Connection to a distant VI

Hi,
Problematic:
I want to access from one PC to an autonomous application installed on another PC through an Ethernet connection with a web browser.
Trials:
LabVIEW is installed on PC1 but isn’t on PC2.
When I try in local on PC1 it works.
When I try from PC1 (web browser) to PC2 (application) it works.
But when try in local on PC2, or from PC2 (browser)to PC1 (application) it doesn’t works.
HTML page displays “download of front panel. 0% of 0 bytes” and stays in that state.
I suppose that a LabVIEW module must to be installed on PC2. I have already install :
LV Web Services
NI LV Web Services Runtime
NI LabVIEW Run-Time Engine Web Server
NI LabVIEW Web Server
Server NI VISA
But the problem is still here
Somebody have any idea?

There is a chapter in the LabVIEW help about remote front panels:
Viewing and Controlling Front Panels Remotely
On the Web:
Waldemar
Using 7.1.1, 8.5.1, 8.6.1, 2009 on XP and RT
Don't forget to give Kudos to good answers and/or questions

Similar Messages

  • Why is very long (about 30 seconds) to connect another distant computer using Screen Sharing under Yosemite ?

    Hello,
    Before Yosemite (under Mavericks and less), it was possible to connect immediately another distant computer (over internet) with Screen Sharing (using Command-K or on Finder Menu-Go and submenu Connect To The Server, and putting the address like vnc://name:password@address
    Under Yosemite, it is possible to do the same things, but it takes about 30 seconds to get connection (is it the evolution of the celerity of the computing ?). And also, I have 2 windows during the waiting of connection : one is with icon of ScreenSharingApplication and 'Connecting to        …com', and the second one is with icon of a BlueHardDiskwith3people and 'Connecting…'.
    Under Yosemite, if I use Chicken of the VNC or JellysFastVNC, the connection is immediately.
    Could you tell me how is it possible to have under Yosemite a quick connection (about 0 to 5 seconds) with a distant computer (over internet) using Screen Sharing (command-K for example) ?
    Thanks.

    William,
    Eventually (after about 30 hours or so) it finished the encryption.  I then forced TM do a backup to the external HDD (after adding a 1GB file to my internal HDD) just to measure how long it would take for TM to run a backup to the external disk -- and it was very fast.  Looks like everything is working fine now. 
    Without your advice that 24+ hours wasn't unreasonable time for a first encryption of a drive that size,  I probably would have kept restarting my iMac and repartioning the external HDD and gone around in circles.
    Thank you very much.

  • How to use HTTPS to retrieve a set of files from a distant server?

    Hi !
    i am interested in some samples or links showing how is it possible to use HTTPS in a java code in a standalone application ( could be swing based or whatever) that allows an HTTPS connection to a distant server ( specefic file repository) so that downloading some data files could be possible.i am also interested to know what conditions should be available to make such connection possible ( specefic port number? specefic authentication? login? password? and does the Operating system on the distant server interfere with that ? etc...)
    thanks!

    in fact i tried to test a sample code by i got this exception :
    Exception in thread "main" javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
         at com.sun.net.ssl.internal.ssl.Alerts.getSSLException(Alerts.java:174)
         at com.sun.net.ssl.internal.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1591)
         at com.sun.net.ssl.internal.ssl.Handshaker.fatalSE(Handshaker.java:187)
         at com.sun.net.ssl.internal.ssl.Handshaker.fatalSE(Handshaker.java:181)
         at com.sun.net.ssl.internal.ssl.ClientHandshaker.serverCertificate(ClientHandshaker.java:975)
         at com.sun.net.ssl.internal.ssl.ClientHandshaker.processMessage(ClientHandshaker.java:123)
         at com.sun.net.ssl.internal.ssl.Handshaker.processLoop(Handshaker.java:516)
         at com.sun.net.ssl.internal.ssl.Handshaker.process_record(Handshaker.java:454)
         at com.sun.net.ssl.internal.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:884)
         at com.sun.net.ssl.internal.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1096)
         at com.sun.net.ssl.internal.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1123)
         at com.sun.net.ssl.internal.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1107)
         at sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:405)
         at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:166)
         at sun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:977)
         at sun.net.www.protocol.https.HttpsURLConnectionImpl.getInputStream(HttpsURLConnectionImpl.java:234)
         at HTTPSConnector.main(HTTPSConnector.java:30)
    Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
         at sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:285)
         at sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:191)
         at sun.security.validator.Validator.validate(Validator.java:218)
         at com.sun.net.ssl.internal.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:126)
         at com.sun.net.ssl.internal.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:209)
         at com.sun.net.ssl.internal.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:249)
         at com.sun.net.ssl.internal.ssl.ClientHandshaker.serverCertificate(ClientHandshaker.java:954)
         ... 12 more
    Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
         at sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:174)
         at java.security.cert.CertPathBuilder.build(CertPathBuilder.java:238)
         at sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:280)
         ... 18 moreand here si the sample code:
    package foo;
    import java.net.URL;
    import java.io.*;
    import javax.net.ssl.HttpsURLConnection;
    public class Test
    public static void main(String[] args)
    throws Exception
    String httpsURL = "https://your.https.url.here/";
    URL myurl = new URL(httpsURL);
    HttpsURLConnection con = (HttpsURLConnection)myurl.openConnection();
    InputStream ins = con.getInputStream();
    InputStreamReader isr=new InputStreamReader(ins);
    BufferedReader in =new BufferedReader(isr);
    String inputLine;
    while ((inputLine = in.readLine()) != null)
    System.out.println(inputLine);
    in.close();
    }so what this error is due to? and how to fix it ?.
    thanks!

  • I have 1 Internet Connection and I need to hook 2 wireless routers help.

    I have one internet connection.  I need to use 2 wireless routers.  What model of linksys router should I purchase and how should I hook them so we can use both at the same time.

    Remember that both wireless routers will not communicate wirelessly you will have to connect both the router's together with Ethernet Cables...
    What will be the approximate distance between both the routers ?
    Do you wish to establish communication between the computers connected to Router 1 and computers connected to Router 2 ?
    Do you wish to have a separate network for both the router's ? Look at this link
    You can go with Wireless - N draft Router's(WRT310N, WRT320N, WRT350N, WRT400N, WRT600N etc) as they will give you a good range to connect to a distant wireless clients...

  • Can't connect remotely after updating to Snow Leopard

    Hi,
    I've been connecting remotely (using SFTP) to my office computer with Fetch fine, My co-worker just updated the system software from OS 10.5 to OS 10.6, and now I cannot connect to the computer...any suggestions of what I should do? The only thing that changed that I can see is that with 10.5 I had to connect using port 222, and now I'm told I need to use port 22. Still can't connect though.
    Thanks for any input!

    So you've got a Mac running 10.5 at home, and you're trying to connect to a Mac running 10.6 at work, and you can no longer connect to that 10.6 computer but your coworker can connect to that same computer? What kind of computer is the coworker using from home? If a Mac, what OS is she running at home? How is she connecting? (Terminal.app command line? GUI front-end interface program like Fetch? Or Fetch itself?) If she is using a GUI program, I think that some of them display to the user a command-line style of text that it is using to connect to the distant end (I know that ssh tunnel used to). It would be helpful to know precisely what command is being sent from her and from you. If you could post those (masking, obviously, the username and hostname or host IP address as "user@host"), that would, I think, be an immense help.
    I do a lot of ssh and sftp to my home network from work and other itinerant locations using Terminal.app program. I type "ssh user@host" or "sftp user@host". That's why I'm asking if your coworker's sftp program actually displays the command sent. Both of these commands (ssh and sftp) can be loaded up with various optional switches to facilitate different or additional behaviors. For example, actually, I use
    "ssh -p22222 -L10025:localhost:25 -L10143:localhost:143 –L10548:localhost:548
    –L15900:localhost:5900 user@host" so that I can tunnel a bunch of other services (AFP file transfer, remote screen sharing, and receive and send email through my own personal five-account IMAP mail server) all encrypted inside the ssh connection. Or "sftp –oPort=22222 user@host" for encrypted file transfer from the command line. It would be helpful to know what her sftp program is actually sending to the work computer.
    Any possibility of a username or password change on the work computer? You made mention about a port switch from 222 to 22...did you make that corresponding change on your sftp program at home as well? Who told you that you had to make that change and why? Lastly, while I can't give any good reason at all as to why it would make any difference, but I see that Fetch is now at version 5.5.3 as of 16 Nov 2010. Are you using the latest and greatest?

  • 2940 connected to 2950 with VLANS

    Hi
    In my office, i have an 2940, no config. I want it to connect to the access sw, which again is connected to the dist/core. My port in the access sw have this config:
    interface FastEthernet0/8
    switchport access vlan 99
    switchport mode access
    switchport voice vlan 20
    no ip address
    spanning-tree portfast
    When i connect the 2940 to this 0/8 port, only some traffice seems to pass. I have several IP phones in my office, but only two would register. The pc is connected via IP phone, but then, only the pc get's access, not that IP phone. I find this strange, about how i should configure the 0/8 port in the 2940, so that all the traffice from the access sw gets through to all my 2940 ports.
    regards
    /alf

    If you configure port fa0/8 to be member of vlan 99 and voice vlan 20 you can only connect a IP phone to that port with built-in switchport that connects the PC/notebook.
    You should not connect a switch to that port. If you want a to connect that switch you can use a trunk to transport VLANs. Furthermore portfast is ONLY to be used on edge ports.

  • Super slow connection

    Having problems with my system somewhere. Cable modem connected to Airport Extreme, which is connected via ethernet to my iMac. Connection speeds are painfully slow. 2.5-3MBPS. When I pull the airport from the network and wire directly to the modem, I get 16-20MBPS. All I can think of to do is to plug the imac and the airport into a switch connected to the cable modem, and split the signal before the wireless broadcast begins. Any other thoughts would be much appreciated.

    hired gun design wrote:
    I'm pretty much at a loss as to how to proceed.
    I'm getting there too... some of this amounts to grasping at straws but here's what I'd do:
    Turn off your iMac's Airport to avoid confusion. If your connection speed is that slow I'm wondering if it's actually connecting to a distant wireless network so just turn it off to be sure.
    See what IP address your iMac is getting when connected directly to the modem. It ought to be the same address the modem would issue the Extreme. Is it? Remember to unplug the modem, thus giving it time to reset its memory first. If you don't know how to determine your iMac's IP address look at this: How do I find my Mac OS X Leopard 10.5's IP address?
    Then, find out what address it has when connected to the Extreme. It ought to be supplied by the Extreme, and within its DHCP address range i.e. not "self-assigned". I don't think anything would work if that were the case anyway.
    Try resetting the Extreme. Sometimes an internal parameter that you simply can't see or change using Manual Setup gets corrupted, and the only solution is to wipe the slate clean.
    Have you updated its firmware? I'm not aware of any recent firmware updates that would cause this kind of behaviour but why not rule out this potential cause.
    Try a different Ethernet cable. I know you're thinking that can't possibly be it but defective cables had me flummoxed more than once.
    Lastly your Extreme might simply be defective. No way to confirm that without substituting another.

  • [New Connection][Oracle][ssh]

    Hi,
    I have just installed SQL Developer on a Windows XP platform.
    I need to connect a distant Oracle database which is on a distant LAN.
    The problem is that the host is not reachable from outside.
    Usually I connect to the distant LAN using SSH and then connect myself to the Oracle database throught the SSH session.
    I haven't seen SSH parameters (such as "login" "password" and "host") in the New Connection dialog box.
    Is it possible to connect myself to this Oracle database with SQL Developer ?
    a+, =)
    -=Finiderire=-
    PS : I'm a french guy and I apologize for mistakes.

    Bonjour,
    Sql Developer connects to the database with JDBC drivers. As far as I know those don't support stuff like SSH.
    If you have a visual interface through the SSH session, I'd install sqldev on the server (or another machine in the remote network), so you'd connect to that.
    K.

  • Criticism of new data "optimization" techniques

    On February 3, Verizon announced two new network practices in an attempt to reduce bandwidth usage:
    Throttling data speeds for the top 5% of new users, and
    Employing "optimization" techniques on certain file types for all users, in certain parts of the 3G network.
    These were two separate changes, and this post only talks about (2), the "optimization" techniques.
    I would like to criticize the optimization techniques as being harmful to Internet users and contrary to long-standing principles of how the Internet operates. This optimization can lead to web sites appearing to contain incorrect data, web sites appearing to be out-of-date, and depending on how optimization is implemented, privacy and security issues. I'll explain below.
    I hope Verizon will consider reversing this decision, or if not, making some changes to reduce the scope and breadth of the optimization.
    First, I'd like to thank Verizon for posting an in-depth technical description of how optimization works, available here:
    http://support.vzw.com/terms/network_optimization.html
    This transparency helps increase confidence that Verizon is trying to make the best decisions for their users. However, I believe they have erred in those decisions.
    Optimization Contrary to Internet Operating Principles
    The Internet has long been built around the idea that two distant servers exchange data with each other by transmitting "packets" using the IP protocol. The headers of these packets contain the information required such that all the Internet routers located between these servers can deliver the packets. One of the Internet's operating principles is that when two servers set up an IP connection, the routers connecting them do not modify the data. They may route the data differently, modify the headers in some cases (like network address translation), or possibly, in some cases, even block the data--but not modify it.
    What these new optimization techniques do is intercept a device's connection to a distant server, inspect the data, determine that the device is downloading a file, and in some cases, to attempt to reduce bandwidth used, modify the packets so that when the file is received by the device, it is a file containing different (smaller) contents than what the web server sent.
    I believe that modifying the contents of the file in this matter should be off-limits to any Internet service provider, regardless of whether they are trying to save bandwidth or achieve other goals. An Internet service provider should be a common carrier, billing for service and bandwidth used but not interfering in any way with the content served by a web server, the size or content of the files transferred, or the choices of how much data their customers are willing to use and pay for by way of the sites they choose to visit.
    Old or Incorrect Data
    Verizon's description of the optimization techniques explains that many common file types, including web pages, text files, images, and video files will be cached. This means that when a device visits a web page, it may be loading the cached copy from Verizon. This means that the user may be viewing a copy of the web site that is older than what the web site is currently serving. Additionally, if some files in the cache for a single web site were added at different times, such as CSS files or images relative to some of the web pages containing them, this may even cause web pages to render incorrectly.
    It is true that many users already experience caching because many devices and nearly all computer browsers have a personal cache. However, the user is in control of the browser cache. The user can click "reload" in the browser to bypass it, clear the cache at any time, or change the caching options. There is no indication with Verizon's optimization that the user will have any control over caching, or even knowledge as to whether a particular web page is cached.
    Potential Security and Privacy Violations
    The nature of the security or privacy violations that might occur depends on how carefully Verizon has implemented optimization. But as an example of the risk, look at what happened with Google Web Accelerator. Google Web Accelerator was a now-discontinued product that users installed as add-ons to their browsers which used centralized caches stored on Google's servers to speed up web requests. However, some users found that on web sites where they logged on, they were served personalized pages that actually belonged to different users, containing their private data. This is because Google's caching technology was initially unable to distinguish between public and private pages, and different people received pages that were cached by other users. This can be fixed or prevented with very careful engineering, but caching adds a big level of risk that these type of privacy problems will occur.
    However, Verizon's explanation of how video caching works suggests that these problems with mixed-up files will indeed occur. Verizon says that their caching technology works by examining "the first few frames (8 KB) of the video". This means that if multiple videos are identical at the start, that the cache will treat them the same, even if they differ later on in the file.
    Although it may not happen very frequently, this could mean that if two videos are encoded in the same manner except for the fact that they have edits later in the file, that some users may be viewing a completely different version of the video than what the web server transmitted. This could be true even if the differing videos are stored at completely separate servers, as Verizon's explanation states that the cataloguing process caches videos the same based on the 8KB analysis even if they are from different URLs.
    Questions about Tethering and Different Devices
    Verizon's explanation says near the beginning that "The form and extent of optimization [...] does not depend on [...] the user's device". However, elsewhere in the document, the explanation states that transcoding may be done differently depending on the capabilities of the user's device. Perhaps a clarification in this document is needed.
    The reason this is an important issue is that many people may wish to know if optimization happens when tethering on a laptop. I think some people would view optimization very differently depending on whether it is done on a phone, or on a laptop. For example, many people, for, say, business reasons, may have a strong requirement that a file they downloaded from a server is really the exact file they think they downloaded, and not one that has been optimized by Verizon.
    What I would Like Verizon To Do
    With respect to Verizon's need to limit bandwidth usage or provide incentives for users to limit their bandwidth usage, I hope Verizon reverses the decision to deploy optimization and chooses alternate, less intrusive means to achieve their bandwidth goals.
    However, if Verizon still decides to proceed with optimization, I hope they will consider:
    Allowing individual customers to disable optimization completely. (Some users may choose to keep it enabled, for faster Internet browsing on their devices, so this is a compromise that will achieve some bandwidth savings.)
    Only optimizing or caching video files, instead of more frequent file types such as web pages, text files, and image files.
    Disabling optimization when tethering or using a Wi-Fi personal hotspot.
    Finally, I hope Verizon publishes more information about any changes they may make to optimization to address these and other concerns, and commits to customers and potential customers about their future plans, because many customers are in 1- or 2-year contracts, or considering entering such contracts, and do not wish to be impacted by sudden changes that negatively impact them.
    Verizon, if you are reading, thank you for considering these concerns.

    A very well written and thought out article. And, you're absolutely right - this "optimization" is exactly the reason Verizon is fighting the new net neutrality rules. Of course, Verizon itself (and it's most ardent supporters on the forums) will fail to see the irony of requiring users to obtain an "unlimited" data plan, then complaining about data usage and trying to limit it artificially. It's like a hotel renting you a room for a week, then complaining you stayed 7 days.
    Of course, it was all part of the plan to begin with - people weren't buying the data plans (because they were such a poor value), so the decision was made to start requiring them. To make it more palatable, they called the plans "unlimited" (even though at one point unlimited meant limited to 5GB, but this was later dropped). Then, once the idea of mandatory data settles in, implement data caps with overages, which is what they were shooting for all along. ATT has already leapt, Verizon has said they will, too.

  • Unknown Error -3256 with itunes

    I have joined my airport express to my existing wireless network and now when I try to use both my local speakers and my distant speakers at the same time I get: "An error happened while connecting to the distant speakers <<name of my speakers>>. An unknown error happened (-3256)"
    Can any body please help?

    Just curious about the UPD Traffic Blocking. I could not find this info on my Mac & I am having the same problem with getting the (-3256) error code.
    I can play in iTunes either multiple speakers separately but when I check both boxes I & try to get them both to play is when I get the error code.
    I'm sure that there are other issues & suprised that not more is talked about in the Apple Discussions forum.
    Thanks,
    Jay

  • How to remotely control WebAS

    Hi,
    I'm using NetWeaver 2004S, NewYork 711 and NewYork 720, I want to find a solution to remotely control the server, such as remotely re-start WebAS or a specified service, (these WebAS cover windows, Linux, and unix platforms), it would be better if just a command, and I onlyneed to provide the connection parameters.
    I know there must be a solution, but I haven't idea how to do this, anyone can help me?
    thanks in advance!
    Regards,
    Qinzhu

    Hi,
    maybe a standard webservice could help you, with this address :
    http://<hostname>:port+13/?wsdl
    it provides several monitoring function, and also a "restart" one.
    Also you can use the Visual Administrator to connect to a distant server, and reboot from here, also a SAP MMC can be used to reference differents servers.
    Fabien.
    Edited by: Fabien REVOL on Sep 29, 2009 4:22 PM, reason: completion of the answer.

  • Why the name Reverse Telnet ?

    Forgive me for this simple ( and to some, stupid) question. Why is reaching the console ports of devices attached to a terminal server called Reverse Telnet. I am confused about the "Reverse" part.
    1. You reach "terminal server" by some suiteable means (telnet, ssh, console) from a device say your computer.
        c:\> telnet 10.10.10.1
        termsrv >
    2. You effectivily telnet to localhost (terminal server) on a specific port bound to certain TTY connection
        termsrv > R1                                  ! ip host R1 2001 <<loopback_address_termsrv>>
        R1>
    Whats different for this second telnet is, instead of the telnet server (running on terminal server) presenting you with a second command shell it connects the mapped console port to the new telnet session. Effectively you read from or write to console port of R1.
    R1 is oblivious about this whole operation. What's so "Reverse" about this second telnet session ?
    Thanks.

    Ah, this is a good question.  Step into my time machine, and travel with me back to late eighties.  The 3Com 3C501 PC Ethernet card was released at the bargain basement price of $999 USD and the mighty Interl 386-DX33 was released to great fanfare.  Windows ran on top of DOS and all PC IP networking stacks were 3rd-party bolt-ons.  When you communicated with a computer, whether DEC, IBM or whomever you did it with a DUMB TERMINAL.  A terminal, for thos eof you who have never sern one,  was either a keyboard and a printer combo (like a Decwriter 100)  or a CRT text screen (Like a VT220, 80 columns by 24 lines) and a keyboard.  What you typed went out the serial port to a computer, and the computer sent text and screen drawing back commands through that same serial port.  That was the common human-computer interface of that era.
    In the bad old days, the terminals were connected directly to the computers by serial interface cards and RS-232 cable.  As computers got faster, more and more terminals could be supported.  This started to get ridiculous as many serial lines emerged from these computers.  The bigger computers  looked like a mutant octopus.
    Enter the TERMINAL SERVER, one of Cisco's early products. (The ASM)
    The Cisco ASM terminal server took up to 96 terminals in an area and provided serial port connections for them.  It then multiplexed those terminals over Ethernet in order to reach an Ethernet connected computer (host).  The host computers were now freed from the sea of serial cables and could service dozens to hundreds of terminals thorough a single Ethernet port!   As a result, dozens to hundreds of slow, lightly used 9600 bps serial cables were replaced by a single 10 Mbit/sec connection.
    The Cisco ASM software provided a telnet client to each serial port so that each terminal could connect to any telnet server (host) on the any network.  This allowed users to connect to multiple computers and relieved the load of computers providing telnet client services to directly attached terminals.  In this model, connections were initiated from a terminal on the port of the Cisco ASM to some distant computer.
    Over time, Cisco noticed that there were computers and other devices (like the IBM 7171) that could not support Ethernet conenctions, but had dozens upon dozens of physical serial ports.  To make it so that network based telnet clients all over the Internet could access such an Ethernet-free computer, Cisco implemented a telnet SERVER function in the ASM.  Connections from a distant telnet client could now conenct through the ASM telnet server and reach these serial ports which had previously been limited to local terminals or expensive modem connections.  Since this activity was the exact reverse of the original use of the ASM, the function became known as "Reverse telnet."
    In summary:  When a serially attached device CONSUMES service FROM the network, that is TELNET.  (The original design!)
    When a serially attached device PROVIDES services TO the network, that is REVERSE TELNET. (The opposite of the original design.  But useful!)
    Now, I will wait for people who have been in the industry longer than I have to go on about SNA, 3270s, paper tape and punch cards.

  • Access a remote capture device

    Hi,
    Is it possible to access, from PC #A, on which JMF is installed, a remote capture device on PC #B, without installing JMF on PC #B.
    In other words, I would like to a access a dsound or a vfw capture device of PC #B, remotely, from PC #A on which a JMF program runs.
    Can I create a URL to connect to a distant dsound or vfw capture device ? If yes, how ?
    Do you have other ideas to suggest?
    Thx in advance.
    Liz

    Yes - use the MySQL type IV JDBC driver to make a connection to any database, including remote ones. It's free to download. Do a Google search on MySQL JDBC.
    MOD

  • Internet Cutting Out

    I don't know why I haven't brought this up yet, but this has been happening since day 1 (of the PS4's release.) My internet will just randomly cut out and back in every once in a while. It's extrememly sporadic and some days it'll be just fine, others I can't go 20 minutes without it doing this. This isn't that big of a problem on most games, but on my personal favorite, Warframe, if I'm in a mission when this happens, that's it. Mission failed. I have to start over. The worst thing about it is that plenty of the missions last a LOT longer than 20 minutes, so essentially, I have to get extrememly lucky to even completely most of this game. Does anyone know how to fix this, because, as I've said, it's been plaguing me since day 1. Also, it's not a problem with my internet as this only happens on my PS4.

    Rustful wrote:
    while using wifi you have to take into consideration how far away from the modem you are what could be interrupting the signal ( microwave, washing machine, multiple walls ) make sure the modem is not tucked into a corner and if you or someone else is downloading from the network while you are connected from a distant wireless connection you are basically screwed you need to use an ethernet cable to boost and definately stop constant connection loss.Yeah true, my Hoover's connected via WiFi and on the odd accassion it goes out the back door and hoovers the lawn........bloody thing 

  • STP and GLBP

    What is the recommended STP priorities if GLBP is going to be used with a redundant core/dist...

    GLBP is not recommended in Layer 2 looped designs with blocking links at the access layer.
    GLBP is best when there is no L2 connection between the Dist switches, only L3. This non-looped approach leaves both uplinks forwarding from the access switch and no matter which switch GLBP selects as the default gateway it is only one hop away.
    Hope this help. Please rate all helpful posts. :)
    -Brad

Maybe you are looking for

  • ALV to Excel download problem

    Hi Experts,    I display around 15 fields(columns) in ALV output. When I download it to Excel, it downloads exactly. Then dynamically, when I increase the  number of fields to be displayed in ALV it is displaying correctly. But when I download to exc

  • Problem with Flash Player (! Mark appears)

    I am trying to view a live webcast and the Player opens and I get the Hour Glass and then it changes to an Exclamation Point in the center of the video.  Can someone tell me what the Exclamation Point Means and what I need to do to get this from not

  • CS5 Photoshop Unable to locate sqlite3_trace

    Everytime I start CS5 Photoshop I receive an error that states - "The procedure entry point sqlite3_trace could not be located in the dynamic link library sqlite.dll". I then get a message that Suitcase Fusion 4 is unable to start and auto font activ

  • Page_jsp content not found exception ..

    though I was able to resolve this as a quick-fix by installing a new cq instance, I still donot know the root cause. This was occuring in OTB Geometrixx application in author instance .. reading something like " org.apache.jsp.libs.foundation.compone

  • CS3 FTP not responding

    i installed CS3 on WinXP after setting up site definitions i click test connection and this monitor bar that use to move in DW8 is not moving at all, what im doing now is use smartftp to upload my webpages. i keep on getting an error report to be sen