Accessing Technote 10398
I thought it might be prudent to share with you the response I received from Sun
regarding the inability to access technote 10398 (Forté logger flags). I was
able to access it 3+ weeks ago, and fortunately kept a hard-copy. But, how are
we supposed to do our job effectively and expediently if we do not have
(complete) access to this resource?
I thought the technotes were completely open to the Forté development
community.... wrong.
-jeff
---------------------- Forwarded by Jeff Bennett/SEH on 09/11/2000 09:02 AM
Forte Support <supportforte.com> on 09/08/2000 10:05:17 AM
To: Jeff Bennett/SEHsehamerica.com
cc:
Subject: Re: Accessing Technote 10398
Fax to:
Hello Jeff,
Were you at one point able to access this technote? You know why -- it's
because this technote is marked for employee viewing only and not available
for customer viewing. If you need further assistance or need to look at
this technote, what you would need to do is log a call with us and then a
tech support specialist will give you a call back. Sometimes, the
technotes are marked unviewable to customers because they might need
further explanation. Let me know if you need to log a case.
Thanks!
At 09:57 AM 9/8/00 -0700, you wrote:
I am no longer able to access technote 10398 (forte logger flags)... why?
-jeff~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
Sun® microsystems
Jeannie Lee
Phone: (510) 451-5400
Fax (510) 869-2010
Email: jeannie.leesun.com
Forte Tools Response Coordinator
I think y'all are overreacting. There are log flags that are detailed in
Technote 10398 that can cause serious implications if used improperly. I
think Forte/Sun just wants to make sure that people don't make mistakes that
cost them valuable time.
As a Forte Consultant for many years, I have seen a good number of people
misuse information that was not completely understood. In some cases, this
caused excessive downtime for production applications. The only time I ever
saw Technote 10398 being provided to a customer was when they were utilizing
Forte Consulting, or when a Technical Support Engineer was heavily involved.
I was extremely surprised to learn that it was available to non-employees via
the website - that sounds as if someone may have inadvertantly marked it as
customer-viewable (incorrectly, obviously) in Sun's internal systems.
Again, I think you're overreacting. I am sure that this isn't a case of Sun
thinking anyone is "stupid." It's a matter of providing the support that
people need to properly utilize the tools available.
-Katie
mark joyce wrote:
read: Sometimes, the technotes are marked unviewable
to customers because they might need further
explanation. Let me know if you need to log a case.
in other words, you are TOO STUPID to use FORTE logger
flags, although they have been widely distributed and
used for years by FORTE users.
i can't believe it either. i don't know what i would
have done for the last 5 years without using the FORTE
flags. such a wealth of good output!
what an excuse! "they might need further explanation"
.. if i had to log every problem with FORTE, instead
of resolving them myself through the information
obtained by using flags, i would have lost my job a
long time ago.
mark.
--- Jeff Bennett <jeff_bennettsehamerica.com> wrote:
I thought it might be prudent to share with you the
response I received from Sun
regarding the inability to access technote 10398
(Forté logger flags). I was
able to access it 3+ weeks ago, and fortunately kept
a hard-copy. But, how are
we supposed to do our job effectively and
expediently if we do not have
(complete) access to this resource?
I thought the technotes were completely open to the
Forté development
community.... wrong.
-jeff
---------------------- Forwarded by Jeff Bennett/SEH
on 09/11/2000 09:02 AM
Forte Support <supportforte.com> on 09/08/2000
10:05:17 AM
To: Jeff Bennett/SEHsehamerica.com
cc:
Subject: Re: Accessing Technote 10398
Fax to:
Hello Jeff,
Were you at one point able to access this technote?
You know why -- it's
because this technote is marked for employee viewing
only and not available
for customer viewing. If you need further
assistance or need to look at
this technote, what you would need to do is log a
call with us and then a
tech support specialist will give you a call back.
Sometimes, the
technotes are marked unviewable to customers because
they might need
further explanation. Let me know if you need to log
a case.
Thanks!
At 09:57 AM 9/8/00 -0700, you wrote:
I am no longer able to access technote 10398 (fortelogger flags)... why?
-jeff~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
Sun® microsystems
Jeannie Lee
Phone: (510) 451-5400
Fax (510) 869-2010
Email: jeannie.leesun.com
Forte Tools Response Coordinator
For the archives, go to:
http://lists.xpedior.com/forte-users and use
the login: forte and the password: archive. To
unsubscribe, send in a new
email the word: 'Unsubscribe' to:
forte-users-requestlists.xpedior.com
http://mail.yahoo.com/
For the archives, go to: http://lists.xpedior.com/forte-users and use
the login: forte and the password: archive. To unsubscribe, send in a new
email the word: 'Unsubscribe' to: forte-users-requestlists.xpedior.com
Similar Messages
-
Re: (forte-users) Accessing Technote 10398
Ketie,
let's see, I have been using FORTE since November of
1994. since the beginning those flags have been common
knowledge within the FORTE community and widely
disseminated.
the FORTE flags have been invaluable to me and HAVE
NEVER caused any downtime. sure, there are a few
wildcards in there that can cause trouble, but to
throw out the baby with the bathwater is ridiculous.
what would life be without trc:lo:25? to trace
exceptions.
or trc:os:1:1 and trc:os:5:5 to tune memory
consumption?
Should i have to call a consultant or FORTE tech
support to do the deep dive on exceptions or tune my
applications? I think not.
Overreaction? No.
Mark.
--- Katie Tierney <katiethetierneys.com> wrote:
I think y'all are overreacting. There are log flags
that are detailed in
Technote 10398 that can cause serious implications
if used improperly. I
think Forte/Sun just wants to make sure that people
don't make mistakes that
cost them valuable time.
As a Forte Consultant for many years, I have seen a
good number of people
misuse information that was not completely
understood. In some cases, this
caused excessive downtime for production
applications. The only time I ever
saw Technote 10398 being provided to a customer was
when they were utilizing
Forte Consulting, or when a Technical Support
Engineer was heavily involved.
I was extremely surprised to learn that it was
available to non-employees via
the website - that sounds as if someone may have
inadvertantly marked it as
customer-viewable (incorrectly, obviously) in Sun's
internal systems.
Again, I think you're overreacting. I am sure that
this isn't a case of Sun
thinking anyone is "stupid." It's a matter of
providing the support that
people need to properly utilize the tools available.
-Katie
mark joyce wrote:
read: Sometimes, the technotes are markedunviewable
to customers because they might need further
explanation. Let me know if you need to log acase.
in other words, you are TOO STUPID to use FORTElogger
flags, although they have been widely distributedand
used for years by FORTE users.
i can't believe it either. i don't know what iwould
have done for the last 5 years without using theFORTE
flags. such a wealth of good output!
what an excuse! "they might need furtherexplanation"
.. if i had to log every problem with FORTE,instead
of resolving them myself through the information
obtained by using flags, i would have lost my joba
long time ago.
mark.
--- Jeff Bennett <jeff_bennettsehamerica.com>wrote:
I thought it might be prudent to share with youthe
response I received from Sun
regarding the inability to access technote 10398
(Forté logger flags). I was
able to access it 3+ weeks ago, and fortunatelykept
a hard-copy. But, how are
we supposed to do our job effectively and
expediently if we do not have
(complete) access to this resource?
I thought the technotes were completely open tothe
Forté development
community.... wrong.
-jeff
---------------------- Forwarded by JeffBennett/SEH
on 09/11/2000 09:02 AM
Forte Support <supportforte.com> on 09/08/2000
10:05:17 AM
To: Jeff Bennett/SEHsehamerica.com
cc:
Subject: Re: Accessing Technote 10398
Fax to:
Hello Jeff,
Were you at one point able to access thistechnote?
You know why -- it's
because this technote is marked for employeeviewing
only and not available
for customer viewing. If you need further
assistance or need to look at
this technote, what you would need to do is loga
call with us and then a
tech support specialist will give you a callback.
Sometimes, the
technotes are marked unviewable to customersbecause
they might need
further explanation. Let me know if you need tolog
a case.
Thanks!
At 09:57 AM 9/8/00 -0700, you wrote:
I am no longer able to access technote 10398
(forte
logger flags)... why?
-jeff~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
Sun® microsystems
Jeannie Lee
Phone: (510) 451-5400
Fax (510) 869-2010
Email: jeannie.leesun.com
Forte Tools Response Coordinator
For the archives, go to:
http://lists.xpedior.com/forte-users and use
the login: forte and the password: archive. To
unsubscribe, send in a new
email the word: 'Unsubscribe' to:
forte-users-requestlists.xpedior.com
http://mail.yahoo.com/
For the archives, go to:
http://lists.xpedior.com/forte-users and use
the login: forte and the password: archive. Tounsubscribe, send in a new
email the word: 'Unsubscribe' to:forte-users-requestlists.xpedior.com
http://mail.yahoo.com/Ketie,
let's see, I have been using FORTE since November of
1994. since the beginning those flags have been common
knowledge within the FORTE community and widely
disseminated.
the FORTE flags have been invaluable to me and HAVE
NEVER caused any downtime. sure, there are a few
wildcards in there that can cause trouble, but to
throw out the baby with the bathwater is ridiculous.
what would life be without trc:lo:25? to trace
exceptions.
or trc:os:1:1 and trc:os:5:5 to tune memory
consumption?
Should i have to call a consultant or FORTE tech
support to do the deep dive on exceptions or tune my
applications? I think not.
Overreaction? No.
Mark.
--- Katie Tierney <katiethetierneys.com> wrote:
I think y'all are overreacting. There are log flags
that are detailed in
Technote 10398 that can cause serious implications
if used improperly. I
think Forte/Sun just wants to make sure that people
don't make mistakes that
cost them valuable time.
As a Forte Consultant for many years, I have seen a
good number of people
misuse information that was not completely
understood. In some cases, this
caused excessive downtime for production
applications. The only time I ever
saw Technote 10398 being provided to a customer was
when they were utilizing
Forte Consulting, or when a Technical Support
Engineer was heavily involved.
I was extremely surprised to learn that it was
available to non-employees via
the website - that sounds as if someone may have
inadvertantly marked it as
customer-viewable (incorrectly, obviously) in Sun's
internal systems.
Again, I think you're overreacting. I am sure that
this isn't a case of Sun
thinking anyone is "stupid." It's a matter of
providing the support that
people need to properly utilize the tools available.
-Katie
mark joyce wrote:
read: Sometimes, the technotes are markedunviewable
to customers because they might need further
explanation. Let me know if you need to log acase.
in other words, you are TOO STUPID to use FORTElogger
flags, although they have been widely distributedand
used for years by FORTE users.
i can't believe it either. i don't know what iwould
have done for the last 5 years without using theFORTE
flags. such a wealth of good output!
what an excuse! "they might need furtherexplanation"
.. if i had to log every problem with FORTE,instead
of resolving them myself through the information
obtained by using flags, i would have lost my joba
long time ago.
mark.
--- Jeff Bennett <jeff_bennettsehamerica.com>wrote:
I thought it might be prudent to share with youthe
response I received from Sun
regarding the inability to access technote 10398
(Forté logger flags). I was
able to access it 3+ weeks ago, and fortunatelykept
a hard-copy. But, how are
we supposed to do our job effectively and
expediently if we do not have
(complete) access to this resource?
I thought the technotes were completely open tothe
Forté development
community.... wrong.
-jeff
---------------------- Forwarded by JeffBennett/SEH
on 09/11/2000 09:02 AM
Forte Support <supportforte.com> on 09/08/2000
10:05:17 AM
To: Jeff Bennett/SEHsehamerica.com
cc:
Subject: Re: Accessing Technote 10398
Fax to:
Hello Jeff,
Were you at one point able to access thistechnote?
You know why -- it's
because this technote is marked for employeeviewing
only and not available
for customer viewing. If you need further
assistance or need to look at
this technote, what you would need to do is loga
call with us and then a
tech support specialist will give you a callback.
Sometimes, the
technotes are marked unviewable to customersbecause
they might need
further explanation. Let me know if you need tolog
a case.
Thanks!
At 09:57 AM 9/8/00 -0700, you wrote:
I am no longer able to access technote 10398
(forte
logger flags)... why?
-jeff~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
Sun® microsystems
Jeannie Lee
Phone: (510) 451-5400
Fax (510) 869-2010
Email: jeannie.leesun.com
Forte Tools Response Coordinator
For the archives, go to:
http://lists.xpedior.com/forte-users and use
the login: forte and the password: archive. To
unsubscribe, send in a new
email the word: 'Unsubscribe' to:
forte-users-requestlists.xpedior.com
http://mail.yahoo.com/
For the archives, go to:
http://lists.xpedior.com/forte-users and use
the login: forte and the password: archive. Tounsubscribe, send in a new
email the word: 'Unsubscribe' to:forte-users-requestlists.xpedior.com
http://mail.yahoo.com/ -
RE: log trace on Service Object
I haven't tried myself; but got a copy from someone of part of technote
10398 which says (the minimum you need is:)
trc:in:1 Prints out information about interpreter state object.
10 - Print method entry/exit
trc:in:2 Trace the interpretation of method invocations and exception
handling
2 - Prints entry/exit and exceptions
trc:in:51:1 Traces method entry/exit by task
trc:in:54:1 Traces method entry/exit by application
Try it.
-----Original Message-----
From: Eric Abécassis [mailto:[email protected]]
Sent: Tuesday, April 13, 1999 10:24 AM
To: Forte User List
Subject: log trace on Service Object
Hi Everybody,
I would like to set log trace on each call (method entry and exit) on a
Service Object, but I didn't find any log flag which helps me.
Does someone have any ideas on how to do that ?
Thank you for your help !
Eric Abécassis <[email protected]>
Senior Architect
Sema Group DTS
To unsubscribe, email '[email protected]' with
'unsubscribe forte-users' as the body of the message.
Searchable thread archive <URL:http://pinehurst.sageit.com/listarchive/>Hi Eric,
You can find on http://perso.club-internet.fr/dnguyen/ a little tool called CodeAdd which adds Entry and Return trace. I fact, you
can use it to add any kind of code at the beginning and the end of your methods.
It also allows you to add a pre-formated comments header in you code.
In a further version, It may be possible to replace a code sequence from your methods. For instance, you may add a trace class and
change a task.Part.LogMgr.Putline by a call to your own class, or need to suppress some lines.
Just be carefull to use the tool on a local backupo of your repository : CodeAdd updates your methods directly in the repository.
Hope this helps,
Daniel Nguyen
Freelance Forte Consultant
Url : http://perso.club-internet.fr/dnguyen/
Eric =?iso-8859-1?Q?Ab=E9cassis?= a écrit:
Hi Everybody,
I would like to set log trace on each call (method entry and exit) on a
Service Object, but I didn't find any log flag which helps me.
Does someone have any ideas on how to do that ?
Thank you for your help !
Eric Abécassis <[email protected]>
Senior Architect
Sema Group DTS
Eric Abécassis <[email protected]>
Senior Architect
Sema Group DTS
Eric Abécassis
Senior Architect <[email protected]>
Sema Group DTS Courrier HTML
les Algorithmes - Pythagore A route des Lucioles, BP 279;Sophia Antipolis;;06905;France Tél. cellulaire: +33 (0) 6 62 36 68 83
Télécopie: +33 (0) 4 93 95 xx xx
Bureau: +33 (0) 4 93 95 46 50
Informations supplémentaires:
le nom ABECASSIS
Prénom Eric
Version 2.1-
To unsubscribe, email '[email protected]' with
'unsubscribe forte-users' as the body of the message.
Searchable thread archive <URL:http://pinehurst.sageit.com/listarchive/> -
Re: (forte-users) FW: (forte-users) Serialisation
Here is a Word formatted copy of the Tech Note
"Slabbert, Etienne" <etiennemds.co.za> 02/17/00 04:10AM >>>Hi,
I cannot get hold of Tech Note 10398..... can anyone email me a copy?
Tx
Etienne
-----Original Message-----
From: Klerk, Theo de [SMTP:Theo.de.Klerkcompaq.com]
Sent: Wednesday, February 09, 2000 4:26 PM
To: 'Jason de Cean'; 'Forte Users'
Subject: RE: (forte-users) Serialisation
There are a number of flags that will show you some of the required
information in a log file (not within the application itself). Technote
10398 has many more flags listed for a variety of obscure, useful, not so
useful and exotic information:
trc:cm:*:4 and *:8 - show packet serialisation, open, closes between
partition communication
trc:do:*:2 - proxy creation/deletion, exception events
trc:do:*:5 - individual message tracing between proxies
trc:do:*:8 - serialisation information
Theo
For the archives, go to: http://lists.xpedior.com/forte-users and use
the login: forte and the password: archive. To unsubscribe, send in a new
email the word: 'Unsubscribe' to: forte-users-requestlists.xpedior.com
For the archives, go to: http://lists.xpedior.com/forte-users and use
the login: forte and the password: archive. To unsubscribe, send in a new
email the word: 'Unsubscribe' to: forte-users-requestlists.xpedior.comHere is a Word formatted copy of the Tech Note
"Slabbert, Etienne" <etiennemds.co.za> 02/17/00 04:10AM >>>Hi,
I cannot get hold of Tech Note 10398..... can anyone email me a copy?
Tx
Etienne
-----Original Message-----
From: Klerk, Theo de [SMTP:Theo.de.Klerkcompaq.com]
Sent: Wednesday, February 09, 2000 4:26 PM
To: 'Jason de Cean'; 'Forte Users'
Subject: RE: (forte-users) Serialisation
There are a number of flags that will show you some of the required
information in a log file (not within the application itself). Technote
10398 has many more flags listed for a variety of obscure, useful, not so
useful and exotic information:
trc:cm:*:4 and *:8 - show packet serialisation, open, closes between
partition communication
trc:do:*:2 - proxy creation/deletion, exception events
trc:do:*:5 - individual message tracing between proxies
trc:do:*:8 - serialisation information
Theo
For the archives, go to: http://lists.xpedior.com/forte-users and use
the login: forte and the password: archive. To unsubscribe, send in a new
email the word: 'Unsubscribe' to: forte-users-requestlists.xpedior.com
For the archives, go to: http://lists.xpedior.com/forte-users and use
the login: forte and the password: archive. To unsubscribe, send in a new
email the word: 'Unsubscribe' to: forte-users-requestlists.xpedior.com -
RE: (forte-users) Serialisation
Singh,
Any message sent across partition boundaries is serialized. This includes
method invokations, events and exceptions. The signature of the message
itself is serialized, as well as the values of all parameters/attributes.
Serializing a scalar value requires less overhead then serialising an
object, however, the difference isn't as big as you might think. Objects
have more attributes then just the value you're interested in and these
attributes are serialised as well. Each object is an instance of a class and
each class has a UUID, which is added to the serialized stream as well.
However, methods are NOT serialised. What happens is this. Forte serializes
an object into a stream containing only the values of the attributes
(including nested attributes). This stream is given a header which sais of
which class this object is an instance (the UUID is used for that). The
receiving partition reads the serialized stream, finds the definition of the
class (defined by UUID) in its own code, creates an instance of this class
and fills the data out of the serialized stream into this new object.
You can imagine what might happen if there is a mismatch between the
class-definitions in both partitions. You either get
serialization-deserialization errors, or the receiving partition complains
that it doesn't even know the UUID of the received streamed object, or you
get no errors at all and just have an object that displays different
behaviour, depending what partition it's in.
If there are no problems, then the main issue is the
serializing-deserializing overhead. Note that the receiving partition has to
instantiate a new object for every serialized object it receives and will
therefore execute all code in the Init() method. This overhead is not
required for scalar types, for which Forte only needs to reserve a small
amount of memory space on the stack.
Any call to a database is also a message sent across partitions and is
therefore serialized. However, one partition is a Forte partition and the
other one isn't. Therefore, Forte's internal serialization mechanism isn't
used. Forte serializes the SQL-query into a format understood by the
database (which is different for every vendor). Forte then receives a stream
back which has a different format for every different database type. This
stream is deserialized and written to attributes that Forte has reserved to
contain the data. Whether these are scalar, datavalues or domains only
impacts performance inside the Forte partition. It has no effect on the
communication with the database.
Pascal Rottier
Atos Origin Nederland (BAS/West End User Computing)
Tel. +31 (0)10-2661223
Fax. +31 (0)10-2661199
E-mail: Pascal.Rottiernl.origin-it.com
++++++++++++++++++++++++++++
Philip Morris (Afd. MIS)
Tel. +31 (0)164-295149
Fax. +31 (0)164-294444
E-mail: Rottier.Pascalpmintl.ch
-----Original Message-----
From: Singh [mailto:fortelistyahoo.com]
Sent: Thursday, February 22, 2001 3:30 AM
To: forte-userslists.xpedior.com
Subject: (forte-users) Serialisation
Hello All
I have a question that has been bugging me for some
time.
We all know that it is better to use scalar data
types, as opposed to objects, when passing data across
a network.
The reason, if I understand correctly, is that when
you send an object across a network, the whole object
(properties, attributes and methods) is deserialised
into zero's and one's before being sent across and
then serialised back into the object when it gets to
the other side. This would take longer for an object
since for a scalar value, just the value is
deserialised and serialised.
But when you are writing to a database from the tier
before the database to the database, does it matter
what type you use. The reason for saying this is that
the values are serialised before they go across and
then deserialised when they get to the base, in other
words, they are sent as zero's and one's. For a scalar
- just the value is sent across but for an object -
does just the value go across or the complete object.
If just the value of the object goes across, then it
doesn't really matter whether a scalar or object is
sent across.
Am I correct in this assumption.
Thanks in advance for your help.
Regards,
Singh
For the archives, go to: http://lists.xpedior.com/forte-users and use
the login: forte and the password: archive. To unsubscribe, send in a new
email the word: 'Unsubscribe' to: forte-users-requestlists.xpedior.comHi,
I cannot get hold of Tech Note 10398..... can anyone email me a copy?
Tx
Etienne
-----Original Message-----
From: Klerk, Theo de [SMTP:Theo.de.Klerkcompaq.com]
Sent: Wednesday, February 09, 2000 4:26 PM
To: 'Jason de Cean'; 'Forte Users'
Subject: RE: (forte-users) Serialisation
There are a number of flags that will show you some of the required
information in a log file (not within the application itself). Technote
10398 has many more flags listed for a variety of obscure, useful, not so
useful and exotic information:
trc:cm:*:4 and *:8 - show packet serialisation, open, closes between
partition communication
trc:do:*:2 - proxy creation/deletion, exception events
trc:do:*:5 - individual message tracing between proxies
trc:do:*:8 - serialisation information
Theo
For the archives, go to: http://lists.xpedior.com/forte-users and use
the login: forte and the password: archive. To unsubscribe, send in a new
email the word: 'Unsubscribe' to: forte-users-requestlists.xpedior.com -
New MBP - wireless/internet access networking problem - a summary!
Greetings!
New MBP here, with all the trimmings (MacOS X 10.4.10 - Safari 3 Beta). New also to the Apple/MAC world
MBP >> wireless networking into a Linksys WRT54G router and >> thru HughesNet DW7000 Satellite Internet connection (not the fastest, but hey, the US and especially rural areas are NOT S. Korea when it comes to speedy internet connections!
Frankly, I bought into it for two reasons: First, hearing about the vaunted Mac a/v/ and doc/photo editing capabilities,... and about MacOS stability, etc... Well, it all needs a little work still: on the part of new users like me, but also probably on the part of the Apple/Mac people as well. 2nd reason I decided to purchase the MBP - i.e. ability to run Windows (I have not yet tried BootCanp, etc...: still resolving preliminary issues!). I still live in a heavy Win environment at my business - no other way of course!
Communications issues seem to still prevail: I am hanging out at several VERY HELPFUL forums (AppleDiscussionForum, MacRumorsForums, etc...) and the same issues keep popping up. Im my case, same as all above reported, with a few additional points, as follows:
1. Xmission errors: seem to be - at least in my case - a constant factor, regardless on how close/far i am from my wireless router. For example, I would be attempting to dwnload an upgrade (large)QT or MacOS file. i am barely into the dowmoad, and I already have several Read/Send errors. By the end of the download, I will have probably about 15 Rcv and 5 Send errors. Never gets quite that bad in my Win machines, I must mention. Anything to do here (I know, there are such things always affecting wireless com). AND, MOST importantly, how that this affect the effectiveness of the upgrade (I spotted same thing with MacOS 10.4.10 and Safari Beta 3 upgrade downloads!). Would it be likely that applying upgrades in such circumstances would screw up the OS??? Could OTOH such errors be automatically "compensated" by re-xmits from the source, and eventually the download would be OK? Because quite frankly, I do NOT know if my important upgrade download was OK to apply to the system, given those errors!!!
Also same thing with PING errors. Quite frequent when pinging another device on my network.
2. Quite often, accessing a site will proceed somehow OK, and then things will get stuck twd the end, as if some buffer somewhere gets overloaded??? Of course, as elsewhere reported, same can often happen with com getting stuck right over the "www" part of the URL!
3. AND, of course, the often reported "NO connection to the Internet", but computer shows good signal level and connection otherwise.
4. Strangely enough, seems that the Airport Extreme wifi card sort of "warms up the the internet" as one proceeds to start using it. It eventually picks up on a network, and often "improves" its connection over time!
5. Built in Airport Extreme seems to not exhibit up all immediately surrounding networks. Sensitivity issue?? iStumbler does.
6. iStumbler permanently posts noise level of 9% regardless of how close to my wireless router/broadband modem I am. Anyone uses iStumbler to monitor network traffic?
This is getting longuish: I just want to get over all those p*ant issues and get into putting my a/v stuff together!!
- Roger T
Thanks for just reading all this!. I am not sure it is all fixable (back to the Win "features" terminology, really meaning "bugs"??)Thanks, BDaqua. This support forum is quite well stocked: I have been perusing all its nooks and cranies!
On the www.dslreports.com - All things Mac - forum, I spotted a couple of mentions of the following type of infromation:
link: »www.hardmac.com/news/2007-07-27/#7039
- The first TechNote provides information concerning the Airport problem affecting the MBP Santa Rosa (but also other Mac Intel). When used on battery, the wireless connection drops and one can even experience kernel panic. Apple Centers are asked not to exchange affected notebook as this is due to a unidentified bug in the Atheros driver, and should be fixed in the future with a simple Airport system update. So for the moment, unfortunate users are asked to directly power their notebook when using wireless network, or using Ethernet connection when running on battery... in other words, turn your notebook into a desktop
to forum · permalink
I am wondering if you and folks on this close-to-Apple forum know anything about this. At least, we could just await remedy instead of messing around endlessly looking for solutions and... pondering as to whether it was a wise thing to purchase an expensive machine which happens to have trouble communicating online. After all, seems that the Mac folks are prone to spend MORE time online uploading/downloading music and videos instead of my being normally doing with the rest of my (Win) computers, i.e. work on customer lists, correspondence, inventories, accounting, data bases, etc....
So, seems to me we do have a pb and Apple might just save a few $$$ on silly ads and get to work on com instead. if nothing else to avoid the appearance of further - admittedly rather funny - ad-spoofs!
So back to your further inquiry. I run a wireless network from a HughesNet satellite modem, thru a Linksys WRT54GL wireless router, into some nearby office LANed desktops and point of sale equipment, to another neighbouring facility via wireless bridge, and to my Mac laptop. Distance from the laptop to the router: 50 ft max.
It all works surprizingly very well: up to 200kbps up and 1000 kbps down (in prime time, 150 up and 600 down). OK, my set up looks complex and incurring LOTS of activity. Actually, online activity is quite minimal and well scheduled - right now I am the only machine on the network online. Otherwise, our office processes online money wiring for customers among other things.
I'll try your DNS server choice on the Mac settings first. Will report accordingly.
Thanks for everything!
- Roger T -
We are trying to use HTTPS client certificate based authentication to access a Java Applet in Firefox v21.0. We have followed the instructions as per the below two urls to enable JSS 4 -
https://developer.mozilla.org/en-US/docs/JSS/Using_JSS<br />
http://docs.oracle.com/javase/6/docs/technotes/guides/deployment/deployment-guide/keystores.html<br />
http://download.java.net/jdk8/docs/technotes/guides/deployment/deployment-guide/keystores.html
We are using JRE version 1.7.0_25-b16 Java HotSpot(TM) Client VM in Firefox v21 but we are getting - <br />
security: Accessing keys and certificate in Mozilla user profile: null<br />
security: JSS is not configured
followed by SSK handshake failure when trying to load the client certificate.
<pre><nowiki>javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure
at sun.security.ssl.Alerts.getSSLException(Unknown Source)
at sun.security.ssl.Alerts.getSSLException(Unknown Source)
at sun.security.ssl.SSLSocketImpl.recvAlert(Unknown Source)
at sun.security.ssl.SSLSocketImpl.readRecord(Unknown Source)
at sun.security.ssl.SSLSocketImpl.performInitialHandshake(Unknown Source)
at sun.security.ssl.SSLSocketImpl.startHandshake(Unknown Source)
at sun.security.ssl.SSLSocketImpl.startHandshake(Unknown Source)
at sun.net.www.protocol.https.HttpsClient.afterConnect(Unknown Source)
at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(Unknown Source)
at sun.net.www.protocol.https.HttpsURLConnectionImpl.connect(Unknown Source)
at sun.plugin.PluginURLJarFileCallBack.connect(Unknown Source)
at sun.plugin.PluginURLJarFileCallBack.retrieve(Unknown Source)
at sun.net.www.protocol.jar.URLJarFile.retrieve(Unknown Source)
at sun.net.www.protocol.jar.URLJarFile.getJarFile(Unknown Source)
at sun.net.www.protocol.jar.JarFileFactory.get(Unknown Source)
at sun.net.www.protocol.jar.JarURLConnection.connect(Unknown Source)
at sun.plugin.net.protocol.jar.CachedJarURLConnection.connect(Unknown Source)
at sun.plugin.net.protocol.jar.CachedJarURLConnection.getJarFileInternal(Unknown Source)
at sun.plugin.net.protocol.jar.CachedJarURLConnection.getJarFile(Unknown Source)
at com.sun.deploy.security.DeployURLClassPath$JarLoader.getJarFile(Unknown Source)
at com.sun.deploy.security.DeployURLClassPath$JarLoader.access$1000(Unknown Source)
at com.sun.deploy.security.DeployURLClassPath$JarLoader$1.run(Unknown Source)
at java.security.AccessController.doPrivileged(Native Method)
at com.sun.deploy.security.DeployURLClassPath$JarLoader.ensureOpen(Unknown Source)
at com.sun.deploy.security.DeployURLClassPath$JarLoader.<init>(Unknown Source)
at com.sun.deploy.security.DeployURLClassPath$3.run(Unknown Source)
at java.security.AccessController.doPrivileged(Native Method)
at com.sun.deploy.security.DeployURLClassPath.getLoader(Unknown Source)
at com.sun.deploy.security.DeployURLClassPath.getLoader(Unknown Source)
at com.sun.deploy.security.DeployURLClassPath.getResource(Unknown Source)
at sun.plugin2.applet.Plugin2ClassLoader$2.run(Unknown Source)
at java.security.AccessController.doPrivileged(Native Method)
at sun.plugin2.applet.Plugin2ClassLoader.findClassHelper(Unknown Source)
at sun.plugin2.applet.Applet2ClassLoader.findClass(Unknown Source)
at sun.plugin2.applet.Plugin2ClassLoader.loadClass0(Unknown Source)
at sun.plugin2.applet.Plugin2ClassLoader.loadClass(Unknown Source)
at sun.plugin2.applet.Plugin2ClassLoader.loadClass0(Unknown Source)
at sun.plugin2.applet.Plugin2ClassLoader.loadClass(Unknown Source)
at sun.plugin2.applet.Plugin2ClassLoader.loadClass(Unknown Source)
at java.lang.ClassLoader.loadClass(Unknown Source)
at sun.plugin2.applet.Plugin2ClassLoader.loadCode(Unknown Source)
at sun.plugin2.applet.Plugin2Manager.initAppletAdapter(Unknown Source)
at sun.plugin2.applet.Plugin2Manager$AppletExecutionRunnable.run(Unknown Source)
at java.lang.Thread.run(Unknown Source)</nowiki></pre>
The client cert based authentication is working when using IE v8 and IE v9 with the same JRE version (JRE version 1.7.0_25-b16 Java HotSpot(TM) Client VM)
Any help to resolve this issue will be very much appreciated.Thank you for your response.
Yes we have added the client certificate file (.pfx) in the Firefox browser Certificate manager / Store. It's also showing the certificate in the View Certificate window. We could not resolve it yet. -
Error when accessing Commands menu
While executing
PDMXI_PUBLIC_DOMAIN_LTD_CREATE_CSS_FILE_FROM_SCRIPT_TAGS_1
canAccept Command in Strip CSS To External File.htm, the follwoing
Javascript error(s) occurred:
At line 11 of file "D:\Program FIles\Macromedia\Dreamweaver
8\Configuration\commands\Strip Css To External File.js":
TypeError: dreamweaver.getDocumentDOM() has no properties
My machine is using Windows XP Pro OS. When a search is done
for the named file in this error message it does not exist.
I cannot access any commands menu items because of this
problem.
Please help,
Thanks
NeilTry the steps in this TechNote:
Troubleshooting JavaScript errors in Dreamweaver
http://www.adobe.com/go/19105
Try this step first about deleting the WinFileCache.dat file:
http://www.adobe.com/cfusion/knowledgebase/index.cfm?id=tn_19105#dat
Hope this helps,
David Alcala
Adobe Technical Support -
Accessing help causes Dreamweaver to crash
I'm quite frustrated due to the crash of all help functions
that are not on the web for my new install of Dreamweaver. I'm
running on an HP laptop and when I go to the help menu or click on
a help button I get the "send / don't send" crash dialogue for
Dreamweaver.
If I go to the help files directly, outside of Dreamweaver, I
can open them correctly.
Any idea what might be tangled up in the install?See if this TechNote helps:
Dreamweaver crashes when accessing help system when Internet
Explorer 7 is
installed
http://www.adobe.com/go/6d7a2c59
David Alcala
Adobe Product Support -
Using the Security Manager to restrict access to a single package
After reading up on the Security Manager, the package.access property and the use of the [accessClassInPackage RuntimePermission|http://java.sun.com/javase/6/docs/technotes/guides/security/permissions.html#RuntimePermission] , it seemed to me that it would possible to set up the following: I have a security-sensitive code base packaged in a jar, and I want to make sure that only one client code base that I specify is permitted to access it. The idea here is to prevent malicious code from executing anything in the sensitive code base; the sensitive code is only accessible to one client that I name in a security policy file. Perhaps rather foolishly, I advised a client to consider this before testing out a sample myself, because much to my surprise, it appears to me that it isn't possible to get the Security Manager to do this at all. Am I missing something? I'm a bit startled by this conclusion -- it seems like such an obvious use for the Security Manager, I'm hard-pressed to be believe that it can't be done, and more inclined to suspect that I'm going about it wrong.
Here's what I thought I could do: set up the package.access property so that it denies access to any package; then in the policy file, grant the RuntimePermission/accessClassInPackage to the client code base that is permitted to access the sensitive code.
Of course, you wouldn't want the package.access property to exclude all packages in the global java.security file, because then no code could be accessed at all. It would be necessary to use the trick of resetting the package.access property within the code, as [illustrated in the secure coding guidelines|http://java.sun.com/security/seccodeguide.html#1-1a] .
But the problem lies in the idea of "use the package.access property to deny access to +any+ package". There doesn't seem to be any way to use wildcards or the like with the property -- it has to specifically name packages (or package prefixes) to which access is forbidden. It wouldn't do to try to name the packages to which I'm trying to prevent access, since we're trying to prevent access from malicious code -- the attacker could just choose package names that aren't on the list. I'd really need to say that access is denied to all packages, except for those in the permitted code base, but the security mechanisms for package access don't seem to allow that.
Moreover, the trick of changing the value of package.access can't be done within the client code -- otherwise, the attacker client would just set the property to his own purposes. But it can't really be done within the sensitive package either, because the whole idea is to prevent access to that package, and by the time it's busy setting the property, it's already too late, because the package has to have been accessed by a client to get there at all.
It seems to me that this a symptom of something I've never really understood about the design of the Security Manager -- you can grant permissions to specific code bases, but you can't revoke permissions from specific code bases, let alone all code bases. What I want to do here is grant access permission to one specific code base and revoke it from all others. There doesn't seem to be any way to express that with the mechanisms of the Security Manager.
The more I look at it, the more it seems that there's just no way to use the Security Manager this way -- set up package access so that a specific code base can only be accessed by one specific client code base. There are surely other ways to get the effect that I'm looking for, but as far as I can tell, none of them involve restricting package access (for example: define a custom permission, grant it only to the permitted client. and check against that permission within the sensitive code base; meaning that the sensitive code has to be accessible to anyone in the first place). This conclusion really surprises me (not to mention my bit of embarrassment with the client); wouldn't this be precisely the sort of thing the Security Manager ought to be good for?You're looking at this back to front. The security policy file is there for the client to decide how much access he is going to give this application, not for to application to restrict who can use it. If you want to control what used to be called 'state orientation' you can do that directly by looking down the stack trace inside your code.
-
Sun's PKCS#11 Bridge to access LunaSA HSM
Hi,
I'm working to access keys/certificates on LunaSA HSM through Sun's Java PKCS#11 Bridge. By
ks = KeyStore.getInstance("pkcs11");
ks.load(null,pin);
I can access credentials on the HSM, but only "part" of them -- Only the certificates that have keys also on the HSM can be identified by their aliases.
For example, if on the HSM are a trusted certificate, whose alias is 'trustedcert', a user certificate and its private key (whose aliases are 'mycert' and 'mykey'), by
ks.aliases();
I got 'mykey' and 'mycert' only, but not 'trustedcert'. I got the same problem when I tried with "keytool".
Is there a solution to this problem, or did I miss something? Thanks for your advice.Doesn't even begin to look right. See the [Java PKCS#11 Reference Guide|http://java.sun.com/javase/6/docs/technotes/guides/security/p11guide.html#Config]:
- Valid values for operation are generate, import, and *. You have nothing.
- Valid values for keytype are CKO_PUBLIC_KEY, CKO_PRIVATE_KEY, and CKO_SECRET_KEY. You have CKO_CERTIFICATE.
- Valid values for keyalgorithm are one of the CKK_xxx constants from the PKCS#11 specification, or * to match keys of any algorithm. You have nothing. -
Z-index related / access layer below
Hi there,
I'm building off of an image map coded by someone else. I
have a large image with the maps marked. Over the maps are layer
divs with a z-index that are to act as rollovers, showing full
alpha on rollover and 0 visibility on mouseout. Great - works fine.
The image maps are under the layer above. When I click the mouse,
the faux-rollover no longer should appear and I need to access the
image change of the large image below. As of now when I click the
dispaly changes to none, though the image map onMouseDown does not
work. — Is there a way I can work with the pre-exsting code
to make this work. (I could go into slicing, though the simpler the
better.
thank you!Can you show us the code, please? Or better yet, post a link
to the page?
Murray --- ICQ 71997575
Adobe Community Expert
(If you *MUST* email me, don't LAUGH when you do so!)
==================
http://www.dreamweavermx-templates.com
- Template Triage!
http://www.projectseven.com/go
- DW FAQs, Tutorials & Resources
http://www.dwfaq.com - DW FAQs,
Tutorials & Resources
http://www.macromedia.com/support/search/
- Macromedia (MM) Technotes
==================
"JenMQui" <[email protected]> wrote in
message
news:f4car2$m7e$[email protected]..
> Hi there,
>
> I'm building off of an image map coded by someone else.
I have a large
> image
> with the maps marked. Over the maps are layer divs with
a z-index that are
> to
> act as rollovers, showing full alpha on rollover and 0
visibility on
> mouseout.
> Great - works fine. The image maps are under the layer
above. When I click
> the
> mouse, the faux-rollover no longer should appear and I
need to access the
> image
> change of the large image below. As of now when I click
the dispaly
> changes to
> none, though the image map onMouseDown does not work. ?
Is there a way I
> can
> work with the pre-exsting code to make this work. (I
could go into
> slicing,
> though the simpler the better.
>
> thank you!
> -
How to connect ms access in swing application JDeveloper
hi guys,
How do I do to connect MSAccess database in a swing application in JDeveloper?Just wondering, you asked how to connect to MS Access from a swing app being developed on JDev...
Are you using ADF ? Or just using JDev to develop a plain vanilla java swing app ?
If not using ADF :
You could try the JDBC ODBC bridge. http://download.oracle.com/javase/6/docs/technotes/guides/jdbc/bridge.html
Might be better than half baked JDBC type 4 drivers for Access.
If using ADF, I'm assuming you have an ADF model project and an ADF swing project. If you can manage to use the JDBC-ODBC bridge, you should be able to configure a DataSource for your model project as javax.sql.DataSource and javax.sql.ConnectionPoolDataSource are now supported though the bridge.
Please keep in mind the warnings on http://download.oracle.com/javase/6/docs/technotes/guides/jdbc/bridge.html, especially the limited scalability and performance. -
How to access complex arrays/types in a class
public class VirusScanMessage {
public byte[] fileContent;
public int fileSize;
public String messages;
public String datLocation;
jclass clazz = env->FindClass("VirusScanMessage");
// get field
jfieldID byteArrayField = env->GetFieldID(clazz,"fileContent","[b");
// get the byteArray object
jbyteArray byteArray = env->GetObjectField(object,byteArrayField);
// get array length
jsize fileContentLength = env->GetArrayLength(byteArray);
jbyte * fileContent = env->GetByteArrayElements(byteArray,0);
// do stuff
// release array
env->ReleaseByteArray(byteArray,fileContent,0);thats the normal way but how to access the arrays if they are complex like this(struct1,class2)?:
public class VirusScanMessage {
public struct1[] fileContent;
public int fileSize;
public String messages;
public String datLocation;
public class2 cl2;
}Note that your code is missing error checking.
thats the normal way but how to access the arrays if they are complex like this(struct1,class2)?:Retrieve each item from the array as an Object.
[http://java.sun.com/javase/6/docs/technotes/guides/jni/spec/functions.html#wp21671] -
Access arabic from db and display in textfield
I have saved arabic in MS Access database which is showing arabic well
but in a JTextField it looks line ?????? ?????
how can i solve this problem ..?Maybe you need to specify the character set ("windows-1256"?) to be used by the JDBC driver (I assume you use the JDBC-ODBC bridge). See http://java.sun.com/javase/6/docs/technotes/guides/jdbc/bridge.html
Maybe you are looking for
-
Any way to override default printer settings into a PDF
Hi -- I work for a large organization that has lots of computers and printers and prints a lot of forms and documents. We are moving towards more digitization of documents and records including printing forms as needed as opposed to having large set
-
Apps report print on PDF format
Hi all, I want to print my report from apps in PDF format, so can anyone tell me how to print report from apps in PDF format. Is there any document ID in metalink or can anyone tell me the complete steps for taking report in PDF format. Thanks & Rega
-
Zen nano plus 1gb only taking 128 so
I just bought mine last Monday, and installed it today. I started putting songs onto it when suddenly it said I couldn't put any more. I looked at the properties and it said I still had 408MB of free space. Any ideas?
-
Either need ability to edit PS layer style in FC or allow for update check to the .psd file
There is not much control over look in FC of imported .psd file. So please allow for update import some how.
-
Adobe Creative Suite 6 mit Pixelschriften auf imac 5K
Wie ist die Schriftendarstellung der Adobe Produkte auf einem imak 5K zu verbessern