3.2 will be coordinated to x.x.x.x and destination y.y.y.y. So PIX will not be able to nat 172.16.5.8 to z.z.z.z because it will be already encrypted by ESP, please correct me if im right

    So incase im right which can do in this case?

    Hello

    I must begin by saying that I have absolutely no expirience NAT configuration on the VPN concentrators.

    If the VPN concentrator is able to make the NAT before negotiating VPN (which I assume he can) then you should be able to use any desired IP address as NAT IP address of your local server behind the hub.

    The right remote end must also ensure that the IP address that you have chosen because address IP NAT will serve you as their IP of destination in the L2L VPN configurations

    -Jouni

Maybe you are looking for

  • iPhone stuck in Recovery Mode 6s

    I have updated to iOS 10. When I came back to my phone, it's in recovery mode. I kept restarting. Still stuck. It takes forever to restore on my computer, it ALWAYS does. I don't know if this has to do with the fact that my phone has had betas out th

  • How can I fix this error: failed application svchost.exe_gpsvc

    Vista 64 bit on my machine boots every time I get the following error in my application event log Failed application svchost.exe_gpsvc, version 6.0.6001.18000, time stamp 0 x 47919291, failed module ntdll.dll, version 6.0.6002.18005, time stamp 0x49e

  • Photosmart 3100 flashing of all-in-one/lights

    have the printer listed above - re error message: cartridges and color light blink - plugged and unplugged, turned on/oo, replaced the color cartridge to nothing does not.  Even if the printer does not print, I would like to solve this problem

  • Question of the NAC

    The NAC policy is run on a cisco switch. If a cisco switch not is connected to these cisco switches, NAC policy can be implemented on the switch cisco no?

  • BlackBerry Smartphones bb curve 8520 wifi ssid and appworld does not

    I have a problem I can not conect to 2 wireless access points that have the same ssid it tells me to replace the one that my router at home and at work are the same, I have to remove the one that made me enter the password all the time are there no w