Accessing Technote 10398

I thought it might be prudent to share with you the response I received from Sun
regarding the inability to access technote 10398 (Forté logger flags). I was
able to access it 3+ weeks ago, and fortunately kept a hard-copy. But, how are
we supposed to do our job effectively and expediently if we do not have
(complete) access to this resource?
I thought the technotes were completely open to the Forté development
community.... wrong.
-jeff
---------------------- Forwarded by Jeff Bennett/SEH on 09/11/2000 09:02 AM
Forte Support <supportforte.com> on 09/08/2000 10:05:17 AM
To: Jeff Bennett/SEHsehamerica.com
cc:
Subject: Re: Accessing Technote 10398
Fax to:
Hello Jeff,
Were you at one point able to access this technote? You know why -- it's
because this technote is marked for employee viewing only and not available
for customer viewing. If you need further assistance or need to look at
this technote, what you would need to do is log a call with us and then a
tech support specialist will give you a call back. Sometimes, the
technotes are marked unviewable to customers because they might need
further explanation. Let me know if you need to log a case.
Thanks!
At 09:57 AM 9/8/00 -0700, you wrote:
I am no longer able to access technote 10398 (forte logger flags)... why?
-jeff~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
Sun&reg; microsystems
Jeannie Lee
Phone: (510) 451-5400
Fax (510) 869-2010
Email: jeannie.leesun.com
Forte Tools Response Coordinator

I think y'all are overreacting. There are log flags that are detailed in
Technote 10398 that can cause serious implications if used improperly. I
think Forte/Sun just wants to make sure that people don't make mistakes that
cost them valuable time.
As a Forte Consultant for many years, I have seen a good number of people
misuse information that was not completely understood. In some cases, this
caused excessive downtime for production applications. The only time I ever
saw Technote 10398 being provided to a customer was when they were utilizing
Forte Consulting, or when a Technical Support Engineer was heavily involved.
I was extremely surprised to learn that it was available to non-employees via
the website - that sounds as if someone may have inadvertantly marked it as
customer-viewable (incorrectly, obviously) in Sun's internal systems.
Again, I think you're overreacting. I am sure that this isn't a case of Sun
thinking anyone is "stupid." It's a matter of providing the support that
people need to properly utilize the tools available.
-Katie
mark joyce wrote:
read: Sometimes, the technotes are marked unviewable
to customers because they might need further
explanation. Let me know if you need to log a case.
in other words, you are TOO STUPID to use FORTE logger
flags, although they have been widely distributed and
used for years by FORTE users.
i can't believe it either. i don't know what i would
have done for the last 5 years without using the FORTE
flags. such a wealth of good output!
what an excuse! "they might need further explanation"
.. if i had to log every problem with FORTE, instead
of resolving them myself through the information
obtained by using flags, i would have lost my job a
long time ago.
mark.
--- Jeff Bennett <jeff_bennettsehamerica.com> wrote:
I thought it might be prudent to share with you the
response I received from Sun
regarding the inability to access technote 10398
(Fort&eacute; logger flags). I was
able to access it 3+ weeks ago, and fortunately kept
a hard-copy. But, how are
we supposed to do our job effectively and
expediently if we do not have
(complete) access to this resource?
I thought the technotes were completely open to the
Fort&eacute; development
community.... wrong.
-jeff
---------------------- Forwarded by Jeff Bennett/SEH
on 09/11/2000 09:02 AM
Forte Support <supportforte.com> on 09/08/2000
10:05:17 AM
To: Jeff Bennett/SEHsehamerica.com
cc:
Subject: Re: Accessing Technote 10398
Fax to:
Hello Jeff,
Were you at one point able to access this technote?
You know why -- it's
because this technote is marked for employee viewing
only and not available
for customer viewing. If you need further
assistance or need to look at
this technote, what you would need to do is log a
call with us and then a
tech support specialist will give you a call back.
Sometimes, the
technotes are marked unviewable to customers because
they might need
further explanation. Let me know if you need to log
a case.
Thanks!
At 09:57 AM 9/8/00 -0700, you wrote:
I am no longer able to access technote 10398 (fortelogger flags)... why?
-jeff~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
Sun&reg; microsystems
Jeannie Lee
Phone: (510) 451-5400
Fax (510) 869-2010
Email: jeannie.leesun.com
Forte Tools Response Coordinator
For the archives, go to:
http://lists.xpedior.com/forte-users and use
the login: forte and the password: archive. To
unsubscribe, send in a new
email the word: 'Unsubscribe' to:
forte-users-requestlists.xpedior.com
http://mail.yahoo.com/
For the archives, go to: http://lists.xpedior.com/forte-users and use
the login: forte and the password: archive. To unsubscribe, send in a new
email the word: 'Unsubscribe' to: forte-users-requestlists.xpedior.com

Similar Messages

  • Re: (forte-users) Accessing Technote 10398

    Ketie,
    let's see, I have been using FORTE since November of
    1994. since the beginning those flags have been common
    knowledge within the FORTE community and widely
    disseminated.
    the FORTE flags have been invaluable to me and HAVE
    NEVER caused any downtime. sure, there are a few
    wildcards in there that can cause trouble, but to
    throw out the baby with the bathwater is ridiculous.
    what would life be without trc:lo:25? to trace
    exceptions.
    or trc:os:1:1 and trc:os:5:5 to tune memory
    consumption?
    Should i have to call a consultant or FORTE tech
    support to do the deep dive on exceptions or tune my
    applications? I think not.
    Overreaction? No.
    Mark.
    --- Katie Tierney <katiethetierneys.com> wrote:
    I think y'all are overreacting. There are log flags
    that are detailed in
    Technote 10398 that can cause serious implications
    if used improperly. I
    think Forte/Sun just wants to make sure that people
    don't make mistakes that
    cost them valuable time.
    As a Forte Consultant for many years, I have seen a
    good number of people
    misuse information that was not completely
    understood. In some cases, this
    caused excessive downtime for production
    applications. The only time I ever
    saw Technote 10398 being provided to a customer was
    when they were utilizing
    Forte Consulting, or when a Technical Support
    Engineer was heavily involved.
    I was extremely surprised to learn that it was
    available to non-employees via
    the website - that sounds as if someone may have
    inadvertantly marked it as
    customer-viewable (incorrectly, obviously) in Sun's
    internal systems.
    Again, I think you're overreacting. I am sure that
    this isn't a case of Sun
    thinking anyone is "stupid." It's a matter of
    providing the support that
    people need to properly utilize the tools available.
    -Katie
    mark joyce wrote:
    read: Sometimes, the technotes are markedunviewable
    to customers because they might need further
    explanation. Let me know if you need to log acase.
    in other words, you are TOO STUPID to use FORTElogger
    flags, although they have been widely distributedand
    used for years by FORTE users.
    i can't believe it either. i don't know what iwould
    have done for the last 5 years without using theFORTE
    flags. such a wealth of good output!
    what an excuse! "they might need furtherexplanation"
    .. if i had to log every problem with FORTE,instead
    of resolving them myself through the information
    obtained by using flags, i would have lost my joba
    long time ago.
    mark.
    --- Jeff Bennett <jeff_bennettsehamerica.com>wrote:
    I thought it might be prudent to share with youthe
    response I received from Sun
    regarding the inability to access technote 10398
    (Fort&eacute; logger flags). I was
    able to access it 3+ weeks ago, and fortunatelykept
    a hard-copy. But, how are
    we supposed to do our job effectively and
    expediently if we do not have
    (complete) access to this resource?
    I thought the technotes were completely open tothe
    Fort&eacute; development
    community.... wrong.
    -jeff
    ---------------------- Forwarded by JeffBennett/SEH
    on 09/11/2000 09:02 AM
    Forte Support <supportforte.com> on 09/08/2000
    10:05:17 AM
    To: Jeff Bennett/SEHsehamerica.com
    cc:
    Subject: Re: Accessing Technote 10398
    Fax to:
    Hello Jeff,
    Were you at one point able to access thistechnote?
    You know why -- it's
    because this technote is marked for employeeviewing
    only and not available
    for customer viewing. If you need further
    assistance or need to look at
    this technote, what you would need to do is loga
    call with us and then a
    tech support specialist will give you a callback.
    Sometimes, the
    technotes are marked unviewable to customersbecause
    they might need
    further explanation. Let me know if you need tolog
    a case.
    Thanks!
    At 09:57 AM 9/8/00 -0700, you wrote:
    I am no longer able to access technote 10398
    (forte
    logger flags)... why?
    -jeff~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
    Sun&reg; microsystems
    Jeannie Lee
    Phone: (510) 451-5400
    Fax (510) 869-2010
    Email: jeannie.leesun.com
    Forte Tools Response Coordinator
    For the archives, go to:
    http://lists.xpedior.com/forte-users and use
    the login: forte and the password: archive. To
    unsubscribe, send in a new
    email the word: 'Unsubscribe' to:
    forte-users-requestlists.xpedior.com
    http://mail.yahoo.com/
    For the archives, go to:
    http://lists.xpedior.com/forte-users and use
    the login: forte and the password: archive. Tounsubscribe, send in a new
    email the word: 'Unsubscribe' to:forte-users-requestlists.xpedior.com
    http://mail.yahoo.com/

    Ketie,
    let's see, I have been using FORTE since November of
    1994. since the beginning those flags have been common
    knowledge within the FORTE community and widely
    disseminated.
    the FORTE flags have been invaluable to me and HAVE
    NEVER caused any downtime. sure, there are a few
    wildcards in there that can cause trouble, but to
    throw out the baby with the bathwater is ridiculous.
    what would life be without trc:lo:25? to trace
    exceptions.
    or trc:os:1:1 and trc:os:5:5 to tune memory
    consumption?
    Should i have to call a consultant or FORTE tech
    support to do the deep dive on exceptions or tune my
    applications? I think not.
    Overreaction? No.
    Mark.
    --- Katie Tierney <katiethetierneys.com> wrote:
    I think y'all are overreacting. There are log flags
    that are detailed in
    Technote 10398 that can cause serious implications
    if used improperly. I
    think Forte/Sun just wants to make sure that people
    don't make mistakes that
    cost them valuable time.
    As a Forte Consultant for many years, I have seen a
    good number of people
    misuse information that was not completely
    understood. In some cases, this
    caused excessive downtime for production
    applications. The only time I ever
    saw Technote 10398 being provided to a customer was
    when they were utilizing
    Forte Consulting, or when a Technical Support
    Engineer was heavily involved.
    I was extremely surprised to learn that it was
    available to non-employees via
    the website - that sounds as if someone may have
    inadvertantly marked it as
    customer-viewable (incorrectly, obviously) in Sun's
    internal systems.
    Again, I think you're overreacting. I am sure that
    this isn't a case of Sun
    thinking anyone is "stupid." It's a matter of
    providing the support that
    people need to properly utilize the tools available.
    -Katie
    mark joyce wrote:
    read: Sometimes, the technotes are markedunviewable
    to customers because they might need further
    explanation. Let me know if you need to log acase.
    in other words, you are TOO STUPID to use FORTElogger
    flags, although they have been widely distributedand
    used for years by FORTE users.
    i can't believe it either. i don't know what iwould
    have done for the last 5 years without using theFORTE
    flags. such a wealth of good output!
    what an excuse! "they might need furtherexplanation"
    .. if i had to log every problem with FORTE,instead
    of resolving them myself through the information
    obtained by using flags, i would have lost my joba
    long time ago.
    mark.
    --- Jeff Bennett <jeff_bennettsehamerica.com>wrote:
    I thought it might be prudent to share with youthe
    response I received from Sun
    regarding the inability to access technote 10398
    (Fort&eacute; logger flags). I was
    able to access it 3+ weeks ago, and fortunatelykept
    a hard-copy. But, how are
    we supposed to do our job effectively and
    expediently if we do not have
    (complete) access to this resource?
    I thought the technotes were completely open tothe
    Fort&eacute; development
    community.... wrong.
    -jeff
    ---------------------- Forwarded by JeffBennett/SEH
    on 09/11/2000 09:02 AM
    Forte Support <supportforte.com> on 09/08/2000
    10:05:17 AM
    To: Jeff Bennett/SEHsehamerica.com
    cc:
    Subject: Re: Accessing Technote 10398
    Fax to:
    Hello Jeff,
    Were you at one point able to access thistechnote?
    You know why -- it's
    because this technote is marked for employeeviewing
    only and not available
    for customer viewing. If you need further
    assistance or need to look at
    this technote, what you would need to do is loga
    call with us and then a
    tech support specialist will give you a callback.
    Sometimes, the
    technotes are marked unviewable to customersbecause
    they might need
    further explanation. Let me know if you need tolog
    a case.
    Thanks!
    At 09:57 AM 9/8/00 -0700, you wrote:
    I am no longer able to access technote 10398
    (forte
    logger flags)... why?
    -jeff~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
    Sun&reg; microsystems
    Jeannie Lee
    Phone: (510) 451-5400
    Fax (510) 869-2010
    Email: jeannie.leesun.com
    Forte Tools Response Coordinator
    For the archives, go to:
    http://lists.xpedior.com/forte-users and use
    the login: forte and the password: archive. To
    unsubscribe, send in a new
    email the word: 'Unsubscribe' to:
    forte-users-requestlists.xpedior.com
    http://mail.yahoo.com/
    For the archives, go to:
    http://lists.xpedior.com/forte-users and use
    the login: forte and the password: archive. Tounsubscribe, send in a new
    email the word: 'Unsubscribe' to:forte-users-requestlists.xpedior.com
    http://mail.yahoo.com/

  • RE: log trace on Service Object

    I haven't tried myself; but got a copy from someone of part of technote
    10398 which says (the minimum you need is:)
    trc:in:1 Prints out information about interpreter state object.
    10 - Print method entry/exit
    trc:in:2 Trace the interpretation of method invocations and exception
    handling
    2 - Prints entry/exit and exceptions
    trc:in:51:1 Traces method entry/exit by task
    trc:in:54:1 Traces method entry/exit by application
    Try it.
    -----Original Message-----
    From: Eric Ab&eacute;cassis [mailto:[email protected]]
    Sent: Tuesday, April 13, 1999 10:24 AM
    To: Forte User List
    Subject: log trace on Service Object
    Hi Everybody,
    I would like to set log trace on each call (method entry and exit) on a
    Service Object, but I didn't find any log flag which helps me.
    Does someone have any ideas on how to do that ?
    Thank you for your help !
    Eric Ab&eacute;cassis <[email protected]>
    Senior Architect
    Sema Group DTS
    To unsubscribe, email '[email protected]' with
    'unsubscribe forte-users' as the body of the message.
    Searchable thread archive <URL:http://pinehurst.sageit.com/listarchive/>

    Hi Eric,
    You can find on http://perso.club-internet.fr/dnguyen/ a little tool called CodeAdd which adds Entry and Return trace. I fact, you
    can use it to add any kind of code at the beginning and the end of your methods.
    It also allows you to add a pre-formated comments header in you code.
    In a further version, It may be possible to replace a code sequence from your methods. For instance, you may add a trace class and
    change a task.Part.LogMgr.Putline by a call to your own class, or need to suppress some lines.
    Just be carefull to use the tool on a local backupo of your repository : CodeAdd updates your methods directly in the repository.
    Hope this helps,
    Daniel Nguyen
    Freelance Forte Consultant
    Url : http://perso.club-internet.fr/dnguyen/
    Eric =?iso-8859-1?Q?Ab=E9cassis?= a &eacute;crit:
    Hi Everybody,
    I would like to set log trace on each call (method entry and exit) on a
    Service Object, but I didn't find any log flag which helps me.
    Does someone have any ideas on how to do that ?
    Thank you for your help !
    Eric Ab&eacute;cassis <[email protected]>
    Senior Architect
    Sema Group DTS
    Eric Ab&eacute;cassis <[email protected]>
    Senior Architect
    Sema Group DTS
    Eric Ab&eacute;cassis
    Senior Architect <[email protected]>
    Sema Group DTS Courrier HTML
    les Algorithmes - Pythagore A route des Lucioles, BP 279;Sophia Antipolis;;06905;France T&eacute;l. cellulaire: +33 (0) 6 62 36 68 83
    T&eacute;l&eacute;copie: +33 (0) 4 93 95 xx xx
    Bureau: +33 (0) 4 93 95 46 50
    Informations suppl&eacute;mentaires:
    le nom ABECASSIS
    Pr&eacute;nom Eric
    Version 2.1-
    To unsubscribe, email '[email protected]' with
    'unsubscribe forte-users' as the body of the message.
    Searchable thread archive <URL:http://pinehurst.sageit.com/listarchive/>

  • Re: (forte-users) FW: (forte-users) Serialisation

    Here is a Word formatted copy of the Tech Note
    "Slabbert, Etienne" <etiennemds.co.za> 02/17/00 04:10AM >>>Hi,
    I cannot get hold of Tech Note 10398..... can anyone email me a copy?
    Tx
    Etienne
    -----Original Message-----
    From: Klerk, Theo de [SMTP:Theo.de.Klerkcompaq.com]
    Sent: Wednesday, February 09, 2000 4:26 PM
    To: 'Jason de Cean'; 'Forte Users'
    Subject: RE: (forte-users) Serialisation
    There are a number of flags that will show you some of the required
    information in a log file (not within the application itself). Technote
    10398 has many more flags listed for a variety of obscure, useful, not so
    useful and exotic information:
    trc:cm:*:4 and *:8 - show packet serialisation, open, closes between
    partition communication
    trc:do:*:2 - proxy creation/deletion, exception events
    trc:do:*:5 - individual message tracing between proxies
    trc:do:*:8 - serialisation information
    Theo
    For the archives, go to: http://lists.xpedior.com/forte-users and use
    the login: forte and the password: archive. To unsubscribe, send in a new
    email the word: 'Unsubscribe' to: forte-users-requestlists.xpedior.com
    For the archives, go to: http://lists.xpedior.com/forte-users and use
    the login: forte and the password: archive. To unsubscribe, send in a new
    email the word: 'Unsubscribe' to: forte-users-requestlists.xpedior.com

    Here is a Word formatted copy of the Tech Note
    "Slabbert, Etienne" <etiennemds.co.za> 02/17/00 04:10AM >>>Hi,
    I cannot get hold of Tech Note 10398..... can anyone email me a copy?
    Tx
    Etienne
    -----Original Message-----
    From: Klerk, Theo de [SMTP:Theo.de.Klerkcompaq.com]
    Sent: Wednesday, February 09, 2000 4:26 PM
    To: 'Jason de Cean'; 'Forte Users'
    Subject: RE: (forte-users) Serialisation
    There are a number of flags that will show you some of the required
    information in a log file (not within the application itself). Technote
    10398 has many more flags listed for a variety of obscure, useful, not so
    useful and exotic information:
    trc:cm:*:4 and *:8 - show packet serialisation, open, closes between
    partition communication
    trc:do:*:2 - proxy creation/deletion, exception events
    trc:do:*:5 - individual message tracing between proxies
    trc:do:*:8 - serialisation information
    Theo
    For the archives, go to: http://lists.xpedior.com/forte-users and use
    the login: forte and the password: archive. To unsubscribe, send in a new
    email the word: 'Unsubscribe' to: forte-users-requestlists.xpedior.com
    For the archives, go to: http://lists.xpedior.com/forte-users and use
    the login: forte and the password: archive. To unsubscribe, send in a new
    email the word: 'Unsubscribe' to: forte-users-requestlists.xpedior.com

  • RE: (forte-users) Serialisation

    Singh,
    Any message sent across partition boundaries is serialized. This includes
    method invokations, events and exceptions. The signature of the message
    itself is serialized, as well as the values of all parameters/attributes.
    Serializing a scalar value requires less overhead then serialising an
    object, however, the difference isn't as big as you might think. Objects
    have more attributes then just the value you're interested in and these
    attributes are serialised as well. Each object is an instance of a class and
    each class has a UUID, which is added to the serialized stream as well.
    However, methods are NOT serialised. What happens is this. Forte serializes
    an object into a stream containing only the values of the attributes
    (including nested attributes). This stream is given a header which sais of
    which class this object is an instance (the UUID is used for that). The
    receiving partition reads the serialized stream, finds the definition of the
    class (defined by UUID) in its own code, creates an instance of this class
    and fills the data out of the serialized stream into this new object.
    You can imagine what might happen if there is a mismatch between the
    class-definitions in both partitions. You either get
    serialization-deserialization errors, or the receiving partition complains
    that it doesn't even know the UUID of the received streamed object, or you
    get no errors at all and just have an object that displays different
    behaviour, depending what partition it's in.
    If there are no problems, then the main issue is the
    serializing-deserializing overhead. Note that the receiving partition has to
    instantiate a new object for every serialized object it receives and will
    therefore execute all code in the Init() method. This overhead is not
    required for scalar types, for which Forte only needs to reserve a small
    amount of memory space on the stack.
    Any call to a database is also a message sent across partitions and is
    therefore serialized. However, one partition is a Forte partition and the
    other one isn't. Therefore, Forte's internal serialization mechanism isn't
    used. Forte serializes the SQL-query into a format understood by the
    database (which is different for every vendor). Forte then receives a stream
    back which has a different format for every different database type. This
    stream is deserialized and written to attributes that Forte has reserved to
    contain the data. Whether these are scalar, datavalues or domains only
    impacts performance inside the Forte partition. It has no effect on the
    communication with the database.
    Pascal Rottier
    Atos Origin Nederland (BAS/West End User Computing)
    Tel. +31 (0)10-2661223
    Fax. +31 (0)10-2661199
    E-mail: Pascal.Rottiernl.origin-it.com
    ++++++++++++++++++++++++++++
    Philip Morris (Afd. MIS)
    Tel. +31 (0)164-295149
    Fax. +31 (0)164-294444
    E-mail: Rottier.Pascalpmintl.ch
    -----Original Message-----
    From: Singh [mailto:fortelistyahoo.com]
    Sent: Thursday, February 22, 2001 3:30 AM
    To: forte-userslists.xpedior.com
    Subject: (forte-users) Serialisation
    Hello All
    I have a question that has been bugging me for some
    time.
    We all know that it is better to use scalar data
    types, as opposed to objects, when passing data across
    a network.
    The reason, if I understand correctly, is that when
    you send an object across a network, the whole object
    (properties, attributes and methods) is deserialised
    into zero's and one's before being sent across and
    then serialised back into the object when it gets to
    the other side. This would take longer for an object
    since for a scalar value, just the value is
    deserialised and serialised.
    But when you are writing to a database from the tier
    before the database to the database, does it matter
    what type you use. The reason for saying this is that
    the values are serialised before they go across and
    then deserialised when they get to the base, in other
    words, they are sent as zero's and one's. For a scalar
    - just the value is sent across but for an object -
    does just the value go across or the complete object.
    If just the value of the object goes across, then it
    doesn't really matter whether a scalar or object is
    sent across.
    Am I correct in this assumption.
    Thanks in advance for your help.
    Regards,
    Singh
    For the archives, go to: http://lists.xpedior.com/forte-users and use
    the login: forte and the password: archive. To unsubscribe, send in a new
    email the word: 'Unsubscribe' to: forte-users-requestlists.xpedior.com

    Hi,
    I cannot get hold of Tech Note 10398..... can anyone email me a copy?
    Tx
    Etienne
    -----Original Message-----
    From: Klerk, Theo de [SMTP:Theo.de.Klerkcompaq.com]
    Sent: Wednesday, February 09, 2000 4:26 PM
    To: 'Jason de Cean'; 'Forte Users'
    Subject: RE: (forte-users) Serialisation
    There are a number of flags that will show you some of the required
    information in a log file (not within the application itself). Technote
    10398 has many more flags listed for a variety of obscure, useful, not so
    useful and exotic information:
    trc:cm:*:4 and *:8 - show packet serialisation, open, closes between
    partition communication
    trc:do:*:2 - proxy creation/deletion, exception events
    trc:do:*:5 - individual message tracing between proxies
    trc:do:*:8 - serialisation information
    Theo
    For the archives, go to: http://lists.xpedior.com/forte-users and use
    the login: forte and the password: archive. To unsubscribe, send in a new
    email the word: 'Unsubscribe' to: forte-users-requestlists.xpedior.com

  • New MBP - wireless/internet access networking problem - a summary!

    Greetings!
    New MBP here, with all the trimmings (MacOS X 10.4.10 - Safari 3 Beta). New also to the Apple/MAC world
    MBP >> wireless networking into a Linksys WRT54G router and >> thru HughesNet DW7000 Satellite Internet connection (not the fastest, but hey, the US and especially rural areas are NOT S. Korea when it comes to speedy internet connections!
    Frankly, I bought into it for two reasons: First, hearing about the vaunted Mac a/v/ and doc/photo editing capabilities,... and about MacOS stability, etc... Well, it all needs a little work still: on the part of new users like me, but also probably on the part of the Apple/Mac people as well. 2nd reason I decided to purchase the MBP - i.e. ability to run Windows (I have not yet tried BootCanp, etc...: still resolving preliminary issues!). I still live in a heavy Win environment at my business - no other way of course!
    Communications issues seem to still prevail: I am hanging out at several VERY HELPFUL forums (AppleDiscussionForum, MacRumorsForums, etc...) and the same issues keep popping up. Im my case, same as all above reported, with a few additional points, as follows:
    1. Xmission errors: seem to be - at least in my case - a constant factor, regardless on how close/far i am from my wireless router. For example, I would be attempting to dwnload an upgrade (large)QT or MacOS file. i am barely into the dowmoad, and I already have several Read/Send errors. By the end of the download, I will have probably about 15 Rcv and 5 Send errors. Never gets quite that bad in my Win machines, I must mention. Anything to do here (I know, there are such things always affecting wireless com). AND, MOST importantly, how that this affect the effectiveness of the upgrade (I spotted same thing with MacOS 10.4.10 and Safari Beta 3 upgrade downloads!). Would it be likely that applying upgrades in such circumstances would screw up the OS??? Could OTOH such errors be automatically "compensated" by re-xmits from the source, and eventually the download would be OK? Because quite frankly, I do NOT know if my important upgrade download was OK to apply to the system, given those errors!!!
    Also same thing with PING errors. Quite frequent when pinging another device on my network.
    2. Quite often, accessing a site will proceed somehow OK, and then things will get stuck twd the end, as if some buffer somewhere gets overloaded??? Of course, as elsewhere reported, same can often happen with com getting stuck right over the "www" part of the URL!
    3. AND, of course, the often reported "NO connection to the Internet", but computer shows good signal level and connection otherwise.
    4. Strangely enough, seems that the Airport Extreme wifi card sort of "warms up the the internet" as one proceeds to start using it. It eventually picks up on a network, and often "improves" its connection over time!
    5. Built in Airport Extreme seems to not exhibit up all immediately surrounding networks. Sensitivity issue?? iStumbler does.
    6. iStumbler permanently posts noise level of 9% regardless of how close to my wireless router/broadband modem I am. Anyone uses iStumbler to monitor network traffic?
    This is getting longuish: I just want to get over all those p*ant issues and get into putting my a/v stuff together!!
    - Roger T
    Thanks for just reading all this!. I am not sure it is all fixable (back to the Win "features" terminology, really meaning "bugs"??)

    Thanks, BDaqua. This support forum is quite well stocked: I have been perusing all its nooks and cranies!
    On the www.dslreports.com - All things Mac - forum, I spotted a couple of mentions of the following type of infromation:
    link: »www.hardmac.com/news/2007-07-27/#7039
    - The first TechNote provides information concerning the Airport problem affecting the MBP Santa Rosa (but also other Mac Intel). When used on battery, the wireless connection drops and one can even experience kernel panic. Apple Centers are asked not to exchange affected notebook as this is due to a unidentified bug in the Atheros driver, and should be fixed in the future with a simple Airport system update. So for the moment, unfortunate users are asked to directly power their notebook when using wireless network, or using Ethernet connection when running on battery... in other words, turn your notebook into a desktop
    to forum · permalink
    I am wondering if you and folks on this close-to-Apple forum know anything about this. At least, we could just await remedy instead of messing around endlessly looking for solutions and... pondering as to whether it was a wise thing to purchase an expensive machine which happens to have trouble communicating online. After all, seems that the Mac folks are prone to spend MORE time online uploading/downloading music and videos instead of my being normally doing with the rest of my (Win) computers, i.e. work on customer lists, correspondence, inventories, accounting, data bases, etc....
    So, seems to me we do have a pb and Apple might just save a few $$$ on silly ads and get to work on com instead. if nothing else to avoid the appearance of further - admittedly rather funny - ad-spoofs!
    So back to your further inquiry. I run a wireless network from a HughesNet satellite modem, thru a Linksys WRT54GL wireless router, into some nearby office LANed desktops and point of sale equipment, to another neighbouring facility via wireless bridge, and to my Mac laptop. Distance from the laptop to the router: 50 ft max.
    It all works surprizingly very well: up to 200kbps up and 1000 kbps down (in prime time, 150 up and 600 down). OK, my set up looks complex and incurring LOTS of activity. Actually, online activity is quite minimal and well scheduled - right now I am the only machine on the network online. Otherwise, our office processes online money wiring for customers among other things.
    I'll try your DNS server choice on the Mac settings first. Will report accordingly.
    Thanks for everything!
    - Roger T

  • How to configure JSS 4 with Firefox 21.0 to to use with HTTPS client authentication? It´s supposed that JSS allows an applet to access Mozilla user´s cert

    We are trying to use HTTPS client certificate based authentication to access a Java Applet in Firefox v21.0. We have followed the instructions as per the below two urls to enable JSS 4 -
    https://developer.mozilla.org/en-US/docs/JSS/Using_JSS<br />
    http://docs.oracle.com/javase/6/docs/technotes/guides/deployment/deployment-guide/keystores.html<br />
    http://download.java.net/jdk8/docs/technotes/guides/deployment/deployment-guide/keystores.html
    We are using JRE version 1.7.0_25-b16 Java HotSpot(TM) Client VM in Firefox v21 but we are getting - <br />
    security: Accessing keys and certificate in Mozilla user profile: null<br />
    security: JSS is not configured
    followed by SSK handshake failure when trying to load the client certificate.
    <pre><nowiki>javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure
    at sun.security.ssl.Alerts.getSSLException(Unknown Source)
    at sun.security.ssl.Alerts.getSSLException(Unknown Source)
    at sun.security.ssl.SSLSocketImpl.recvAlert(Unknown Source)
    at sun.security.ssl.SSLSocketImpl.readRecord(Unknown Source)
    at sun.security.ssl.SSLSocketImpl.performInitialHandshake(Unknown Source)
    at sun.security.ssl.SSLSocketImpl.startHandshake(Unknown Source)
    at sun.security.ssl.SSLSocketImpl.startHandshake(Unknown Source)
    at sun.net.www.protocol.https.HttpsClient.afterConnect(Unknown Source)
    at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(Unknown Source)
    at sun.net.www.protocol.https.HttpsURLConnectionImpl.connect(Unknown Source)
    at sun.plugin.PluginURLJarFileCallBack.connect(Unknown Source)
    at sun.plugin.PluginURLJarFileCallBack.retrieve(Unknown Source)
    at sun.net.www.protocol.jar.URLJarFile.retrieve(Unknown Source)
    at sun.net.www.protocol.jar.URLJarFile.getJarFile(Unknown Source)
    at sun.net.www.protocol.jar.JarFileFactory.get(Unknown Source)
    at sun.net.www.protocol.jar.JarURLConnection.connect(Unknown Source)
    at sun.plugin.net.protocol.jar.CachedJarURLConnection.connect(Unknown Source)
    at sun.plugin.net.protocol.jar.CachedJarURLConnection.getJarFileInternal(Unknown Source)
    at sun.plugin.net.protocol.jar.CachedJarURLConnection.getJarFile(Unknown Source)
    at com.sun.deploy.security.DeployURLClassPath$JarLoader.getJarFile(Unknown Source)
    at com.sun.deploy.security.DeployURLClassPath$JarLoader.access$1000(Unknown Source)
    at com.sun.deploy.security.DeployURLClassPath$JarLoader$1.run(Unknown Source)
    at java.security.AccessController.doPrivileged(Native Method)
    at com.sun.deploy.security.DeployURLClassPath$JarLoader.ensureOpen(Unknown Source)
    at com.sun.deploy.security.DeployURLClassPath$JarLoader.<init>(Unknown Source)
    at com.sun.deploy.security.DeployURLClassPath$3.run(Unknown Source)
    at java.security.AccessController.doPrivileged(Native Method)
    at com.sun.deploy.security.DeployURLClassPath.getLoader(Unknown Source)
    at com.sun.deploy.security.DeployURLClassPath.getLoader(Unknown Source)
    at com.sun.deploy.security.DeployURLClassPath.getResource(Unknown Source)
    at sun.plugin2.applet.Plugin2ClassLoader$2.run(Unknown Source)
    at java.security.AccessController.doPrivileged(Native Method)
    at sun.plugin2.applet.Plugin2ClassLoader.findClassHelper(Unknown Source)
    at sun.plugin2.applet.Applet2ClassLoader.findClass(Unknown Source)
    at sun.plugin2.applet.Plugin2ClassLoader.loadClass0(Unknown Source)
    at sun.plugin2.applet.Plugin2ClassLoader.loadClass(Unknown Source)
    at sun.plugin2.applet.Plugin2ClassLoader.loadClass0(Unknown Source)
    at sun.plugin2.applet.Plugin2ClassLoader.loadClass(Unknown Source)
    at sun.plugin2.applet.Plugin2ClassLoader.loadClass(Unknown Source)
    at java.lang.ClassLoader.loadClass(Unknown Source)
    at sun.plugin2.applet.Plugin2ClassLoader.loadCode(Unknown Source)
    at sun.plugin2.applet.Plugin2Manager.initAppletAdapter(Unknown Source)
    at sun.plugin2.applet.Plugin2Manager$AppletExecutionRunnable.run(Unknown Source)
    at java.lang.Thread.run(Unknown Source)</nowiki></pre>
    The client cert based authentication is working when using IE v8 and IE v9 with the same JRE version (JRE version 1.7.0_25-b16 Java HotSpot(TM) Client VM)
    Any help to resolve this issue will be very much appreciated.

    Thank you for your response.
    Yes we have added the client certificate file (.pfx) in the Firefox browser Certificate manager / Store. It's also showing the certificate in the View Certificate window. We could not resolve it yet.

  • Error when accessing Commands menu

    While executing
    PDMXI_PUBLIC_DOMAIN_LTD_CREATE_CSS_FILE_FROM_SCRIPT_TAGS_1
    canAccept Command in Strip CSS To External File.htm, the follwoing
    Javascript error(s) occurred:
    At line 11 of file "D:\Program FIles\Macromedia\Dreamweaver
    8\Configuration\commands\Strip Css To External File.js":
    TypeError: dreamweaver.getDocumentDOM() has no properties
    My machine is using Windows XP Pro OS. When a search is done
    for the named file in this error message it does not exist.
    I cannot access any commands menu items because of this
    problem.
    Please help,
    Thanks
    Neil

    Try the steps in this TechNote:
    Troubleshooting JavaScript errors in Dreamweaver
    http://www.adobe.com/go/19105
    Try this step first about deleting the WinFileCache.dat file:
    http://www.adobe.com/cfusion/knowledgebase/index.cfm?id=tn_19105#dat
    Hope this helps,
    David Alcala
    Adobe Technical Support

  • Accessing help causes Dreamweaver to crash

    I'm quite frustrated due to the crash of all help functions
    that are not on the web for my new install of Dreamweaver. I'm
    running on an HP laptop and when I go to the help menu or click on
    a help button I get the "send / don't send" crash dialogue for
    Dreamweaver.
    If I go to the help files directly, outside of Dreamweaver, I
    can open them correctly.
    Any idea what might be tangled up in the install?

    See if this TechNote helps:
    Dreamweaver crashes when accessing help system when Internet
    Explorer 7 is
    installed
    http://www.adobe.com/go/6d7a2c59
    David Alcala
    Adobe Product Support

  • Using the Security Manager to restrict access to a single package

    After reading up on the Security Manager, the package.access property and the use of the [accessClassInPackage RuntimePermission|http://java.sun.com/javase/6/docs/technotes/guides/security/permissions.html#RuntimePermission] , it seemed to me that it would possible to set up the following: I have a security-sensitive code base packaged in a jar, and I want to make sure that only one client code base that I specify is permitted to access it. The idea here is to prevent malicious code from executing anything in the sensitive code base; the sensitive code is only accessible to one client that I name in a security policy file. Perhaps rather foolishly, I advised a client to consider this before testing out a sample myself, because much to my surprise, it appears to me that it isn't possible to get the Security Manager to do this at all. Am I missing something? I'm a bit startled by this conclusion -- it seems like such an obvious use for the Security Manager, I'm hard-pressed to be believe that it can't be done, and more inclined to suspect that I'm going about it wrong.
    Here's what I thought I could do: set up the package.access property so that it denies access to any package; then in the policy file, grant the RuntimePermission/accessClassInPackage to the client code base that is permitted to access the sensitive code.
    Of course, you wouldn't want the package.access property to exclude all packages in the global java.security file, because then no code could be accessed at all. It would be necessary to use the trick of resetting the package.access property within the code, as [illustrated in the secure coding guidelines|http://java.sun.com/security/seccodeguide.html#1-1a] .
    But the problem lies in the idea of "use the package.access property to deny access to +any+ package". There doesn't seem to be any way to use wildcards or the like with the property -- it has to specifically name packages (or package prefixes) to which access is forbidden. It wouldn't do to try to name the packages to which I'm trying to prevent access, since we're trying to prevent access from malicious code -- the attacker could just choose package names that aren't on the list. I'd really need to say that access is denied to all packages, except for those in the permitted code base, but the security mechanisms for package access don't seem to allow that.
    Moreover, the trick of changing the value of package.access can't be done within the client code -- otherwise, the attacker client would just set the property to his own purposes. But it can't really be done within the sensitive package either, because the whole idea is to prevent access to that package, and by the time it's busy setting the property, it's already too late, because the package has to have been accessed by a client to get there at all.
    It seems to me that this a symptom of something I've never really understood about the design of the Security Manager -- you can grant permissions to specific code bases, but you can't revoke permissions from specific code bases, let alone all code bases. What I want to do here is grant access permission to one specific code base and revoke it from all others. There doesn't seem to be any way to express that with the mechanisms of the Security Manager.
    The more I look at it, the more it seems that there's just no way to use the Security Manager this way -- set up package access so that a specific code base can only be accessed by one specific client code base. There are surely other ways to get the effect that I'm looking for, but as far as I can tell, none of them involve restricting package access (for example: define a custom permission, grant it only to the permitted client. and check against that permission within the sensitive code base; meaning that the sensitive code has to be accessible to anyone in the first place). This conclusion really surprises me (not to mention my bit of embarrassment with the client); wouldn't this be precisely the sort of thing the Security Manager ought to be good for?

    You're looking at this back to front. The security policy file is there for the client to decide how much access he is going to give this application, not for to application to restrict who can use it. If you want to control what used to be called 'state orientation' you can do that directly by looking down the stack trace inside your code.

  • Sun's PKCS#11 Bridge to access LunaSA HSM

    Hi,
    I'm working to access keys/certificates on LunaSA HSM through Sun's Java PKCS#11 Bridge. By
    ks = KeyStore.getInstance("pkcs11");
    ks.load(null,pin);
    I can access credentials on the HSM, but only "part" of them -- Only the certificates that have keys also on the HSM can be identified by their aliases.
    For example, if on the HSM are a trusted certificate, whose alias is 'trustedcert', a user certificate and its private key (whose aliases are 'mycert' and 'mykey'), by
    ks.aliases();
    I got 'mykey' and 'mycert' only, but not 'trustedcert'. I got the same problem when I tried with "keytool".
    Is there a solution to this problem, or did I miss something? Thanks for your advice.

    Doesn't even begin to look right. See the [Java PKCS#11 Reference Guide|http://java.sun.com/javase/6/docs/technotes/guides/security/p11guide.html#Config]:
    - Valid values for operation are generate, import, and *. You have nothing.
    - Valid values for keytype are CKO_PUBLIC_KEY, CKO_PRIVATE_KEY, and CKO_SECRET_KEY. You have CKO_CERTIFICATE.
    - Valid values for keyalgorithm are one of the CKK_xxx constants from the PKCS#11 specification, or * to match keys of any algorithm. You have nothing.

  • Z-index related / access layer below

    Hi there,
    I'm building off of an image map coded by someone else. I
    have a large image with the maps marked. Over the maps are layer
    divs with a z-index that are to act as rollovers, showing full
    alpha on rollover and 0 visibility on mouseout. Great - works fine.
    The image maps are under the layer above. When I click the mouse,
    the faux-rollover no longer should appear and I need to access the
    image change of the large image below. As of now when I click the
    dispaly changes to none, though the image map onMouseDown does not
    work. — Is there a way I can work with the pre-exsting code
    to make this work. (I could go into slicing, though the simpler the
    better.
    thank you!

    Can you show us the code, please? Or better yet, post a link
    to the page?
    Murray --- ICQ 71997575
    Adobe Community Expert
    (If you *MUST* email me, don't LAUGH when you do so!)
    ==================
    http://www.dreamweavermx-templates.com
    - Template Triage!
    http://www.projectseven.com/go
    - DW FAQs, Tutorials & Resources
    http://www.dwfaq.com - DW FAQs,
    Tutorials & Resources
    http://www.macromedia.com/support/search/
    - Macromedia (MM) Technotes
    ==================
    "JenMQui" <[email protected]> wrote in
    message
    news:f4car2$m7e$[email protected]..
    > Hi there,
    >
    > I'm building off of an image map coded by someone else.
    I have a large
    > image
    > with the maps marked. Over the maps are layer divs with
    a z-index that are
    > to
    > act as rollovers, showing full alpha on rollover and 0
    visibility on
    > mouseout.
    > Great - works fine. The image maps are under the layer
    above. When I click
    > the
    > mouse, the faux-rollover no longer should appear and I
    need to access the
    > image
    > change of the large image below. As of now when I click
    the dispaly
    > changes to
    > none, though the image map onMouseDown does not work. ?
    Is there a way I
    > can
    > work with the pre-exsting code to make this work. (I
    could go into
    > slicing,
    > though the simpler the better.
    >
    > thank you!
    >

  • How to connect ms access in swing application  JDeveloper

    hi guys,
    How do I do to connect MSAccess database in a swing application in JDeveloper?

    Just wondering, you asked how to connect to MS Access from a swing app being developed on JDev...
    Are you using ADF ? Or just using JDev to develop a plain vanilla java swing app ?
    If not using ADF :
    You could try the JDBC ODBC bridge. http://download.oracle.com/javase/6/docs/technotes/guides/jdbc/bridge.html
    Might be better than half baked JDBC type 4 drivers for Access.
    If using ADF, I'm assuming you have an ADF model project and an ADF swing project. If you can manage to use the JDBC-ODBC bridge, you should be able to configure a DataSource for your model project as javax.sql.DataSource and javax.sql.ConnectionPoolDataSource are now supported though the bridge.
    Please keep in mind the warnings on http://download.oracle.com/javase/6/docs/technotes/guides/jdbc/bridge.html, especially the limited scalability and performance.

  • How to access complex arrays/types in a class

    public class VirusScanMessage {
    public byte[] fileContent;
    public int fileSize;
    public String messages;
    public String datLocation;
    jclass clazz = env->FindClass("VirusScanMessage");
    // get field
    jfieldID byteArrayField = env->GetFieldID(clazz,"fileContent","[b");
    // get the byteArray object
    jbyteArray byteArray = env->GetObjectField(object,byteArrayField);
    // get array length
    jsize fileContentLength = env->GetArrayLength(byteArray);
    jbyte * fileContent = env->GetByteArrayElements(byteArray,0);
    // do stuff
    // release array
    env->ReleaseByteArray(byteArray,fileContent,0);thats the normal way but how to access the arrays if they are complex like this(struct1,class2)?:
    public class VirusScanMessage {
    public struct1[] fileContent;
    public int fileSize;
    public String messages;
    public String datLocation;
    public class2 cl2;
    }

    Note that your code is missing error checking.
    thats the normal way but how to access the arrays if they are complex like this(struct1,class2)?:Retrieve each item from the array as an Object.
    [http://java.sun.com/javase/6/docs/technotes/guides/jni/spec/functions.html#wp21671]

  • Access arabic from db and display in textfield

    I have saved arabic in MS Access database which is showing arabic well
    but in a JTextField it looks line ?????? ?????
    how can i solve this problem ..?

    Maybe you need to specify the character set ("windows-1256"?) to be used by the JDBC driver (I assume you use the JDBC-ODBC bridge). See http://java.sun.com/javase/6/docs/technotes/guides/jdbc/bridge.html

Maybe you are looking for