Getting xyz of a transformgroup?

hi, i'm trying to do the impossible, an MMORPG in java, and i need some form of getting the xyz coords out of a TransFormGroup.
if there is any way to do this, please help.
thanks,
dude who programmes MMORPGs.

TransformGroup.getTransform(myTransform3D)
myTransform3D.get(myVector3F)
myX = myVector3F.x
...and so on. You have a choice of gets from the
Transform3Dthanks.i saw all the gets in the transform3D documentation in the APIs, but there were too many i never saw a vector3f one :)

Similar Messages

  • Session context getting expired

    Hi,
    I am making a call from my application to other application.I am setting the session ctx in my application .
    In my application i have a stateless session bean .If i do
    mySessionCtx.getCallerPrincipal().getName());
    lets say I am getting xyz.
    My bean calls different applications which are also stateless session bean.
    when the client session bean authenticates it is getting UNAUTHENTICATED but not xyz.So it throws exception .
    The session time out is configured from websphere as 30 min.
    The session gets timed out after 30 min the context xyz vanishes.So client bean is getting UNAUTHENTICATED instead of xyz.
    How can i configure session time out or context to exist for some time it in my code?
    One work around is changing timeout in websphere .But I need to configure in my code either session timeout or making session context to exist more than 30 min.
    Thanks and Regards

    Siva,
    There can be many factors for this: 'ClientSessionExpireMinutes'
    Defines the length of idle time that can pass before Oracle BI Presentation Server removes the user's client (browser) session information from its memory. This session includes user-specific state information such as request cache - dashboard page state - subject area information -connection information - and so on.
    Make sure while testing you are not doing anything on OBIEE browser window i.e. its idle
    Also, try to increase the minutes to say 240 and check how much time it takes ...??
    This shud solve..as this is very common problem with such tags..its not 100% guranteed !!

  • Where does CustomIDocumentPlugin:identifyIncomingDocument get doctype from

    When handling positional flat files it looks like doctype is not defaulting from B2B setups for oracle.tip.adapter.b2b.document.custom.CustomIDocumentPlugin:identifyIncomingDocument
    oracle.tip.adapter.b2b.document.custom.CustomIDocumentPlugin:identifyIncomingDocument Enter
    oracle.tip.adapter.b2b.document.custom.CustomIDocumentPlugin:identifyIncomingDocument non-XML Payload
    oracle.tip.adapter.b2b.document.custom.CustomIDocumentPlugin:identifyIncomingDocument iDoc ECS = xyzECS.ecs
    oracle.tip.adapter.b2b.document.custom.CustomIDocumentPlugin:identifyIncomingDocument start pos = 71
    oracle.tip.adapter.b2b.document.custom.CustomIDocumentPlugin:identifyIncomingDocument end pos = 75
    oracle.tip.adapter.b2b.document.custom.CustomIDocumentPlugin:identifyIncomingDocument key = [METH]
    oracle.tip.adapter.b2b.document.custom.CustomIDocumentPlugin:identifyIncomingDocument value = [METH]
    oracle.tip.adapter.b2b.document.custom.CustomIDocumentPlugin:identifyIncomingDocument target = [METH]
    oracle.tip.adapter.b2b.document.custom.CustomIDocumentPlugin:identifyIncomingDocument doctype = xyz, doctype revision = 1.0
    oracle.tip.adapter.b2b.document.custom.CustomIDocumentPlugin:identifyIncomingDocument Exit
    the doctype that I have defined in B2B is different than what's being identifyed by CustomIDocumentPlugin
    message only gets processed if I go and change my doctype name to whats in the log.

    I understand start and end position, they are matching. but its identifying the doc type as lets say "xyz" and revison 1.0 , where as there is no such setup in Oracle B2B. my question was where is it getting "xyz" and 1.0. it always defaults to doc type as "xyz" and revision 1.0
    If I go and change my B2B setups (doc type as "xyz") only then the document gets processed or else it errors saying agreement not found.
    This is very strange , is it possible that the doc type is somehow getting derived from ecs and not B2B setups ?

  • Java3D - how to get the viewing frustum coordinates

    Hi all!
    I am so desperate to find out how to retrieve the viewing frustum (truncated pyramid) coordinates (xyz) in Java3D.
    Please let me know. I checked the API docs but no luck.
    I am sure there must be some way (or method) of extracting these (xyz) coodrinates from this frustum.
    Thanks!

    firstly I humbly admit I am not that familiar with openGL so I dont know what those functions are doing ..but still I might be missing what is it you are looking for...u saying "to get xyz" coordinates of truncated pyramid ... u need 8 points (depending on the way you wanna calculate it)to create viewing frustum so which one u looking for? ....btw there is a viewing frustum method to get points but unfortunately due to j3d setup by the time u get them using that method 2 frames will go by .... so
    View view = viewer.getView();
    double point1 = view.getBackClipDistance() * SOME_CONSTANT;
    double point2 = view.getFrontClipDistance();
    double point3 = view.getFieldOfView();
    double point4 = (double) view.getCanvas3D(0).getWidth() /
    (double) view.getCanvas3D(0).getHeight();
    double point5 = Math.tan(point3 / SOME_CONSTANT) * point2;
    double point6 = point5 / point4;
    double point7 = (point5 / point1) * point1;
    double point8 = point7 / point4;
    now just just normals and u can setup up your 6 planes of the view frustum ...

  • Download files from application server - unknown file name

    Hello everybody,
    I am working on a report allowing users to download XML files from the application server. All these XML files are created by the SAP system and their names can be found in a table. I can simply use OPEN DATASET for these files, put all file content to a buffer and send them to the GUI with CALL METHOD cl_gui_frontend_services=>gui_download.
    The problem is now that some files are touched by an external document management system. These files are moved to another directory and timestamped. The first is no problem since the folder name is always the same and can be replaced before the OPEN DATASET statement. But additionally, the file gets a timestamp, when the filename was xyz.xml before, it now gets xyz.xml.01012008123456123456. As I cannot try all possible values (mircoseconds!), I need a way to search for the right filename on the application server. Is there a function module for this available?
    It can always be stated that the former name (xyz.xml) is still a unique prefix, so I don't have to worry that xyz.xml.* will return multiple files.
    Thanks in advance for any suggestions.
    Christoph

    HI!
    I copy the function GET_DIRECTORY_FILE. In the eyelash of tables create one structures:
    DIR_FILES           LIKE                  ZDIR_FILES
    The single structure has component NAME (char 250).
    I code of the function that I use is:
    FUNCTION zget_directory_file.
    ""Interfase local
    *"  IMPORTING
    *"     REFERENCE(NAME_OF_DIR) TYPE  CHAR120
    *"     REFERENCE(NAME_OF_FILE) TYPE  CHAR120 OPTIONAL
    *"     REFERENCE(SP_CS) TYPE  CHAR120 OPTIONAL
    *"  TABLES
    *"      DIR_FILES STRUCTURE  ZDIR_FILES
      DATA: a_dir_name TYPE  char120,
            a_generic_name TYPE  char120,
            a_must_cs TYPE  char120.
      a_dir_name      = name_of_dir.
      a_generic_name  = name_of_file.
      a_must_cs       = sp_cs.
      DATA: errcnt(2) TYPE p VALUE 0.
      IF a_dir_name IS INITIAL.
       MESSAGE e220.     " 'Place cursor on valid line !'.
      ENDIF.
      CALL 'C_DIR_READ_FINISH'             " just to be sure
          ID 'ERRNO'  FIELD file_list-errno
          ID 'ERRMSG' FIELD file_list-errmsg.
      CALL 'C_DIR_READ_START' ID 'DIR'    FIELD a_dir_name
                              ID 'FILE'   FIELD a_generic_name
                              ID 'ERRNO'  FIELD file-errno
                              ID 'ERRMSG' FIELD file-errmsg.
      IF sy-subrc <> 0.
        sy-subrc = 4.
        EXIT.
      ENDIF.
      file-dirname = a_dir_name.
      DO.
        CLEAR file.
        file-name = '*.zip'.
        CALL 'C_DIR_READ_NEXT'
          ID 'TYPE'   FIELD file-type
          ID 'NAME'   FIELD file-name
          ID 'LEN'    FIELD file-len
          ID 'OWNER'  FIELD file-owner
          ID 'MTIME'  FIELD file-mtime
          ID 'MODE'   FIELD file-mode
          ID 'ERRNO'  FIELD file-errno
          ID 'ERRMSG' FIELD file-errmsg.
        file-dirname = a_dir_name.
        MOVE sy-subrc TO file-subrc.
        CASE sy-subrc.
          WHEN 0.
            CLEAR: file-errno, file-errmsg.
            CASE file-type(1).
              WHEN 'F'.                 " normal file.
                PERFORM filename_useable USING file-name file-useable.
              WHEN 'f'.                 " normal file.
                PERFORM filename_useable USING file-name file-useable.
              WHEN OTHERS.              " directory, device, fifo, socket,...
                MOVE sap_no  TO file-useable.
            ENDCASE.
            IF file-len = 0.
              MOVE sap_no TO file-useable.
            ENDIF.
          WHEN 1.                     " end of directory
            EXIT.
          WHEN 4.                     " filename too long
            MOVE sap_no TO file-useable.
          WHEN OTHERS.
            ADD 1 TO errcnt.
            IF errcnt > 90.
              EXIT.
            ENDIF.
            IF sy-subrc = 5.
              MOVE: '???' TO file-type,
                    '???' TO file-owner,
                    '???' TO file-mode.
            ELSE.
            ULINE.
            WRITE: / 'C_DIR_READ_NEXT', 'SUBRC', SY-SUBRC.
            ENDIF.
            MOVE sap_no TO file-useable.
        ENDCASE.
       PERFORM p6_to_date_time_tz(rstr0400) USING file-mtime
                                                  file-mod_time
                                                  file-mod_date.
      * Does the filename contains the requested pattern?
      * Then store it, else forget it.
       MOVE-CORRESPONDING file TO file_list.
       APPEND file_list.
        MOVE file-name TO dir_files-name.
        APPEND dir_files.
       IF a_must_cs = no_cs.
         MOVE-CORRESPONDING file TO file_list.
         APPEND file_list.
       ELSE.
         IF file-name CS a_must_cs.
           MOVE-CORRESPONDING file TO file_list.
           APPEND file_list.
         ENDIF.
       ENDIF.
      ENDDO.
    ENDFUNCTION.
    *&      Form  filename_useable
          text
         -->A_NAME     text
         -->A_USEABLE  text
    FORM filename_useable USING a_name a_useable.
    *--================--
      DATA l_name(75).
      l_name = a_name.
      IF l_name(4) = 'core'.
        a_useable = sap_no.
      ELSE.
        a_useable = sap_yes.
      ENDIF.
    ENDFORM.                    "FILENAME_USEABLE
    With this I obtain all the archives XML of that route in a table
    DATA: zfiles LIKE STANDARD TABLE OF zdir_files WITH HEADER LINE.
    CALL FUNCTION 'ZGET_DIRECTORY_FILE'
      EXPORTING
        name_of_dir = dsn
      TABLES
        dir_files   = zfiles.
    IF sy-subrc = 0.
      LOOP AT zfiles .
        IF  zfiles-name+0(2) = 'O_' AND
            zfiles-name+2(3) = sy-mandt AND
            zfiles-name+5(1) = '_' AND
           zfiles-name+22(4) = '.xml'.
          file = zfiles-name.
    endloop.
    endif.
    I hope this helps you.
    Regards.

  • Error with SSL Message

    Hello Guys,
    I am implementing solution where in I need to post http request to a secure server. I am using following mechanisam to talk to the ssl server. But when I run the program on my local machine I get following error. Can you guys please help me out since I have limited knowledge of security API and I need to get this done in very short time. Please help me understand necessary steps required to resolve this issue.
    Thanks
    Code
    SSLSocketFactory factory = (SSLSocketFactory)SSLSocketFactory.getDefault();
    tunnelHost = "<my proxy server >";
    tunnelPort = "<proxy server port>";
    tunnel = new Socket(tunnelHost, tunnelPort);
    doTunnelHandshake(tunnel, host, port ,username , password);
    socket =(SSLSocket)factory.createSocket(tunnel, host, port, true);
    socket.addHandshakeCompletedListener(
    new HandshakeCompletedListener()
         public void handshakeCompleted(
         HandshakeCompletedEvent event)
              {"\t CipherSuite:" + event.getCipherSuite());
              System.out.println(
              "\t SessionId " + event.getSession());
              System.out.println(
              "\t PeerHost "+
              event.getSession().getPeerHost());
    socket.startHandshake();
    socket.close();
    tunnel.close();
    } catch (Exception e) {
         e.printStackTrace();
    private void doTunnelHandshake(Socket tunnel, String host, int port , String username , String password)
    throws IOException
    OutputStream out = tunnel.getOutputStream();
    String AuthString = new String("NORTHAMERICA\\"+username+ ":" + password );
    byte [] AuthBytes = AuthString.getBytes();
    char []AuthChar = Base64encode(AuthBytes);
    String test = String.valueOf(AuthChar);
    String ProxyAuthorization = new String("Proxy-Authorization: Basic " + test);
    String msg = "CONNECT " + host + ":" + port + " HTTP/1.0\n"
    + "User-Agent: Java SSL Sample\n"
    + "Host: FSM Gateway\n"
    + "Proxy-Connection: Keep-Alive\n"
    + "Pragma: No-Cache\n"
    + ProxyAuthorization
    + "\r\n\r\n";
    byte b[];
    try {
    b = msg.getBytes("ASCII7");
    } catch (UnsupportedEncodingException ignored) {
    * If ASCII7 isn't there, something serious is wrong, but
    * Paranoia Is Good �
    b = msg.getBytes();
    out.write(b);
    out.flush();
    byte reply[] = new byte[200];
    int replyLen = 0;
    int newlinesSeen = 0;
    boolean headerDone = false; /* Done on first newline */
    InputStream in = tunnel.getInputStream();
    boolean error = false;
    while (newlinesSeen < 2) {
    int i = in.read();
    if (i < 0) {
    throw new IOException("Unexpected EOF from proxy");
    if (i == '\n') {
    headerDone = true;
    ++newlinesSeen;
    } else if (i != '\r') {
    newlinesSeen = 0;
    if (!headerDone && replyLen < reply.length) {
    reply[replyLen++] = (byte) i;
    * Converting the byte array to a string is slightly wasteful
    * in the case where the connection was successful, but it's
    * insignificant compared to the network overhead.
    String replyStr;
    try {
    replyStr = new String(reply, 0, replyLen, "ASCII7");
    } catch (UnsupportedEncodingException ignored) {
    replyStr = new String(reply, 0, replyLen);
    /* We asked for HTTP/1.0, so we should get that back */
    if (!replyStr.startsWith("HTTP/1.0 200")) {
    throw new IOException("Unable to tunnel through "
    + tunnelHost + ":" + tunnelPort
    + ". Proxy returns \"" + replyStr + "\"");
    System.out.println("tunneling Handshake was successful!");
    Exception is javax.net.ssl.SSLException: Unrecognized SSL message, plaintext connection?
    at com.sun.net.ssl.internal.ssl.InputRecord.b(Unknown Source)
    at com.sun.net.ssl.internal.ssl.InputRecord.read(Unknown Source)
    at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(Unknown Source)
    at com.sun.net.ssl.internal.ssl.SSLSocketImpl.j(Unknown Source)
    at com.sun.net.ssl.internal.ssl.SSLSocketImpl.startHandshake(Unknown Source)
    at SSLSocketClient.doIt(SSLSocketClient.java:166)
    at SSLSocketClient.main(SSLSocketClient.java:54)
    Debug information is
    keyStore is :
    keyStore type is : jks
    init keystore
    init keymanager of type SunX509
    trustStore is: C:\Program Files\Java\j2re1.4.2_06\lib\security\cacerts
    trustStore type is : jks
    init truststore
    adding as trusted cert:
    Subject: CN=Baltimore CyberTrust Code Signing Root, OU=CyberTrust, O=Baltimore, C=IE
    Issuer: CN=Baltimore CyberTrust Code Signing Root, OU=CyberTrust, O=Baltimore, C=IE
    Algorithm: RSA; Serial number: 0x20000bf
    Valid from Wed May 17 09:01:00 CDT 2000 until Sat May 17 18:59:00 CDT 2025
    adding as trusted cert:
    Subject: CN=Entrust.net Secure Server Certification Authority, OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/CPS incorp. by ref. (limits liab.),
    Issuer: CN=Entrust.net Secure Server Certification Authority, OU=(c) 1999 Entrust.net Limited, OU=www.entrust.net/CPS incorp. by ref. (limits liab.),
    Algorithm: RSA; Serial number: 0x374ad243
    Valid from Tue May 25 11:09:40 CDT 1999 until Sat May 25 11:39:40 CDT 2019
    adding as trusted cert:
    Subject: CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE
    Issuer: CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE
    Algorithm: RSA; Serial number: 0x20000b9
    Valid from Fri May 12 13:46:00 CDT 2000 until Mon May 12 18:59:00 CDT 2025
    adding as trusted cert:
    Subject: CN=VeriSign Class 3 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Net
    Issuer: CN=VeriSign Class 3 Public Primary Certification Authority - G3, OU="(c) 1999 VeriSign, Inc. - For authorized use only", OU=VeriSign Trust Net
    Algorithm: RSA; Serial number: 0x9b7e0649a33e62b9d5ee90487129ef57
    Valid from Thu Sep 30 19:00:00 CDT 1999 until Wed Jul 16 18:59:59 CDT 2036
    adding as trusted cert:
    init context
    trigger seeding of SecureRandom
    done seeding SecureRandom
    tunneling Handshake was successful!
    Socket is 15e83f9[SSL_NULL_WITH_NULL_NULL: Socket[addr=/10.0.1.38,port=80,localport=2133]]
    %% No cached client session
    *** ClientHello, TLSv1
    RandomCookie: GMT: 1115833203 bytes = { 119, 0, 234, 70, 240, 74, 55, 9, 64, 89, 133, 251, 64, 160, 105, 25, 113, 219, 252, 65, 240, 228, 184, 117, 235,
    Session ID: {}
    Cipher Suites: [SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_
    Compression Methods:  { 0 }
    main, WRITE: TLSv1 Handshake, length = 73
    main, WRITE: SSLv2 client hello message, length = 98
    main, handling exception: javax.net.ssl.SSLException: Unrecognized SSL message, plaintext connection?
    main, SEND TLSv1 ALERT: fatal, description = unexpected_message
    main, WRITE: TLSv1 Alert, length = 2
    main, called closeSocket()
    javax.net.ssl.SSLException: Unrecognized SSL message, plaintext connection?
    at com.sun.net.ssl.internal.ssl.InputRecord.b(Unknown Source)
    at com.sun.net.ssl.internal.ssl.InputRecord.read(Unknown Source)
    at com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(Unknown Source)
    at com.sun.net.ssl.internal.ssl.SSLSocketImpl.j(Unknown Source)
    at com.sun.net.ssl.internal.ssl.SSLSocketImpl.startHandshake(Unknown Source)
    at SSLSocketClient.doIt(SSLSocketClient.java:166)
    at SSLSocketClient.main(SSLSocketClient.java:54)

    No it is not correct.
    The socket creation should be provided with the proper host and the port. the resource on the host is something you should ask your server (HTTP GET ... whatever).
    The https://abc.com:443 is equal to https://abc.com as the default port for https is 443. the host variable should be "abc.com" and the port "443" and the rest negotiated in application level (HTTP GET /XYZ [is not the proper syntax]).
    Further, with this description, the first url (https://server/resource:port) is not making any sense.
    You problem in first place is probably the host and port parameters (specifically the port has been set to 80 which most likely is wrong) . you need to consider the other port regarding newline and CRs buildging the proxy authentication header, but you debug logs suggest that your test proxy server takes it.

  • How to set Serial No column in a table

    Hi All,
          I want to create a SNo. column . With RFC i dint get this column and I have to create this additional column. Please someone help me with code.
    Thanks
    Uday
    Edited by: Uday Kumar Kanike on Jan 13, 2012 12:02 PM

    Dear Uday,
    Create the custom context  node and attributes (for populating rfc column data). also you can create extra attribute for Serial No. when you populating data from rfc, add the number in serial no.
    like:-
    wdContext.node<NODE>().invalidate();
    I<NODE>Element ele = null;
    for(int i=0; i<wdContext.node<RFC OUTPUT NODE>().size(); i++)
          ele = wdContext.create <NODE>Element();
          ele.setSerialNo(i OR i+1);
          //for other attribute
          ele.set<XYZ>(wdContext.node<RFC OUTPUT NODE>().get<RFC OUTPUT NODE>ElementAt(i).get<XYZ>());
          wdContext.node<NODE>().addElement(ele);
    Hope it will helps
    Best Regards
    Arun Jaiswal

  • How do I set a unix executable file as a default application for a file type?

    I have a bunch of files all with the same extension, abc. I compiled a program, xyz, from source (using MacPorts) to run through these files. Everything works great. The program is in /usr/local/bin/
    From a terminal window:
    /usr/local/bin/xyz ./somefile.abc
    How do I get xyz to launch .abc files from Finder by double clicking on them? If I "Get Info" for any .abc file, and go to the "Open with:" section, my program xyz is not there. If I click on "Other...", xyz is nowhere to be found and /usr/local/bin is not navigable.
    How do I get xyz in the Applications list?

    Platypus was exactly what I was looking for. To those who are interested:
    The script type I used was Perl.
    Create a new script:
    #!/usr/bin/perl
    system("/usr/local/bin/xyz '@ARGV[0]'");
    Make sure to Accept dropped items.
    I also changed the Output to "None", unchecked "Remain running after initial execution", and checked "Run in background".
    Thanks so much!

  • BTX Bluetooth Extender

    The other day I ordered the BTX Bluetooth Extender from BT-1. It is supposed to extend the bluetooth range by up to 100 feet (30 meters).
    I am currently running a Mac Mini with OS X version 10.6.2. I have a wireless Apple keyboard and a wireless Magic Mouse currently connected to the Mac Mini via bluetooth and everything is working perfectly. This is connected to the internal bluetooth set-up in the Mac.
    The BTX dongle that you plug into a USB slot is supposed to override the internal bluetooth set up in the Mac and all bluetooth devices should sinc with the BTX automatically when plugged into the USB slot.
    When I plug the BTX extender in, I lose the connection of the keyboard as well as mouse and they do not connect to the new bluetooth device. I've tried powering up with the BTX in as well as turning the keyboard and mouse off then on and still nothing. I've shut down and powered up with the BTX in and still no connection. I've also set the Bluetooth software in the PC to search for all devices just before I plug in the BTX and even after I lose the keyboard and mouse it is still scanning but no connection.
    Any suggestions? Thanks.
    Miles

    As mentioned, when the original bluetooth connection (from within the Mac Mini) is up and running I am paired with my mouse and keyboard and everything is working fine. Under the bluetooth options I get:
    "XYZ's Computer" is the name Bluetooth devices use to connect to this computer.
    When I plug in the BTX extender into my USB slot I lose my pairing on the mouse and keyboard and I get:
    "FLC-BTMDC746" is the name Bluetooth devices use to connect to this computer.
    So I think the device is being picked up and is overriding the Mac Mini's internal bluetooth. It is just that I am not able to pair my keyboard or mouse to the device.
    Thanks
    Miles

  • How to play DVD movie and video on Blackberry

    This guide is mainly about how to rip DVD and convert video to BlackBerry Storm. First, you should know what video format is BlackBerry Storm supports.
    Because DVD has CSS copyright protection, we need a program to rip DVD and convert video for BlackBerry Storm. The tool we use is BlackBerry Converter Suite, it includes two programs: DVD to BlackBerry Storm Converter and BlackBerry Storm Video Converter. This program not only supports BlackBerry Storm, but also BlackBerry Curve, BlackBerry Pearl and BlackBerry Bold series.
    It supports audio and video format as follow:
    Video: DVD, ISO, AVI, MPEG, MKV, MP4, MP4-AVC, M4V, WMV, MOV, 3GP, 3G2, MPG, FLV, ASF, VOB
    Audio: WMA, M4A, MP3, AAC, AC3, WMA
    For more info about this BlackBerry Converter Suite, you can refer to here.
    And here is the free download link, about 12.4 MB.
    Now, let’s start the guide about converting DVD and Video to BlackBerry Storm.
    Step1, Download and install the BlackBerry Storm converter, and then run it.  
    Step2. Load DVD into the software by clicking “Add DVD file”.
    Here we can load three kinds of DVD's:
    1. Real DVD, just put the DVD in your DVD drive and click load DVD, (you can find it by clicking the triangle on the right of 'load file' button.)
    2. DVD ISO image, you can amount your ISO files in the daemon tools and then load the virtual DVD drive.
    3. A DVD folder, sometimes you may store the DVD folder in your hard drive, it appears like "Video_TS" "Audio_TS" folders. You can load it by clicking the "load DVD folders" button.
    Step3. Select Profile, Subtitle, Audio, output directory setting
    After you load DVD into the software, click the Profile drop-down list to select the proper format according to your BlackBerry Type, this guide is mainly about how to convert DVD and video to BlackBerry Storm, so we select the “BlackBerry Storm series(*.mp4)” profile.
    Regular DVD movies usually have several subtitles such as English, French, German, etc. You can select one you prefer. You can also delete the subtitle by selecting “No Subtitle”. Selecting Audio is the same. If you want to join all your DVD files into one video file, please select the option named “Merge into one file”. For more advanced setting, you can open the setting panel by clicking “Setting”.
    Step4. Start the conversion
    After all things done, you can click the “Start” to begin the conversion; it will take about 30 minutes for converting a regular two hours DVD movie. When the conversion finished, click “find target” to located the converted video on your computer, connect your BlackBerry Storm to computer, and then copy the video to your BlackBerry memory card, that’s all. Then you can enjoy your favorites DVD movies on your BlackBerry Storm.
    For converting video to BlackBerry Storm, you can click “Video to BlackBerry” to run the BlackBerry Movie Converter, the operation steps are similar to DVD to BlackBerry Converter, So I’m not repeat here. But I want to add some tips to the BlackBerry Movie Converter.
    1. The Video to BlackBerry Converter supports batch conversion, so you can add multiple video files at one time.
    2. The Video to BlackBerry Converter embeds powerful video editing functions, you can use it to cut video, trim video, crop video, and you can even add a watermark to the video.
    3. The Video to BlackBerry Converter can also help you convert video file to MP3, WMA, AAC, etc audio, so you can set it as your BlackBerry ringtone.

    STOP.....WHAT DOES "HOW TO CONVERT DVD MOVIE AND SET THEM ON THE IPOD" HAS ANYTHING TO DO WITH THIS DISCUSSION FORUM?
    This is very simple:
    THe 5G IPOD is designed to seamsleslly play video acquired from the ITUNES music store. What does that mean? It means that if you get the video from the Itunes music store it should work, and if it does not work, you then post the relevant question in the ITUNES discussion forum.
    If you want to rip DVD's, by all means, search in websites like www.videohelp.com, or search in google. If you do not find the answer there, then search here.
    This particular question has been ASKED countless times and the last time I checked the forum was called Using Your 5th Generation IPOD", not "How do I get XYZ type video to play on the IPOD" nor "How do I use ABC program to rip, convert, a DVD"?
    Have you checked first the video specs of the video ipod? What formats, codecs, etc? before posting your question here?
    Don't get me wrong, we are here to help, but it is a little bit irritating to see newcomers post questions without having searched for the answers first, specially on a topic that has been addressed so many times as this one
    AMD ATHLON XP 1800+   Windows XP Pro   1GB RAM, 530 GB HDD BLACK IPOD 30GB DVD DECRYPTER VIDEORA IPOD CONVERTER

  • Issues with query using joins in 3 tables

    I am trying to fetch data from 3 tables (Project,RIsk and Issues) using join. There are Risks associated with some projects and Issues associated with some projects.
    ProjectID is primary key in Project table.
    RiskID is primary key in risk table. ProjectID is foreign key.
    IssueID is primary key in Issue table.ProjectID is foreign Key.
    I need the projectname, count of risks for projects, count of issues for projects. I am using joins in all the 3 tables. Issue here is, its giving me double of count of risks and issues for each project.
    Please advise how can I get the correct number. I have used the below query,
    select p.projectname,count(r.riskid),count(i.issueid) from project as p
    left outer join risk as r on p.projectid=r.projecctid
    left outer join issue as i on p.projectid=i.projectid
    group by
    p.projectname
    thanks

    Hi All,
    I got a new requirement to count, the number of high priority risks as well as high priority issues along with the other details. I modified the below table to include the changes, but I am not getting the desired result. Could you please help?
    Original query:
    select p.projectname,count(distinct r.riskid), count(distinct i.issueid) from project as p
    left outer join risk as r on p.projectid=r.projecctid
    left outer join issue as i on p.projectid=i.projectid
    group by p.projectname
    Modified query:
    select p.projectname,count(distinct r.riskid),sum(case when r.riskpriority='high' then 1 else 0 end), sum(case when i.issuepriority='high' then 1 else 0 end),count(distinct i.issueid) from project as p
    left outer join risk as r on p.projectid=r.projecctid
    left outer join issue as i on p.projectid=i.projectid
    group by p.projectnameI should get the desired result as:XYZ,8,1,4,4But I am getting:XYZ,8,4,4,32thanks for the reply.

  • How to move application from one machine to another..??

    Hi All,
    I have developed a application which I want to move it to a server, but when I use export i am getting XYZ.sql. And i tried to import it on server but I am getting some Schema errors.
    Please can anybody help me to move my application to other machine with DATABASE structure and Schema.
    Is there anyway to covert my application into a installable, as we install Sample Applications which brings Database tables and schema on to our system when we install it.
    Thanks Lot
    Yogesh

    Hi,
    I'm not sure if your situation is the same as mine but here is how I move my application between computers.
    Comp1: @WORK
    Comp2: @HOME
    1. Export the database on comp1:
    At command prompt type: exp system/password file=db.dmp full=Y
    2. Export the application on comp1:
    From inside ApEx go into your application, select Import/Export and export the following:
    - Application (i use file format DOS, owner override is the application owner and Run and Build Application)
    - CSS (export all css files)
    - Images (export the image files)
    3. Create a user in comp2 to receive the application:
    Log into ApEx as SYSTEM and create a user with full privileges (I use the same username on comp1 and comp2)
    Note: If the user already exists in comp2 I will delete (including all applications) and re-create (basically to start fresh)
    4. Import the database on comp2:
    At command prompt type: imp system/password file=db.dmp fromuser=MYUSER touser=MYUSER
    Note: MYUSER is the user you have created in step3, therefore only database objects from the export file for that user will be imported.
    (Now all my tables, packages, procedures, triggers etc are in the database).
    5. Import the application on comp2:
    Log into ApEx as MYUSER. Go into applications and select Import/Export and import the 3 files that were exported earlier
    At this point everything for me is working.
    BTW - I'm using the same version of XE on both machines.
    Hope this helps.
    Richard.

  • Utility of flex application

    I have one doubt if any of you can answer it. Flex
    application in the end generates SWF file. This file is definitely
    heavier then normal sites. Moreover if one is developing a photo
    gallery in flex i think it will take a lot of time loading the
    pages. Thats a drawback. One more thing. If someone say X needs
    some info on a topic related to photography and there is a site on
    photography in flex say xyz.com. If X searches with the keywords
    like photographs or photography then the chances of getting xyz.com
    in the search results are negligible. Then why develop sites in
    flex.

    "tejudb" <[email protected]> wrote in
    message
    news:gpdf7g$mfe$[email protected]..
    >I have one doubt if any of you can answer it. Flex
    application in the end
    > generates SWF file. This file is definitely heavier then
    normal sites.
    > Moreover
    > if one is developing a photo gallery in flex i think it
    will take a lot of
    > time
    > loading the pages. Thats a drawback. One more thing. If
    someone say X
    > needs
    > some info on a topic related to photography and there is
    a site on
    > photography
    > in flex say xyz.com. If X searches with the keywords
    like photographs or
    > photography then the chances of getting xyz.com in the
    search results are
    > negligible. Then why develop sites in flex.
    Most people aren't using Flex as an alternative for standard
    HTML sites.
    Instead, they're developing business applications. So the
    target users know
    where to find them (they are likely employed by or affiliated
    with the
    company that had them built) and someone has made a decision
    that the power
    gained in terms of data handling and experience control is
    worth the extra
    file size.
    HTH;
    Amy

  • Fault Policy - Handle Multiple Faults

    Hi,
    I have a requirement that i need to call a webservice Y from BPEL Process Z
    Both are on different networks.
    Y can return two types of fault
    1. Fault Xyz (Business Fault)
    2. Fault Pqr (Remote Fault)
    I need to create a fault policy so that
    when I get Xyz Fault it retries an an interval of 30 mins for 100 times.
    when I get Pqr Fault it retries an an interval of 5 mins for 100 times.
    I have implemented it, but it works bit differently that what i expect.
    The fault which comes first, the retry interval is taken of that fault.
    Below is my policy file:
    <faultPolicies xmlns="http://schemas.oracle.com/bpel/faultpolicy">
    <faultPolicy version="2.0.1" id="FPolicy123"
                   xmlns:env="http://schemas.xmlsoap.org/soap/envelope/"
                   xmlns:xs="http://www.w3.org/2001/XMLSchema"
                   xmlns="http://schemas.oracle.com/bpel/faultpolicy"
                   xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
    <Conditions>
         <faultName xmlns:ff="http://xmlns.oracle.com/testApplication/FP_1/B" name="ff:Xx11iFault">
              <condition>
                   <action ref="ora-retry"/>
    </condition>
         </faultName>
    <faultName xmlns:bpelx="http://schemas.oracle.com/bpel/extension" name="bpelx:remoteFault">
    <condition>
                   <action ref="ora-retry_rf"/>
    </condition>
         </faultName>
    </Conditions>
    <Actions>
         <Action id="ora-retry">
              <retry>
                   <retryCount>10</retryCount>
                   <retryInterval>30</retryInterval>
    <retryFailureAction ref="ora-terminate"/>
              </retry>
         </Action>
         <Action id="ora-retry_rf">
              <retry>
                   <retryCount>3</retryCount>
                   <retryInterval>15</retryInterval>
    <retryFailureAction ref="ora-terminate"/>
              </retry>
         </Action>
    <Action id="ora-terminate">
    <abort/>
    </Action>
    </Actions>
    </faultPolicy>
    </faultPolicies>
    Please suggest a solution on this.
    Thanks,
    Rosh

    What is the significance of retrying on business fault / binding fault ?
    According to the Oracle Documentation, there is no point in retrying.
    http://docs.oracle.com/cd/E12839_01/integration.1111/e10224/bp_faults.htm
    Refer *12.3.2.1 bindingFault* section, please
    Thanks,
    Vijay

  • How to trigger approval request for resources after assigning role

    Hi,
    We have a use case where we need to assign resources to user via assigning roles.
    In order to achive this use case
    1. we have created a role and assigned the access policy to it which contain the resources to be provisioned once the role is assigned to the user.
    2. Created a SOA composite having manager approval and assigned this composite to a approval policy of type 'Assign Role'.
    3. I am already having the approval policy for the resources which are present in roles. The approval policy of resources is of type "Provision Resource".
    4. Also the SOA composite for resource apporal is deployed in OIM and assigned to the approval policy.
    5. Now when I am raising the request from OIM of type "Assign Role" the approval defined in the SOA composite for Role approval gets triggered. After approving the role request the role is assigned to the user and also the resources defined in the access policy gets provisioned to teh user account.
    Now I want to trigger the resource approval process after the role approval instead of directly provisioning the resources. So that once the role is approved the individual Approval Process of resources part of roles should also gets invoked. Based on the approval or rejection of resources approval, the resource gets assigned to the user.
    Please let me know how to achieve the above use case.
    Thanks in advance

    Access policy is saying whoever gets xyz role, will get this abc resource. Now once a user gets xyz role, you are stopping to get abc resource? both are contradictory. Don't go through access policy. User is anyway going to request for roles. Modify your flow and make user request for resource. Have your composite and approval policy attached. User will get resource once it is approved.
    regards,
    GP

Maybe you are looking for