About Application Identity

Hi,All
I have a problem about application Identity.
If table has numberic primary key columns,when reversemapping,it will be
mapped to built-in data type like "long","int".But I want it be wrapped
class like "Long","Integer".How to do?
Regards,
Jia shunlin

See our documentation on customizing reverse mapping.
http://www.solarmetric.com/Software/Documentation/latest/docs/ref_guide_pc_reverse.html#ref_guide_pc_reverse_custom

Similar Messages

  • Application identity multi-colum PK problem

    Hello,
    I am having problem with application identity in case of multi-colum PK when
    componente of OID class are themselve percistent classes.
    OrgUnitTypeRole class identified by OrgUnitType and Role which are both
    persistent classes.
    Attached are OrgUnitTypeRole and OrgUnitTypeRoleOid classes
    I am getting following exception:
    javax.jdo.JDOFatalDataStoreException: The registered class
    "peacetech.gao.usorg.jdo.OrgUnitTypeRole" is not compiled or not longer
    exists. If the class has been deleted, unregister it before proceeding.
    NestedThrowables:
    java.lang.VerifyError: (class: peacetech/gao/usorg/jdo/OrgUnitTypeRole,
    method: jdoCopyKeyFieldsToObjectId signature:
    (Ljavax/jdo/PersistenceCapable$ObjectIdFieldManager;Ljava/lang/Object;)V)
    Bad type in putfield/putstatic
    at com.solarmetric.kodo.impl.jdbc.schema.DB.getPersistentTypes(DB.java:270)
    at
    com.solarmetric.kodo.impl.jdbc.JDBCPersistenceManagerFactory.setup(JDBCPersi
    stenceManagerFactory.java:170)
    at
    com.solarmetric.kodo.runtime.PersistenceManagerFactoryImpl.privateSetup(Pers
    istenceManagerFactoryImpl.java:501)
    at
    com.solarmetric.kodo.runtime.PersistenceManagerFactoryImpl.getPersistenceMan
    ager(PersistenceManagerFactoryImpl.java:61)
    at
    com.solarmetric.kodo.runtime.PersistenceManagerFactoryImpl.getPersistenceMan
    ager(PersistenceManagerFactoryImpl.java:50)
    at
    peacetech.gao.usorg.jdo.JDOFactory.getPersistenceManager(JDOFactory.java:70)
    at peacetech.gao.usorg.gui.BrowserFrame.<init>(BrowserFrame.java:158)
    at peacetech.gao.usorg.gui.Browser.<init>(Browser.java:23)
    at peacetech.gao.usorg.gui.Browser.main(Browser.java:85)
    Thank you very much in advance
    Alex
    begin 666 OrgUnitTypeRoleOid.java
    M"B\J*@H@*B!#;W!Y<FEG:'0@*&,I(#(P,# L(%!E86-E(%1E8VAN;VQO9WDL
    M($EN8RX*("H@)$%U=&AO<B0*("H@)%)E=FES:6]N)"P@)$1A=&4D"B J("1.
    M;TME>7=O<F1S) H@*B\*"G!A8VMA9V4@<&5A8V5T96-H+F=A;RYU<V]R9RYJ
    M9&\N;VED.PH*:6UP;W)T('!E86-E=&5C:"YG86\N=7-O<F<N:F1O+D]R9U5N
    M:714>7!E.PII;7!O<G0@<&5A8V5T96-H+F=A;RYU<V]R9RYJ9&\N4F]L93L*
    M"G!U8FQI8R!C;&%S<R!/<F=5;FET5'EP95)O;&5/:60@:6UP;&5M96YT<R!J
    M879A+FEO+E-E<FEA;&EZ86)L92!["B @<'5B;&EC($]R9U5N:714>7!E(&]R
    M9U5N:714>7!E.PH@('!U8FQI8R!2;VQE(')O;&4["@H@('!U8FQI8R!/<F=5
    M;FET5'EP95)O;&5/:60H*2![?0H*("!P=6)L:6,@3W)G56YI=%1Y<&52;VQE
    M3VED*$]R9U5N:714>7!E(&]R9U5N:714>7!E+"!2;VQE(')O;&4I('L*(" @
    M('1H:7,N;W)G56YI=%1Y<&4@/2!O<F=5;FET5'EP93L*(" @('1H:7,N<F]L
    M92 ](')O;&4["B @?0H*("!P=6)L:6,@:6YT(&AA<VA#;V1E*"D@>PH@(" @
    M<F5T=7)N(&]R9U5N:714>7!E+FAA<VA#;V1E*"D["B @?0H*("!P=6)L:6,@
    M8F]O;&5A;B!E<75A;',H3V)J96-T(&\I('L*(" @(&EF("AO(#T]('1H:7,I
    M('L*(" @(" @<F5T=7)N('1R=64["B @("!](&5L<V4@:68@*&\@:6YS=&%N
    M8V5O9B!/<F=5;FET5'EP95)O;&5/:60I('L*(" @(" @3W)G56YI=%1Y<&52
    M;VQE3VED(&]T:&5R(#T@*$]R9U5N:714>7!E4F]L94]I9"EO.PH@(" @("!R
    M971U<FX@*&]R9U5N:714>7!E+F5Q=6%L<RAO=&AE<BYO<F=5;FET5'EP92D@
    M)B8@<F]L92YE<75A;',H;W1H97(N<F]L92DI.PH@(" @?2!E;'-E('L*(" @
    =(" @<F5T=7)N(&9A;'-E.PH@(" @?0H@('T*?0H`
    `
    end
    begin 666 OrgUnitTypeRole.java
    M+RHJ"B J($-O<'ER:6=H=" H8RD@,C P,"P@4&5A8V4@5&5C:&YO;&]G>2P@
    M26YC+@H@*B D075T:&]R.B!2;WET;6%N+"!!;&5X) H@*B D4F5V:7-I;VXZ
    M(#0D+" D1&%[email protected]\R-R\R,# Q(#<Z,C0Z,S8@4$TD"B J("1.;TME>7=O
    M<F1S) H@*B\*"B\J"DE.4T525"!)3E1/(&]R9U]U;FET7W1Y<&5?<F]L92 H
    M;W)G7W5N:71?='EP95]R;VQE7VED+"!O<F=?=6YI=%]T>7!E+"!R;VQE7VED
    M+"!H;VYO<FEF:6,I(%9!3%5%4R H,2P@,3$X+" Q+" G4V5N+B<I.PI)3E-%
    M4E0@24Y43R!O<F=?=6YI=%]T>7!E7W)O;&4@*&]R9U]U;FET7W1Y<&5?<F]L
    M95]I9"P@;W)G7W5N:71?='EP92P@<F]L95]I9"P@:&]N;W)I9FEC*2!604Q5
    M15,@*#(L(#(Q."P@,BP@)U)E<"XG*3L*"FEN<V5R="!I;G1O(&]R9U]U;FET
    M7W1Y<&5?<F]L92 H;W)G7W5N:71?='EP95]R;VQE7VED+"!O<F=?=6YI=%]T
    M>7!E+"!R;VQE7VED+"!H;VYO<FEF:6,I"G-E;&5C="!R;W=N=6T@*R Q,"P@
    M="XJ("!F<F]M("@*<V5L96-T(&]R9U]U;FET7W1Y<&4L(')O;&5?:60L("=3
    M96XN)PIF<F]M(&]R9U]U;FET7W1Y<&4L(')O;&4*=VAE<F4@;W)G7W5N:71?
    M='EP92!B971W965N(#$S,"!A;F0@,3@P("!A;F0@(')O;&5?:60@/B R"G5N
    M:6]N"G-E;&5C="!O<F=?=6YI=%]T>7!E+"!R;VQE7VED+" G4F5P+B<*9G)O
    M;2!O<F=?=6YI=%]T>7!E+"!R;VQE"G=H97)E(&]R9U]U;FET7W1Y<&4@8F5T
    M=V5E;B R,S @86YD(#(X," @86YD("!R;VQE7VED(#X@,@IU;FEO;@IS96QE
    M8W0@;W)G7W5N:71?='EP92P@<F]L95]I9"P@;G5L; IF<F]M(&]R9U]U;FET
    M7W1Y<&4L(')O;&4*=VAE<F4@;W)G7W5N:71?='EP92!B971W965N(#,S,"!A
    M;F0@,S@P("!A;F0@(')O;&5?:60@/B R"BD@= H*24Y315)4($E.5$\@;W)G
    M7W5N:71?='EP95]R;VQE("AO<F=?=6YI=%]T>7!E7W)O;&5?:60L(&]R9U]U
    M;FET7W1Y<&4L(')O;&5?:60L(&AO;F]R:69I8RD@5D%,5453("@Q+" Q,3 L
    M(#$L("=396YA=&]R)RD["DE.4T525"!)3E1/(&]R9U]U;FET7W1Y<&5?<F]L
    M92 H;W)G7W5N:71?='EP95]R;VQE7VED+"!O<F=?=6YI=%]T>7!E+"!R;VQE
    M7VED+"!H;VYO<FEF:6,I(%9!3%5%4R H,BP@,3$P+" R+" G4V5N871O<B<I
    M.PI)3E-%4E0@24Y43R!O<F=?=6YI=%]T>7!E7W)O;&4@*&]R9U]U;FET7W1Y
    M<&5?<F]L95]I9"P@;W)G7W5N:71?='EP92P@<F]L95]I9"P@:&]N;W)I9FEC
    M*2!604Q515,@*#,L(#$Q,"P@,RP@)U-E;F%T;W(G*3L*24Y315)4($E.5$\@
    M;W)G7W5N:71?='EP95]R;VQE("AO<F=?=6YI=%]T>7!E7W)O;&5?:60L(&]R
    M9U]U;FET7W1Y<&4L(')O;&5?:60L(&AO;F]R:69I8RD@5D%,5453("@T+" Q
    M,3 L(#0L("=396YA=&]R)RD["DE.4T525"!)3E1/(&]R9U]U;FET7W1Y<&5?
    M<F]L92 H;W)G7W5N:71?='EP95]R;VQE7VED+"!O<F=?=6YI=%]T>7!E+"!R
    M;VQE7VED+"!H;VYO<FEF:6,I(%9!3%5%4R H-2P@,34P+" Q+" G4V5N871O
    M<B<I.PI)3E-%4E0@24Y43R!O<F=?=6YI=%]T>7!E7W)O;&4@*&]R9U]U;FET
    M7W1Y<&5?<F]L95]I9"P@;W)G7W5N:71?='EP92P@<F]L95]I9"P@:&]N;W)I
    M9FEC*2!604Q515,@*#8L(#$U,"P@,BP@)U-E;F%T;W(G*3L*24Y315)4($E.
    M5$\@;W)G7W5N:71?='EP95]R;VQE("AO<F=?=6YI=%]T>7!E7W)O;&5?:60L
    M(&]R9U]U;FET7W1Y<&4L(')O;&5?:60L(&AO;F]R:69I8RD@5D%,5453("@W
    M+" Q-3 L(#,L("=396YA=&]R)RD["DE.4T525"!)3E1/(&]R9U]U;FET7W1Y
    M<&5?<F]L92 H;W)G7W5N:71?='EP95]R;VQE7VED+"!O<F=?=6YI=%]T>7!E
    M+"!R;VQE7VED+"!H;VYO<FEF:6,I(%9!3%5%4R H."P@,34P+" T+" G4V5N
    M871O<B<I.PI)3E-%4E0@24Y43R!O<F=?=6YI=%]T>7!E7W)O;&4@*&]R9U]U
    M;FET7W1Y<&5?<F]L95]I9"P@;W)G7W5N:71?='EP92P@<F]L95]I9"P@:&]N
    M;W)I9FEC*2!604Q515,@*#DL(#$P.2P@,RP@)U-E;F%T;W(G*3L*"DE.4T52
    M5"!)3E1/(&]R9U]U;FET7W1Y<&5?<F]L92 H;W)G7W5N:71?='EP95]R;VQE
    M7VED+"!O<F=?=6YI=%]T>7!E+"!R;VQE7VED+"!H;VYO<FEF:6,I(%9!3%5%
    M4R H,3$L(#(Q,"P@,2P@)U)E<')E<V5N=&%T:79E)RD["DE.4T525"!)3E1/
    M(&]R9U]U;FET7W1Y<&5?<F]L92 H;W)G7W5N:71?='EP95]R;VQE7VED+"!O
    M<F=?=6YI=%]T>7!E+"!R;VQE7VED+"!H;VYO<FEF:6,I(%9!3%5%4R H,3(L
    M(#(Q,"P@,BP@)U)E<')E<V5N=&%T:79E)RD["DE.4T525"!)3E1/(&]R9U]U
    M;FET7W1Y<&5?<F]L92 H;W)G7W5N:71?='EP95]R;VQE7VED+"!O<F=?=6YI
    M=%]T>7!E+"!R;VQE7VED+"!H;VYO<FEF:6,I(%9!3%5%4R H,3,L(#(Q,"P@
    M,RP@)U)E<')E<V5N=&%T:79E)RD["DE.4T525"!)3E1/(&]R9U]U;FET7W1Y
    M<&5?<F]L92 H;W)G7W5N:71?='EP95]R;VQE7VED+"!O<F=?=6YI=%]T>7!E
    M+"!R;VQE7VED+"!H;VYO<FEF:6,I(%9!3%5%4R H,30L(#(Q,"P@-"P@)U)E
    M<')E<V5N=&%T:79E)RD["DE.4T525"!)3E1/(&]R9U]U;FET7W1Y<&5?<F]L
    M92 H;W)G7W5N:71?='EP95]R;VQE7VED+"!O<F=?=6YI=%]T>7!E+"!R;VQE
    M7VED+"!H;VYO<FEF:6,I(%9!3%5%4R H,34L(#(U,"P@,2P@)U)E<')E<V5N
    M=&%T:79E)RD["DE.4T525"!)3E1/(&]R9U]U;FET7W1Y<&5?<F]L92 H;W)G
    M7W5N:71?='EP95]R;VQE7VED+"!O<F=?=6YI=%]T>7!E+"!R;VQE7VED+"!H
    M;VYO<FEF:6,I(%9!3%5%4R H,38L(#(U,"P@,BP@)U)E<')E<V5N=&%T:79E
    M)RD["DE.4T525"!)3E1/(&]R9U]U;FET7W1Y<&5?<F]L92 H;W)G7W5N:71?
    M='EP95]R;VQE7VED+"!O<F=?=6YI=%]T>7!E+"!R;VQE7VED+"!H;VYO<FEF
    M:6,I(%9!3%5%4R H,3<L(#(U,"P@,RP@)U)E<')E<V5N=&%T:79E)RD["DE.
    M4T525"!)3E1/(&]R9U]U;FET7W1Y<&5?<F]L92 H;W)G7W5N:71?='EP95]R
    M;VQE7VED+"!O<F=?=6YI=%]T>7!E+"!R;VQE7VED+"!H;VYO<FEF:6,I(%9!
    M3%5%4R H,3@L(#(U,"P@-"P@)U)E<')E<V5N=&%T:79E)RD["DE.4T525"!)
    M3E1/(&]R9U]U;FET7W1Y<&5?<F]L92 H;W)G7W5N:71?='EP95]R;VQE7VED
    M+"!O<F=?=6YI=%]T>7!E+"!R;VQE7VED+"!H;VYO<FEF:6,I(%9!3%5%4R H
    M,3DL(#(P.2P@,RP@)U)E<')E<V5N=&%T:79E)RD["BHO"@H*<&%C:V%G92!P
    M96%C971E8V@N9V%O+G5S;W)G+FID;SL*"G!U8FQI8R!C;&%S<R!/<F=5;FET
    M5'EP95)O;&4@>PH@('!R:79A=&4@3W)G56YI=%1Y<&4@;W)G56YI=%1Y<&4[
    M"B @<')I=F%T92!2;VQE(')O;&4["B @<')I=F%T92!3=')I;F<@:&]N;W)I
    M9FEC.PH*("!P=6)L:6,@3W)G56YI=%1Y<&52;VQE*"D@>WT*"B @<'5B;&EC
    M($]R9U5N:714>7!E(&=E=$]R9U5N:714>7!E*"D@>PH@(" @<F5T=7)N(&]R
    M9U5N:714>7!E.PH@('T*"B @<'5B;&EC('9O:60@<V5T3W)G56YI=%1Y<&4H
    M3W)G56YI=%1Y<&4@;W)G56YI=%1Y<&4I('L*(" @('1H:7,N;W)G56YI=%1Y
    M<&4@/2!O<F=5;FET5'EP93L*("!]"@H@('!U8FQI8R!V;VED('-E=%)O;&4H
    M4F]L92!R;VQE*2!["B @("!T:&ES+G)O;&4@/2!R;VQE.PH@('T*"B @<'5B
    M;&EC(%)O;&4@9V5T4F]L92@I('L*(" @(')E='5R;B!R;VQE.PH@('T*"B @
    M<'5B;&EC('9O:60@<V5T2&]N;W)I9FEC*%-T<FEN9R!H;VYO<FEF:6,I('L*
    M(" @('1H:7,N:&]N;W)I9FEC(#T@:&]N;W)I9FEC.PH@('T*"B @<'5B;&EC
    M(%-T<FEN9R!G971(;VYO<FEF:6,H*2!["B @("!R971U<FX@:&]N;W)I9FEC
    M.PH@('T*"B @<'5B;&EC(&EN="!H87-H0V]D92@I('L*(" @(')E='5R;B!O
    M<F=5;FET5'EP92YH87-H0V][email protected]@('T*"B @<'5B;&EC(&)O;VQE86X@
    M97%U86QS*$]B:F5C="!O*2!["B @("!I9B H;R ]/2!T:&ES*2!["B @(" @
    M(')E='5R;B!T<G5E.PH@(" @?2!E;'-E(&EF("AO(&EN<W1A;F-E;V8@3W)G
    M56YI=%1Y<&52;VQE*2!["B @(" @($]R9U5N:714>7!E4F]L92!O=&AE<B ]
    M("A/<F=5;FET5'EP95)O;&4I;SL*(" @(" @<F5T=7)N("AO<F=5;FET5'EP
    M92YE<75A;',H;W1H97(N;W)G56YI=%1Y<&4I("8F(')O;&4N97%U86QS*&]T
    M:&5R+G)O;&4I*3L*(" @('T@96QS92!["B @(" @(')E='5R;B!F86QS93L*
    -(" @('T*("!]"@I]"@``
    `
    end

    Hello,
    I am having problem with application identity in case of multi-colum PK when
    componente of OID class are themselve percistent classes.
    OrgUnitTypeRole class identified by OrgUnitType and Role which are both
    persistent classes.
    Attached are OrgUnitTypeRole and OrgUnitTypeRoleOid classes
    I am getting following exception:
    javax.jdo.JDOFatalDataStoreException: The registered class
    "peacetech.gao.usorg.jdo.OrgUnitTypeRole" is not compiled or not longer
    exists. If the class has been deleted, unregister it before proceeding.
    NestedThrowables:
    java.lang.VerifyError: (class: peacetech/gao/usorg/jdo/OrgUnitTypeRole,
    method: jdoCopyKeyFieldsToObjectId signature:
    (Ljavax/jdo/PersistenceCapable$ObjectIdFieldManager;Ljava/lang/Object;)V)
    Bad type in putfield/putstatic
    at com.solarmetric.kodo.impl.jdbc.schema.DB.getPersistentTypes(DB.java:270)
    at
    com.solarmetric.kodo.impl.jdbc.JDBCPersistenceManagerFactory.setup(JDBCPersi
    stenceManagerFactory.java:170)
    at
    com.solarmetric.kodo.runtime.PersistenceManagerFactoryImpl.privateSetup(Pers
    istenceManagerFactoryImpl.java:501)
    at
    com.solarmetric.kodo.runtime.PersistenceManagerFactoryImpl.getPersistenceMan
    ager(PersistenceManagerFactoryImpl.java:61)
    at
    com.solarmetric.kodo.runtime.PersistenceManagerFactoryImpl.getPersistenceMan
    ager(PersistenceManagerFactoryImpl.java:50)
    at
    peacetech.gao.usorg.jdo.JDOFactory.getPersistenceManager(JDOFactory.java:70)
    at peacetech.gao.usorg.gui.BrowserFrame.<init>(BrowserFrame.java:158)
    at peacetech.gao.usorg.gui.Browser.<init>(Browser.java:23)
    at peacetech.gao.usorg.gui.Browser.main(Browser.java:85)
    Thank you very much in advance
    Alex
    begin 666 OrgUnitTypeRoleOid.java
    M"B\J*@H@*B!#;W!Y<FEG:'0@*&,I(#(P,# L(%!E86-E(%1E8VAN;VQO9WDL
    M($EN8RX*("H@)$%U=&AO<B0*("H@)%)E=FES:6]N)"P@)$1A=&4D"B J("1.
    M;TME>7=O<F1S) H@*B\*"G!A8VMA9V4@<&5A8V5T96-H+F=A;RYU<V]R9RYJ
    M9&\N;VED.PH*:6UP;W)T('!E86-E=&5C:"YG86\N=7-O<F<N:F1O+D]R9U5N
    M:714>7!E.PII;7!O<G0@<&5A8V5T96-H+F=A;RYU<V]R9RYJ9&\N4F]L93L*
    M"G!U8FQI8R!C;&%S<R!/<F=5;FET5'EP95)O;&5/:60@:6UP;&5M96YT<R!J
    M879A+FEO+E-E<FEA;&EZ86)L92!["B @<'5B;&EC($]R9U5N:714>7!E(&]R
    M9U5N:714>7!E.PH@('!U8FQI8R!2;VQE(')O;&4["@H@('!U8FQI8R!/<F=5
    M;FET5'EP95)O;&5/:60H*2![?0H*("!P=6)L:6,@3W)G56YI=%1Y<&52;VQE
    M3VED*$]R9U5N:714>7!E(&]R9U5N:714>7!E+"!2;VQE(')O;&4I('L*(" @
    M('1H:7,N;W)G56YI=%1Y<&4@/2!O<F=5;FET5'EP93L*(" @('1H:7,N<F]L
    M92 ](')O;&4["B @?0H*("!P=6)L:6,@:6YT(&AA<VA#;V1E*"D@>PH@(" @
    M<F5T=7)N(&]R9U5N:714>7!E+FAA<VA#;V1E*"D["B @?0H*("!P=6)L:6,@
    M8F]O;&5A;B!E<75A;',H3V)J96-T(&\I('L*(" @(&EF("AO(#T]('1H:7,I
    M('L*(" @(" @<F5T=7)N('1R=64["B @("!](&5L<V4@:68@*&\@:6YS=&%N
    M8V5O9B!/<F=5;FET5'EP95)O;&5/:60I('L*(" @(" @3W)G56YI=%1Y<&52
    M;VQE3VED(&]T:&5R(#T@*$]R9U5N:714>7!E4F]L94]I9"EO.PH@(" @("!R
    M971U<FX@*&]R9U5N:714>7!E+F5Q=6%L<RAO=&AE<BYO<F=5;FET5'EP92D@
    M)B8@<F]L92YE<75A;',H;W1H97(N<F]L92DI.PH@(" @?2!E;'-E('L*(" @
    =(" @<F5T=7)N(&9A;'-E.PH@(" @?0H@('T*?0H`
    `
    end
    begin 666 OrgUnitTypeRole.java
    M+RHJ"B J($-O<'ER:6=H=" H8RD@,C P,"P@4&5A8V4@5&5C:&YO;&]G>2P@
    M26YC+@H@*B D075T:&]R.B!2;WET;6%N+"!!;&5X) H@*B D4F5V:7-I;VXZ
    M(#0D+" D1&%[email protected]\R-R\R,# Q(#<Z,C0Z,S8@4$TD"B J("1.;TME>7=O
    M<F1S) H@*B\*"B\J"DE.4T525"!)3E1/(&]R9U]U;FET7W1Y<&5?<F]L92 H
    M;W)G7W5N:71?='EP95]R;VQE7VED+"!O<F=?=6YI=%]T>7!E+"!R;VQE7VED
    M+"!H;VYO<FEF:6,I(%9!3%5%4R H,2P@,3$X+" Q+" G4V5N+B<I.PI)3E-%
    M4E0@24Y43R!O<F=?=6YI=%]T>7!E7W)O;&4@*&]R9U]U;FET7W1Y<&5?<F]L
    M95]I9"P@;W)G7W5N:71?='EP92P@<F]L95]I9"P@:&]N;W)I9FEC*2!604Q5
    M15,@*#(L(#(Q."P@,BP@)U)E<"XG*3L*"FEN<V5R="!I;G1O(&]R9U]U;FET
    M7W1Y<&5?<F]L92 H;W)G7W5N:71?='EP95]R;VQE7VED+"!O<F=?=6YI=%]T
    M>7!E+"!R;VQE7VED+"!H;VYO<FEF:6,I"G-E;&5C="!R;W=N=6T@*R Q,"P@
    M="XJ("!F<F]M("@*<V5L96-T(&]R9U]U;FET7W1Y<&4L(')O;&5?:60L("=3
    M96XN)PIF<F]M(&]R9U]U;FET7W1Y<&4L(')O;&4*=VAE<F4@;W)G7W5N:71?
    M='EP92!B971W965N(#$S,"!A;F0@,3@P("!A;F0@(')O;&5?:60@/B R"G5N
    M:6]N"G-E;&5C="!O<F=?=6YI=%]T>7!E+"!R;VQE7VED+" G4F5P+B<*9G)O
    M;2!O<F=?=6YI=%]T>7!E+"!R;VQE"G=H97)E(&]R9U]U;FET7W1Y<&4@8F5T
    M=V5E;B R,S @86YD(#(X," @86YD("!R;VQE7VED(#X@,@IU;FEO;@IS96QE
    M8W0@;W)G7W5N:71?='EP92P@<F]L95]I9"P@;G5L; IF<F]M(&]R9U]U;FET
    M7W1Y<&4L(')O;&4*=VAE<F4@;W)G7W5N:71?='EP92!B971W965N(#,S,"!A
    M;F0@,S@P("!A;F0@(')O;&5?:60@/B R"BD@= H*24Y315)4($E.5$\@;W)G
    M7W5N:71?='EP95]R;VQE("AO<F=?=6YI=%]T>7!E7W)O;&5?:60L(&]R9U]U
    M;FET7W1Y<&4L(')O;&5?:60L(&AO;F]R:69I8RD@5D%,5453("@Q+" Q,3 L
    M(#$L("=396YA=&]R)RD["DE.4T525"!)3E1/(&]R9U]U;FET7W1Y<&5?<F]L
    M92 H;W)G7W5N:71?='EP95]R;VQE7VED+"!O<F=?=6YI=%]T>7!E+"!R;VQE
    M7VED+"!H;VYO<FEF:6,I(%9!3%5%4R H,BP@,3$P+" R+" G4V5N871O<B<I
    M.PI)3E-%4E0@24Y43R!O<F=?=6YI=%]T>7!E7W)O;&4@*&]R9U]U;FET7W1Y
    M<&5?<F]L95]I9"P@;W)G7W5N:71?='EP92P@<F]L95]I9"P@:&]N;W)I9FEC
    M*2!604Q515,@*#,L(#$Q,"P@,RP@)U-E;F%T;W(G*3L*24Y315)4($E.5$\@
    M;W)G7W5N:71?='EP95]R;VQE("AO<F=?=6YI=%]T>7!E7W)O;&5?:60L(&]R
    M9U]U;FET7W1Y<&4L(')O;&5?:60L(&AO;F]R:69I8RD@5D%,5453("@T+" Q
    M,3 L(#0L("=396YA=&]R)RD["DE.4T525"!)3E1/(&]R9U]U;FET7W1Y<&5?
    M<F]L92 H;W)G7W5N:71?='EP95]R;VQE7VED+"!O<F=?=6YI=%]T>7!E+"!R
    M;VQE7VED+"!H;VYO<FEF:6,I(%9!3%5%4R H-2P@,34P+" Q+" G4V5N871O
    M<B<I.PI)3E-%4E0@24Y43R!O<F=?=6YI=%]T>7!E7W)O;&4@*&]R9U]U;FET
    M7W1Y<&5?<F]L95]I9"P@;W)G7W5N:71?='EP92P@<F]L95]I9"P@:&]N;W)I
    M9FEC*2!604Q515,@*#8L(#$U,"P@,BP@)U-E;F%T;W(G*3L*24Y315)4($E.
    M5$\@;W)G7W5N:71?='EP95]R;VQE("AO<F=?=6YI=%]T>7!E7W)O;&5?:60L
    M(&]R9U]U;FET7W1Y<&4L(')O;&5?:60L(&AO;F]R:69I8RD@5D%,5453("@W
    M+" Q-3 L(#,L("=396YA=&]R)RD["DE.4T525"!)3E1/(&]R9U]U;FET7W1Y
    M<&5?<F]L92 H;W)G7W5N:71?='EP95]R;VQE7VED+"!O<F=?=6YI=%]T>7!E
    M+"!R;VQE7VED+"!H;VYO<FEF:6,I(%9!3%5%4R H."P@,34P+" T+" G4V5N
    M871O<B<I.PI)3E-%4E0@24Y43R!O<F=?=6YI=%]T>7!E7W)O;&4@*&]R9U]U
    M;FET7W1Y<&5?<F]L95]I9"P@;W)G7W5N:71?='EP92P@<F]L95]I9"P@:&]N
    M;W)I9FEC*2!604Q515,@*#DL(#$P.2P@,RP@)U-E;F%T;W(G*3L*"DE.4T52
    M5"!)3E1/(&]R9U]U;FET7W1Y<&5?<F]L92 H;W)G7W5N:71?='EP95]R;VQE
    M7VED+"!O<F=?=6YI=%]T>7!E+"!R;VQE7VED+"!H;VYO<FEF:6,I(%9!3%5%
    M4R H,3$L(#(Q,"P@,2P@)U)E<')E<V5N=&%T:79E)RD["DE.4T525"!)3E1/
    M(&]R9U]U;FET7W1Y<&5?<F]L92 H;W)G7W5N:71?='EP95]R;VQE7VED+"!O
    M<F=?=6YI=%]T>7!E+"!R;VQE7VED+"!H;VYO<FEF:6,I(%9!3%5%4R H,3(L
    M(#(Q,"P@,BP@)U)E<')E<V5N=&%T:79E)RD["DE.4T525"!)3E1/(&]R9U]U
    M;FET7W1Y<&5?<F]L92 H;W)G7W5N:71?='EP95]R;VQE7VED+"!O<F=?=6YI
    M=%]T>7!E+"!R;VQE7VED+"!H;VYO<FEF:6,I(%9!3%5%4R H,3,L(#(Q,"P@
    M,RP@)U)E<')E<V5N=&%T:79E)RD["DE.4T525"!)3E1/(&]R9U]U;FET7W1Y
    M<&5?<F]L92 H;W)G7W5N:71?='EP95]R;VQE7VED+"!O<F=?=6YI=%]T>7!E
    M+"!R;VQE7VED+"!H;VYO<FEF:6,I(%9!3%5%4R H,30L(#(Q,"P@-"P@)U)E
    M<')E<V5N=&%T:79E)RD["DE.4T525"!)3E1/(&]R9U]U;FET7W1Y<&5?<F]L
    M92 H;W)G7W5N:71?='EP95]R;VQE7VED+"!O<F=?=6YI=%]T>7!E+"!R;VQE
    M7VED+"!H;VYO<FEF:6,I(%9!3%5%4R H,34L(#(U,"P@,2P@)U)E<')E<V5N
    M=&%T:79E)RD["DE.4T525"!)3E1/(&]R9U]U;FET7W1Y<&5?<F]L92 H;W)G
    M7W5N:71?='EP95]R;VQE7VED+"!O<F=?=6YI=%]T>7!E+"!R;VQE7VED+"!H
    M;VYO<FEF:6,I(%9!3%5%4R H,38L(#(U,"P@,BP@)U)E<')E<V5N=&%T:79E
    M)RD["DE.4T525"!)3E1/(&]R9U]U;FET7W1Y<&5?<F]L92 H;W)G7W5N:71?
    M='EP95]R;VQE7VED+"!O<F=?=6YI=%]T>7!E+"!R;VQE7VED+"!H;VYO<FEF
    M:6,I(%9!3%5%4R H,3<L(#(U,"P@,RP@)U)E<')E<V5N=&%T:79E)RD["DE.
    M4T525"!)3E1/(&]R9U]U;FET7W1Y<&5?<F]L92 H;W)G7W5N:71?='EP95]R
    M;VQE7VED+"!O<F=?=6YI=%]T>7!E+"!R;VQE7VED+"!H;VYO<FEF:6,I(%9!
    M3%5%4R H,3@L(#(U,"P@-"P@)U)E<')E<V5N=&%T:79E)RD["DE.4T525"!)
    M3E1/(&]R9U]U;FET7W1Y<&5?<F]L92 H;W)G7W5N:71?='EP95]R;VQE7VED
    M+"!O<F=?=6YI=%]T>7!E+"!R;VQE7VED+"!H;VYO<FEF:6,I(%9!3%5%4R H
    M,3DL(#(P.2P@,RP@)U)E<')E<V5N=&%T:79E)RD["BHO"@H*<&%C:V%G92!P
    M96%C971E8V@N9V%O+G5S;W)G+FID;SL*"G!U8FQI8R!C;&%S<R!/<F=5;FET
    M5'EP95)O;&4@>PH@('!R:79A=&4@3W)G56YI=%1Y<&4@;W)G56YI=%1Y<&4[
    M"B @<')I=F%T92!2;VQE(')O;&4["B @<')I=F%T92!3=')I;F<@:&]N;W)I
    M9FEC.PH*("!P=6)L:6,@3W)G56YI=%1Y<&52;VQE*"D@>WT*"B @<'5B;&EC
    M($]R9U5N:714>7!E(&=E=$]R9U5N:714>7!E*"D@>PH@(" @<F5T=7)N(&]R
    M9U5N:714>7!E.PH@('T*"B @<'5B;&EC('9O:60@<V5T3W)G56YI=%1Y<&4H
    M3W)G56YI=%1Y<&4@;W)G56YI=%1Y<&4I('L*(" @('1H:7,N;W)G56YI=%1Y
    M<&4@/2!O<F=5;FET5'EP93L*("!]"@H@('!U8FQI8R!V;VED('-E=%)O;&4H
    M4F]L92!R;VQE*2!["B @("!T:&ES+G)O;&4@/2!R;VQE.PH@('T*"B @<'5B
    M;&EC(%)O;&4@9V5T4F]L92@I('L*(" @(')E='5R;B!R;VQE.PH@('T*"B @
    M<'5B;&EC('9O:60@<V5T2&]N;W)I9FEC*%-T<FEN9R!H;VYO<FEF:6,I('L*
    M(" @('1H:7,N:&]N;W)I9FEC(#T@:&]N;W)I9FEC.PH@('T*"B @<'5B;&EC
    M(%-T<FEN9R!G971(;VYO<FEF:6,H*2!["B @("!R971U<FX@:&]N;W)I9FEC
    M.PH@('T*"B @<'5B;&EC(&EN="!H87-H0V]D92@I('L*(" @(')E='5R;B!O
    M<F=5;FET5'EP92YH87-H0V][email protected]@('T*"B @<'5B;&EC(&)O;VQE86X@
    M97%U86QS*$]B:F5C="!O*2!["B @("!I9B H;R ]/2!T:&ES*2!["B @(" @
    M(')E='5R;B!T<G5E.PH@(" @?2!E;'-E(&EF("AO(&EN<W1A;F-E;V8@3W)G
    M56YI=%1Y<&52;VQE*2!["B @(" @($]R9U5N:714>7!E4F]L92!O=&AE<B ]
    M("A/<F=5;FET5'EP95)O;&4I;SL*(" @(" @<F5T=7)N("AO<F=5;FET5'EP
    M92YE<75A;',H;W1H97(N;W)G56YI=%1Y<&4I("8F(')O;&4N97%U86QS*&]T
    M:&5R+G)O;&4I*3L*(" @('T@96QS92!["B @(" @(')E='5R;B!F86QS93L*
    -(" @('T*("!]"@I]"@``
    `
    end

  • Change_connection does not update entire info about application

    The procedure change_connection does not update the entire info of the about application window. When I change my connection the connect string in the about application window still shows the old connection string.
    I added the line g_connect_string := get_application_property(CONNECT_STRING);
    to the procedure change_connection between the lines
    -- Reset user preference settings for new user connection
    qms$user_prefs.init;
    and the lines:
    -- The menu must be replaced because the new user might have other security privileges
    Now the connect string will change in the about window.

    Mark,
    This has been implemented in Headstart PATCH6530_for_6i and PATCH6530_for_9i.
    Regards,
    Marcel

  • Utilizing auto-increment/identity fields for primary key with "application" identity

    Is it possible to utilise an auto-increment (identity in MS SQL Server)
    field for the primary key field when using "application" identity?

    To the best of my knowledge, you cannot use auto-increment. Due to the
    differences in the way that identities are generated at the datastore
    (upon insert) vs. JDO (upon makePersistent), this feature of SQLServer is
    not supported yet.
    However, we do provide a variety of other ways of generating identity
    which may provide a closer fit to what you want, and
    our users may have some experience in solving your problem.
    On Tue, 28 Jan 2003 09:56:08 +0000, Sean Ryan wrote:
    Is it possible to utilise an auto-increment (identity in MS SQL Server)
    field for the primary key field when using "application" identity?--
    Stephen Kim
    [email protected]
    SolarMetric, Inc.
    http://www.solarmetric.com

  • Application identity tool error

    I'm getting the following error when I run the appidtool from ant (kodo
    3.0.1):
    kodo.util.FatalUserException: Type "class
    com.correlat.intranet.news.NewsItem" does not have metadata, does not use
    application identity, or inherits the identity class from its superclass.
    My jdo definitions are:
    <package name="com.correlat.intranet.news">
    <class name="NewsItem"
    persistence-capable-superclass="net.sundog.news.NewsItem"
    identity-type="application">
    <extension vendor-name="kodo" key="jdbc-class-map"
    value="flat"/>
    <field name="postedBy">
    <extension vendor-name="kodo" key="jdbc-field-map"
    value="one-one">
    <extension vendor-name="kodo" key="column.id_i"
    value="postedby_person_id_i"/>
    </extension>
    </field>
    <field name="lastUpdatedBy">
    <extension vendor-name="kodo" key="jdbc-field-map"
    value="one-one">
    <extension vendor-name="kodo" key="column.id_i"
    value="lastupdatedby_person_id_i"/>
    </extension>
    </field>
    <field name="relevantOrganizations">
    <collection
    element-type="com.correlat.intranet.directory.Organization"/>
    <extension vendor-name="kodo" key="jdbc-field-map"
    value="many-many">
    <extension vendor-name="kodo" key="element-column.id_i"
    value="organization_id_i"/>
    <extension vendor-name="kodo" key="table"
    value="t_map_newsitem_organization"/>
    <extension vendor-name="kodo" key="ref-column.id_i"
    value="newsitem_id_i"/>
    </extension>
    </field>
    </class>
    AND
    <package name="net.sundog.news">
    <class name="NewsItem" objectid-class="NewsItemId">
    <extension vendor-name="kodo" key="jdbc-class-map" value="base">
    <extension vendor-name="kodo" key="table" value="t_news"/>
    <extension vendor-name="kodo" key="pk-column" value="id_i"/>
    </extension>
    <extension vendor-name="kodo" key="jdbc-version-ind"
    value="version-number">
    <extension vendor-name="kodo" key="column"
    value="rowversion_i"/>
    </extension>
    <extension vendor-name="kodo" key="jdbc-class-ind"
    value="in-class-name">
    <extension vendor-name="kodo" key="column"
    value="classtype_id_vc"/>
    </extension>
    <field name="id" primary-key="true">
    <extension vendor-name="kodo" key="jdbc-field-map"
    value="value">
    <extension vendor-name="kodo" key="column"
    value="id_i"/>
    </extension>
    </field>
    <field name="title">
    <extension vendor-name="kodo" key="jdbc-field-map"
    value="value">
    <extension vendor-name="kodo" key="column"
    value="title_vc"/>
    </extension>
    </field>
    <field name="summary">
    <extension vendor-name="kodo" key="jdbc-size" value="-1"/>
    <extension vendor-name="kodo" key="jdbc-field-map"
    value="clob">
    <extension vendor-name="kodo" key="column"
    value="summary_clob"/>
    </extension>
    </field>
    <field name="text">
    <extension vendor-name="kodo" key="jdbc-size" value="-1"/>
    <extension vendor-name="kodo" key="jdbc-field-map"
    value="clob">
    <extension vendor-name="kodo" key="column"
    value="text_clob"/>
    </extension>
    </field>
    <field name="newsDate">
    <extension vendor-name="kodo" key="jdbc-field-map"
    value="value">
    <extension vendor-name="kodo" key="column"
    value="newsdate_dt"/>
    </extension>
    </field>
    <field name="lastUpdated">
    <extension vendor-name="kodo" key="jdbc-field-map"
    value="value">
    <extension vendor-name="kodo" key="column"
    value="lastupdated_dt"/>
    </extension>
    </field>
    <field name="relatedUrl">
    <extension vendor-name="kodo" key="jdbc-field-map"
    value="value">
    <extension vendor-name="kodo" key="column"
    value="relatedurl_vc"/>
    </extension>
    </field>
    <field name="active">
    <extension vendor-name="kodo" key="jdbc-field-map"
    value="value">
    <extension vendor-name="kodo" key="column"
    value="active_b"/>
    </extension>
    </field>
    <field name="image">
    <extension vendor-name="kodo" key="jdbc-field-map"
    value="blob">
    <extension vendor-name="kodo" key="column"
    value="image_blob"/>
    </extension>
    </field>
    <field name="imageMimeType">
    <extension vendor-name="kodo" key="jdbc-field-map"
    value="value">
    <extension vendor-name="kodo" key="column"
    value="imagemimetype_vc"/>
    </extension>
    </field>
    </class>
    My ant task is:
    <taskdef name="appidtool" classname="kodo.ant.ApplicationIdToolTask">
    <classpath path="${base.classpath}"/>
    </taskdef>
    <appidtool ignoreErrors="false" directory="${src.dir}/java">
    <fileset dir="src/java">
    <include name="**/*.jdo"/>
    </fileset>
    <codeformat spaceBeforeParen="true" braceOnSameLine="false"/>
    <config licenseKey="${kodo.license}"/>
    </appidtool>
    Nathan

    I don't think using ant's filesets would work because I have one .jdo file
    per package. There are multiple class definitions in each .jdo file, some
    of which inherit while others don't.
    Nathan
    "Marc Prud'hommeaux" <[email protected]> wrote in message
    news:[email protected]..
    Nathan-
    Is there any other errors that won't be listed now that actually are
    errors?
    >
    There are other possible error conditions that will be ignored if
    ignoreErrors is true.
    We recommend keeping ignoreErrors to false, and only running the tool on
    those classes for which you really do want the appid classes to be
    generated. ant's fileset directives are pretty flexible; there are
    many different ways you can configure it to include only those files you
    want.
    In article <bu8re6$u2e$[email protected]>, Nathan Voxland wrote:
    That solves it, thanks.
    Is there any other errors that won't be listed now that actually are
    errors?
    >>
    Nathan
    "Abe White" <[email protected]> wrote in message
    news:bu76si$nct$[email protected]..
    Running the task on a class that doens't use application identity or
    inherits its application identity class (and therefore doesn't need one
    gernated) is considered an error. By setting the task's "ignoreError"
    property to "false", you're telling it to throw an exception when it
    encounters such a case.
    Marc Prud'hommeaux [email protected]
    SolarMetric Inc. http://www.solarmetric.com

  • Why think about Application virtualization before going to VDI or desktop virtualization

    Hi Team,
    I am new in ThinApp technology.
    My question is that "Why think about Application virtualization before going to VDI or desktop virtualization."
    Please help to clear my question.
    Thanks
    Yogesh

    With Application Virtualization you'll make any transition easier. While the term isn't really clear to understand for anyone new to the technology I usually find it easier to explain by calling it Application Isolation/Redirection, which actually gives a clearer idea of what it is doing. What ThinApp (or any other Application Virtualization) does is catch calls the operating system does to the registry and files and reroute that to a single contained environment. With Application Virtualization you can deploy your applications without touching the other applications or operating system. The nice thing about ThinApp is that it's clientless so there is no need for any backend or client. The runtime is contained in the ThinApp, which is why you can even use multiple versions at the same time.
    With VDI you try to consolidate resources and not buy 1000's of desktops every few years, because physical desktop migrations are a pain. You also try to make managing them easier because basically you'll only have to manage a single desktop (master image). But to get there you will have to do a migration, having Application Virtualization in place will make it an easy project instead of a hard one.
    The second reason why you would want to do it is because with ThinApp there is no need to actually deploy the application to the VDI, they can be shown on the machine but actually run from a share or even dynamically mapped with virtual disks.

  • Auto populating application identity primary key?

    I'm sure this has been asked before but I couldn't find anything by many
    searches.
    I have some classes with int or long as their primary key. I prefer using
    application identity so the application can have direct access to the
    primary key.
    I would like to have the primary key automatically populated by Kodo from
    a sequence such that I can do:
    MyObject test = new MyObject();
    pm.makePersistent(test);
    assertTrue(test.getId() > 0);
    Is this possible in Kodo? I haven't been able to find it. I know I can do
    it with datastore identity but I would really like to avoid that.
    Thank you,
    Joel Shellman

    Hi Joel,
    before you may consider to use auto-incremented appid PK's let me tell
    some things from my own experience.
    If you have auto-incremented primary key fields you have consider that
    their values will be finally set when you commit the transaction.
    So if you access the pk fields during a transaction their values will be
    NOT set until you call explicitly KodoPersistenceManager.flush() or commit
    the transaction.
    If you use applications identity and if you have a compound PK's which one
    its fields presents a foreign key from a relation, you have to consider
    this behavior and maybe run into problems.
    I had many problems with it and finally build a wrapper around the
    sequence generator instance from KodoHelper.getSequenceHelper ().
    Greetings,
    Matthias
    Stephen Kim wrote:
    Joel, there is not, unless you are using auto-incrementing primary keys.
    You can do it in application code by calling
    KodoHelper.getSequenceHelper (). Note that you should not have this in
    an empty constructor as it may interfere with integration with JDO's
    registration system.
    Joel Shellman wrote:
    I'm sure this has been asked before but I couldn't find anything by many
    searches.
    I have some classes with int or long as their primary key. I prefer using
    application identity so the application can have direct access to the
    primary key.
    I would like to have the primary key automatically populated by Kodo from
    a sequence such that I can do:
    MyObject test = new MyObject();
    pm.makePersistent(test);
    assertTrue(test.getId() > 0);
    Is this possible in Kodo? I haven't been able to find it. I know I can do
    it with datastore identity but I would really like to avoid that.
    Thank you,
    Joel Shellman
    Steve Kim
    [email protected]
    SolarMetric Inc.
    http://www.solarmetric.com

  • Application Identity

    I am wondering how you can set an application identity? When you publish and create an ADOBE AIR application from FC, where do you set the identity so that when you sent the application to someone who wants to install it, can see it is from you and not anybody else. I thought I would find this in the publish settings but it is no where to find. Any ideas?
    Thanks in advance!

    Hi Hisham,
    You would need to set this in Flash Builder.   Import the fxp into Fb and the 'sign' the application as you export it to an AIR release build.  There is some documentation here:
    http://help.adobe.com/en_US/flashbuilder/using/WS6f97d7caa66ef6eb1e63e3d11b6c4d0d21-7f99.h tml
    Tanya

  • Application Identity classes

    Does the application identity class used for each persistent class
    (hierarchy) have to be a unique class?
    If so, can you please state why.
    Thanks,
    Paula

    Yes, each hierarchy has to use its own application identity class. Otherwise, what are we to do in the PersistenceManager.getObjectById (Object oid, ...) method? Query the tables used by all the various inheritance hierachies the for the matching PK, and then do an additional query to load the data once we find the right table? Obviously it could be done, but it would be very inefficient. Also, if separate inheritance hierachies (and therefore separate tables) are allowed to have to same app id class, what's to stop two object of different hierachies from having the same primary key values, and therefore the exact same application identity object? Again, there are various inefficient ways around this problem, too, but all things considered, it seems much simpler to just require each hierachy to have its own identity class.

  • Questions about application server architecture

    Hello guys,
    I have few questions about application server architecture�
    I have a task to build a server application which will do the following: Clients (special java clients) will connect to it and send some data for further processing on server side. Chunks of data will be relatively small but they will take a lot of time for processing (it is ok that it will be quite slow).
    Also server will run some sort of �database� where all clients� working data will be stored. So, in case a client loses its data he/she is always able to download it from the server.
    For me it seems, like server will consist of the following components:
    1. �Reception�. This part will be responsible for all client-communication procedures.
    2. �Data storage�. This part will simply store all clients� data and provide some API interface for clients through �reception� to manage it (add/get/delete and so on).
    3. �Processor�. Some sort of dummy-sophisticated module. It will take some input data from �data storage� when it receives order for this and process it. �Processor� will have two states: �busy� which means �processor� processing some data and �available� which means �processor� ready to process new data.
    4. �Manager�. This part will always check �data storage� for new data and �processor� for availability. When �processor� and new data are available �manager� will make an order for �processor� to take new data from �data storage� and process it.
    So, my question is the following: Which technology and approaches I should use to realize my plan?
    I think that I can make �reception� as a Session Bean, but I don�t know yet, what are the best for the rest, for example �manager� and �processor�. I was thinking about writing my own application server (and I can do it), but I would like to learn j2ee technologies, so I think it is a perfect chance for me (I read a lot about j2ee before I wrote this post, but all examples have only �account�-�bill�-�money transfer� I think it is quite far away from reality or I am doing something wrong ;-)!
    p.s. I am thinking about using JBoss as an Application Server. I tested it and wrote some tests. They work and run fast enough, so I like it. Moreover it has module architecture.
    Please, give me some advises and tips!
    Thank you in advance!

    1. �Reception�. This part will be responsible for all
    client-communication procedures.Session bean with remote interface.
    2. �Data storage�. This part will simply store all
    clients� data and provide some API interface for
    clients through �reception� to manage it
    (add/get/delete and so on).Session bean that will use entity beans or hibernate to work with persistant data.
    3. �Processor�. Some sort of dummy-sophisticated
    module.Use a message driven bean. Make Reception to enqueue a message when new data is available for processing. Processor will process the data and store the resut in database using Data Storage session bean.
    4. �Manager�. This part will always check �data
    storage� for new data and �processor� for
    availability. When �processor� and new data are
    available �manager� will make an order for
    �processor� to take new data from �data storage� and
    process it.It's redundand component, because application server will manage messages and processors.

  • Several questions about Application Security

    Hello,
    I have several questions about Application Security and perhaps I need a few tips...
    I have a lot of users in a few groups which have access to my application! And the different groups should have only access to their pages.
    In my application I use trees to navigate through the application.
    So my idea is that i display different trees for the different user groups and restrict the user to access the URL....so the user can only see and contact "their" pages.
    I know how to create the logic behind the trees, but how can I create the restricted URL access...
    The "No URL Access" in the Session State Protection can not be used, because I use a lot of links in reports and HTML regions.
    Is there another way to solve that?
    But I am unsure if that is a "good" solution for my problem!
    What do you think about that?
    Am I going to do that too complicated?
    Could that be done by authentication or authorization?
    (By the way, I do not understand the differences between authentication and authorization. Can anyone help?)
    I would be glad for any reply!
    Thank you,
    Tim

    Hey Arie and Scott,
    thank you for your quick reply!
    Now I understand the context around authorization and authentication...
    I try the Access Control List and I think that is a very nice feature! Really good!
    But now I am wondering, how I can create more privileges?
    So that I have a few "end-user-roles" and then I can choose who have access to a page and who not!
    Does anybody know how to do that?
    Thank you,
    Tim

  • How to verify client application identity?

    Hello,
    I would appreciate some guidance from senior security people in this forum. Here is what I am trying to do:
    1- I am responsible for partial development of a TECHNICAL FRAMEWORK, which will end-up packaged as a signed jar file: i.e., "signedFramework.jar".
    2- The purpose of the framework is, of course, to be used by different BUSINESS APPLICATIONS.
    3- These business applications are typically packaged as war files, and embed the above "signedFramework.jar" with them, allowing them to make direct calls to some framework operations/classes (so, no networking involved).
    3- Each business application has its own certificate that will be used to sign its own package.
    ==> Given the situation above, can anyone help (high-level description) with the following:
    - Whenever framework sensitive operations get called, I would like to be able to verify the calling application identity: To do that, I was thinking of retrieving the certificate from the calling application. By comparing info from the retrieved certificate with a "trusted keystore" , I'd be able to authenticate the client application and allow or deny the operation.
    Is this common practice? Any hint?
    Thanks for your help and time,
    MD

    or... from DAA.
    1. client sends U to server
    2. server creates a nonce n and encrypts with the public key of the client
    3. client decrypts n and computes hash(U||n) and sends to server
    4. server computes hash(U||n) and compares it with the value received from the client
    This may take place over a public network iff U can be made public.
         C                         S
         |---------U-------->|
         |                         |
         |<------{n}_PK------|
         |                         |
         |----hash(U||n)---->|
         |          ____________|________________
         |          | Server computes hash(U||n) |
         |       | and compares it to value   |
         |          | supplied by client         |
        |       |----------------------------|
         |                         |

  • Cannot change Application Identity service to automatic.

    I am running Windows Technical Preview for Enterprise and when I try to change the startup Application Identity service to automatic, I always get access
    is denied and I cannot change the Application Identity service to startup automatically.
    Here is the screenshot of my error:

    Are you facing this problem with all services or only this one?
    Are you able to change it to different state?
    Make sure report this issue using Feedback App too.
    PS: You could directly add screenshot in this post by clicking on image icon and add the image.

  • Doc for Application Identity?

    All,
    I notice that in the release notes, application identity is supported as of beta 2.20, and I know
    that several people here are using the functionality, but in looking though the documentation, I
    didn't find a section on application identity. Would someone point me in the right direction?
    TIA
    David

    David Ezzio <[email protected]> writes:
    All,
    I notice that in the release notes, application identity is supported as of beta 2.20, and I know
    that several people here are using the functionality, but in looking though the documentation, I
    didn't find a section on application identity. Would someone point me in the right direction?David,
    What problems in particular are you having? There is really only one
    aspect of Kodo JDO's application identity system that requires special
    documentation. The mechanism for providing a custom schema mapping is
    slightly different when using application identity than when using data
    store identity. See docs/existing-schema.html for details.
    Aside from this situation, you should be able to just specify the
    'identity-type' and 'objectid-class' attributes of the 'class' element
    to 'application'. For example, the XML below could be a valid
    package.jdo entry for the tutorial.Animal class if it had two fields
    called 'pk1' and 'pk2' which constituted the application-managed object
    id. Note that you must create your own object id class for Animal
    (identified as 'AnimalID' in the example). You may want to use
    com.solarmetric.kodo.tools.appid.ApplicationIDTool to auto-generate a
    template Java file.
    <?xml version="1.0"?>
    <jdo>
         <package name="tutorial">
              <class name="Animal" identity-type="application"
    objectid-class="AnimalID" >
                   <field name="pk1" primary-key="true"/>
                   <field name="pk2" primary-key="true"/>
    </class>
         </package>
    </jdo>
    Good luck, and let me know if you need further assistance.
    -Patrick
    Patrick Linskey [email protected]
    SolarMetric Inc. http://www.solarmetric.com

  • Important conceptual question about Application Module, Maximum Pool Size

    Hello everyone,
    We have a critical question about the Application Module default settings (taking the DB connections from a DataSource)
    I know that on the Web it is generally suggested that each request must end with either a commit or rollback when executing PL/SQL blocks "directly" on the DB without the framework BC/ViewObject/Entity service intervention.
    Now, for some reasons, we started to develop our applications with thinking that each Web Session would reference exactly one DB session (opened by any instance taken from the AM pool) for the whole duration of the session, so that the changes made by each Web session to its DB session would never interfere with the changes made by "other" Web Sessions to "other" DB sessions .
    In other words, because of that convincement we often implemented sort of "transactions" that open and close (with either commit or rollback) each DB session not in/after a single HTTP request, but during many HTTP Requests.
    As a concrete example think of this scenario:
    1. the user presses the "Insert" button. An HTTP request is fired. The action listener is executed and ends up with inserting rows in a table via a PL SQL block (not via the ViewObjects API).
    2. no commit or rollback after the above PL/SQL block is done yet.
    3. finally the user presses a "Commit" or "Rollback" button, firing the call to the appropriate AM methos.
    Those three requests consist of what I called "transaction".
    From the documentation it's clear that there is no guarantee that the couple AM istance + DB session is the same during all the requests.
    This means that, during step 2, it's possible that another user might reference the same "pending" AM/DbSession for his needs and "steal" somehow the work done via PL/SQL after step 1. (This happens because sessions taken by the pool are always rolled back by default.)
    Now my question is:
    Suppose we set the "Maximum Pool Size" parameter to very a great number (always inferior to the maximum number of concurrent users):
    Is there any guarantee that all the requests will be isolated in that case?
    I hope the problem is clear.
    Let me know if you want more details.

    Thanks for the answers.
    If I am right, from all your answers about resource avaiability, this means that even supposing the framework is able to always give us the same AM instance back from the AM pool (by following the session-affinity criterias), there is, however, no "connection affinity" with the connections from the DataSource. This means that the "same AM instance" might take the "a new DB connection", if necessary, from the connection pool of the DataSource. If that happens, that could give us the same problems as taking "a new AM instance" (that is, not following session-affinity) from the beginning, since each time an a new connection is taken (either via a new AM instance or via the same AM instance plus a new DB connection), the corresponding DB session is rolle back by default, clearing all the pending transactions we might have performed before with direct PL/SQL calls bypassing the AM services during the life cycle of our application, so that the new HTTP request will have a clean DB session to start to work with.

Maybe you are looking for

  • Where are the image units in Motion 5.05??

    What happened to the image units in Motion 5.05? I used to have it in 5.04 but where is it? I'm using Mountain Lion. Please Help, ~AJ

  • Distinct count that ignores NULL

    I am trying to do a distinct count of a field but I do not want any NULL rows to be counted.  Any ideas on how to accomplish this? I have created a formula field that returns a date from a different field if certain criteria are met.  If not, it retu

  • Add new tables to metadata

    Hello, I have added a new table in the mapping just to store some new data generated from a count function. Can you tell me how can I add this table to metadata? I added my source tables, which are under ODBC module, to metadata using the metadata wi

  • [SOLVED]assigning "special" shell [variable] to awk, got problem

    $ VAR='AB' ; echo "$VAR" | awk -v foo="$VAR" '{gsub(foo,"Z");print}' # [1] Z $ VAR='[AB]' ; echo "$VAR" | awk -v foo="$VAR" '{gsub(foo,"Z");print}' # [2] [ZZ] $ VAR='[AB' ; echo "$VAR" | awk -v foo="$VAR" '{gsub(foo,"Z");print}' # [3] awk: (FILENAME=

  • User exit for delivery tab of PO line item?

    Hi guys, i want to impose checking on under delivery tolerance field present under delivery tab of PO line items. Is there any user exit to do this?? Appropriate solution would be rewarded/ Regards, GURU