Extracting .vew file without Groupwise Client.

Hi All,
I am new to this new group.
we are seeking possiblities on Merging our products data into Groupwise
Templates.
we have a requirement , where we would like to extract information from .vew
file i.e. Groupwise Template file, without having groupwise installed on
server.
please let me know, if there are ways to achieve it...if not some other
alternatives are also invited.
Looking forward for Response.
Thanks,
Bugsy.

virtualsk wrote:
> Hi All,
>
> I am new to this new group.
> we are seeking possiblities on Merging our products data into
> Groupwise
> Templates.
>
> we have a requirement , where we would like to extract information from
> .vew
> file i.e. Groupwise Template file, without having groupwise installed
> on
> server.
>
> please let me know, if there are ways to achieve it...if not some
> other
> alternatives are also invited.
>
> Looking forward for Response.
>
>
> Thanks,
> Bugsy.
>
>
I am not aware of any formal (and public) document that documents the
VEW file format. Maybe Preston is?

Similar Messages

  • Loading jar files without extracting

    Is it possible to load a jar file without extracting it? If so, how?
    I've loaded the JCE and the class that I'm using references another jar file, which also comes with the JCE. I've loaded that other jar as well, but it's failing. It appears to be looking for the jar by it's name (US_export_policy.jar). I'm not sure how to get Oracle's JVM to see the other jar.
    Thanks,
    Kevin Ash
    [email protected]

    On 10/28/10 11:13 PM, Tilak wrote:
    > I use JDT API org.eclipse.jdt.internal.core.util.ClassFileReader to
    > identify annotated POJOs, which doesn't provide functionality to
    > identify a POJO as annotated if it's parent (interface) is already
    > annotated.
    If you're directly reading class files, you may have to navigate the
    class hierarchy yourself, e.g., recursively find and open the parent
    types to search for annotations.
    If the annotation type you're looking for has
    @Retention(RetentionType.RUNTIME) or @Retention(RetentionType.CLASS),
    and if it has @Inherited, then the APT annotation processing API will
    report a class as showing the annotation, if one of its superclasses is
    annotated. Roughly the same is true of reading the class reflectively.
    However, that does not apply to interfaces, only to superclasses. You
    can read about that in the JDK docs [1].
    I guess what I'm saying is that by the terms of Java, a POJO _is not_
    annotated just because it implements an interface that happens to be
    annotated. Therefore there is no direct way to ask a representation of
    a class whether it is annotated in this way - rather, you have to walk
    the supertype hierarchy and ask the individual interfaces whether they
    have the annotation.
    [1]
    http://download.oracle.com/javase/1.5.0/docs/api/index.html? java/lang/annotation/Retention.html

  • Find item in zip file without extracting

    Hi Guys!
    Weird question today!
    I'm looking for files like sin*.dat into a specific file-server folder that may contain subfolders and zip/7z folders.
    With powershell i'm not able to find this files into zip/7z folders and i can't unzip those folders for many reasons.
    Is there a way to find those files without unzip the folders?
    Thanks
    A

    Hi!
    Not Sure, i've got PS4 and update .Net with Windows update to 4.5.1 but it seems that PS don't recognise([System.IO.Compression.ZipFile].
    Using  this script http://blogs.technet.com/b/heyscriptingguy/archive/2013/11/02/powertip-find-if-computer-has-net-framework-4-5.aspx the
    result is true.
    What can i do?

  • Updating a running JAR file without using JDK

    Hi guys, I have been stuck on this problem for days. I have a program that allows the user to log in and encrypt/decrypt files. This program must be stored on the removable drive and it should work on any operating system without requiring any installation of files. In order to store their login data, I wrote it to a shadow.txt file. My idea was to pack this shadow file into the JAR file so as not to create unnecessary files. I understand that in order to update JAR files, all I need to do is to do
    Runtime.getRuntime().exec("jar uf login.jar shadow.txt");However, here's the problem. I cannot assume that every user PC has JDK installed. As JRE doesn't have jar.exe, that command won't work anymore. Furthermore, the JAR is currently in use. So even if the user has JDK, windows will never allow this command to go through. Anyone has any ideas?

    I had similar requirement, except that, i used a war file.
    Had a client.war file in JBoss deploy directory, and i needed to update client.jnlp file present in it.
    But as jar.exe comes only with jdk, could not use jar -uf command.
    But not sure if it works with other application server too,
    in jboss we can explode the war file, meaning we can create a directory "client.war" in deploy directory and extract your client.war contents to it. Now when server starts, it considers the extracted directory as web archive application.
    This extraction can be done with out using jar.exe. can be done using jarinputstream aswell.
    Once the contents are extracted , the files in it can be modified with out jar.exe.
    For my case it worked as my client.war file is not signed, although the resources inside are signed.

  • Experience about life without Novell Client?

    Hi,
    got anyone a wider experience about OES Infrastructure without Novell
    Client and W7 Workstations?
    We didn't need absolut highest performance but an absolut stable and
    reliable Environment (24h Healthcare).
    - Is Performance with CIFS Access to OES NSS Cluster Ressources comparable?
    - Is availability comparable (in special Cluster migrations, Filelocking
    on Files)
    Today we run ~250 XP Workstations on OES2
    Cluster/Filesharing/iprint/Zen7 and Groupwise.
    Now we are going to ZCM11 and W7/64bit and think about avoid to use the
    Novell Client for Windows to reduce complexity and switch on Client Side
    to AD-Domain and use OES Infrastructur only for the "Backend".
    Most Novell Services (Groupwise/iPrint) are going to auth to AD too, so
    why should we use Novell Client and the NCP Protocol anymore?
    Is the NCP Protocoll so much better against CIFS in current OES
    Implementations (i'm no Expert in this Things).
    Regards
    Thomas

    On 25.04.2012 06:16, kvishwanath wrote:
    >
    > Welcome to Novell CIFS !!
    >
    > To begin with - "OES Infrastructure without Novell Client on Win 7 is
    > possible by Novell CIFS"
    >
    > To answer your specific questions,
    > - Yes, CIFS has Comparable performance improvement w.r.t. Novell Client
    > in recently released versions like OES2SP3,OES11FP0& Upcoming OES11
    > SP1.
    > - CIFS service is a cluster enabled, It works seamlessly on cluster
    > migration, supports cross protocol lock feature across protocols (CIFS,
    > NCP, AFP).
    >
    >
    > In addition, CIFS supports Distributed File Services(DFS), Dynamic
    > Storage Technology (DST), backup an many more features. Please refer
    > Novell Documentation for more details.
    I know this, but in real life there are always pitfalls...
    >
    > Specific to your infrastructure question of ~250 XP workstations, we
    > have scaled CIFS service up to 4000 connections on single server 3 node
    > cluster setup. Howe ever we are interested to know more details on your
    > setup and infrastructure details further on this.
    >
    What would you like to know?
    Most infos are on my first post.
    We get more and more Windows Applikations who need a Windows Server as
    Plattform for Services, Shares and Authentication.
    In the past we create lokal "system" Accounts on these Applikation
    Servers and map there Shares with help of the Loginskripts.
    like map use R: \\app-server\files password /user:<systemaccount>
    But now we are low on Drive Letters...
    So now we think about to bring the Applikation Server and Windows
    Workstation into AD-Domain for using same User Accounts/Passworddatabase
    and use the UNC Syntax for this kind of Applikations.
    Or we use some Applikations/Infrastruktur who use "transparent" Login
    with AD Authentication (sp. Citrix) or use this as Authentication Point.
    And that's our thoughts about CIFS and Novell Infrastractur in General.
    Regards
    Thomas

  • Download ZIP file without changing file extension

    I regularly download a zipped csv file, of the format: "filename.csv.gz". As the name does not change, Firefox adds a digit to distinguish it, so for example I get "filename.csv-3.gz". This is a pain as it changes the file extension which means that I cannot open the extracted file without first renaming it. I want to keep an archive of all the files, so deleting them each time isn't really an option, and neither is moving them to a different location each time. Is there any way the naming convention for downloads can be changed?

    I think you have to disable it in your Operating system:
    8dot3NameCreation
    [http://support.microsoft.com/kb/121007]

  • Saving The Report File (PDF) on Client Machine/PC

    Hi Everyone,
    I am using Oracle Application Server 10g (10.1.2). I have a form that calls a report (both forms and report version are 10.1.2) with ASYNCHRONOUS option and creates a file in PDF format. The report is running fine and is creating the PDF file fine BUT on the application server.
    I need to know if there is a possibility of either creating the file on the client machine/pc or transferring the file from application server to client PC. I would prefer the first option that is to create the file on client PC so the client can print or browse the report later. The second option would be ok if there is no solution for first option but I am assuming that it would take twice as much time. First to create the report on Application Server then to transfer the file from AS to client PC.
    I have already included webutil library and object library but could not find a way to save the file on client PC using any of the APIs.
    I would appreciate if some one provide me detail information. I mean syntax on how to either create the file on client PC or how to transfer the file created on application server to client PC. I would like to know where the report is created on Application server as the path will be required for transfer.
    Thanks in advance.
    Khalid

    Instead of just creating the file, open the file in a
    browser using rwservlet. That way the client can see
    it and save in his PC whenever he wants to.
    Try:
    ...write code to get report id...you must be already
    having this...
    then continue....
    :global.report_server_name:=<servername>;
    reports_servelet:='/reports/rwservlet';
    REPORT_MESSAGE := RUN_REPORT_OBJECT(REPORT_ID);     
    vjob_id :=
    substr(report_message,length(:global.report_server_na
    e)+2,length(report_message));
    hidden_action :=
    reports_servelet||'/'||'getjobid'||vjob_id||'?server='
    ||:global.report_server_name;
                                       --WEB.SHOW_DOCUMENT(hidden_action);
    Basically you get the objid for the report you ran
    and open it in the browser.
    Hope this helps.Hi,
    First of all thanks for you kind reply. Actaully user has an option to preview report and it is working fine. The reports run and display under browser as either PDF or HTML depending on option selected by user. These reports can be saved on client machine without any problem as you mentioned.
    The problem with this form is that as soon as it execute the report it exit out of form. So the reports that are previewed run under SYNCHRONOUS mode and reports that are creating files run in ASYNCHORONOUS mode. I can run preview reports also in ASYNCHOROUS mode and I have already tried it by creating TIMER and WHEN_TIMER-EXPIRED trigger and commenting EXIT_FORM built-in. But as mentioned since the form exit out WHEN_TIME_EXPIRED does not fire and it does not display the report on the browser. I can see the status of the report in print queue when it is finished successfully.
    If the report is not displayed after running in ASYNCHOROUS mode then I will be unable to save the file. That is the reason we created the FILE creation option and thought we will find a way to create/save the file on client PC but I am having hard time to do that.
    I am sure I have made myself clear. Bottom line is that previewing a report in a browse is an option but will not work for long reports and if we run in background then it will not display in a browser as form exits after calling the run_report_object to run report so WHEN-TIMER-EXPIRED is not there to show the report when it is finished.
    Thanks
    Khalid

  • Connect to Oracle without Oracle Client in Windows?

    Hi All,
    Is there anyway to connect to Oracle DB without any installation of Oracle Product in Client?
    I am using MS ODBC Driver Oracle but It need the "Data Source Name"
    It seems that client machine do need to Setup the NET 8 Configure / Tnsname.ora
    I can try to set any thing in Oracle Server, But want to minimize the effort doing on the client (Because there are many!).
    I am using Visual Basic, WIN XP as client Platform. WIN 2K as Oracle DB Server.
    Can anybody give me a hand. Thank you very much!
    Eric Yuen

    You'll need to install Oracle Client in the client machine. ODBC (or other) connections need OCI and Oracle Net layers.
    The Oracle ODBC has a lot of dependencies, probably a thousand files. Unfortunately Client is pretty heavy... managewize also. So that's why you should develop "internet apps". :)

  • How to replace or remove last 500 bytes of a file without rewriting all the file?

    Hi everyone,
    Usually I only ask for help when I can't find a solution for several days or weeks... And guess what? That just happen!
    So, this is what i am trying to do:
    I have a program to ZIP folder and protect them with password, then it encrypts the zip file.
    That it's working fine, until the user forgets his password.
    So, what I want to do is give the user a Recovery Password option for each ZIP file created. I can't use the Windows Registry because the idea is to be able to recover the password in any computer.So i came up with an idea...
    In simple terms, this will work like this:
    0 - Choose folder to ZIP
    1 - Ask user for recover details (date of birth, email etc)
    2 - ZIP folder with password
    3 - Encrypt ZIP file
    4 - Encrypt recover details and convert it to HEX
    5 - Add recover details (in HEX) to the end of the ZIP file (last bytes)
    6 - Add "5265636F76657244657461696C73" which is the text "RecoverDetails" in HEX
    7 - Add "504B0506000000000000000000000000000000000000" this is the final bytes of a ZIP file and will make the Operating System think that is a ZIP file (i know that will give an error when we try to open it.. the ideia is to change the
    extension later and use my software to do all the work to access this ZIP/folder again)
    So, explaining what it's here, I want to say that I managed how to do all of this so far. The point number 6 will help us to determine where the recover details are in the file, or if they actually exist because user can choose not to use them.
    In order to unlock this ZIP and extract it's contents, I need to reverse what I've done. That means, that  need to read only the last 500 bytes (or less if the file is smaller) of the ZIP and remove those extra bytes I added so the program can check
    if the user is inputing a correct password, and if so decrypt contents and extract them.
    But, if the user insert a wrong password I need to re-add those bytes with the recover details again to the ZIP file.
    The second thing is, if the user forgets his password and asks to recover it, a form will be shown asking to insert the recover detail (date of birth, email etc), so we need to reed the last 500 bytes of the ZIP, find the bytes in number 6 and remove the
    bytes before number 6, remove bytes in number 6 and number 7, and we will have the recover details to match against the user details input.
    I have all done so far with the locking process. But i need help with the unlocking.
    I am not sure if it's possible, but this what i am looking for:
    Read last 500 bytes of a file, remove the bytes with recover details and save the file. Without reading the whole file, because if we have a 1GB file that will take a very long time. Also, i don't want to "waste" hard drive space creating a new
    clone file with 1GB and then delete the original.
    And then add them back "in case user fails the password" which should be exactly the same.
    This sounds a bit confusing I know, even to me, I am writing and trying to explain this the better I can.. Also my English is not the best..
    Here it goes some code to better understanding:
    'READ LAST 500 BYTES OF ZIP FILE TO CHECK IF IT CONTAINS RECOVER DETAILS
    Dim oFileStream As New FileStream(TextBox_ZIP_to_Protect.Text & ".zip", FileMode.Open, FileAccess.Read)
    Dim oBinaryReader As New BinaryReader(oFileStream)
    Dim lBytes As Long = oFileStream.Length
    oBinaryReader.BaseStream.Position = lBytes - 500
    Dim fileData As Byte() = oBinaryReader.ReadBytes(500)
    oBinaryReader.Close()
    oFileStream.Close()
    Dim txtTemp As New System.Text.StringBuilder()
    For Each myByte As Byte In fileData
    txtTemp.Append(myByte.ToString("X2"))
    Next
    Dim RecoveryDetailsPass_Holder = txtTemp.ToString()
    'Dim Temp_2 = txtTemp.ToString()
    'RichTextBox1.Text = txtTemp.ToString()
    If txtTemp.ToString.Contains("505245434F47414653") Then
    'we have password recovery details(the numbers mean RecoverDetails in HEX)
    'next we will get rid of everything before and after of string "cut_at"
    Dim mystr As String = RecoveryDetailsPass_Holder 'RichTextBox1.Text
    Dim cut_at As String = "505245434F47414653"
    Dim x As Integer = InStr(mystr, cut_at)
    ' Dim string_before As String = mystr.Substring(0, x - 1)
    Dim string_after As String = mystr.Substring(x + cut_at.Length - 1)
    RecoveryDetailsPass_Holder = RecoveryDetailsPass_Holder.Replace(string_after.ToString, "")
    RecoveryDetailsPass_Holder = RecoveryDetailsPass_Holder.Replace("505245434F47414653", "") ' this is RecoverDetails in HEX
    RecoveryDetailsPass_Holder = RecoveryDetailsPass_Holder.Replace("504B0506000000000000000000000000000000000000", "") ' this is the bytes of an empty zip file
    'AT THIS POINT WE HAVE ONLY THE RECOVER PASSWORD DETAILS (date of birth, email etc) IN THE VARIABLE "RecoveryDetailsPass_Holder"
    '////////////////////////////////////////////////////// TO DEBUG
    'MsgBox(string_after.ToString & "505245434F47414653")
    'InputBox("", "", string_after.ToString)
    '\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\ TO DEBUG
    'Temp_2 = Temp_2.Replace(RecoveryDetailsPass_Holder.ToString, "")
    Now that we have the recover details, we need to remove them from ZIP in order to the software try to unzip it with the password provided by the user on the GUI.
    If the user needs to recover the password we have the details already in RecoveryDetailsPass_Holder variable and just need to match them against user input details.
    If the user fails, we need to put the RecoveryDetailsPass_Holder back on the file.
    Any question just ask, it's a bit trick to explain i think, but please ask.
    Anyone know how to do this?
    Many thanks in advanced.
    Nothing is impossible!
    @ Portugal
    Vote if it's helpfull :)

    @ ALL
    Thank you very much for you help. I know that if I'm "playing" with bytes you should assume that I know a lot of VB.net, but I don't know that much unfortunately. I am not a beginner but I am still very fresh and I probably do stuff that work but
    probably not in the best way...
    Anyway, I will explain the idea of this little software I'm making. Once I wanted to create a program to protect folders with password, and I came up with something to change folder permissions to lock access to them, and that actually worked fine and quickly.
    However, I managed how to "crack" the protection by going to folder properties, security tab and then give permissions back to my username. So that, to me, wasn't a safer system to protect folders, also I want the ability to use passwords. So I search
    and search online for a way to do it, and someone replied (to someone with the same question as me) that the best option would be to create a zip with all contents of the folder, with password and then change the extension from .zip to .whatever and register
    the new extension .whatever on the Windows Registry, so that file will have an icon and open with my software.
    So I did...The program zips everything, change the extension and I added the encryption to avoid people changing the extension to ZIP or trying to open with 7-Zip or similar and be able to see the protected files names in the .zip/.whatever
    Answering to all of you now:
    @Armi
    "System.IO.FileStream.SetLength"
    I know I tried that but I erased the code because it didn't work for some reason, I don't remember why sorry, was long time before I created this post.
    The last code I was trying to use was this:
    ' Set the stream position to the desired location of the stream.
    Dim fileStream As IO.FileStream = _
    New IO.FileStream(TextBox_ZIP_to_Protect.Text & ".zip", IO.FileMode.Append)
    Try
    ' Set the stream (OFFSET) position to the desired location of the stream.
    fileStream.Seek(210, IO.SeekOrigin.Current)
    Dim Bytes_do_ZE As Byte() = HexStringToByteArray(Temp_2.ToString)
    'Write Characters ASCII
    For Each Byte_Do_Zeca As Byte In Bytes_do_ZE
    fileStream.WriteByte(Byte_Do_Zeca)
    Next
    Finally
    fileStream.Close()
    End Try
    and we need this:
    Private Shared Function HexStringToByteArray(ByRef strInput As String) As Byte()
    Dim length As Integer
    Dim bOutput As Byte()
    Dim c(1) As Integer
    length = strInput.Length / 2
    ReDim bOutput(length - 1)
    For i As Integer = 0 To (length - 1)
    For j As Integer = 0 To 1
    c(j) = Asc(strInput.Chars(i * 2 + j))
    If ((c(j) >= Asc("0")) And (c(j) <= Asc("9"))) Then
    c(j) = c(j) - Asc("0")
    ElseIf ((c(j) >= Asc("A")) And (c(j) <= Asc("F"))) Then
    c(j) = c(j) - Asc("A") + &HA
    ElseIf ((c(j) >= Asc("a")) And (c(j) <= Asc("f"))) Then
    c(j) = c(j) - Asc("a") + &HA
    End If
    Next j
    bOutput(i) = (c(0) * &H10 + c(1))
    Next i
    Return (bOutput)
    End Function
    That code, as I understand, is to search for the OFFSET of the bytes in the file and start to write from there... That OFFSET should be the beginning of the 500 bytes read on the code before. I got the OFFSET position "210" reading the file with
    the HEX editor "HxD - Hexeditor v1.7.7.0" but using the OFFSET won't work because every file, password, recover details and so on, are different and so the file size, changing the OFFSET I
    think.
    @Reed Kimble
    Does that sound like something which might work for you?
    Thanks for your help. That might be some solution, however it seams a bit of the same problem where we need to read the bytes again to get the recover details. But, as I said in this post, because this is meant to password protect folders, do you think that
    will apply as well?
    @Crazypennie
    Thanks for your reply.
    All this appears really weak. The user has your application since he need it to open the file .... and the code in the application contain the code to read the file without knowing the password. Therefore anyone can read your code and retrieve the
    data without the password ... if he knows VB.
    The application can only open the file if the user didn't use a password to protect the file. Because the file is encrypted and needs to be unencrypted first.
    When the application tries to open/read the file, will need to decrypt it first and then check for a password and do the validation. Also the application is with the code masked/protected which i think it might not be easy for reverse engineering.
    - You need to use a web server and a symmetric key encryption
    This a good idea, besides I don't know how to implement it. However the idea is to be able to:
    1 - Protect a folder anywhere in any Windows computer (portable app)
    2 - Recover password details (security question) in any computer, online and offline
    And I think we need a computer always connected to the Internet to use that method, right?
    @ Mr. Monkeyboy
    Thank you very much for your effort.
    I just wanted to let you know that the zip method you are using is no longer supported.
    I didn't actually knew that. Thanks for letting me know.
    Do you require the compressed encrypted files to actually be Zip files or could they just be compressed files that have nothing to do with Zip?
    No, it doesn't need to be a .zip extension. I am actually using my own extension. It starts as a Zip but then I changed to my own extension which I have registered on the Windows Registry.
    @ ALL
    Thanks again to all for trying and spending time helping me.
    By the way, I might not be able to answer or try any code during the weekend... It's easter break and family is around. Have a nice easter everyone. :)
    Nothing is impossible! Imagination is the limit!

  • Batch file extracting all files from nested archives

    I have managed to leverage a powerful
    forfiles command line utility with the mighty
    7z compression program.
    Below is a simple batch file extracting all files from nested archives hidden at any depth inside other archives and/or folders. After the extraction each archive file turns into a folder having the archive file name. If, for example, there was an "outer.rar"
    archive file containing nothing but an "inner.zip" archive with only "afile.txt" inside, "outer.rar" becomes "...\outer.rar\inner.zip\afile.txt" file system path.
    @echo off
    rem extract_nested_archives.bat
    move %1 "%TMP%"\%2
    md %2
    7z x -o%1 -y %TMP%\%2
    del "%TMP%"\%2
    for %%a in (zip rar jar z bz2 gz gzip tgz tar lha iso wim cab rpm deb) do forfiles /P %1 /S /M *.%%a /C "cmd /c if @isdir==FALSE extract_nested_archives.bat @path @file"
    ARCHIVES ARE DELETED DURING THE EXTRACTION! Make a copy before running the script!
    "7z.exe" and "extract_nested_archives.bat" should be in folders available via the %PATH% environment variable.
    The first parameter of extract_nested_archives.bat is the full path name of the archive or folder that should be fully expanded; the second parameter is just the archive or folder name without the path. So you should run "c:\temp\extract_nested_archives.bat
    c:\temp\outer.rar outer.rar" from the command line to completely expand "outer.rar". "c:\temp" must be the current folder.
    Best regards, 0x000000AF

    Incredibly useful!  Thank you so much.  I did make a couple of small changes to make the script a little easier to use from the end-user perspective.
    First - I don't like making the user input the redundant second parameter, so I added this snippet which extracts it from the first parameter.  The first line of the snippet enables delayed expansion so that special characters in our file name don't
    break anything.  The second line pulls the parameter into a variable, and the 3rd line uses delayed expansion on that new variable.  Before implementing delayed expansion I had problems with file paths which included parentheses.
    SetLocal EnableDelayedExpansion
    Set SOURCE=%1
    For %%Z in (!source!) do (
    set FILENAME=%%~nxZ
    set FILENAME=%FILENAME:"=%
    Anyway once that was done, I just used %FILENAME% everywhere in the script instead of
    %2 (making sure to correct quotes as needed)
    This way, to run my script all you need to run is:
    C:\temp\extract_nested_archives.bat C:\temp\Archive.zip
    Second - I didn't want to modify the Windows environment variable.  So I replaced
    7z with "%PROGRAMFILES%\7-zip\7z.exe"
    I also replaced extract_nested_archives.bat with "%~f0" (which represents the full path+filename of the current script).
    Here is my full script now.  Tested on Windows 8 with the 64-bit version of 7-zip installed:
    @echo off
    Setlocal EnableDelayedExpansion
    Set source=%1
    For %%Z in (!source!) do (
    set FILENAME=%%~nxZ
    set FILENAME=%FILENAME:"=%
    move /Y %1 "%TMP%\%FILENAME%"
    md "%FILENAME%"
    "%PROGRAMFILES%\7-zip\7z.exe" x -o%1 -y "%TMP%\%FILENAME%"
    DEL "%TMP%\%FILENAME%"
    for %%a in (zip rar jar z bz2 gz gzip tgz tar lha iso wim cab rpm deb) do (
    forfiles /P %1 /S /M *.%%a /C "cmd /c if @isdir==FALSE "%~f0" @path @file"

  • How to extract rpt file from .b1px file in SAP B1

    How to extract rpt file from .b1px file in SAP B1

    Hi Trupti,
    You will not be able to export .b1px file without importing in SAP B1.
    Please import .b1px file in SAP B1 and then export .rpt file from SAP B1 one by one.
    Hope this helps
    Regards::::
    Atul Chakraborty

  • Extraction, Flat File, Generic Data Source, Delta Initialization

    Extraction, Flat File, Generic Data Source, Delta Initialization
    I have couple of questions regarding data extraction.
    1.     If you have Data Source a Flat File e.g. Excel file I know that you have to create Data Source at BW side. How do you upload updates, by selecting Delta Update when executing next Data Load? Do you ever u201Cconvertu201D this Excel file into Application Tables to become SAP Source 
    2.     Can you please give me example of situation where you had to create Generic Data Source? What is difference between Time Stamp, Calend. Day and Numeric Pointer. Which one is most common to select?
    3.     I read somewhere that Generic Data Source does not have Setup Table. I thought that you have to have Setup Table in order to load transaction Data otherwise you will lock the Application Tables. Where am I going wrong im my thinking please?
    4.     What are steps in terms of IP before, under and after Delta Initialization. I belive that you can do two ways:
    Full Update - Initialize Delta Process (without Data Transfer) u2013 Delta Update  or
    Initialize Delta Process (with Data Transfer) u2013 Delta Update
    Am I right? What is most common method and why?
    5.     If you want to add a filed in Data Source after 6 month using it, you want to do it without re-init Delta Queue. You add field in RSA6, then provide info for ABAP to populate new filed (info u2013 name of Data Source, Extract Structure, field added, name of Application Table which contains the field). How does it work now as there is no SetUp table it has been deleted after Initialisation? How does Delta Queue know that it is going to receive data which has been  expanded by one field or it may does not need to know at all?
    THANKSSSSSSSSSs

    Hi,
    1. If you have Data Source a Flat File e.g. Excel file I know that you have to create Data Source at BW side. How do you upload updates, by selecting Delta Update when executing next Data Load? Do you ever u201Cconvertu201D this Excel file into Application Tables to become SAP Source
    Once you create Datasource for A flat file extraction then it is file source system specific hence you cont change to Application table source Data source
    In info package you can change the source as application server instead of desktop no need to change the DS
    2. Can you please give me example of situation where you had to create Generic Data Source? What is difference between Time Stamp, Calend. Day and Numeric Pointer. Which one is most common to select?
    When we don't find any standard extractor then we can go for Generic(if i want information sales along with finance information in a data source then generally we dont get standard one hence we can go for generic DS)
    Check the below link for More about generic DS .
    http://wiki.sdn.sap.com/wiki/display/BI/Generic+Extraction
    for Delta capturing you can use
    Timestamp(if the table has time stamp filed  so it can stamp the last changed record in that table hence it is easy to get delta based on the time stamp)
    Calday- (If the table doesn't have the Timestamp filed then search for Calday where you can stamp the delta based on the date when documents are changed )
    Numericpointer : If the table doesn't above both then we go for this option where you can the numeric value change stamp )
    3. I read somewhere that Generic Data Source does not have Setup Table. I thought that you have to have Setup Table in order to load transaction Data otherwise you will lock the Application Tables. Where am I going wrong im my thinking please?
    Generic datasource nothing but we extracting data directly from the database table without any interface between the application/systems
    4. What are steps in terms of IP before, under and after Delta Initialization. I belive that you can do two ways:
    Full Update - Initialize Delta Process (without Data Transfer) u2013 Delta Update or
    Initialize Delta Process (with Data Transfer) u2013 Delta Update
    Am I right? What is most common method and why?
    Correct
    5. If you want to add a filed in Data Source after 6 month using it, you want to do it without re-init Delta Queue. You add field in RSA6, then provide info for ABAP to populate new filed (info u2013 name of Data Source, Extract Structure, field added, name of Application Table which contains the field). How does it work now as there is no SetUp table it has been deleted after Initialisation? How does Delta Queue know that it is going to receive data which has been expanded by one field or it may does not need to know at all?
    Once you add the new field to structure(DS) you will get the data as on date onwards not historical data hence what is the concept of setup table  ( delta records come from the Delta Que not from the setup table )
    If you want histaric data to new field then you need to setp table deletion ...etc...
    Hope it is clear..
    Regards,
    Satya

  • How to Attach a File Without Embedding It on Mail?

    How to Attach a File Without Embedding It on a Mac?
    Tamer is not working and I prefer not to use TERMINAL (defaults write com.apple.mail DisableInlineAttachmentViewing -bool yes)
    Right click send as icon is not a solution.
    Any other options? Thanks!

    bbp@bcn wrote:
    I always receive the same response, "Can you send it as an attachment?"
    and I think It does something to do with the way I send files.
    Thanks
    It's nothing to do with the way you send them. Every mail client chooses how to cope with attachments: in some there is a preference setting but in many cases it automatically displays embedded images. Even where there is a preference setting it's up to the person receiving the email: you can't control it. Why are they so fussed about your sending as an attachment? The image can be saved easily enough, usually by dragging it to the Desktop, or by a button to save attachments. If they really want this you are going to have to zip it, there isn't any other way round it.

  • Copy file without retyping its name

    I`m just starting to use Java (in school) so I need help even with simple things like this: I have to copy file without retyping its name in destination. I`ve tried to use substring method for extracting filename, but it gives me an error "The method substring() is undefined for type Copy". Any help?
    import java.io.BufferedReader;
    import java.io.FileInputStream;
    import java.io.FileNotFoundException;
    import java.io.FileOutputStream;
    import java.io.IOException;
    import java.io.InputStreamReader;
    public class Copy{
         * @param args
         public static void main(String[] args) {
              try {
                   BufferedReader br = new BufferedReader(new InputStreamReader(System.in));
    //Entering the path to the file that I want to copy
                   System.out.println("Enter file path");
                   String filePath= br.readLine();
    //Entering the destination for copied file
                   System.out.println("Enter destination");
                   String destination = br.readLine();
                   FileInputStream fis = new FileInputStream(filePath);
                   FileOutputStream fos = new FileOutputStream(destination);
                   int c=0;
                   while((c=fis.read())!=-1){
                        fos.write(c);
                   fis.close();
                   fos.close();
              } catch (FileNotFoundException e) {
                   e.printStackTrace();
              } catch (IOException e) {
                   e.printStackTrace();
    }

    cereal_killer wrote:
    No. I expected this (String fileName = substring(filePath.lastIndexOf("/")+1, filePath.length());) to workYou didn't provide a string reference on which to execute substring. As in:
    String str = "blah blah blah";
    String fileName = str.substring(...);
    {code}If you just say *substring(start, end)* how is it supposed to know *which* String object to operate on?
    Without the someStringReference. preceding it, calling a method--in your case substring--is like calling it on this object, i.e., like this.substring. Your class does not define a substring method, so it's a compile time error to try to call that non-existent method.

  • Writing to a cell in an existing Excel file without prompt of overwritin​g

    I am trying to learn communicating with Excel spreadsheet via ActiveX. I started with the Labview example "Write Table to XL", however, this example creates new file which is not my case of overwriting an existing Excel spreadsheet. So, I made my changes to the VI to overwrite an existing file with my new value. Unfortunately, there is always prompt of overwriting the file, and even though I press "yes", the file keeps unchanged.
    The help I need is to kindly :
    1- check my attached VI for any mistakes
    2- make the VI overwriting the file without any prompts
    Thanks in advance
    Solved!
    Go to Solution.
    Attachments:
    Write_Value_to_Cell_ActiveX.vi ‏17 KB

    I really appreciate your help, but I already changed the configuration to open a file path taking another ActiveX example as a reference. Here is my subVI's I used, but they are merged in LLB. I am sorry for my ignorance of how to extract all the subVI's from this file.
    Attachments:
    ExcelExamples.llb ‏62 KB

Maybe you are looking for

  • Connect to MSSQL from OWB Linux.

    Hi, This is almost an embarrasing question to ask because I should be able to find this information but Alas! such is life. So here goes, I want to be able to connect from my OWB 10gR2 on Linux to Microsoft SQL Server on some windows box. I went into

  • How can I get Mavericks off my comp and go back to the old OS?

    Anything related to the internet is slow or doesn't work.  My Outlook crashes constantly and I hate using Mail.  I knew better than to downgrade to the new OS but did it anyway.  This is so irritating. <Re-Titled By Host>

  • Error Message when running a parse

    When running a parse on a universe this error showed up when using a MS SQL Server 2005 OLE connection: Parse failed:  Exception:  DBD,[Microsoft OLE  DB Provider for SQL Server} : Object was open What is this telling me?  Did someone get an exclusiv

  • Cv01n-grey field

    Dear all, In t-code CV01N, "create original" icon is there after clicking this icon pop-up will appears In that poo-up five field are there, but one field "storage category" is in grey . I want to assign storage category there only . How can activate

  • HR posistion updated when person assigned to a work centre.

    Hello in SAP Plant Maintenance (PM), we are assigning persons to work centers. Some times a strange thing happen when we assign a person to a work center. The position for the person is updated with a wrong value in HR master data. We are not given a