Data display issue in CF all non-IE browsers

The message title was a bit vague for all the factors
involved here so let me explain the problem in detail.
We are running ColdFusion 7, we use Oracle 9i and the
datatype of the field we are having issues with is a LONG field.
The data we are displaying is part of an application that has
an essay field. When we insert the data from the essay into the
Oracle 9i DB i can query the DB and get the correct result in SQL+
and Golden. The results are being stored as ASCII in the LONG
field. In IE displaying this data in any way works fine. However in
Firefox, Seamonkey, Opera or any other non-IE browser I've tested,
when I try to display the data in a text area or a text input even
I get a string filled with □. Also if I even try to output
the contents of the field in a cfoutput I cannot even copy the
string correctly, I only get the first letter.
So if i put in the essay field "Hello world" when I revisit
that page to edit it, it would look something like this
"H□e□l□l□o□
W□o□r□l□d□." I brought this into
ultraedit so I could try converting to see what exactly this
character represents (I had to view source, save the file and open
the saved file since copy and pasting is made impossible by
whatever is going on), and apparently the □ is the null
character.
[Edited: I am getting the null character in FF not in IE]
I am not entirely sure why I am getting a null character in
FF and not IE but I thought it might have something to do with the
fact that ColdFusion defaults to UTF-8 and the value is being
stored as ASCII. This is strange first off because I am not telling
CF to store the value to ASCII anywhere so you would think it would
default as UTF-8. Secondly I tried to force the page to default to
ASCII to see if that fixed the problem with <cfcontent
type="text/html; charset=us-ascii"> this would read the page as
ASCII but for some reason that field still comes in as UTF-8.
Bugged Display in
FCK editor
Bugged firefox
source of above display
Has anyone ever seen or heard of anything like this? It only
seems to happen with the LONG datatype because we have no issues on
any fields except fields that are LONG.
Thanks in advance for any assistance.

Where does the data come from (FCK Editor, MS Word, other)?
This problem happens when I am using a text area, a text
input or FCK editor I submit the data via a form and allow the user
to edit it later if necessary using the same means (i.e. text
input, text area or FCKeditor). But this only occurs on fields that
insert to LONG datatypes. VARCHAR2's are working fine.
If you look at the data directly in the database does it look
fine?
Yes the data looks exactly as it should when I look at it in
the DB.
Have you tried something like this:
<cfprocessingdirective pageencoding="us-ascii">
Not yet, I will try that now and let you know how it works
What popped into my head was that somewhere the data is
double-byte
characters that are not using the second byte so it is null,
then later
on it is being interpreted as single-byte characters which is
exposing
the nulls.
I definately think this is the problem but I don't know
enough about encoding and how CF handles it to know how to fix the
problem.
I'll keep you all updated on my progress, thanks for the
suggestions thus far.
I have not tried

Similar Messages

  • Data Displaying issue in ALV report

    Hi,
      I have made a ALV report,  the presetn display layout is as below
    it is displaying the material shortage reprot against issued production order
    ORDER NO.     Order Qty.     MATERIAL     TOTAL QTY     SHORTAGE QTY
    3000000     100     610     100     5
    3000000     100     101     200     43
    3000000     100     8795     400     400
    3000000     100     456     100     67
    3000001     50     548     50     33
    3000004     62     710     62     3
    3000005     15     7895     15     15
    3000020     11     456     22     10
    now the user requirement is the report should come as per below formate
    AT EACH NEW ORDER NUMBER :
    ****************first display main order no. and order qty.
    ORDER NO.     Order Qty
    3000000     100
    ************************then below this display the indiviual material and qty.
    MATERIAL     TOTAL QTY          SHORTAGE QTY
         610            100                     5
       101              200     43
    8795     400     400
    456     100     67
    *******again at new order******
    ORDER NO.       Order Qty
      3000001         50
    **********then below display the items
    MATERIAL     TOTAL QTY          SHORTAGE QTY
      548           50                 33
    how to do this is there any output layout with this i can get this formate in LAV report
    regards,
      zafar

    Hi Zafar,
    You can populate your internal table as per the requirement.
    at new order only.
    itab-Order = 3000000 .
    itab-Order quantity = 100.
    append itab
    for all materials for that order
    itab-MATERIAL       =   610 .
    itab-TOTAL QTY  = 100 .
    itab-SHORTAGE QTY = 5.
    append itab.
    Cheers,
    Suhail

  • Crystal report - Data display issue

    Hi all,
           I did a crystal report. the labels in the crystal report are
                    QTR1  QTR2  QTR3  QTR4
         If I select  the prompt value as QTR3, the values should display under QTR3, but data is displaying under QTR1
         If I select  the prompt value as QTR3 and QTR4, the values should display under QTR3 and QTR4 columns, but data is displaying under QTR1& QTR2.
    i.e., the data is displaying in an order starting from first column.
    Please let me know if I need to change any prompt settings to get the data in the order I needed.
    Thanks in Advance.
    Regards,
    Viswa

    there are 2 ways this can be done.
    do they only run one qtr at a time?
    you can create a group for each quarter
    create a parameter to pull by quarter.
    in the record selection place this statement
    (if {@qtr}=0 then true else = {@qtr})
    in the parameter place 0 if the qtr is numeric value otherwise place ALL (replace the 0 in the record selection with all if necc)
    this will retrieve all the qtrs or the qtr specified.
    if you create groupings for the qtrs place the value of the qtr in the details section below where you want to display qtr 2.
    you will need to create formulas to differentiate the qtrs.
    if qtr1 in date to date then $ amount
    create a formula for all qtrs. this will display the dollar or value for the qtr date range only. otherwise a zero or null will be displayed.
    right click on the section and go to section expert
    in supress section click on the formual button
    if qtr=1 then true. (keep in mind it is a supression formula so true will supress the qtr, false will display)
    then on the values in the the detail section you can supress those based upon a formula also like above.

  • Date Display issue

    Hi,
    i have a date field in the bean , when i display the date using outputText tag, it is displaying one day less, i tried printing the date on console from bean, it is showing correctly....
    can any one tell me...why it is happend? and suggest a solution.

    Hi Balu,
    here is the code snippet...
    <html>
    <head>
        <%@ taglib uri="http://java.sun.com/jsf/html" prefix="h"%>
        <%@ taglib uri="http://java.sun.com/jsf/core" prefix="f"%>
    </head>
    <body>
    <h:dataTable var="bonuslist"  value="#{focal.empBonus}">
            <h:column id="monthyearcolumn">
            <f:facet name="header">
                <h:outputText value="Month/Year" id="monthyearhead"/>
            </f:facet>
                <h:selectOneMenu value="#{bonuslist.paymentDate}" id="monthyear">
                           <f:selectItems value="#{focal.dateslist}"/>
                    </h:selectOneMenu>
                <h:outputText value="#{bonuslist.paymentDate}"/>
            </h:column>into the drop down also i am getting the data from the same table, it is displaying correctly, but the output text is displaying one day less....
    can you help me....(h:outputText is just for testing purpose as the drop down is not selecting the correct item , for checking purpose i am using outputText )

  • Render Data displaying over media PP CS6 in all panels. Can't toggle off.

    Hi
    I am getting render data displaying in all panels. It is generally useful info, but it stays on even as I play the footage. How can I toggle this off? It seems to be the same kind of switch as Safe Margins. But I don't see it anywhere.
    Many thanks!
    Moti

    Yeah I figured I was not making myself clear.
    I have not at all been able to find any help on this issue anywhere.
    I've attached a picture below which shows what I'm talking about.
    Hope this makes the issue clearer.
    Many thanks for the response!!
    Moti

  • SSDT - SQL Server Data Tools - display issue

    In SSDT 2010 SSAS project, Dimension Usage --> Define Relationship window
    The display has problem to see everything. In the "Define Relationship" windows, the Relationship section overlap the measure group table display. I can only see upper half the measure group table font.
    Can someone help to let me know what is the issue?

    Hi Tie,
    According to your description, there are some display problems when you design a SQL Server Analysis Services project in SQL Server Data Tools, right?
    In your scenario, does this issue occur on only this project or all the projects? In your scenario, please create a sample SSAS project and then check if this issue occurs on the new project or not?
    If this issue occurs on only this project, then the issue is related to your cube structure, please to restart SSDT to check if this issue persists or not. If the issue persists, please provide us more information about your cube settings.
    If this issue occurs on all the projects, then the issue is related to SSDT. To avoid this issue, you can use SQL Server Data Tools – Business Intelligence for Visual Studio 2012 to build you SSAS project. It available on the link below
    http://www.microsoft.com/en-in/download/details.aspx?id=36843
    http://blogs.msdn.com/b/analysisservices/archive/2013/03/06/sql-server-data-tools-business-intelligence-for-visual-studio-2012-released-online.aspx
    Regards,
    Charlie Liao
    TechNet Community Support

  • Unicode and non-unicode string data types Issue with 2008 SSIS Package

    Hi All,
    I am converting a 2005 SSIS Package to 2008. I have a task which has SQL Server as the source and Oracle as the destination. I copy the data from a SQL server view with a field nvarchar(10) to a field of a oracle table varchar(10). The package executes fine
    on my local when i use the data transformation task to convert to DT_STR. But when I deploy the dtsx file on the server and try to run from an SQL Job Agent it gives me the unicode and non-unicode string data types error for the field. I have checked the registry
    settings and its the same in my local and the server. Tried both the data conversion task and Derived Column task but with no luck. Pls suggest me what changes are required in my package to run it from the SQL Agent Job.
    Thanks.

    What is Unicode and non Unicode data formats
    Unicode : 
    A Unicode character takes more bytes to store the data in the database. As we all know, many global industries wants to increase their business worldwide and grow at the same time, they would want to widen their business by providing
    services to the customers worldwide by supporting different languages like Chinese, Japanese, Korean and Arabic. Many websites these days are supporting international languages to do their business and to attract more and more customers and that makes life
    easier for both the parties.
    To store the customer data into the database the database must support a mechanism to store the international characters, storing these characters is not easy, and many database vendors have to revised their strategies and come
    up with new mechanisms to support or to store these international characters in the database. Some of the big vendors like Oracle, Microsoft, IBM and other database vendors started providing the international character support so that the data can be stored
    and retrieved accordingly to avoid any hiccups while doing business with the international customers.
    The difference in storing character data between Unicode and non-Unicode depends on whether non-Unicode data is stored by using double-byte character sets. All non-East Asian languages and the Thai language store non-Unicode characters
    in single bytes. Therefore, storing these languages as Unicode uses two times the space that is used specifying a non-Unicode code page. On the other hand, the non-Unicode code pages of many other Asian languages specify character storage in double-byte character
    sets (DBCS). Therefore, for these languages, there is almost no difference in storage between non-Unicode and Unicode.
    Encoding Formats: 
    Some of the common encoding formats for Unicode are UCS-2, UTF-8, UTF-16, UTF-32 have been made available by database vendors to their customers. For SQL Server 7.0 and higher versions Microsoft uses the encoding format UCS-2 to store the UTF-8 data. Under
    this mechanism, all Unicode characters are stored by using 2 bytes.
    Unicode data can be encoded in many different ways. UCS-2 and UTF-8 are two common ways to store bit patterns that represent Unicode characters. Microsoft Windows NT, SQL Server, Java, COM, and the SQL Server ODBC driver and OLEDB
    provider all internally represent Unicode data as UCS-2.
    The options for using SQL Server 7.0 or SQL Server 2000 as a backend server for an application that sends and receives Unicode data that is encoded as UTF-8 include:
    For example, if your business is using a website supporting ASP pages, then this is what happens:
    If your application uses Active Server Pages (ASP) and you are using Internet Information Server (IIS) 5.0 and Microsoft Windows 2000, you can add "<% Session.Codepage=65001 %>" to your server-side ASP script.
    This instructs IIS to convert all dynamically generated strings (example: Response.Write) from UCS-2 to UTF-8 automatically before sending them to the client.
    If you do not want to enable sessions, you can alternatively use the server-side directive "<%@ CodePage=65001 %>".
    Any UTF-8 data sent from the client to the server via GET or POST is also converted to UCS-2 automatically. The Session.Codepage property is the recommended method to handle UTF-8 data within a web application. This Codepage
    setting is not available on IIS 4.0 and Windows NT 4.0.
    Sorting and other operations :
    The effect of Unicode data on performance is complicated by a variety of factors that include the following:
    1. The difference between Unicode sorting rules and non-Unicode sorting rules 
    2. The difference between sorting double-byte and single-byte characters 
    3. Code page conversion between client and server
    Performing operations like >, <, ORDER BY are resource intensive and will be difficult to get correct results if the codepage conversion between client and server is not available.
    Sorting lots of Unicode data can be slower than non-Unicode data, because the data is stored in double bytes. On the other hand, sorting Asian characters in Unicode is faster than sorting Asian DBCS data in a specific code page,
    because DBCS data is actually a mixture of single-byte and double-byte widths, while Unicode characters are fixed-width.
    Non-Unicode :
    Non Unicode is exactly opposite to Unicode. Using non Unicode it is easy to store languages like ‘English’ but not other Asian languages that need more bits to store correctly otherwise truncation will occur.
    Now, let’s see some of the advantages of not storing the data in Unicode format:
    1. It takes less space to store the data in the database hence we will save lot of hard disk space. 
    2. Moving of database files from one server to other takes less time. 
    3. Backup and restore of the database makes huge impact and it is good for DBA’s that it takes less time
    Non-Unicode vs. Unicode Data Types: Comparison Chart
    The primary difference between unicode and non-Unicode data types is the ability of Unicode to easily handle the storage of foreign language characters which also requires more storage space.
    Non-Unicode
    Unicode
    (char, varchar, text)
    (nchar, nvarchar, ntext)
    Stores data in fixed or variable length
    Same as non-Unicode
    char: data is padded with blanks to fill the field size. For example, if a char(10) field contains 5 characters the system will pad it with 5 blanks
    nchar: same as char
    varchar: stores actual value and does not pad with blanks
    nvarchar: same as varchar
    requires 1 byte of storage
    requires 2 bytes of storage
    char and varchar: can store up to 8000 characters
    nchar and nvarchar: can store up to 4000 characters
    Best suited for US English: "One problem with data types that use 1 byte to encode each character is that the data type can only represent 256 different characters. This forces multiple
    encoding specifications (or code pages) for different alphabets such as European alphabets, which are relatively small. It is also impossible to handle systems such as the Japanese Kanji or Korean Hangul alphabets that have thousands of characters."<sup>1</sup>
    Best suited for systems that need to support at least one foreign language: "The Unicode specification defines a single encoding scheme for most characters widely used in businesses around the world.
    All computers consistently translate the bit patterns in Unicode data into characters using the single Unicode specification. This ensures that the same bit pattern is always converted to the same character on all computers. Data can be freely transferred
    from one database or computer to another without concern that the receiving system will translate the bit patterns into characters incorrectly.
    https://irfansworld.wordpress.com/2011/01/25/what-is-unicode-and-non-unicode-data-formats/
    Thanks Shiven:) If Answer is Helpful, Please Vote

  • No problem with this with my MacBook Pro or ipod Touch. My iphone keeps displaying incorrect password. All software is up to date.

    I am unable to sign-in to my iphone4 to make purchases or update apps. There is no problem with my MacBook Pro or ipod Touch when logging in to iTunes or Apple.com. My iphone keeps displaying incorrect password. All software is up to date. This very strange. Any suggestions how to resolve this problem as it is quite frustrating.

    Sig,
    Thanks for the advice. I finally tried a solution after doing nothing. LoL. What I did do was change the channel the router was on from 9 to 7. I think I've done something like this in the past when I had slow internet and that worked out well too. I thought that would help and so far so good. Not an interruption so far but we shall see. To the guy or girl who expressed that they had the same problem as me I would try changing the channel of your router like I did. I will monitor the situation and see if it totally solved my problem or not and keep this thread updated. Thanks people

  • 10.5.3 Update display issue. None of the already discussed...

    I've calibrated my display at a colour management facility some weeks ago, and took a screen picture of the brightness setting in system preferences... so that i could recall it in case i changed the brightness by accident.
    well, after updating couple days ago, i was asked to restart my computer. i did restart, but the computer acted weirdly, taking a lot of time installing extra stuff and eventually auto-restarting extra 2 times before showing my desktop again.
    once it did, i noticed right away my screen was a little darker and maybe with lesss contrast. I checked Display preferences (Adjuts display brightness left Uncheked) and with the brightness slider at the same point as usual, it was significantly darker. Actually, i need almost full brightness to get the same white that was 70% brightness before the update.
    I see a lot of people with display issues after that update, what is going on?
    ps: i'm using 2008 LED 15" MBP

    That extra stuff your computer was installing may have been things that Software Update downloaded automatically but didn't install at the time. Don't worry, restarting twice is normal. By chance did you notice a drop in brightness after the update when running on battery power? When you unplug a MacBook Pro, the screen automatically dims a bit to save energy.

  • HPPavilion dv6000 notebook display issue

    System -Notebook Hp pavilion dv6000 GPU- NVidia Geforce 8400 MGS
    P/d- FM428EA#ABU
    S/n-[edited]
    Model-dv6920ea
    Place of Purchase-United Kingdom. 
    Operating System: Windows 8.1 Pro 64-bit (6.3, Build 9600) (9600.winblue_gdr.130913-2141)
    Language: English (Regional Setting: English)
    System Manufacturer: Hewlett-Packard
    System Model: HP Pavilion dv6700 Notebook PC
    BIOS: Ver 1.00PARTTBL
    Processor: Intel(R) Core(TM)2 Duo CPU T5750 @ 2.00GHz (2 CPUs), ~2.0GHz
    Memory: 4096MB RAM
    Available OS Memory: 4094MB RAM
    Page File: 1760MB used, 3742MB available
    Windows Dir: C:\Windows
    DirectX Version: DirectX 11
    Problem is :-
    1. Black Screen at startup.
    2. No automatic booting.
    3. FN key used to proceed booting.
    4. Monitor lid close and open brings back the display.
    5. Display goes frequently, brought back by lid close and open.
    6. Not more than 1200 x 768 display resolution available
    Please tell me how to fix this problem.
    Best Regards
    Mehroz

    Hi Mehroz,
    Thank you for visiting the HP Support Forums and Welcome. I have read your thread on your HP Pavilion dv6920ea Notebook and getting errors on startup. Try performing a hard reset.
    When performing a hard reset please note remove any and all USB devices, and remove memory cards from the card reader slot. Disconnect all non-essential devices.
    If that does not help try to turn on the computer you start to press F11 repeatedly till the menu opens. You can do a system restore. The HP Support Assistant will help you keep the computer software and drivers up to date. 
    The final thing you should try is to restore the BIOS defaults.
    Hope this helps you.
    Thanks.
    Please click “Accept as Solution ” if you feel my post solved your issue, it will help others find the solution.
    Click the “Kudos, Thumbs Up" on the bottom to say “Thanks” for helping!

  • Finder date display- Yosemite

    My Macbook Pro has been having slowness problems, and I just noticed some folders have unusual date displays: 2014 M04 17:50.
    I have never seen the M, which must mean month before yesterday. Anybody have some light to shine on this?
    I have run MacScan for tracking cookies and spyware- found 2 Safari tracking cookies, but nothing else. Also ran Adwaremedic- nothing found.

    Mac users often ask whether they should install "anti-virus" (AV) software. The usual answer is "no." That answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions.
    It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to take control of it remotely. That threat is in a different category, and there's no easy way to defend against it. AV software is not intended to, and does not, defend against such attacks.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't been checked for security by Apple unless it comes from the App Store, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has taken far too long to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. Those lapses don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, not machine behavior, and no technological fix alone is going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're better informed than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software. A genuine alert that Flash is outdated and blocked is shown on this support page. Follow the instructions on the support page in that case. Otherwise, assume that the alert is fake and someone is trying to scam you into installing malware. If you see such alerts on more than one website, ask for instructions.
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Rogue websites such as Softonic, Soft32, and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission. All "YouTube downloaders" are in this category, though not all are necessarily malicious.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a padlock icon in the address bar when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial AV or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It can be as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • Display issue on brand new 2014 X1 Carbon Touch

    So I was about to start raving about my X1C that I just received. Loving the display, the keyboard, build quality, etc. I had no gripes and was just browsing away when suddenly the screen did the full glitch. I recognize this as what happens when something's messed with the motherboard/display adapter. So I gave it a reset. All was normal and then it happened again. I was able to replicate it 3-4 times and it keeps happening. I never dropped it or anything. It was always just stationary.
    I can't believe this. I had problems with the first gen non-touch and touch. I was hoping by now they have improved.
    Link to image 1
    Link to image 2
    Link to image 3
    Moderator note: images totalling more than 50k converted to links per forum rules:  Lenovo Community Participation Rules

    Hi,
    Welcome to Lenovo Community Forums!
    I’m sorry to hear that you have display issues in your brand new Lenovo X1 carbon.
    From the snapshots, it seems like a cable/LCD issue. Is the display working fine when you connect it to an external monitor?
    Since it’s a brand new machine, I strongly recommend you to contact our technical support for assistance.
    Click here to open a link where you can select the country and get the exact contact support number. I’m sure they will be a great help.
    Best Regards,
    Mithun.
    Did someone help you today? Press the star on the left to thank them with a Kudo!
    If you find a post helpful and it answers your question, please mark it as an "Accepted Solution"! This will help the rest of the Community with similar issues identify the verified solution and benefit from it.
    Follow @LenovoForums on Twitter!

  • All non-Apple Wireless Clients won't Connect to Time Capsule

    I have a latest gen Apple 2TB TC (ME177LL/A) and have had it for about 14 months. I have never had any issue with it in the past and have perhaps only had to reset it twice in that 14 month span.
    Came home from work last night to watch some Netflix on my PS4, and noticed my PS4 couldn't connect to the network. In the PS4 OS I kept getting errors that said either the network no longer existed or my password was incorrect. I simply tried to re-enter my password multiple times, but only once was the PS4 successfully able to connect. The one time it did connect the network speed indicated in the PS4 speed test was less than 200 kpbs. Within moments, the PS4 lost connection again. I was unable to reconnect.
    At this point I figured I would just use the PS3 instead...same issue, however. Initially thought it was perhaps a PSN issue, but this time I never once could get the PS3 to connect. It repeatedly just said the network wasn't available or the password was incorrect. Went through the same troubleshooting steps that I did on the PS4 with no luck.
    At this point I realized my Lyric thermostat had been erroring out and giving me a notification on my phone---the app on my phone wasn't able to connect to the Lyric via Wifi. Also noticed my August Connect was flashing red and was not connected. DirecTV Genie was not connected to my TC network either. Then went to my home office to discover my Slingbox was no longer connected either. Interestingly enough, though, my iPhone, MacBook Pro, Mac Mini, wife's iPhone, and MacBook all were still connected to my TC network with no issues. I performed speed tests on all of them and all were giving me well over my 60 Gbps Internet speeds. These devices never disconnected nor had any hiccups.
    Essentially determined all my non-Apple devices couldn't stay connected to the TC network.
    Proceeded to just reset the TC and see what would happen. None of the non-Apple devices could connect. Same "Network not found/incorrect password"
    Then proceeded to perform factory reset on TC. At the same time I unplugged my Charter internet modem from power and cat5 out. Powered on modem, waited. Then powered up TC. I did this process twice through, once with auto selected 2.4/5 Ghz channels--still had issue with devices being unable to connect. The second time through, I set up the 2.4/5 Ghz bases upon the most "open" channels as shown by iStumblr (I live in fairly large luxury apartment building that has many networks -- so there are A LOT of networks).
    This time I appeared to have success. One-by-one I was able to connect all my non-Apple devices to this new network with the new SSID and credentials. All devices were able to connect and the PS3/PS4 were able to connect to PSN and I was very easily able to get Netflix.
    Woke up this morning and noticed all non-Apple devices were once again not connected....really not sure what's going on. Didn't have time to dive in deeper before heading to work.
    Just as an FYI, I have 2 different Macs backing up to the TC via Time Machine wirelessly (the primary reason I have a TC and not another router). Also have an Asustor AS5008T connected to the TC via round robin link aggregation. All Macs are running Yosemite. All iPhones are running iOS 8.3. Offhand, I don't know the firmware the TC is running. I made no recent changes to the network or any of the hardware.
    Anybody have any idea what could be the culprit? Any help would be greatly appreciated.

    Whilst I said in my first post that apple had removed all the logs.. you can still get them via PC version 5 airport utility... you will need to plug in via ethernet since wireless is not working. You can also install v5 utility into a Mac but I cannot tell you how. Google it.
    The other method.. and I am not at all sure if it is useful or not.
    Using the airport utility in an ipad.. click on the TC, then edit.. then advanced.. Diagnostics and Usage Data.
    Go into this and you will see the Airport utility has got a stack of info out of the TC..(for secret transmission to apple).
    eg
    I guess it is comparison between normal functionality and when it fails that will show something interesting.. meaning you will need to track the info... and it is not so easy to get it out other than as a screenshot..

  • ORA-01403 No Data Found Issue

    Hi,
    Im very new to streams and having a doubt regarding ORA-01403 issue happening while replication. Need you kind help on this regard. Thanks in advance.
    Oracle version : 10.0.3.0
    1.Suppose there are 10 LCRs in a Txn and one of the LCR caused ORA-01403 and none of the LCRs get executed.
    We can read the data of this LCR and manually update the record in the Destination database.
    Eventhough this is done, while re-executing the transaction, im getting the same ORA-01403 on the same LCR.
    What could be the possible reason.
    Since, this is a large scale system with thousands of transactions, it is not possible to handle the No data found issues occuring in the system.
    I have written a PL/SQL block which can generate Update statements with the old data available in LCR, so that i can re-execute the Transaction again.
    The PL/SQL block is given below. Could you please check if there are any issues in this while generating the UPDATE statements. Thank you
    /* Formatted on 2008/10/23 14:46 (Formatter Plus v4.8.7) */
    --Script for generating the Update scripts for the Message which caused the 'NO DATA FOUND' error.
    DECLARE
    RES NUMBER; --No:of errors to be resolved
    RET NUMBER; --A number variable to hold the return value from getObject
    I NUMBER; --Index for the loop
    J NUMBER; --Index for the loop
    K NUMBER; --Index for the loop
    PK_COUNT NUMBER; --To Hold the no:of PK columns for a Table
    LCR ANYDATA; --To Hold the Logical Change Record
    TYP VARCHAR2 (61); --To Hold the Type of a Column
    ROWLCR SYS.LCR$_ROW_RECORD; --To Hold the LCR caused the error in a Txn.
    OLDLIST SYS.LCR$_ROW_LIST; --To Hold the Old data of the Record which was tried to Update/Delete
    NEWLIST SYS.LCR$_ROW_LIST;
    UPD_QRY VARCHAR2 (5000);
    EQUALS VARCHAR2 (5) := ' = ';
    DATA1 VARCHAR2 (2000);
    NUM1 NUMBER;
    DATE1 TIMESTAMP ( 0 );
    TIMESTAMP1 TIMESTAMP ( 3 );
    ISCOMMA BOOLEAN;
    TYPE TAB_LCR IS TABLE OF ANYDATA
    INDEX BY BINARY_INTEGER;
    TYPE PK_COLS IS TABLE OF VARCHAR2 (50)
    INDEX BY BINARY_INTEGER;
    LCR_TABLE TAB_LCR;
    PK_TABLE PK_COLS;
    BEGIN
    I := 1;
    SELECT COUNT ( 1)
    INTO RES
    FROM DBA_APPLY_ERROR;
    FOR TXN_ID IN
    (SELECT MESSAGE_NUMBER,
    LOCAL_TRANSACTION_ID
    FROM DBA_APPLY_ERROR
    WHERE LOCAL_TRANSACTION_ID =
    '2.85.42516'
    ORDER BY ERROR_CREATION_TIME)
    LOOP
    SELECT DBMS_APPLY_ADM.GET_ERROR_MESSAGE
    (TXN_ID.MESSAGE_NUMBER,
    TXN_ID.LOCAL_TRANSACTION_ID
    INTO LCR
    FROM DUAL;
    LCR_TABLE (I) := LCR;
    I := I + 1;
    END LOOP;
    I := 0;
    K := 0;
    dbms_output.put_line('size >'||lcr_table.count);
    FOR K IN 1 .. RES
    LOOP
    ROWLCR := NULL;
    RET :=
    LCR_TABLE (K).GETOBJECT
    (ROWLCR);
    --dbms_output.put_line(rowlcr.GET_OBJECT_NAME);
    PK_COUNT := 0;
    --Finding the PK columns of the Table
    SELECT COUNT ( 1)
    INTO PK_COUNT
    FROM ALL_CONS_COLUMNS COL,
    ALL_CONSTRAINTS CON
    WHERE COL.TABLE_NAME =
    CON.TABLE_NAME
    AND COL.CONSTRAINT_NAME =
    CON.CONSTRAINT_NAME
    AND CON.CONSTRAINT_TYPE = 'P'
    AND CON.TABLE_NAME =
    ROWLCR.GET_OBJECT_NAME;
    dbms_output.put_line('Count of PK Columns >'||pk_count);
    DEL_QRY := NULL;
    DEL_QRY :=
    'DELETE FROM '
    || ROWLCR.GET_OBJECT_NAME
    || ' WHERE ';
    INS_QRY := NULL;
    INS_QRY :=
    'INSERT INTO '
    || ROWLCR.GET_OBJECT_NAME
    || ' ( ';
    UPD_QRY := NULL;
    UPD_QRY :=
    'UPDATE '
    || ROWLCR.GET_OBJECT_NAME
    || ' SET ';
    OLDLIST :=
    ROWLCR.GET_VALUES ('old');
    -- Generate Update Query
    NEWLIST :=
    ROWLCR.GET_VALUES ('old');
    ISCOMMA := FALSE;
    FOR J IN 1 .. NEWLIST.COUNT
    LOOP
    IF NEWLIST (J) IS NOT NULL
    THEN
    IF J <
    NEWLIST.COUNT
    THEN
    IF ISCOMMA =
    TRUE
    THEN
    UPD_QRY :=
    UPD_QRY
    || ',';
    END IF;
    END IF;
    ISCOMMA := FALSE;
    TYP :=
    NEWLIST
    (J).DATA.GETTYPENAME;
    IF (TYP =
    'SYS.VARCHAR2'
    THEN
    RET :=
    NEWLIST
    (J
    ).DATA.GETVARCHAR2
    (DATA1
    IF DATA1 IS NOT NULL
    THEN
    UPD_QRY :=
    UPD_QRY
    || NEWLIST
    (J
    ).COLUMN_NAME;
    UPD_QRY :=
    UPD_QRY
    || EQUALS;
    UPD_QRY :=
    UPD_QRY
    || ' '
    || ''''
    || SUBSTR
    (DATA1,
    0,
    253
    || '''';
    ISCOMMA :=
    TRUE;
    END IF;
    ELSIF (TYP =
    'SYS.NUMBER'
    THEN
    RET :=
    NEWLIST
    (J
    ).DATA.GETNUMBER
    (NUM1
    IF NUM1 IS NOT NULL
    THEN
    UPD_QRY :=
    UPD_QRY
    || NEWLIST
    (J
    ).COLUMN_NAME;
    UPD_QRY :=
    UPD_QRY
    || EQUALS;
    UPD_QRY :=
    UPD_QRY
    || ' '
    || NUM1;
    ISCOMMA :=
    TRUE;
    END IF;
    ELSIF (TYP =
    'SYS.DATE'
    THEN
    RET :=
    NEWLIST
    (J
    ).DATA.GETDATE
    (DATE1
    IF DATE1 IS NOT NULL
    THEN
    UPD_QRY :=
    UPD_QRY
    || NEWLIST
    (J
    ).COLUMN_NAME;
    UPD_QRY :=
    UPD_QRY
    || EQUALS;
    UPD_QRY :=
    UPD_QRY
    || ' '
    || 'TO_Date( '
    || ''''
    || DATE1
    || ''''
    || ', '''
    || 'DD/MON/YYYY HH:MI:SS AM'')';
    ISCOMMA :=
    TRUE;
    END IF;
    ELSIF (TYP =
    'SYS.TIMESTAMP'
    THEN
    RET :=
    NEWLIST
    (J
    ).DATA.GETTIMESTAMP
    (TIMESTAMP1
    IF TIMESTAMP1 IS NOT NULL
    THEN
    UPD_QRY :=
    UPD_QRY
    || ' '
    || ''''
    || TIMESTAMP1
    || '''';
    ISCOMMA :=
    TRUE;
    END IF;
    END IF;
    END IF;
    END LOOP;
    --Setting the where Condition
    UPD_QRY := UPD_QRY || ' WHERE ';
    FOR I IN 1 .. PK_COUNT
    LOOP
    SELECT COLUMN_NAME
    INTO PK_TABLE (I)
    FROM ALL_CONS_COLUMNS COL,
    ALL_CONSTRAINTS CON
    WHERE COL.TABLE_NAME =
    CON.TABLE_NAME
    AND COL.CONSTRAINT_NAME =
    CON.CONSTRAINT_NAME
    AND CON.CONSTRAINT_TYPE =
    'P'
    AND POSITION = I
    AND CON.TABLE_NAME =
    ROWLCR.GET_OBJECT_NAME;
    FOR J IN
    1 .. NEWLIST.COUNT
    LOOP
    IF NEWLIST (J) IS NOT NULL
    THEN
    IF NEWLIST
    (J
    ).COLUMN_NAME =
    PK_TABLE
    (I
    THEN
    UPD_QRY :=
    UPD_QRY
    || ' '
    || NEWLIST
    (J
    ).COLUMN_NAME;
    UPD_QRY :=
    UPD_QRY
    || ' '
    || EQUALS;
    TYP :=
    NEWLIST
    (J
    ).DATA.GETTYPENAME;
    IF (TYP =
    'SYS.VARCHAR2'
    THEN
    RET :=
    NEWLIST
    (J
    ).DATA.GETVARCHAR2
    (DATA1
    UPD_QRY :=
    UPD_QRY
    || ' '
    || ''''
    || SUBSTR
    (DATA1,
    0,
    253
    || '''';
    ELSIF (TYP =
    'SYS.NUMBER'
    THEN
    RET :=
    NEWLIST
    (J
    ).DATA.GETNUMBER
    (NUM1
    UPD_QRY :=
    UPD_QRY
    || ' '
    || NUM1;
    END IF;
    IF I <
    PK_COUNT
    THEN
    UPD_QRY :=
    UPD_QRY
    || ' AND ';
    END IF;
    END IF;
    END IF;
    END LOOP;
    END LOOP;
    UPD_QRY := UPD_QRY || ';';
    DBMS_OUTPUT.PUT_LINE (UPD_QRY);
    --Generate Update Query - End
    END LOOP;
    END;

    Thanks for you replies HTH and Dipali.
    I would like to make some points clear from my side based on the issue i have raised.
    1.The No Data Found error is happening on a table for which supplemental logging is enabled.
    2.As per my understanding, the "Apply" process is comparing the existing data in the destination database with the "Old" data in the LCR.
    Once there is a mismatch between these 2, ORA-01403 is thrown. (Please tell me whether my understanding is correct or not)
    3.This mismatch can be on date field or even on the timestamp millisecond as well.
    Now, the point im really wondering about :
    Some how a mismatch got generated in the destination database (Not sure about the reason) and ORA-01403 is thrown.
    If we could update the Destination database with the "Old" data from LCR, this mismatch should be resolved isnt it?
    Reply to you Dipali :
    If nothing is working out, im planning to put a conflict handler for all tables with "OVERWRITE" option. With the following script
    --Generate script for applying Conflict Handler for the Tables for which Supplymentary Logging is enabled
    declare
    count1 number;
    query varchar2(500) := null;
    begin
    for tables in (
    select table_name from user_tables where table_name IN ("NAMES OF TABLES FOR WHICH SUPPLEMENTAL LOGGING IS ENABLED")
    loop
    count1 := 0;
    dbms_output.put_line('DECLARE');
    dbms_output.put_line('cols DBMS_UTILITY.NAME_ARRAY;');
    dbms_output.put_line('BEGIN');
    select max(position) into count1
    from all_cons_columns col, all_constraints con
    where col.table_name = con.table_name
    and col.constraint_name = con.constraint_name
    and con.constraint_type = 'P'
    and con.table_name = tables.table_name;
    for i in 1..count1
    loop
    query := null;
    select 'cols(' || position || ')' || ' := ' || '''' || column_name || ''';'
    into query
    from all_cons_columns col, all_constraints con
    where col.table_name = con.table_name
    and col.constraint_name = con.constraint_name
    and con.constraint_type = 'P'
    and con.table_name = tables.table_name
    and position = i;
    dbms_output.put_line(query);
    end loop;
    dbms_output.put_line('DBMS_APPLY_ADM.SET_UPDATE_CONFLICT_HANDLER(');
    dbms_output.put_line('object_name => ''ICOOWR.' || tables.table_name|| ''',');
    dbms_output.put_line('method_name => ''OVERWRITE'',');
    dbms_output.put_line('resolution_column => ''COLM_NAME'',');
    dbms_output.put_line('column_list => cols);');
    dbms_output.put_line('END;');
    dbms_output.put_line('/');
    dbms_output.put_line('');
    end loop;
    end;
    Reply to u HTH :
    Our Destination database is a replica of the source and no triggers are running on any of these tables.
    This is not the first time im facing this issue. Earlier, we had to take big outage times and clear the Replica database and apply the dump from the source...
    Now i cant think about that situation.

  • Video Playback in synchroniz​ation to data display

    I've read a bunch of topics about recording live video, but my question has to do with playback synchronized to a data display.  I've got a simple black and white camera (RS170) already.  I'm going to get some sort of capture board.  I want to record video from this camera to the hard drive.  The reason is that this video file needs to be analyzed later so I need to store it on disk instead of memory as it could be days later.  While I'm recording video, another signal needs to be recorded.  It could be anything really, let us say temperature for discussion.  Assume everything is in place for this temp. acquisition. 
    Recording video to disk doesn't seem to be any problem.  My question relates to playing this video back such that when you play it, you can also look at a data display of the recorded temperatures that happened at the same time as the video was recorded.  If you were to drag the video slider manually (instead of just pressing play), the data display would also update accordingly.  This essentially syncs the data display of temperature with the video picture you are seeing.  Pressing play and just watching the video, the temp data would update itself with the correct historical values.  Pressing pause on the video, would of course freeze the temp display to the value at that time.  Wherever the video is, the temp data would have to display the correct historical value.
    I would need to record possibly a few hours of video a day so disk space could be an issue if using uncompressed AVI format.  I wouldn't have to save every days video file so I could eventually delete a bunch of the files.  I'd just save the days video that produces interesting results to examine later.  A number of video files might build up (a months worth?) before the directory is examined for possible deletes.  I'd like some feedback on this too from someone who has tried uncompressed AVI versus something else that is compressed.  Is performance OK if using compression? 
    The computer I'd be running this on is the latest workstation class machine from HP so it is a fairly powerful computer.
    Is there any sample code of doing this video playback indexing to data signal display?  I'm thinking there would have to be some function to know where the video is playing at all times and then historically retrieve the temperature data.  Is there performance issues with this?  I'd want it fairly accurate such that the smallest increment of a video frame (say 30 times a second) produced a proper data display for temperature.  In reality, my signal will change faster than a typical temperature value would.

    I doubt this will satisfy 100% of what you're looking for, but it should at least get the conversation started on developing some techniques we can use to syncronize acquired data playback (again, let's say temperature) with some external source. I don't know much about video playback, so I won't be able to help you much there, but I do know a lot about leveraging LabVIEW technology to play back data in real-time as best possible, while allowing the user (or the video playback itself) to dictate a specific position at any time, pause, etc...
    My first recommendation would be to save your acquired temperature data as a Waveform. Waveform is more or less like a cluster with three elements: a 1D array of Y-values, an intial time (t0), and the time between samples (dt). You can use these three pieces of information to reconstitute when each sample was acquired and what the timing should be configured for to play these samples back in real time. Search the web for information on writing Waveforms to file and reading them. You should find plenty there (or post somewhere else ).
    After that, we can use a Timed Loop for playback. Timed Loops allow you to set a desired Loop period. They also have a lot of other capabilities, such as setting priorities, handling the fact that your last loop didn't finish on time, etc. Here's a link with more info on Timed Loops. Other than that, Timed Loops can operate like regular while loops.
    My next idea is to incorporate a current position that we keep track of. This could be, for instance, the index of the current element in the 1D Y-values array. If you want this to involve user interaction with the front panel (for instance, changing a Slider value to reflect the playback position), then you could use an event structure with a timeout case set to zero. Then update the temperature value and increment the current position in the timeout case.
    You might take a look at the example I've written in LabVIEW 7.1 that "acquires" 5 seconds of sine wave data and plays it back in real time. The user can adjust the position or pause the playback at any time. Again, I don't know exactly how this would interface with video feedback. If you have more specifics about what method you will use to playback the video, maybe someone with more expertise in this area could help us out.
    Jarrod S.
    National Instruments
    Attachments:
    Signal_Playback_Realtime.vi ‏223 KB

Maybe you are looking for