520 & 750. nothing is impossible

I wanna know why every time I buy inks, like74X  colour or 74X black, it says i can print 520 pages and 750 pages but in my experience every time they can only print no more than 100 pages? 
One pack of A4 paper contains 300 sheets, and one pack can cost me like 4 colour and 3 black. WHY?
I dare not print anyting at all     because generally after I print no more than 10 pictures(not full size A4 pictures) with a new colour ink, computer will surely  tell me there is only 80% ink remain.
I wanna know how to print 520 pages with one colour ink and 750 pages with one black ink?

The page ratings are based on an IEC standard as described here.  Photo printing uses more ink than plain paper text and graphics printing, see here for the photo ratings for the 75xl color.  There are some things you can do to minimize ink use:  
Do not run unnecessary cleaning cycles.
Keep the printer plugged into a live outlet - turning the printer off from an external outlet can use more ink due to servicing.
If printing a number of photos it is better to print them as a batch rather than individually.
Bob Headrick,  HP Expert
I am not an employee of HP, I am a volunteer posting here on my own time.
If your problem is solved please click the "Accept as Solution" button ------------V
If my answer was helpful please click the "Thumbs Up" to say "Thank You"--V

Similar Messages

  • Two iPhones, both mine, using the same Apple ID iCloud account

    I've seen similar questions but it is always being brought up by members of a family each with their own phone sharing an account. My scenario is different...
    I have an activated Verizon iPhone 5, running iOS 7.1.x. I have an Apple ID and it backs up stuff to my iCloud account.
    I've just received an, as of right now, non-activated T-Mobile iPhone 6. I haven't turned it on yet but it'll of course have iOS 8.x.
    Both phones are mine. In a couple weeks, I'm going to go through the whole process of porting my number from Verizon to T-Mobile, but for reasons I won't go into now, I can't do that just yet.
    If I power on the new iPhone 6 now, because I'm excited and want to play around with it, I should be able to just use it Wi-Fi. My question then is can I use both devices with the same Apple ID / iCloud account?
    Obviously phone calls and non-Wi-Fi data will only be working through the iPhone 5, since it's the only one with service, and that's fine. But what happens with backups and syncing? Will new photos and apps end up on both? Will contacts, the call history, and messages (texts and iMessages) end up syncing? Will syncing work in both directions? Any other caveats or problems that I might run into? If it's a pain, I can just leave the iPhone 6 alone, and wait until I port my number over.
    Thanks,
    Manny
    P.S. I've never ported a number or upgraded from one iPhone to another, so I don't know how it normally works. I'm assuming my Apple ID can "transfer" everything. I don't have much on my phone so it all fits within my iCloud storage. I don't use it with iTunes, or hook it up to any computer at all, or for music, movies, etc. Just apps, contacts, settings, photos, etc.

    mannyace wrote:
    Thanks for the response.
    So I basically won't run into any trouble? I
    There should be no issues. Its designed to work like that.  You don't change Apple IDs just because you get a new device.
    mannyace wrote:
    Thanks for the response.
    Is there any chance that the phones can fall out of sync?
    Unlikely. But nothing is impossible.   Though I don;t see how that would happen. As long as both are signed into the Same Apple ID / iCloud Account they will be N'Sync. (Bad Joke)
    mannyace wrote:
    Thanks for the response.
    If I get a message or buy an app or take a photo on the iPhone 5, how do I get those things onto the iPhone 6?
    If you buy an App, you have 2 ways to get it to the iPhone6: If Automatic Downloads is enabled in Settings->iTunes & App Store, it will automatically download to the iPhone 6 when you buy it on the 5 and vice versa if you buy it on the 6, it will download to the 5.
    Alternatively, you can simply go to the App Store App->Updates->Purchased and look for the App there and download it. Purchased Apps will not require payment again. i.e They'll be free to download to the iPhone 6 once purchased.
    SMS Messages will sync over using Continuity as long as they are on the same Wifi network. Otherwise, restoring the iPhone 5 backup to the iPhone 6 will transfer all messages received up until the backup was made onto the iPhone 6.
    Images, can be transferred either through Photo Stream
    My Photo Stream FAQ - Apple Support
    Or any Cloud service you want such as Dropbox, or One Drive.
    mannyace wrote:
    Also, something i forgot to ask initially: Should I update the iPhone 5 to iOS 8 first or does that not matter?
    If you want the Continuity features as explained above you need to update the iPhone 5 to iOS 8. Otherwise its not all that important.

  • HD help

    Hey guys it my first time on this forum so dont be to harsh with me  
    I just recently built a new pc over x-mas for my first time and i seem to be having hard drive problems.  Im getting lock up errors while idel in windows, my first probelm was not even being able to get into windows with my mobo set to auto detect of the HD.  That was easily fixed with my friends suggestion of switching to large in the HD bios setup.  
    Anyway, with that setting i was getting lock ups in windows just sitting around(if i sat idel for 30+ min it would lock up).  With a little thought i setup the HD manualy as CHS 16,383 x 16 x 63 with the precomp and landing at 0.  This fixed the problem it seemed for the time being.  I would run 4-5 days at a time and only reset if something i installed promted me too.
    Well the other day i woke up with a disk error and a lovely blue screen.  Reboot and entered the bios to find my HD set back to auto everything.  I quickly set the settings back to what i had them at manual and noticed i could not set the disk size back to 200 gb, and it was set at 8,455 mb!  Well back into windows i go and again im getting the lock ups.  Im still not able to ge the capacity of the hard disk off that 8455 mb and back to 200g.
    My setup is (will enter into sig when i find out how to)
    K8N NEO2 PLATINUM 1.3 bios
    EVGA|GF 6800GT
    AMD 64 3500+ ATHLON 64 939P
    WD 200gb eide setup
    DDRAM 512X2|OCZ PC3500 433M
    THERMALTAKE CASE
    POWER SUPPLY|ASPIRE ATX-AS500-SV12V 520 watt
    Nothing is over clocked, and im not a computer nub, just graphic design would be my special  

    if it has no slave make sure its jumperless not master
    and on the black end of an 80 wire ide
    that has the blue end in the board
    you dont say what o/s this is

  • HT201272 I have always had and used the same Apple ID, so where are the rest of the songs I bought from itunes? I've bought at least 400 songs and I only am being able to download 178. Where are the rest of my purchases?!

    I have always had and used the same Apple ID. I have changed credit card information on my Apple ID account several times though. Does that make a difference when downloading past purchases? I'm very angry at Apple and Itunes because I have been using itunes since 05/2005 and I do not have even close to the amount of songs and albums that I have purchased from itunes. If the credit card info does make a difference even though the account is the same one then itunes needs to make sure to notify users of this because I am not the only one who is wondering this same thing. I have numerous friends who i've talked to about this and they say the same thing, that they too have songs purchased in the past that have disappeared when trying to download past purchased items. It should not make a difference. $12 is $12. Especially since I have ALWAYS used the same account. If itunes does not change their ways, I will not be purchasing songs or anything else for that matter from them ever again. I will go back to buying CDs where I KNOW that it will always be with me and I don't have to deal with this. I will also make sure to find a better more reliable source to download music from and will make sure everyone I know and come in contact with knows what it is and how much better it is than itunes. There should be no experation date on the music I PURCHASE, nor should there be any other little loop holes that allow itunes to rob us of rightfully purchased products. What's the deal itunes?? 

    mannyace wrote:
    Thanks for the response.
    So I basically won't run into any trouble? I
    There should be no issues. Its designed to work like that.  You don't change Apple IDs just because you get a new device.
    mannyace wrote:
    Thanks for the response.
    Is there any chance that the phones can fall out of sync?
    Unlikely. But nothing is impossible.   Though I don;t see how that would happen. As long as both are signed into the Same Apple ID / iCloud Account they will be N'Sync. (Bad Joke)
    mannyace wrote:
    Thanks for the response.
    If I get a message or buy an app or take a photo on the iPhone 5, how do I get those things onto the iPhone 6?
    If you buy an App, you have 2 ways to get it to the iPhone6: If Automatic Downloads is enabled in Settings->iTunes & App Store, it will automatically download to the iPhone 6 when you buy it on the 5 and vice versa if you buy it on the 6, it will download to the 5.
    Alternatively, you can simply go to the App Store App->Updates->Purchased and look for the App there and download it. Purchased Apps will not require payment again. i.e They'll be free to download to the iPhone 6 once purchased.
    SMS Messages will sync over using Continuity as long as they are on the same Wifi network. Otherwise, restoring the iPhone 5 backup to the iPhone 6 will transfer all messages received up until the backup was made onto the iPhone 6.
    Images, can be transferred either through Photo Stream
    My Photo Stream FAQ - Apple Support
    Or any Cloud service you want such as Dropbox, or One Drive.
    mannyace wrote:
    Also, something i forgot to ask initially: Should I update the iPhone 5 to iOS 8 first or does that not matter?
    If you want the Continuity features as explained above you need to update the iPhone 5 to iOS 8. Otherwise its not all that important.

  • HT204053 Is it possible to have two (or more) different icloud mail accounts (not alias) under the same apple id? If not what is you best advice for all family members to have their own e-mail and still share the purchases under the same apple id. Thanks

    Is it possible to have two (or more) different icloud mail accounts (not alias) under the same apple id? If not what is you best advice for all family members to have their own e-mail and still share the purchases under the same apple id. Thanks

    mannyace wrote:
    Thanks for the response.
    So I basically won't run into any trouble? I
    There should be no issues. Its designed to work like that.  You don't change Apple IDs just because you get a new device.
    mannyace wrote:
    Thanks for the response.
    Is there any chance that the phones can fall out of sync?
    Unlikely. But nothing is impossible.   Though I don;t see how that would happen. As long as both are signed into the Same Apple ID / iCloud Account they will be N'Sync. (Bad Joke)
    mannyace wrote:
    Thanks for the response.
    If I get a message or buy an app or take a photo on the iPhone 5, how do I get those things onto the iPhone 6?
    If you buy an App, you have 2 ways to get it to the iPhone6: If Automatic Downloads is enabled in Settings->iTunes & App Store, it will automatically download to the iPhone 6 when you buy it on the 5 and vice versa if you buy it on the 6, it will download to the 5.
    Alternatively, you can simply go to the App Store App->Updates->Purchased and look for the App there and download it. Purchased Apps will not require payment again. i.e They'll be free to download to the iPhone 6 once purchased.
    SMS Messages will sync over using Continuity as long as they are on the same Wifi network. Otherwise, restoring the iPhone 5 backup to the iPhone 6 will transfer all messages received up until the backup was made onto the iPhone 6.
    Images, can be transferred either through Photo Stream
    My Photo Stream FAQ - Apple Support
    Or any Cloud service you want such as Dropbox, or One Drive.
    mannyace wrote:
    Also, something i forgot to ask initially: Should I update the iPhone 5 to iOS 8 first or does that not matter?
    If you want the Continuity features as explained above you need to update the iPhone 5 to iOS 8. Otherwise its not all that important.

  • Unlinking two iPhones that currently have the same Apple ID

    My parents accidentally used the same Apple ID for both of their iPhones. How can I unlink their accounts and create two different, unique Apple IDs for each of their iPhones? And without losing what is currently saved to the iCloud (some of the info saved is for business). I appreciate any help. When I create a new ID for one device it messes up the other one. Thanks!

    mannyace wrote:
    Thanks for the response.
    So I basically won't run into any trouble? I
    There should be no issues. Its designed to work like that.  You don't change Apple IDs just because you get a new device.
    mannyace wrote:
    Thanks for the response.
    Is there any chance that the phones can fall out of sync?
    Unlikely. But nothing is impossible.   Though I don;t see how that would happen. As long as both are signed into the Same Apple ID / iCloud Account they will be N'Sync. (Bad Joke)
    mannyace wrote:
    Thanks for the response.
    If I get a message or buy an app or take a photo on the iPhone 5, how do I get those things onto the iPhone 6?
    If you buy an App, you have 2 ways to get it to the iPhone6: If Automatic Downloads is enabled in Settings->iTunes & App Store, it will automatically download to the iPhone 6 when you buy it on the 5 and vice versa if you buy it on the 6, it will download to the 5.
    Alternatively, you can simply go to the App Store App->Updates->Purchased and look for the App there and download it. Purchased Apps will not require payment again. i.e They'll be free to download to the iPhone 6 once purchased.
    SMS Messages will sync over using Continuity as long as they are on the same Wifi network. Otherwise, restoring the iPhone 5 backup to the iPhone 6 will transfer all messages received up until the backup was made onto the iPhone 6.
    Images, can be transferred either through Photo Stream
    My Photo Stream FAQ - Apple Support
    Or any Cloud service you want such as Dropbox, or One Drive.
    mannyace wrote:
    Also, something i forgot to ask initially: Should I update the iPhone 5 to iOS 8 first or does that not matter?
    If you want the Continuity features as explained above you need to update the iPhone 5 to iOS 8. Otherwise its not all that important.

  • How do i contact or give the request to the seller if my ipad is in active screen?

    i bough an ipad mini from a person (2nd bough the ipad), when he give me the ipad mini has fw 7.0.4 and didnt have icloud or appstore id, but when i bring it home, i try to reset all settings and it ask me pin code (i ask the 2nd user and he said he didnt know), so i try to restore it again and it gonna ask me id t****@gmail.com to active. i come back to the 2nd seller and after i try to talk him with the angry mood, he said he bought it from another person (1 user) some month ago and he didn't know where he go (stay at the hotel when the 2nd seller bought it), and said the pin code (nothing to do or no where to press it now), aslo ask why i reset it so it was like that and refuse to give my money back. Now i want to contact to the 1rst seller to ask him remove my device from the icloud but i don't know his mail id to contact (t****@gmail.com), why apple dont just wrote the long address id of the user icloud, so someone like me or everyone else just have the active screen can contact. they said they can't have but need to find the orginal user but they didn't want to give my mail/cell phone number to the orginal user or give me his email address, my money is trash and ipad is brick now.. i can't take back my money from the 2nd cause he said i was make it to a brick.. :-<.
    My ipad is not in black list, not stolen. i work for 2 months to buy for my little siter and now there is nothing i cant do, just wait for apple has someway to give my mail to the user or give me his mail...
    already chat with the apple support but nothing the supporter can do :-<

    and i also reply from this thread, hater gonna hate but someone bough it with money is not those fault, i just want to contact the owner to talk about the device.
    https://discussions.apple.com/message/23749325#23749325
    didnt like everyone has enough money to buy a new one, or just for kid, new one is expansive in some contry.
    Is there anyway to contact the orignal owner when the email like ******@gmail :-<..
    contact the police help nothing in some country cause they just don't care and dont know, so u lost ur money for nothing if u can't contact the owner..
    those who lost the divice is just as those who lost the money buy the device with lock, so why u hate all those who buy device with lock but not stolen, nothing is impossible, rite?
    In my case, i just contact the owner to ask him remove the device or pay more for the account if those device is not stolen, that's all.

  • How to replace or remove last 500 bytes of a file without rewriting all the file?

    Hi everyone,
    Usually I only ask for help when I can't find a solution for several days or weeks... And guess what? That just happen!
    So, this is what i am trying to do:
    I have a program to ZIP folder and protect them with password, then it encrypts the zip file.
    That it's working fine, until the user forgets his password.
    So, what I want to do is give the user a Recovery Password option for each ZIP file created. I can't use the Windows Registry because the idea is to be able to recover the password in any computer.So i came up with an idea...
    In simple terms, this will work like this:
    0 - Choose folder to ZIP
    1 - Ask user for recover details (date of birth, email etc)
    2 - ZIP folder with password
    3 - Encrypt ZIP file
    4 - Encrypt recover details and convert it to HEX
    5 - Add recover details (in HEX) to the end of the ZIP file (last bytes)
    6 - Add "5265636F76657244657461696C73" which is the text "RecoverDetails" in HEX
    7 - Add "504B0506000000000000000000000000000000000000" this is the final bytes of a ZIP file and will make the Operating System think that is a ZIP file (i know that will give an error when we try to open it.. the ideia is to change the
    extension later and use my software to do all the work to access this ZIP/folder again)
    So, explaining what it's here, I want to say that I managed how to do all of this so far. The point number 6 will help us to determine where the recover details are in the file, or if they actually exist because user can choose not to use them.
    In order to unlock this ZIP and extract it's contents, I need to reverse what I've done. That means, that  need to read only the last 500 bytes (or less if the file is smaller) of the ZIP and remove those extra bytes I added so the program can check
    if the user is inputing a correct password, and if so decrypt contents and extract them.
    But, if the user insert a wrong password I need to re-add those bytes with the recover details again to the ZIP file.
    The second thing is, if the user forgets his password and asks to recover it, a form will be shown asking to insert the recover detail (date of birth, email etc), so we need to reed the last 500 bytes of the ZIP, find the bytes in number 6 and remove the
    bytes before number 6, remove bytes in number 6 and number 7, and we will have the recover details to match against the user details input.
    I have all done so far with the locking process. But i need help with the unlocking.
    I am not sure if it's possible, but this what i am looking for:
    Read last 500 bytes of a file, remove the bytes with recover details and save the file. Without reading the whole file, because if we have a 1GB file that will take a very long time. Also, i don't want to "waste" hard drive space creating a new
    clone file with 1GB and then delete the original.
    And then add them back "in case user fails the password" which should be exactly the same.
    This sounds a bit confusing I know, even to me, I am writing and trying to explain this the better I can.. Also my English is not the best..
    Here it goes some code to better understanding:
    'READ LAST 500 BYTES OF ZIP FILE TO CHECK IF IT CONTAINS RECOVER DETAILS
    Dim oFileStream As New FileStream(TextBox_ZIP_to_Protect.Text & ".zip", FileMode.Open, FileAccess.Read)
    Dim oBinaryReader As New BinaryReader(oFileStream)
    Dim lBytes As Long = oFileStream.Length
    oBinaryReader.BaseStream.Position = lBytes - 500
    Dim fileData As Byte() = oBinaryReader.ReadBytes(500)
    oBinaryReader.Close()
    oFileStream.Close()
    Dim txtTemp As New System.Text.StringBuilder()
    For Each myByte As Byte In fileData
    txtTemp.Append(myByte.ToString("X2"))
    Next
    Dim RecoveryDetailsPass_Holder = txtTemp.ToString()
    'Dim Temp_2 = txtTemp.ToString()
    'RichTextBox1.Text = txtTemp.ToString()
    If txtTemp.ToString.Contains("505245434F47414653") Then
    'we have password recovery details(the numbers mean RecoverDetails in HEX)
    'next we will get rid of everything before and after of string "cut_at"
    Dim mystr As String = RecoveryDetailsPass_Holder 'RichTextBox1.Text
    Dim cut_at As String = "505245434F47414653"
    Dim x As Integer = InStr(mystr, cut_at)
    ' Dim string_before As String = mystr.Substring(0, x - 1)
    Dim string_after As String = mystr.Substring(x + cut_at.Length - 1)
    RecoveryDetailsPass_Holder = RecoveryDetailsPass_Holder.Replace(string_after.ToString, "")
    RecoveryDetailsPass_Holder = RecoveryDetailsPass_Holder.Replace("505245434F47414653", "") ' this is RecoverDetails in HEX
    RecoveryDetailsPass_Holder = RecoveryDetailsPass_Holder.Replace("504B0506000000000000000000000000000000000000", "") ' this is the bytes of an empty zip file
    'AT THIS POINT WE HAVE ONLY THE RECOVER PASSWORD DETAILS (date of birth, email etc) IN THE VARIABLE "RecoveryDetailsPass_Holder"
    '////////////////////////////////////////////////////// TO DEBUG
    'MsgBox(string_after.ToString & "505245434F47414653")
    'InputBox("", "", string_after.ToString)
    '\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\ TO DEBUG
    'Temp_2 = Temp_2.Replace(RecoveryDetailsPass_Holder.ToString, "")
    Now that we have the recover details, we need to remove them from ZIP in order to the software try to unzip it with the password provided by the user on the GUI.
    If the user needs to recover the password we have the details already in RecoveryDetailsPass_Holder variable and just need to match them against user input details.
    If the user fails, we need to put the RecoveryDetailsPass_Holder back on the file.
    Any question just ask, it's a bit trick to explain i think, but please ask.
    Anyone know how to do this?
    Many thanks in advanced.
    Nothing is impossible!
    @ Portugal
    Vote if it's helpfull :)

    @ ALL
    Thank you very much for you help. I know that if I'm "playing" with bytes you should assume that I know a lot of VB.net, but I don't know that much unfortunately. I am not a beginner but I am still very fresh and I probably do stuff that work but
    probably not in the best way...
    Anyway, I will explain the idea of this little software I'm making. Once I wanted to create a program to protect folders with password, and I came up with something to change folder permissions to lock access to them, and that actually worked fine and quickly.
    However, I managed how to "crack" the protection by going to folder properties, security tab and then give permissions back to my username. So that, to me, wasn't a safer system to protect folders, also I want the ability to use passwords. So I search
    and search online for a way to do it, and someone replied (to someone with the same question as me) that the best option would be to create a zip with all contents of the folder, with password and then change the extension from .zip to .whatever and register
    the new extension .whatever on the Windows Registry, so that file will have an icon and open with my software.
    So I did...The program zips everything, change the extension and I added the encryption to avoid people changing the extension to ZIP or trying to open with 7-Zip or similar and be able to see the protected files names in the .zip/.whatever
    Answering to all of you now:
    @Armi
    "System.IO.FileStream.SetLength"
    I know I tried that but I erased the code because it didn't work for some reason, I don't remember why sorry, was long time before I created this post.
    The last code I was trying to use was this:
    ' Set the stream position to the desired location of the stream.
    Dim fileStream As IO.FileStream = _
    New IO.FileStream(TextBox_ZIP_to_Protect.Text & ".zip", IO.FileMode.Append)
    Try
    ' Set the stream (OFFSET) position to the desired location of the stream.
    fileStream.Seek(210, IO.SeekOrigin.Current)
    Dim Bytes_do_ZE As Byte() = HexStringToByteArray(Temp_2.ToString)
    'Write Characters ASCII
    For Each Byte_Do_Zeca As Byte In Bytes_do_ZE
    fileStream.WriteByte(Byte_Do_Zeca)
    Next
    Finally
    fileStream.Close()
    End Try
    and we need this:
    Private Shared Function HexStringToByteArray(ByRef strInput As String) As Byte()
    Dim length As Integer
    Dim bOutput As Byte()
    Dim c(1) As Integer
    length = strInput.Length / 2
    ReDim bOutput(length - 1)
    For i As Integer = 0 To (length - 1)
    For j As Integer = 0 To 1
    c(j) = Asc(strInput.Chars(i * 2 + j))
    If ((c(j) >= Asc("0")) And (c(j) <= Asc("9"))) Then
    c(j) = c(j) - Asc("0")
    ElseIf ((c(j) >= Asc("A")) And (c(j) <= Asc("F"))) Then
    c(j) = c(j) - Asc("A") + &HA
    ElseIf ((c(j) >= Asc("a")) And (c(j) <= Asc("f"))) Then
    c(j) = c(j) - Asc("a") + &HA
    End If
    Next j
    bOutput(i) = (c(0) * &H10 + c(1))
    Next i
    Return (bOutput)
    End Function
    That code, as I understand, is to search for the OFFSET of the bytes in the file and start to write from there... That OFFSET should be the beginning of the 500 bytes read on the code before. I got the OFFSET position "210" reading the file with
    the HEX editor "HxD - Hexeditor v1.7.7.0" but using the OFFSET won't work because every file, password, recover details and so on, are different and so the file size, changing the OFFSET I
    think.
    @Reed Kimble
    Does that sound like something which might work for you?
    Thanks for your help. That might be some solution, however it seams a bit of the same problem where we need to read the bytes again to get the recover details. But, as I said in this post, because this is meant to password protect folders, do you think that
    will apply as well?
    @Crazypennie
    Thanks for your reply.
    All this appears really weak. The user has your application since he need it to open the file .... and the code in the application contain the code to read the file without knowing the password. Therefore anyone can read your code and retrieve the
    data without the password ... if he knows VB.
    The application can only open the file if the user didn't use a password to protect the file. Because the file is encrypted and needs to be unencrypted first.
    When the application tries to open/read the file, will need to decrypt it first and then check for a password and do the validation. Also the application is with the code masked/protected which i think it might not be easy for reverse engineering.
    - You need to use a web server and a symmetric key encryption
    This a good idea, besides I don't know how to implement it. However the idea is to be able to:
    1 - Protect a folder anywhere in any Windows computer (portable app)
    2 - Recover password details (security question) in any computer, online and offline
    And I think we need a computer always connected to the Internet to use that method, right?
    @ Mr. Monkeyboy
    Thank you very much for your effort.
    I just wanted to let you know that the zip method you are using is no longer supported.
    I didn't actually knew that. Thanks for letting me know.
    Do you require the compressed encrypted files to actually be Zip files or could they just be compressed files that have nothing to do with Zip?
    No, it doesn't need to be a .zip extension. I am actually using my own extension. It starts as a Zip but then I changed to my own extension which I have registered on the Windows Registry.
    @ ALL
    Thanks again to all for trying and spending time helping me.
    By the way, I might not be able to answer or try any code during the weekend... It's easter break and family is around. Have a nice easter everyone. :)
    Nothing is impossible! Imagination is the limit!

  • Clients Business area: Banking Services - BI Development & Support?

    Hi All,
    I would like to know the things taken into consideration while working in developement & support projects with respect to domain.
    As we have a clients doing retail business for whom the BW is implemented,<b> In the same way i want to have the info of BW development & Support in the below areas:
    1.Banking Services
    If we will be in banking services project, what & all we should know like landscape of the client, their business process etc.,
    How those will be?</b>
    The info asked is a bit tough for providing the needed info, but as we know that nothing is impossible in SDN.
    Thanks in Advance.

    Hi all,
    No one has answered yet...
    Can anyone plssss

  • In memory replication doesn't seem to work

    We have set up a Cluster with 2 servers. Our Proxy server is NES. We can
              see the round robin working but each time we are accessing the session,
              the same cookie gets overriden (the browser receives the WebLogicSession
              cookie from the weblogic servers) .... Loosing all the information..
              Is this a WebLogic bug ?
              Olivier
              [olivier.vcf]
              

    I don't think it goes in the xml file. It should be in weblogic.properties file
              weblogic.httpd.session.cookie.name=foo
              -- Prasad
              John wrote:
              > Could you tell me how I can set up the cookie in web.xml to override the WeblogicSession cookie?
              >
              > "Yogi Mudras" <[email protected]> wrote:
              > >Is SP6 out yet ?
              > >
              > >
              > >"Olivier Brand" <[email protected]> wrote in message
              > >news:[email protected]...
              > >> BEA told me that the Session bug will be fixed in SP7.
              > >>
              > >> Otherwise, the in-memory replication is working fine. During our stress
              > >test, we got
              > >> some exceptions.
              > >>
              > >> When we are using in-memory replicaiton, should all the objects put in the
              > >HttpSession
              > >> be Serializable ? My guess is that they have to be.
              > >>
              > >> Olivier
              > >>
              > >> weblogic.servlet.internal.session.ReplicatedSession.invalidate(Compiled
              > >> Code)
              > >> at
              > >>
              > >weblogic.servlet.internal.session.ReplicatedSessionContext.invalidateSession
              > >(Compiled
              > >> Code)
              > >> at
              > >>
              > >weblogic.servlet.internal.session.SessionContext$SessionInvalidator.invalida
              > >teSessions(Compiled
              > >>
              > >> Code)
              > >> at
              > >>
              > >weblogic.servlet.internal.session.SessionContext$SessionInvalidator.trigger(
              > >Compiled
              > >> Code)
              > >> at
              > >> weblogic.time.common.internal.ScheduledTrigger.executeLocally(Compiled
              > >> Code)
              > >> at
              > >> weblogic.time.common.internal.ScheduledTrigger.execute(Compiled Code)
              > >> at weblogic.time.server.ScheduledTrigger.execute(Compiled Code)
              > >> at weblogic.kernel.ExecuteThread.run(Compiled Code)
              > >>
              > >> weblogic.cluster.replication.NotFoundException: remove unable to find
              > >> object 7173403347807782043
              > >> at java.lang.Throwable.fillInStackTrace(Native Method)
              > >> at java.lang.Throwable.fillInStackTrace(Compiled Code)
              > >> at weblogic.rmi.extensions.AbstractRequest.sendReceive(Compiled
              > >> Code)
              > >> at
              > >> weblogic.cluster.replication.ReplicationManager_WLStub.remove(Compiled
              > >> Code)
              > >> at
              > >> weblogic.cluster.replication.ReplicationManager.unregister(Compiled
              > >> Code)
              > >> at
              > >> weblogic.servlet.internal.session.ReplicatedSession.invalidate(Compiled
              > >> Code)
              > >> at
              > >>
              > >weblogic.servlet.internal.session.ReplicatedSessionContext.invalidateSession
              > >(Compiled
              > >> Code)
              > >> at
              > >>
              > >weblogic.servlet.internal.session.SessionContext$SessionInvalidator.invalida
              > >teSessions(Compiled
              > >>
              > >> Code)
              > >> at
              > >>
              > >weblogic.servlet.internal.session.SessionContext$SessionInvalidator.trigger(
              > >Compiled
              > >> Code)
              > >> at
              > >> weblogic.time.common.internal.ScheduledTrigger.executeLocally(Compiled
              > >> Code)
              > >>
              > >> Prasad Peddada wrote:
              > >>
              > >> > Olivier Brand wrote:
              > >> >
              > >> > > In fact, nothing is impossible since there is a HUGE bug in WebLogic
              > >and the
              > >> > > sessions. This bug has been (and still is) filed under the following
              > >number:
              > >> > > CR033896.
              > >> > > I have noticed that if you have two different web app, if you contact
              > >a
              > >> > > servlet in app 1 and a servlet in app 2 (2 different contexts), the
              > >same
              > >> > > cookie: WebLogicSession, is being overriden !!
              > >> > > The workaround is to override in the web.xml the name of the session.
              > >> >
              > >> > Do you have problems even with the suggested workaround?
              > >> >
              > >> > > I got the sticky load balancing back in placing the CookieName
              > >argument in the
              > >> > > NES proxy (app1 and app2). This way the proxy can identify what
              > >application
              > >> > > server to contact depending on the requestor's cookie.
              > >> > >
              > >> > > I am still noticing the loss of the session when using the failover:
              > >> > >
              > >> > > I stop app server A, app1 is switched to app server B but recreate the
              > >same
              > >> > > cookie with a different value. I thought that in-memory replication
              > >was...
              > >> > > replicating. Does it mean that only the DB persistency (or file system
              > >if
              > >> > > using NFS of course) can work in a failover scenario ?
              > >> >
              > >> > When you failover to server B the cookie will change. The behavior is
              > >correct, but
              > >> > do you see loss of session data. Is it possible to post the cookies
              > >before and
              > >> > after failover.
              > >> >
              > >> > - Prasad
              > >> >
              > >> > >
              > >> > > Olivier
              > >> > >
              > >> > > Prasad Peddada wrote:
              > >> > >
              > >> > > > Olivier Brand wrote:
              > >> > > >
              > >> > > > > We have set up a Cluster with 2 servers. Our Proxy server is NES.
              > >We can
              > >> > > > > see the round robin working but each time we are accessing the
              > >session,
              > >> > > > > the same cookie gets overriden (the browser receives the
              > >WebLogicSession
              > >> > > > > cookie from the weblogic servers) .... Loosing all the
              > >information..
              > >> > > >
              > >> > > > What do you mean by overriden? That's not possible. Could you post
              > >the two
              > >> > > > sessions ids.
              > >> > > >
              > >> > > > - Prasad
              > >> > > >
              > >> > > > >
              > >> > > > > Is this a WebLogic bug ?
              > >> > > > >
              > >> > > > > Olivier
              > >> >
              > >> > --
              > >> > Cheers
              > >> >
              > >> > - Prasad
              > >>
              > >
              > >
              

  • Looking for a usable GUI Designer/Container...

    Hi all.
    Since a while, I'm looking for an integrated environment to develop and execute Java/Swing GUI and it seems it's not possible to find such a thing...
    I explain : we are developping lots of J2EE applications hosted in a well known Application Server, and for what concern server, we can find 'on the shelf' almost all we need. Thus, using Session Beans, EJB3, Spring (...), it's pretty comfortable to build professional applications.
    But generally speeking, these applications have a graphical part, and at this point, things become more complicated. For years, we have been using only Java, for both server and client part (Swing, even in its firsts versions... souvenirs...). But even after 10 years of Java, it seems that it is still not possible to find a tool in which we can design, test, deploy and execute our GUIs.
    Since Matisse appeared, it is a little bit easier to design panels (but not so trivial... JFormDesigner has released a beta version supporting the GroupLayout : still lots of bugs) but for what concern, let's say, the 'GUI Container' part, it seems that market/open source has no answer. I tried Netbeans RCP (and also Eclipse...), but these containers have been thought for IDE, and concepts are not easy to map on a standard GUI. Moreover, these containers are huge and not so easy to understand, so very often, the decision to build full custom applications is taken, re-writing for the 1000th time the main window, the menubar/toolbar management, the MDI controller (using sometime a docking framework), ... Thus, the cost of the development and the baseline is high, and of course, our clients are dissatisfied.
    Recently, a new way of developping applications appeared : server part is developped using Java/J2EE, and the client side (fat client) is made using .Net. Interop between client and server leans on WebServices or binary interop (JIntegra).
    I'm totally convinced that this kind of architecture is a mistake, but it's more and more difficult to defend Java on the client side. C# tools seem to be easier to use, more productive, ...
    So my question is : what are your opinions/experiences on this subject? Have you found "the magic tool", "the magic framework", ... that make of Java/Swing a good challenger for desktop developments... or do you think that the game is over, and that Microsoft .Net has definitively won the client?
    Thks for your answers!!
    Rd

    I believe it is not about winning and lossing. Its about learning. By the way, let me mention that God who is the mastermind of all variations is a God of diversity. Every diverse expression of whatever kind is a reflection and coextension of its maker -and that means that even you are a coextension of Himself.
    Perhaps, if you are really looking for a tool that would satisfy your demands or desires along with Java, isnt it not logical to say that... or shall I say "perhaps" God is leading you into that new expression of diversity -a diversity that will challenge the whole creation? I dont blame others with what I cant do for myself.
    One saying says,
    "Seek and you shall find; Knock and the door will be opened to you; Ask and it shall be given you." The shorter way of saying it is..."Be patient and you will be satisfied."
    If the clients lost patience. Make them understand how complex it is to make a java application. They will appreciate your wisdom.
    Well nothing is impossible. The best part of your mind [one variation of the others] will always suggest: "All things are possilbe".
    Therefore, do not despise what God is blessing.
    Oliver Bob Lagumen
    Newbie in Java

  • How to send an analog output signal on same axis running a stepping motor umi 7764/ PCI7334

    I am running a single axis stepping motor (which is working fine) but
    for the application I need to be able to turn on and off a 5 volt
    laser.  It notes in the manual for the UMI 7764  that the the
    analog output can be used as a general-purpose voltage output.  I
    would like to use it as such, but can't figure out what VI's actually
    send messages to the board to output a 5 Volt signal.  
    Ideally I would use the analog output on the same axis that the
    stepping motor is on, but if need be I could use one of the other axis
    if this isn't possible (ie. it may not be possible to step and send
    analog voltage output on same axis at same time).  I have been
    looking at the configuring DAQ and ADC stuff, but can't seem to make
    sense if these actually control the analog output channel.  I
    think they just control the Analog input channels, but maybe I am
    wrong. 
    Any help would be greatly appreciated
    Andre

    Hi,
    It is possible to send analog output out of the same same DAC channel in which your stepper is connected, if you configure the stepper as open loop in MAX. I've tried it. This way you have the stepper output, analog output and encoder input acting independently. So you can use these seperately for different purposes, such as using the analog output for constant speed motors where speed or position control is not of much importance, encoder for positioning some other axes and stepper output for stepper control. With good programming skills, the NI motion controllers can thus be used for the most complex configurations. Great work NI !!! Nothing is impossible.
    Regards,
    Giridhar Rajan
    Automation Engineer, Design
    Cruiser Controls
    Mumbai, India

  • Audio distortion over time

    The audio I am receiving deteriorates to a "fuzz" and eventually disappears completely after a few minutes of using Facetime on my mac mini with an isight camera for sound and video. Using lion and facetime 1.1.1. After I end the call, restart the app and call again, the sound is fine for a few minutes and then it starts all over again. Suggestions?

    That's extremely strange.  Although nothing's impossible, I think iTunes is the least likely culprit.  Normally, if files are getting corrupted, the number 1 suspect is a failing disk drive.  You might want to run some diagnostics on your disk.
    How was the file ripped?  Is it Mp3 or AAC? Some old rippers did non-standard things, and maybe new players are a little fussier.  I thought all that had been sorted out by 2008, though.
    You said you have Time Machine backups.  Do you have any of when it was good?
    I'd suggest trying to open it with Audacity and see if there's anything "interesting" about it.
    If it's an MP3, you could also try an MP3 repair utility, like this one:
    http://mp3.about.com/od/tutorials/ht/Repair-MP3-Files.htm
    (I have no direct experience with this program).

  • Smudge Tool Double Brush Bug Issue

    I have a very strange problem that just appeared in my copy of Adobe Photoshop CS5 Version 12.0 x32
    Out of nowhere I've noticed that when I use the Smudge Tool my brush will randomly have 2 points instead of one.  I've looked all through my brush settings and everything is normal in the defaul brush settings.  Yet when I go to smudge something I get the normal smudge point and then 10 or so pixels away another Smudge Brush at about 50% the size of the normal brush is smudging my image as well.  This makes the smudge tool basically useless and I seem to be the only one who has this bug.
    Has anyone had a similar bug and is there any solution besides reinstalling?

    I check Autodesk Sketchbook Pro and they don't have a smudge tool or anything that looks like it. But their app is really impressive for a company specialised in 3D. I might spend more time on it. Infinite Painter, a bit buggy and slow, have now a move tool that does something "similar" if you play with the parameters. But if you press too much it acts like a pinch. Thing is their move tool seems to blend colors without darkening them... their might be a way !
    So of the 3 drawing apps that I have, none have a smudge tool. Which is scary. It seems that transparency is definitely a complex (nothing is impossible to code) thing to code. I'm sure the brains behind Unreal Engine would say it's doable.
    Let's wait and hope. But without that, the future of drawing apps on Android is seriously compromised.

  • [BUG] Loop optimize error for ^=  (64Bit Runtime1.6.0_18)

    Hi,
    I don't know if I should make bug report or not. I have found a strange error within a loop iteration up to Integer.MAXVALUE.
    Here is the source:
    public class problem64bit
          * @param args
         public static void main(final String[] args)
              System.out.println("java.version = \t"
                        + System.getProperty("java.version") + " "
                        + System.getProperty("java.vm.name") + " ("
                        + System.getProperty("sun.arch.data.model") + "Bit)");
              System.out.println("OS = \t\t" + System.getProperty("os.name") + " ("
                        + System.getProperty("os.version") + ")\n");
              booleanInvert(Integer.MAX_VALUE);
              booleanInvert(Integer.MAX_VALUE - 1);
              booleanInvert(Integer.MAX_VALUE - 2);
         private static void booleanInvert(final int max)
              System.out.println("BooleanInvert with max = " + max + " iterations");
              long timeStart = System.currentTimeMillis();
              boolean test1 = false;
              boolean test2 = false;
              boolean test3 = false;
              for (int i = 0; i < max; i++)
                   test1 = !test1;
              for (int i = 0; i < max; i++)
                   test2 = test2 ? false : true;
              for (int i = 0; i < max; i++)
                   test3 ^= true;
              System.out.println("Time: " + (System.currentTimeMillis() - timeStart)
                        + "ms");
              if (test1 != test2 || test1 != test3)
                   System.out.println("ERROR: Boolean invert\n\ttest1=" + test1
                             + "\n\ttest2=" + test2 + "\n\ttest3=" + test3);
              } else
                   System.out.println("Everything as it should be!");
    }The result is different between a x32JRE and a x64JRE
    Results on a x32JRE:
    java.version =      1.6.0_18 Java HotSpot(TM) Client VM (32Bit)
    OS =           Windows 7 (6.1)
    BooleanInvert with max = 2147483647 iterations
    Time: 7812ms
    Everything as it should be!
    BooleanInvert with max = 2147483646 iterations
    Time: 7469ms
    Everything as it should be!
    BooleanInvert with max = 2147483645 iterations
    Time: 8801ms
    Everything as it should be!and here are the results on a x64JRE
    java.version =      1.6.0_18 Java HotSpot(TM) 64-Bit Server VM (64Bit)
    OS =           Windows 7 (6.1)
    BooleanInvert with max = 2147483647 iterations
    Time: 13ms
    ERROR: Boolean invert
         test1=true
         test2=true
         test3=false
    BooleanInvert with max = 2147483646 iterations
    Time: 11ms
    Everything as it should be!
    BooleanInvert with max = 2147483645 iterations
    Time: 0ms
    Everything as it should be!as you can see, the result on the x32 JRE is the expected one. The x64 JRE is very fast but there seems to be a nasty bug in the optimization code for the loops because only with Interger.MAXVALUE there is a problem.
    What to do now - can anybody reproduce the error and sould i report it as a bug? Is it only in the Win(7) x64 JRE?
    greetings
    Edited by: GandalfTheWhite on Feb 13, 2010 6:30 AM
    Edited by: GandalfTheWhite on Feb 13, 2010 6:38 AM
    Edited by: GandalfTheWhite on Feb 13, 2010 6:50 AM

    Hi,
    well this is the first time I hear that eclipse uses its own compiler! But nothing is impossible :-) -> as I know now eclipse uses its own incremental compiler :-(.
    Here are the javap codes of the two class files (minimized example!)
    But I will update my eclipse with the lates stable build an have a look at the problem again. Thx for your help!
    eclipse.class
    Compiled from "problem64Bit.java"
    public class problem64Bit extends java.lang.Object{
    public problem64Bit();
      Code:
       0:     aload_0
       1:     invokespecial     #8; //Method java/lang/Object."<init>":()V
       4:     return
    public static void main(java.lang.String[]);
      Code:
       0:     ldc     #16; //int 2147483647
       2:     invokestatic     #17; //Method booleanInvert:(I)V
       5:     ldc     #21; //int 2147483646
       7:     invokestatic     #17; //Method booleanInvert:(I)V
       10:     return
    private static void booleanInvert(int);
      Code:
       0:     iconst_0
       1:     istore_1
       2:     iconst_0
       3:     istore_2
       4:     iconst_0
       5:     istore_3
       6:     goto     22
       9:     iload_1
       10:     ifeq     17
       13:     iconst_0
       14:     goto     18
       17:     iconst_1
       18:     istore_1
       19:     iinc     3, 1
       22:     iload_3
       23:     iload_0
       24:     if_icmplt     9
       27:     iconst_0
       28:     istore_3
       29:     goto     39
       32:     iload_2
       33:     iconst_1
       34:     ixor
       35:     istore_2
       36:     iinc     3, 1
       39:     iload_3
       40:     iload_0
       41:     if_icmplt     32
       44:     iload_1
       45:     iload_2
       46:     if_icmpeq     83
       49:     getstatic     #24; //Field java/lang/System.out:Ljava/io/PrintStream;
       52:     new     #30; //class java/lang/StringBuilder
       55:     dup
       56:     ldc     #32; //String ERROR: Boolean invert\n\ttest1=
       58:     invokespecial     #34; //Method java/lang/StringBuilder."<init>":(Ljava/lang/String;)V
       61:     iload_1
       62:     invokevirtual     #37; //Method java/lang/StringBuilder.append:(Z)Ljava/lang/StringBuilder;
       65:     ldc     #41; //String \n\ttest2=
       67:     invokevirtual     #43; //Method java/lang/StringBuilder.append:(Ljava/lang/String;)Ljava/lang/StringBuilder;
       70:     iload_2
       71:     invokevirtual     #37; //Method java/lang/StringBuilder.append:(Z)Ljava/lang/StringBuilder;
       74:     invokevirtual     #46; //Method java/lang/StringBuilder.toString:()Ljava/lang/String;
       77:     invokevirtual     #50; //Method java/io/PrintStream.println:(Ljava/lang/String;)V
       80:     goto     91
       83:     getstatic     #24; //Field java/lang/System.out:Ljava/io/PrintStream;
       86:     ldc     #55; //String Everything as it should be!
       88:     invokevirtual     #50; //Method java/io/PrintStream.println:(Ljava/lang/String;)V
       91:     returnconsole.class
    Compiled from "problem64Bit.java"
    public class problem64Bit extends java.lang.Object{
    public problem64Bit();
      Code:
       0:     aload_0
       1:     invokespecial     #1; //Method java/lang/Object."<init>":()V
       4:     return
    public static void main(java.lang.String[]);
      Code:
       0:     ldc     #2; //int 2147483647
       2:     invokestatic     #3; //Method booleanInvert:(I)V
       5:     ldc     #4; //int 2147483646
       7:     invokestatic     #3; //Method booleanInvert:(I)V
       10:     return
    private static void booleanInvert(int);
      Code:
       0:     iconst_0
       1:     istore_1
       2:     iconst_0
       3:     istore_2
       4:     iconst_0
       5:     istore_3
       6:     iload_3
       7:     iload_0
       8:     if_icmpge     27
       11:     iload_1
       12:     ifne     19
       15:     iconst_1
       16:     goto     20
       19:     iconst_0
       20:     istore_1
       21:     iinc     3, 1
       24:     goto     6
       27:     iconst_0
       28:     istore_3
       29:     iload_3
       30:     iload_0
       31:     if_icmpge     44
       34:     iload_2
       35:     iconst_1
       36:     ixor
       37:     istore_2
       38:     iinc     3, 1
       41:     goto     29
       44:     iload_1
       45:     iload_2
       46:     if_icmpeq     86
       49:     getstatic     #5; //Field java/lang/System.out:Ljava/io/PrintStream;
       52:     new     #6; //class java/lang/StringBuilder
       55:     dup
       56:     invokespecial     #7; //Method java/lang/StringBuilder."<init>":()V
       59:     ldc     #8; //String ERROR: Boolean invert\n\ttest1=
       61:     invokevirtual     #9; //Method java/lang/StringBuilder.append:(Ljava/lang/String;)Ljava/lang/StringBuilder;
       64:     iload_1
       65:     invokevirtual     #10; //Method java/lang/StringBuilder.append:(Z)Ljava/lang/StringBuilder;
       68:     ldc     #11; //String \n\ttest2=
       70:     invokevirtual     #9; //Method java/lang/StringBuilder.append:(Ljava/lang/String;)Ljava/lang/StringBuilder;
       73:     iload_2
       74:     invokevirtual     #10; //Method java/lang/StringBuilder.append:(Z)Ljava/lang/StringBuilder;
       77:     invokevirtual     #12; //Method java/lang/StringBuilder.toString:()Ljava/lang/String;
       80:     invokevirtual     #13; //Method java/io/PrintStream.println:(Ljava/lang/String;)V
       83:     goto     94
       86:     getstatic     #5; //Field java/lang/System.out:Ljava/io/PrintStream;
       89:     ldc     #14; //String Everything as it should be!
       91:     invokevirtual     #13; //Method java/io/PrintStream.println:(Ljava/lang/String;)V
       94:     returnas far as i can see... there a some differences but more could not make out of it.
    greeting gandalf
    ps here the source for the smaler sample
    public class problem64Bit
          * @param args
          *            Arguments
         public static void main(final String[] args)
              booleanInvert(Integer.MAX_VALUE);
              booleanInvert(Integer.MAX_VALUE - 1);
         private static void booleanInvert(final int max)
              boolean test1 = false;
              boolean test2 = false;
              for (int i = 0; i < max; i++)
                   test1 = !test1;
              for (int i = 0; i < max; i++)
                   test2 ^= true;
              if (test1 != test2)
                   System.out.println("ERROR: Boolean invert\n\ttest1=" + test1
                             + "\n\ttest2=" + test2);
              } else
                   System.out.println("Everything as it should be!");
    }Edited by: GandalfTheWhite on Feb 16, 2010 11:33 AM

Maybe you are looking for