How can we use C# to read dynamic parameter's value list from .rpt?

I'm using Cystal Report 2008. We know starting from CR XI we can create dynamic parameters, the list of items of this kind of parameter are fetching from database. So in general the SQLs to get the list of values for dynamic parameters are stored in the .rpt.
In Crystal Report Designer, if I preview a report with dynamic parameters, it will first query the database and then show the input dialog with list of values from database for user to choose. My question is can we implement the same thing by our C# code? I'm planning to use C# code to read this dynamic parameter's value list from .rpt and render them on the web page. Then pass back the user selected values to the .rpt to run the report after user make the choice. I didn't find any APIs can do this. Is it possible?
Thanks in advance!!

Hi,
Can you explain a bit in detail, I have similar scenario. I am using the following code but not getting the Column name for dynamic parameter list.
foreach (ParameterFieldDefinition prm
                          in reportDocument.DataDefinition.ParameterFields)
                try
                    string vParameterFieldName;                   
                    *vParameterFieldName = prm.ParameterFieldName.ToString();*
Shakeel

Similar Messages

  • How can I use a SCH-LC11 device in CHINA which bought from ebay. I am not Verizon customer but I prefer to using your 4G LTE Router . How can I get the unlock code? The device may have a bad ESN but I only use it in CHINA. Kindly looking forward your repl

    How can I use a SCH-LC11 device in CHINA which bought from ebay. I am not Verizon customer but I prefer to using your 4G LTE Router . How can I get the unlock code? The device may have a bad ESN but I only use it in CHINA. Kindly looking forward your reply. Thanks!

    It's good to read Antoniad's post.  It reassures me that I can use my new iPad as an international communication device which is the reason I purchased the thing.  However, I called Verizon today (my provider of cellular data) who told me that I can't just pop in a SIM card as you suggested.  He also said that he was from the "Pre-Pay" division of Verizon and he was certain that I couldn't do what I planned to do.  I was extremely disappointed as I had called Apple prior to buying the iPad and I read the algorhythm on the website for choosing an iPad before purchasing.  Those sources were quite specific and the information seemed clear.  I would be able to use my iPad to communicate through cellular connections while traveling on the road, literally, abroad.  I was told that I could pop in a data card wherever I was, just as you indicated in your message above, and voila I was good to go.  The Verizon rep definitively rained on that parade, but said that I might be able to do this if I have a "Post-Pay" account, a different area of Verizon.  I haven't had the chance to talk to this division yet, so I looked to Apple's Support for answers.  Maybe I will find out that I can use my iPad as an international communication device while traveling on the road afterall, however, it appears I may need a different type of account (Post-Pay), something I was never warned about. Can I switch to this kind of account?  I don't know.  I have to find out.  If you have any information about this issue, it would be good to share since I strongly suspect there are others who bought the iPad for the same purpose that I have.

  • How can I use counters to read the difference between two expernal pulse signals?

    I generated a pulse signal and sent it to a sensor which in turn gives me a pulse signal back. I need to read the time from which the sent the signal goes high to the time that the signal is returned. How can I read this? the diagram is attached
    Attachments:
    Timing_Diagram1.doc ‏256 KB

    Hello;
    The way to accomplish that is by using one of the 660x boards, and configure the counter to do "Edge Separation Method".
    That method will increment the counter event count value every time a pulse comes into its source input. The counters only increments between the rising edge of the aux line and the rising edge of the gate. The current value of the counter is read when the counter is finished or an error occurs. You need to wire the out pulse to the AUX line, and the return pulse to the gate line of the counter.
    Hope this helps.
    Filipe A.
    Applications Engineer
    National Instruments

  • How can I use counters to read the difference between two external pulse signals?

    I generated a pulse signal and sent it to a sensor which in turn gives me a pulse signal back. I need to read the time from which the sent the signal goes high to the time that the signal is returned. How can I read this? the diagram is attached
    Attachments:
    Timing_Diagram1.doc ‏256 KB

    There is vi called "Two Edge Separation Mesurement (NI-TIO).vi". In LV6.1 it is in "c:\...\LabVIEW 6.1\Examples\DAQ\Counter\ni-tio.llb".
    Unfortunately this function has no timeout. This means that your program will hang on if there are no pulses. I have attached an improved version of this vi with a timeout(sorry for the french text in the description). There are also some other improvements like the calculation of the edge separation in seconds (not only clock counts).
    This function will only work with NI-TIO cards (like 660x).
    Attachments:
    Two_Edge_Separation_Measurement_with_Timeout_(NI-TIO).vi ‏103 KB

  • How can I use the Adobe reader if the PDF documents are in iBooks?

    The Adobe reader asks me to look for an "Open in" button but iBooks does not appear to have one. I like IBooks because it synchronises nicely with the computer, and I can read the PDFs but I cannot highlight, add comments or add bookmarks unless I use the Adobe reader.

    Use iTunes to save the PDF FROM iBooks, and to add them to Adobe Reader.
    Connect your iPad to your computer. Bring up iTunes on your computer.
    To save a PDF FROM iBooks, click on "Books" in the Library section on the left. Select the PDF you want to save and right-click and choose Show in Finder (Show in Explorer in Windows). Go up one level in your computer hierarchy and you'll see all the "Books" (PDFs and eBooks) in iBooks.  You can leave them here if you want to view the PDFs in iBooks in the future, or drag them to the Desktop.
    To move the PDF TO Adobe Reader:
    Return to iTunes. Click on the iPad on the left in Devices. Click on the Apps tab. Scroll down the the File Sharing section as shown below. Click on Adobe Reader. Click the Add button and select the PDFs you identified in the previous step. They'll be added to Adobe Reader

  • How can I use oracle function to decode the encode value

    Hi everybody,
    If the data is encode value how can I decode this value

    DBMS_OBFUSCATION_TOOLKIT
    DBMS_OBFUSCATION_TOOLKIT allows an application to encrypt data using either the Data Encryption Standard (DES) or the Triple DES algorithms.
    The Data Encryption Standard (DES), also known as the Data Encryption Algorithm (DEA) by the American National Standards Institute (ANSI) and DEA-1 by the International Standards Organization (ISO), has been a worldwide encryption standard for over 20 years. The banking industry has also adopted DES-based standards for transactions between private financial institutions, and between financial institutions and private individuals. DES will eventually be replaced by a new Advanced Encryption Standard (AES).
    DES is a symmetric key cipher; that is, the same key is used to encrypt data as well as decrypt data. DES encrypts data in 64-bit blocks using a 56-bit key. The DES algorithm ignores 8 bits of the 64-bit key that is supplied; however, developers must supply a 64-bit key to the algorithm.
    Triple DES (3DES) is a far stronger cipher than DES; the resulting ciphertext (encrypted data) is much harder to break using an exhaustive search: 2**112 or 2**168 attempts instead of 2**56 attempts. Triple DES is also not as vulnerable to certain types of cryptanalysis as is DES. DES procedures are as follows:
    DESEncrypt Procedure
    DESDecrypt Procedure
    Oracle installs this package in the SYS schema. You can then grant package access to existing users and roles as needed. The package also grants access to the PUBLIC role so no explicit grant needs to be done.
    This chapter discusses the following topics:
    Overview of Key Management
    Summary of DBMS_OBFUSCATION Subprograms
    Overview of Key Management
    Key management, including both generation and secure storage of cryptographic keys, is one of the most important aspects of encryption. If keys are poorly chosen or stored improperly, then it is far easier for a malefactor to break the encryption. Rather than using an exhaustive key search attack (that is, cycling through all the possible keys in hopes of finding the correct decryption key), cryptanalysts typically seek weaknesses in the choice of keys, or the way in which keys are stored.
    Key generation is an important aspect of encryption. Typically, keys are generated automatically through a random-number generator. Provided that the random number generation is cryptographically secure, this can be an acceptable form of key generation. However, if random numbers are not cryptographically secure, but have elements of predictability, the security of the encryption may be easily compromised.
    The DBMS_OBFUSCATION_TOOLKIT package does not generate encryption keys nor does it maintain them. Care must be taken by the application developer to ensure the secure generation and storage of encryption keys used with this package. Furthermore, the encryption and decryption done by the DBMS_OBFUSCATION_TOOLKIT takes place on the server, not the client. If the key is passed over the connection between the client and the server, the connection must be protected using Oracle Advanced Security; otherwise the key is vulnerable to capture over the wire.
    Key storage is one of the most important, yet difficult aspects of encryption and one of the hardest to manage properly. To recover data encrypted with a symmetric key, the key must be accessible to the application or user seeking to decrypt data. The key needs to be easy enough to retrieve that users can access encrypted data when they need to without significant performance degradation. The key also needs to be secure enough that it is not easily recoverable by an unauthorized user trying to access encrypted data he is not supposed to see.
    The three options available to a developer are:
    Store the key in the database
    Store the key in the operating system
    Have the user manage the key
    Storing the Key in the Database
    Storing the keys in the database cannot always provide bullet-proof security if you are trying to protect data against the DBA accessing encrypted data (since an all-privileged DBA can access tables containing encryption keys), but it can provide security against the casual snooper, or against someone compromising the database files on the operating system. Furthermore, the security you can obtain by storing keys in the database does not have to be bullet-proof in order to be extremely useful.
    For example, suppose you want to encrypt an employee's social security number, one of the columns in table EMP. You could encrypt each employee's SSN using a key which is stored in a separate column in EMP. However, anyone with SELECT access on the EMP table could retrieve the encryption key and decrypt the matching social security number. Alternatively, you could store the encryption keys in another table, and use a package to retrieve the correct key for the encrypted data item, based on a primary key-foreign key relationship between the tables.
    A developer could envelope both the DBMS_OBFUSCATION_TOOLKIT package and the procedure to retrieve the encryption keys supplied to the package. Furthermore, the encryption key itself could be transformed in some way (for example, XORed with the foreign key to the EMP table) so that the key itself is not stored in easily recoverable form.
    Oracle recommends using the wrap utility of PL/SQL to obfuscate the code within a PL/SQL package itself that does the encryption. That prevents people from breaking the encryption by looking at the PL/SQL code that handles keys, calls encrypting routines, and so on. In other words, use the wrap utility to obfuscate the PL/SQL packages themselves. This scheme is secure enough to prevent users with SELECT access to EMP from reading unencrypted sensitive data, and a DBA from easily retrieving encryption keys and using them to decrypt data in the EMP table. It can be made more secure by changing encryption keys regularly, or having a better key storage algorithm (so the keys themselves are encrypted, for example).
    Storing the Key in the Operating System
    Storing keys in the operating system (that is, in a flat file) is another option. With Oracle8i you can make callouts from PL/SQL, which you could use to retrieve encryption keys. If you store keys in the O/S and make callouts to retrieve the keys, the security of your encrypted data is only as secure as the protection of the key file on the O/S. Of course, a user retrieving keys from the operating system would have to be able to either access the Oracle database files (to decrypt encrypted data), or be able to gain access to the table in which the encrypted data is stored as a legitimate user.
    User-Supplied Keys
    If you ask a user to supply the key, it is crucial that you use network encryption, such as that provided by Oracle Advanced Security, so the key is not passed from client to server in the clear. The user must remember the key, or your data is nonrecoverable.
    http://download-west.oracle.com/docs/cd/B10501_01/appdev.920/a96612/d_obtool.htm#ARPLS028
    Joel P�rez

  • HP6520 How can I use a new, but protected, 564 XL ink cartridge from my broken 6510 printer.

    My 6510 failed after just over one year of use.  I salvaged a brand new 564XL ink cartridge to use in my new 6520.  Message says - HP protected cartridge installed.  Replace Cartridge. 
    I have three more new cartridges from the 6510, color, that likely will have the same problem when I install them.  How can I get them to work in my 6520.

    Hi tsuribaka,
    Welcome to the HP Forums! I understand that you are trying to use the HP 564  XL ink cartridge, from your broken HP Photosmart 6510 with your new HP Photosmart 6520. I am happy to help you with this issue!
    In order to use those old cartridges, you must first use the setup cartridges that came with the new printer, in order for it to initialize. Once you put in those old cartridges the setup cartridges will become unusable. I recommended using up the setup cartridges first, then use the old cartridges that you have.
    Make sure to store the old cartridges, in an air-tight container, such as a zip-lock bag, or a Tupperware container. In a cool, dry place.
    Hope this information helps you, and thank you for posting!
    RnRMusicMan
    I work on behalf of HP
    Please click “Accept as Solution ” if you feel my post solved your issue, it will help others find the solution.
    Click the “Kudos Thumbs Up" to say “Thanks” for helping!

  • How can I use PowerShell 3.0 cmdlets or script to list all the local groups and local users of a server?

    Using PowerShell 3.0 (And if possible the CIM, not WMI cmdlet), how can I script with | out-file C:\<filename>.txt or .csv option to list all local user accounts & local groups
    on remote computers? 
    Thank You!

    I don't recall PowerShell V3 introducing anything new to handle local users and groups. You need to use PowerShell V1 methods, using the [ADSI] accelerator and the WinNT: provider. The scripts linked above show this. No need to use WMI (which would probably
    be slower).
    Here is a script I've used to enumerate all local groups and their members:
    $Computer
    = "MyServer"
    $Computer =
    [ADSI]"WinNT://$Computer"
    $Groups =
    $Computer.psbase.Children | Where {$_.psbase.schemaClassName
    -eq "group"}
    ForEach ($Group
    In $Groups)
        "Group: "
    + $Group.Name
        $Members
    = @($Group.psbase.Invoke("Members"))
        ForEach ($Member
    In $Members)
            $Class
    = $Member.GetType().InvokeMember("Class",
    'GetProperty', $Null,
    $Member, $Null)
            $Name
    = $Member.GetType().InvokeMember("Name",
    'GetProperty', $Null,
    $Member, $Null)
            "-- Member: $Name ($Class)"
    A similar script to enumerate all local users would be:
    $Computer
    = "MyServer"
    $Computer =
    [ADSI]"WinNT://$Computer"
    $Users =
    $Computer.psbase.Children | Where {$_.psbase.schemaClassName
    -eq "user"}
    ForEach ($User
    In $Users)
        "User: "
    + $User.Name
    Richard Mueller - MVP Directory Services

  • HT2204 How can I used credits in my itunes account to purchase apps from the app store?

    I bought AppStore gift cards to purchase software and loaded them to ITunes account.  Can I use these credits in the AppStore?

    Yes, the credit will be used to make purchases. Go through the steps of buying the app in the Mac App Store, just as you would purchase content in the iTunes stores.

  • HT4993 How can i use my iphone in other country. I´m from USA and i can´t use my iphone in peru. the only message that i see in mu phone is NOT SERVICE. What can i do?

    Hello, im in vacation in peru but im from usa and i can´t use my iphone. i already call my line service to actived my phone and they said that everithing is ok but i´m still with out service. Can same one help me to be able to use my iphone. Thank you in Advance!!!!
    Sincerely,
    Katty Hall

    yes, i´m using the same service via roaming. I already call SPRING, and they told me that roaming is actived, but  i´m still with out service

  • How can I use SAX to Read XML in JSP?

    I created a class which extend DefaultHandler of SAX. I can use java to call this class and read XML data without any problems. But I can't call this class through JSP. Looks it didn't active startElement() when I called from JSP. Do you have any ideas on this case?
    ======================This is java call and works==============
    import java.io.*;
    import java.util.*;
    import ReadXmlSax;
    public class ReadElement
         public static void main(String argv[])
              ReadXmlSax r = new ReadXmlSax();
              Enumeration e = r.getAttribute("dre.xml","server","name");
              try{
                   while (e.hasMoreElements()) {
                   System.out.println((String)e.nextElement());}
              }catch(Throwable t){
                   t.printStackTrace();
    ======================================================================
    ========================This is jsp call but doesn't work=============
    <%@ page import = "java.util.*" %>
    <%@ page import = "java.io.*" %>
    <%@ page import = "ReadXmlSax" %>
    <html>
    <head><title>SAX Reader</title></head>
    <body>
    <%
    ReadXmlSax r = new ReadXmlSax();
    Enumeration e = r.getAttribute("dre.xml","server","name");
    while (e.hasMoreElements()) {
    out.println(e.nextElement());
    out.println("<br>");
    %>
    </body>
    </html>
    ======================================================================

    maybe you just simply can't reach dre.xml from your web server!

  • How can I use a web app to provide me with results from a matrix?

    I have a need to set up a search type box based off a matrix. This is a matrix which shows a list of zip codes down the left column, and a list of products across the top, and the corresponding field from a zip code and a product is the freight rate.
    e.g.
              Product 1     Product 2     Product 3     Product 4
    1234     $10               $12               $14               $16
    4567     $11               $11               $13               $17
    5678     $55               $54               $27               $35    
    so the freight rate to 4567 for product 3 is $13.
    Then what i want to have is a drop down list for a customer to select the product, then a field to enter their zip code, and the search result will be the cross referenced freight rate.
    Is this possible? If so, can someone guide me as to how this would be done?

    Throw this open to the community to chip in, but off the top of my head.... thinking of something along lines of:
    Create 3 web apps,
    Product (Fields Product Name & ProductID)
    Zipcode (Fields Area Desc & Zipcode)
    Freight Rates (Fields FreightRateID (made up of ProductID_ZipCode), Freight Rate)
    Create a web app search form for Web App Freight Rates with:
    Product select, with options drawn from web app 1 using ProductID for value.
    Zipcode select, with options drawn from web app 2 using Zipcode for value.
    Hidden FreightRateID field.
    Once a visitor has selected their product and zipcode, using javascript concatenate the selected ProductID with selected Zipcode.
    This will produce a FreightRateID (e.g. PROD1_4567), which can be loaded into the hidden FreightRateID field.
    When submitted, it will perform a web app search for a Freight Rate that matches the chosen product and zipcode, ie. FreightRateID.
    To make entry of the freight rates easier, maybe add 2 datasource fields to the Freight Rate web app for Product and Zipcode.
    Then create a front end web app add/edit (via a secure zone) to allow entry to be done by:
    Select product, select zipcode then enter freight rate.  (FreightRateID can be created and populated in same way as search above)

  • How can i use the shared object already present in the system from java.

    explanation:
    Actually there are shared objects present in the jdk which is used by java itself.I want to know if i can use the methods in any library file(shared object) which is already present in the system.
    Or the question can be put this way how does the java call the native methods? (Can we do that explicitly) in our code.

    It isn't entirely clear what you mean by 'shared' objects and what the relationship with these shared objects and calling native code is.
    There are no shared objects in the Java language, only the java platform.
    The platform system properties are exposed via the System class (java.lang package).
    You are free to create your own shared objects by using static member access or some other mechanism.
    Your access to methods in any of the API's is dictated by the access type you have, normally public being the only completely open access allowing complete visibility.
    You can call native methods, thats what JNI is for. Calling native methods in classes other than your own is generally done using the API provided by the developer(s) of those classes.

  • How can I use iCoud to sync my Outlook calendar and contact from Parallesl?

    Before I switched to MAC, I used a PC and relied on Outlook for years.  Now that I use Paralles on MAC, I continued using Outlook.
    I have been using ITunes via a wire to sync calendar and contact info from Outlook also for years.
    With the launch of iCloud, I feel my way of syncing is outdated.  I have an IPad and tried to use iCloud to sync my calendar info to my phone, but didnt work.
    I was told that I could pick either method or but not both.  Technically, I could sync my Outlook info onto my iPhone first, and then turn on iCloud to synch those info to other iDevice right? Why didn't it work?

    I will address your second question.
    First, make sure your iPhone and iPad have absolutely identical Apple IDs.  If they do, use that Apple ID in Settings > iCloud on your iPhone to select the "Notes" option.  Lo and behold, all your iCloud notes should appear on your iPhone.

  • How can I use Lightroom 5.7 to import RAW files (.arw) from my new Sony Alpha 7 ll?

    When I try to import, I get a "Preview Not Available for this File" message.
    I thought LR 5.7 would contain a Camera RAW converter.  If not, when?
    Please help  me....

    Support was provided in record time with the LR 5.7.1 update.
    Profiles for new camera models can only commence being created after the camera has been released to the market.
    See the link below.
    Lightroom Journal | Tips and advice straight from the Lightroom team.

Maybe you are looking for