How do I tell the user she is out of memory?

In my Swing app, a thread can try and get too much data from the database. It catches the OutOfMemoryError exception, and passes it back up to the GUI. And then.... the GUI crashes when it tried to display the error message, because it's out of memory.
I tried putting System.gc() calls all over the place. No joy.
Ideas?
--- Eric

Right now, what I have my app doing is warning the user when they initiate an unlimited query (queries have a default limit). The warning basically states that "If too many results are returned, then the app will abruptly exit, because it runs out of memory, and I can't figure out a way to trap this case. Have a nice day, I'm a lousy programmer."
I wonder if there is some way to detect when the vm is running low on memory, but isn't quite out. Then it could abort the process cleanly, tidy up, and keep the app running. Here's the code that runs out of memory:
DataInputStream in = new DataInputStream(connection);
ObjectInputStream oin = new ObjectInputStream(in);
thingy = oin.readObject();Has anyone attempted to subclass ObjectInputStream and override readObject() with readObject(int iAbortThresholdInKilobytes)? Would this be tough?

Similar Messages

  • When I plug in my ipad it automatically tries to back up and download all the contents to the C drive - the PC is too full and I have iTunes on an external hard drive, how do I tell the system to do the backup to the hard drive please?

    When I plug in my ipad it automatically tires to back up and download all the contents to the C drive - the PC is too full and I have iTunes on an external hard drive, how do I tell the system to do the backup to the hard drive please?

    You can open a command prompt by hitting the start button and typing CMD<Enter> in the search box that opens up.
    To move the current backup folder from C: to D: type in this command and press <Enter>
    Move "C:\Users\<User>\AppData\Local\Apple Computer\MobileSync\Backup" "D:\Backup"
    Where <User> is your Windows user name.
    To make iTunes look for the data in the new location type in this command and press <Enter>
    MkLink /J "C:\Users\<User>\AppData\Local\Apple Computer\MobileSync\Backup" "D:\Backup"
    If your external drive has a different letter or you already have a folder called "Backup" then edit "D:\Backup" accordingly in both commands.
    tt2

  • How to check if the user has only the display authority of a message

    hi,
    How to check if the user has only the display authority of a message but does not have the change authority for a certain message?
    Best regards,

    hi blake
    though i am an application consultant and for authorisation u need to have help of BASIS person if u r not the one but still i can guide u regarding the same,
    Basically Authorization Management 
    Use
    You can use the following authorization objects to control the authorizations for maintaining business partner data:
    •        Authorization objects for the Business Partner:
    •     &#61601;        B_BUPA_GRP
    •     &#61601;        B_BUPA_ATT
    •     &#61601;        B_BUPA_FDG
    •     &#61601;        B_BUPA_RLT•       
    Authorization objects for relationships:
    •     &#61601;        B_BUPR_BZT
    •     &#61601;        B_BUPR_FDG
    In addition, you can assign an authorization group to a business partner in the dialog. The authorization group controls which users may maintain data for this business partner.
    You can also define authorizations for fields and field groups using the Business Data Toolset (BDT). Depending on the settings you have made, the system carries out the relevant authorization checks.
    In the dialog in the SAP GUI, you can display an overview of the authorizations assigned to you by pressing the button Settings.
    For more information on authorization management, see the Implementation Guide (IMG) of the Business Partner, as well as in the Developer’s Handbook for the BDT under  Authorizations.
    IntegrationAuthorization management for the Business Partner forms part of the  SAP authorization concept.
    Prerequisites
    You have made the necessary settings in Customizing of the Business Partner under Basic Settings--> -Address Management.
    Moving over
    AS ABAP Authorization Concept 
    The ABAP authorization concept protects transactions, programs, and services in SAP systems from unauthorized access. On the basis of the authorization concept, the administrator assigns authorizations to the users that determine which actions a user can execute in the SAP system, after he or she has logged on to the system and authenticated himself or herself.
    To access business objects or execute SAP transactions, a user requires corresponding authorizations, as business objects or transactions are protected by authorization objects. The authorizations represent instances of generic authorization objects and are defined depending on the activity and responsibilities of the employee. The authorizations are combined in an authorization profile that is associated with a role. The user administrators then assign the corresponding roles using the user master record, so that the user can use the appropriate transactions for his or her tasks.
    Authorization Checks 
    To ensure that a user has the appropriate authorizations when he or she performs an action, users are subject to authorization checks.
    The following actions are subject to authorization checks that are performed before the start of a program or table maintenance and which the SAP applications cannot avoid:
    •        Starting SAP transactions (authorization object S_TCODE)
    •        Starting reports (authorization object S_PROGRAM)
    •        Calling RFC function modules (authorization object S_RFC)
    •        Table maintenance with generic tools (S_TABU_DIS)
    Checking at Program Level with AUTHORITY-CHECK
    Applications use the ABAP statement AUTHORITY-CHECK, which is inserted in the source code of the program, to check whether users have the appropriate authorization and whether these authorizations are suitably defined; that is, whether the user administrator has assigned the values required for the fields by the programmer. In this way, you can also protect transactions that are called indirectly by other programs.
    AUTHORITY-CHECK searches profiles specified in the user master record to see whether the user has authorization for the authorization object specified in the AUTHORITY-CHECK. If one of the authorizations found matches the required values, the check is successful.
    Starting SAP Transactions
    When a user starts a transaction, the system performs the following checks:
    •        The system checks in table TSTC whether the transaction code is valid and whether the system administrator has locked the transaction.
    •        The system then checks whether the user has authorization to start the transaction.
    The SAP system performs the authorization checks every time a user starts a transaction from the menu or by entering a command. Indirectly called transactions are not included in this authorization check. For more complex transactions, which call other transactions, there are additional authorization checks.
    •     &#61601;        The authorization object S_TCODE (transaction start) contains the field TCD (transaction code). The user must have an authorization with a value for the selected transaction code.
    •     &#61601;        If an additional authorization is entered using transaction SE93 for the transaction to be started, the user also requires the suitable defined authorization object (TSTA, table TSTCA).
    If you create a transaction in transaction SE93, you can assign an additional authorization to this transaction. This is useful, if you want to be able to protect a transaction with a separate authorization. If this is not the case, you should consider using other methods to protect the transaction (such as AUTHORITY-CHECK at program level).
    •        The system checks whether the transaction code is assigned an authorization object. If so, a check is made that the user has authorization for this authorization object.
    The check is not performed in the following cases:
    You have deactivated the check of the authorization objects for the transaction (with transaction SU24) using check indicators, that is, you have removed an authorization object entered using transaction SE93. You cannot deactivate the check for objects from the SAP NetWeaver and HR areas.
    This can be useful, as a large number of authorization objects are often checked when transactions are executed, since the transaction calls other work areas in the background. In order for these checks to be executed successfully, the user in question must have the appropriate authorizations. This results in some users having more authorization than they strictly need. It also leads to an increased maintenance workload. You can therefore deactivate authorization checks of this type in a targeted manner using transaction SU24.
    •     &#61601;        You have globally deactivated authorization objects for all transactions with transaction SU24 or transaction SU25.
    •     &#61601;        So that the entries that you have made with transactions SU24 and SU25 become effective, you must set the profile parameter AUTH/NO_CHECK_IN_SOME_CASES to “Y” (using transaction RZ10).
    All of the above checks must be successful so that the user can start the transaction. Otherwise, the transaction is not called and the system displays an appropriate message.
    Starting Report Classes
    You can perform additional authorization checks by assigning reports to authorization classes (using report RSCSAUTH). You can, for example, assign all PA* reports to an authorization class for PA (such as PAxxx). If a user wants to start a PA report, he or she requires the appropriate authorization to execute reports in this class.
    We do not deliver any predefined report classes. You must decide yourself which reports you want to protect in this way. You can also enter the authorization classes for reports with the maintenance functions for report trees. This method provides a hierarchical approach for assigning authorizations for reports. You can, for example, assign an authorization class to a report node, meaning that all reports at this node automatically belong to this class. This means that you have a more transparent overview of the authorization classes to which the various reports are transported.
    You must consider the following:
    •     •         After you have assigned reports to authorization classes or have changed assignments, you may have to adjust objects in your authorization concept (such as roles (activity groups), profiles, or user master records).
    •     •         There are certain system reports that you cannot assign to any authorization class. These include:
    •     •         RSRZLLG0
    •     •         STARTMEN (as of SAP R/3 4.0)
    •     •         Reports that are called using SUBMIT in a customer exit at logon (such as SUSR0001, ZXUSRU01).
    •     •         Authorization assignments for reports are overwritten during an upgrade. After an upgrade, you must therefore restore your customer-specific report authorizations.
    Calling RFC Function Modules
    When RFC function modules are called by an RFC client program or another system, an authorization check is performed for the authorization object S_RFC in the called system. This check uses the name of the function group to which the function module belongs. You can deactivate this check with parameter auth/rfc_authority_check.
    Checking Assignment of Authorization Groups to Tables
    You can also assign authorization groups to tables to avoid users accessing tables using general access tools (such as transaction SE16). A user requires not only authorization to execute the tool, but must also have authorization to be permitted to access tables with the relevant group assignments. For this case, we deliver tables with predefined assignments to authorization groups. The assignments are defined in table TDDAT; the checked authorization object is S_TABU_DIS.
    You can assign a table to authorization group Z000. (Use transaction SM30 for table TDDAT) A user that wants to access this table must have authorization object S_TABU_DIS in his or her profile with the value Z000 in the field DICBERCLS (authorization group for ABAP Dictionary objects).
    please See also:
    •        SAP Notes 7642, 20534, 23342, 33154, and 67766
    guess this info will help you,there is one graphic which actually explain the hierarchy of authorisation,i will find some time out to let u know more info about the authorisation
    but if u sit with ur BASIS guy then u can learn lot of things in PFCG
    i guess u r a basis guy,then its not a problem
    best regards
    ashish

  • How i can show the user input in alv list on the top

    hi all,
                   please tell me how i can show the user input in alv list on the top.
                         and  also tell me how i  can hide the toolbar in alv.
    regards
    vikas saini

    Hi,
    Use the Below Code.
    form top_of_page.                                          
      data : it_header type slis_t_listheader,
             is_header type slis_listheader.
      is_header-typ  = c_h.
      is_header-key  = space.
      is_header-info = 'Pending Order Information Report'(018).
      append is_header to it_header.
      call function 'REUSE_ALV_COMMENTARY_WRITE'
        exporting
          it_list_commentary = it_header.
    endform.                    "top_of_page
    and finally pass it to .
    call function 'REUSE_ALV_GRID_DISPLAY'
          exporting
            i_callback_program     = sy-repid
            i_callback_top_of_page = 'TOP_OF_PAGE'
    call function 'REUSE_ALV_GRID_DISPLAY'
          exporting
            i_callback_program     = sy-repid
            i_callback_top_of_page = 'TOP_OF_PAGE'
    Regards.
    Arbind

  • How do I change the user?

    this was my fiance's iphone 3 before she got a new 4. How do I change the user?

    iPhone User Guide (For iOS 4.2 and 4.3 Software)
    You can just restore the iphone.

  • "Volume not found" I have 3 iphoto_libraries stored in a external disk, while the actual files are in other external disk. Ive moved together iphotolibraries and files but: HOW CAN I TELL THE LIBRARIES WHERE TO FIND THEM NOW?

    I have three iphoto_libraries stored in a external disk PASSPORT (one for each trip imovie Im making -Ive managed this way the libraries so to not confuse the trips) while the actual files are in OTHER external disk LACIE. And everything was fine: imovie find each library, could work with it, or iphoto could edit the files.
    But one day everything crashed at the same time: i opened iphoto to find 3 different scenarios:
    1) iphoto_library GREECE was there, but not the albums i prepared. no events. when double click in any of them: "Volume not found"
    2) iphoto_library ITALY was there, and the albums i prepared too, but empty.
    in both cases I can only see the photos in 'photos'  because 'events'  shows some events with photo preview and some with no preview, just some kind of preset clipart palm tree, but if i enter the event, photos are there but again: when double click in any item: "Volume not found"
    3)  iphoto_library ISRAEL was there, the albums too, when double click in any of them: all OK
    The 3 libraries was managed the same way. Meaning: Ive imported photos to iphoto from external disk LACIE in a iphotolibrary stored in another external disk PASSPORT. Also: I don't have unchecked the option "copy to file" or something like that. photos where moved, not copied. Also i have all the movie_libraries in the PASSPORT as well. What happened??
    Solution? Nothing yet. Ive moved now all the photo folders from LACIE together in PASSPORT with the iphotolibraries but problem persist:
    HOW CAN I TELL THE LIBRARIES WHERE TO LOOK FOR THE VOLUMES NOW?
    "Volumes" are the original files aren't them?
    Please help. this is so annoying to try and find in the forum, to tricky to explain
    I have a Macbook pro retina Yosemite 10.10.1 / iphoto 9.6 (910-29)/ iMovie 10.0.6
    THANK YOU
    Vicky

    The 3 libraries was managed the same way. Meaning: Ive imported photos to iphoto from external disk LACIE in a iphotolibrary stored in another external disk PASSPORT.
    This is not clear, especially when you say
    I don't have unchecked the option "copy to file" or something like that. photos where moved, not copied.
    Especially as the message you're getting is typical of a library where the ' option "copy to file" or something like that' is unchecked.
    So it's a simple question:
    Are you these Managed or Referenced Libraries?
    A Managed Library, is the default setting, and iPhoto copies files into the iPhoto Library when Importing. The files are then stored in the Library package
    A Referenced Library is when iPhoto is NOT copying the files into the iPhoto Library when importing because you made a change at iPhoto -> Preferences -> Advanced. (You unchecked the option to copy files into the Library on import) The files are then stored where ever you put them and not in the Library package. In this scenario you are responsible for the File Management.

  • HT201342 How can I change the USER of my i-cloud address? My 12 year old set up the e-mail account and used a silly user name (like: turtle!!). I would like to have an icloud e-mail account but under my own user name. The other /old name can be deleted?

    How can I change the USER name of my i-cloud e-mail account? It was set up by my son and he used a silly / embarrassing user name. I would like to change this name OR set up another i-cloud e-mail account under my own name / reference. Help?

    iCloud email addresses can't be changed or deleted, but you can set up an alias namethat he can use which will be linked to his current iCloud account and will receive email in the existing iCould inbox.  This guide explains how: http://support.apple.com/kb/PH2622.

  • How can  I  restrain the user login portal once, in the same time ???

    Hi
    I need to restrain the user can't repeat to login portal ....
    to reduce portal loading
    How can I restrain the user login portal once, in the same time???
    Which attributs in Identity Manager or amconsole I can do it to restrain the user ??
    tks

    Does your portal support anonymous access? If so, make sure you are using the authlessanonymous mode. This mode only creates one session that is shared for all anonymous users. This is much more efficient than anonymous access, which creates a session for each anonymous user.
    I have no other recommendation for limiting users to a single login. In general, web applications do not behave like this. What if a user closes their browser without logging out? Does the user have to wait until the session times out in order to log back in again?
    The same thing is true for users that are mobile. If a user leaves their office without logging out and then attempts to log in with a laptop in the conference room, then access will be denied in your implementation. Users do not expect this type of limitation being built into the system.
    If you are having problems scaling, then you need to look at your architecture and perhaps add some more resources. Also, make sure you are making efficient use of the authlessanonymous access mode as stated above.
    - Jim

  • How can I tell the device is connected to itunes 12?

    how can I tell the device is connected to itunes 12?  I have Windows 8.  I hear that the device is connected, but don't see the device to manage.  Only thing that happens is on the phone it says Trust the computer..   I say Trust and nothing happens.

    in ituens at the top where you see the small icons for Music, Movies, TV etc when your device is connected you will see a small icon representing your phone or ipad etc popup click that and it will show you the usual interface for backup and syncing.
    if that doesnt happen, like it didint for me initially, you should close itunes fully via task manager if you know how to do this and start it again with the device unplugged then plug it in after itunes has finished loading.
    Worst case scenario you nee to resatrt

  • Hi guys,Explain how to find whether the user request is dialog or bc ...

    how to find whether the user request is dialog or bc or some other wp and where we can see that ?

    Hello Damodar,
    You can find out that in SM50.
    However one piece of advice. I have noticed that you are raising lots of questions about very basic questions. Either you new to SAP or dont know anything about SAP Basis and want to get in this area. Or else you are preparing for some interview. In either of these cases expecting solutions given at SDN are not going to be of much help. Better read yorself in SAP Help as most people do. SDN should not be overly used for such purposes. Basic questions are welcome but you want to learn SAP through SDN !!!
    Regards.
    Ruchit.

  • HT203167 I have just downloaded the latest itunes version (11.0.1). All my data cannot now be located, though the library is showing all the correct content.The data is stored on an external hard drive. How do I tell the library where to find it's data?

    I have just downloaded the latest itunes version (11.0.1). All my data cannot now be located, though the library is showing all the correct content.The data is stored on an external hard drive. How do I tell the library where to find it's data?

    The iTunes application should be installed on the system drive. You may need to repair iTunes to fix that error regarding a missing .exe.
    To organize your library properly see Make a split library portable.
    If you don't have a working version of the library that can be transformed into a portable shape I have tools and techniques that can repair the broken links.
    tt2

  • The Ipad2 Application Data folder is taking up huge space in C: Drive. How can I shift the User Application data for iPad2 to another Drive?

    The Ipad2 Application Data folder is taking up huge space in C: Drive. How can I shift the User Application data for iPad2 to another Drive?

    Thanks a lot for the response. Yes, I am checking my C: drive data thoroughly now, including the hidden folders, to ascertain if something else can be moved, as per your suggestion.

  • How do you tell the free hard drive space on macbook pro 10.6.8

    how do you tell the free hard drive space on macbook pro 10.6.8

    Open Activity Monitor and look at the drive space info
    see graphic here
    Why is my computer slow?

  • How do you tell the sequence of a TV series in iTunes?

    Hi,
    I've never downloaded a TV series before in iTunes and I am wondering how do you tell the order of the "chapters"?  I don't see any sequence information.  For example, I am interested in downloading the series called "The Walking Dead" but I don't know how to tell what order to watch them in.  Any hints?
    Thanks.
    Dave

    Simply double click on the playlist name.
    Really easy
    Let me know

  • How to determine that the user/ pernr is comp cord?

    Hi,
    In tcode pa30 i see there is Comp Cord field. so these are the HR persons right which use the three digits numbers.
    So my question is how to determine that the user/ pernr is comp cord?
    I want to create the fm and pass user id as import and want to find out where this user is belongs to comp coordinator or not.
    i do see some entry in the T526 table but not sure, how it work.
    Regards
    Ali

    hi ali,
    SACHX is the field you are looking for ..
    regards
    Manthan Raja

Maybe you are looking for