How to down the media smart package for lap top

Hi, Well were to begin I bought my second Hp computer in the USA as my daughter live there, I just recently decided to reboot but that turned into a nightmare it did not work either way from recovery or from the  disc’s you supplied.
So I installed some new software Windows 7 Ultimate service pack 1.
You supplied Windows Vista home Premium S o where I can get it from?
It includes Video, Music, TV and Web Cam.
P1 also an upgrade to Windows 7 Home Premium Upgrade Media.
My Computer is HP Pavilion DV7 1245DX I would now like to put some of the software that was on the computer when I bought it HP Media Smart is the software I have looked
for but without success so I hope you can direct me t
Hope you can help me to solve this problem.
Regards Albert Crabtree

Hello again albertrn2000.
You should run the diagnostics on your hard drive and memory.  This document has instructions for testing the memory.  This document covers testing the hard drive.  
Make sure to post the results of both.
Have a wonderful afternoon!
Please click the white star under my name to give me Kudos as a way to say "Thanks!"
Click the "Accept as Solution" button if I resolve your issue.

Similar Messages

  • HT204291 how do get the media icon for mac mirroring when running airplay on itunes?

    how do get the media icon for mac mirroring when running airplay

    Airplay mirroring requires a Mac from 2011 or later, running OSX 10.8 (or later)
    http://support.apple.com/kb/HT5404?viewlocale=en_US&locale=en_US

  • How to Generate a complex smart form for the Sales Order different pages h

    How to Generate a complex smart form for the Sales Order different pages has different page Layouts  explain me?

    in print program in interface when calling the form there should be some option to tell it to make a NEW spool everytime.
    I have it in mind for sap-script it is ITCPO-TDNEWID. Dont have it in mind for SAMRTFORMS but still it should work somehow similar.

  • How to find the existing request no for Smart form

    Hi Experts,
    plz tell me how to find the existing request no for Smart form in ABAP.
    thanks in advance.
    regards,
    radhika.

    Radhika,
    Choose Goto > Object Directory Entry> Lock Overview On the Initial screen of the "smartforms" transaction, after entering the actual smartform. This would give you the request number for the smartform.
    Regards
    Narasimhan

  • What is the best security package for an imac using yosimity

    What is the best security package for an imac using Yosimity

    Mac users often ask whether they should install "anti-virus" software. The answer usually given on ASC is "no." The answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There  is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to take control of it remotely. That threat is in a different category, and there's no easy way to defend against it.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has taken far too long to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. Those lapses don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, not machine behavior, and no technological fix alone is going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're better informed than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software. A genuine alert that Flash is outdated and blocked is shown on this support page. Follow the instructions on the support page in that case. Otherwise, assume that the alert is fake and someone is trying to scam you into installing malware. If you see such alerts on more than one website, ask for instructions.
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Rogue websites such as Softonic, Soft32, and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission. All "YouTube downloaders" are in this category, though not all are necessarily malicious.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a padlock icon in the address bar when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It can be as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • How to find the exact user exit for our requirement?

    Dear Mr. keerthi,
    can you please explain me how to find the exact user exit for our requirement?

    Hi sandip
    There is more than one method in which you can check for user-exits.The following method is used very often.
    <b>How to find the exact user-exit for your requirement.</b>
    1.     You can check the user exists using transaction SE85.
    2.     Repository Information System -> Enhancements -> Customer exits
    3.     You can search the user-exits by package name.
    4.     Double click on each exit name to check the function module exits.
    <b>The procedure to find the package name.</b>
    Execute transaction SE93 
    Enter the tcode of the transaction for which you want to check the user exit.
    Example: if you want to find the user-exit for purchase orders while changing, enter ME22n  and press display.
    You will get to see the package name
    But you need to confirm that the user exit will get triggered at the appropriate event.
    ( example: you might want some validations to be done ON SAVE of a purchase order)
    <b>Checking if the user-exit is getting triggered or not.</b>
    1.     Open the user exit function module (that you have got in step 4) in Tcode SE37.
    2.     Click on where used button. In the pop up that immediately appears choose only programs .
    3.     You will get a list of programs. Double click on the program name.
    4.     You will get the list of location where this function module user exit is used.
    5.     Place session break points at each of these location ( at each CALL FUNCTION statement)
    6.     Now go to your transaction ( say change purchase order tcode:Me22n) and check if the user exit is getting triggered on appropriate event.
    regards,
    Prasad

  • Is the Adobe Air Packager for Desktop or Web Application Apps?

    Is the Adobe Air Packager for desktop or web applications?
    I'm testing the RoboHelp Adobe Air packager and noticed that
    it produces an *.exe file that must be launched locally. This makes
    it seem like it's only an alternative to the *.CHM format for
    desktop applications?
    Is there a way to link to webhelp topics packaged using Adobe
    Air to provide context-sensitive help (CSH) for a web application
    running on a remote server? Supposedly the Adobe Air packager has
    CSH capabilities, but I've found zero documentation on how to set
    this up.

    Hi Dirk.
    Peter Grainge has an article on Air's use on his
    site.

  • Help! How to get the Java Communication Package work in JDK1.3.1?

    I downloaded a Java Communications API Win32 ver 2.0 from java.sun.com, and try to use it to do some programming to communication ports with JDK1.3.1.
    I failed. When I tested with the samples (BlackBox, SimpleRead) coming with the javax.comm. It showed "no serial port found", something like that. I check the installation Instructions of the comm. package, it only described the installation under JDK1.1 and the pre-release version of JDK1.2. (and the installation of the same package in JDK1.1 and JDK1.2 are totally different.)I tried the specification with my JDK1.3, but it doesn't work.
    Who knows how to install the Javax.comm package in JDK1.3.1? Please let me know as soon as possible. Thanks a lot.

    This comes straight out of the FAQ that you got with your download:
    Q: My application does not find any ports when it enumerates available ports.
    Q: BlackBox gives me a message that says "No serial ports found!"
    A: In order for the Java communications API to find ports the file
    javax.comm.properties must be in the correct place. The preferred location
    is in <jdk>/lib. See the installation instructions for alternate locations
    and further information.
    Installation is very simple. Comm is a standard extension, so copy comm.jar to %JAVA_HOME%\jre\lib\ext
    This is all in the docs....

  • Please guide me How to configure the swift integration packages

    Hi frinds,
    Please guide me How to configure the swift integration packages, in swift we have to use MT103 format
    sender side we have ERD system and Receiver side File system,
    wt adapters  we have to use in sender side and what kind of encrypt and decrypt formats support for swift in PI

    hi,
    the only reference we have is this OSS note and guides inside it
    1064419 SAP Integration Package for SWIFT: Info about installation
    Please have a look at it,
    Regards,
    Michal Krawczyk

  • How to clean the iPad Smart Cover(Leather)?

    how to clean the iPad Smart Cover(Leather)?

    For added protection, use wilsons leather cleaner/protector spray.  Makes it water proof and stain resistant.  Just did it to my tan cover and it worked great!

  • Where is the javax sound package for download?

    Where is the javax sound package for download? (URL) I got the latest JDK yesterday and tried to compile some audio applet but it looks like all of the Javax stuff is missing from the latest JDK.
    Where do I download the javax sound package ?
    Dan

    This is an audio player that another posted here. I tried to compile and run it but here were the results.
    javac SimplePlayerApplet.javaSimplePlayerApplet.java:9: package javax.media does not exist
    import javax.media.*;
    ^
    SimplePlayerApplet.java:11: cannot find symbol
    symbol: class ControllerListener
    public class SimplePlayerApplet extends Applet implements ControllerListener {
    ^
    SimplePlayerApplet.java:14: cannot find symbol
    symbol : class Player
    location: class SimplePlayerApplet
    Player player = null;
    ^
    SimplePlayerApplet.java:122: cannot find symbol
    symbol : class ControllerEvent
    location: class SimplePlayerApplet
    public synchronized void controllerUpdate(ControllerEvent event) {
    ^
    SimplePlayerApplet.java:44: cannot find symbol
    symbol : class MediaLocator
    location: class SimplePlayerApplet
              MediaLocator mrl = null;
              ^
    SimplePlayerApplet.java:63: cannot find symbol
    symbol : class MediaLocator
    location: class SimplePlayerApplet
              if ((mrl = new MediaLocator(mediaFile)) == null)
              ^
    SimplePlayerApplet.java:68: cannot find symbol
    symbol : variable Manager
    location: class SimplePlayerApplet
                        player = Manager.createPlayer(mrl);
                        ^
    SimplePlayerApplet.java:69: cannot find symbol
    symbol : class NoPlayerException
    location: class SimplePlayerApplet
              } catch (NoPlayerException e) {
              ^
    SimplePlayerApplet.java:130: cannot find symbol
    symbol : class RealizeCompleteEvent
    location: class SimplePlayerApplet
         if (event instanceof RealizeCompleteEvent) {
         ^
    SimplePlayerApplet.java:165: cannot find symbol
    symbol : class CachingControlEvent
    location: class SimplePlayerApplet
         } else if (event instanceof CachingControlEvent) {
         ^
    SimplePlayerApplet.java:166: cannot find symbol
    symbol : variable Controller
    location: class SimplePlayerApplet
         if (player.getState() > Controller.Realizing)
         ^
    SimplePlayerApplet.java:170: cannot find symbol
    symbol : class CachingControlEvent
    location: class SimplePlayerApplet
         CachingControlEvent e = (CachingControlEvent) event;
         ^
    SimplePlayerApplet.java:170: cannot find symbol
    symbol : class CachingControlEvent
    location: class SimplePlayerApplet
         CachingControlEvent e = (CachingControlEvent) event;
         ^
    SimplePlayerApplet.java:171: cannot find symbol
    symbol : class CachingControl
    location: class SimplePlayerApplet
         CachingControl cc = e.getCachingControl();
         ^
    SimplePlayerApplet.java:181: cannot find symbol
    symbol : class EndOfMediaEvent
    location: class SimplePlayerApplet
         } else if (event instanceof EndOfMediaEvent) {
         ^
    SimplePlayerApplet.java:184: cannot find symbol
    symbol : class Time
    location: class SimplePlayerApplet
         player.setMediaTime(new Time(0));
         ^
    SimplePlayerApplet.java:186: cannot find symbol
    symbol : class ControllerErrorEvent
    location: class SimplePlayerApplet
         } else if (event instanceof ControllerErrorEvent) {
         ^
    SimplePlayerApplet.java:189: cannot find symbol
    symbol : class ControllerErrorEvent
    location: class SimplePlayerApplet
         Fatal(((ControllerErrorEvent)event).getMessage());
         ^
    SimplePlayerApplet.java:190: cannot find symbol
    symbol : class ControllerClosedEvent
    location: class SimplePlayerApplet
    } else if (event instanceof ControllerClosedEvent) {
    ^
    19 errors
    So what am I missing ...and where do I get it ??
    Dan

  • How to find the status of package (valid/invalid) was at a particular time

    How to find the status of package (valid/invalid) was at a particular time ?
    I want to find the status of one oracle package at 3pm yesterday. The status of this package today is INVALID.
    I am sure it was VALID yesterday. But no way to prove it. Can any one help please???
    I can generate AWR report for last 7 days...

    Try using a flashback query, like this:
    select object_name, object_type, status
    from dba_objects AS OF TIMESTAMP (SYSTIMESTAMP - INTERVAL '18' HOUR)  -- 18 hours ago
    where object_name = 'MY_OBJECT'
    ;if you haven't granted FLASHBACK privs, you may need to connect as SYS to do a flashback query on a data dictionary table.
    But this should give you the info you need - if it's still in undo.

  • How to use the same POWL query for multiple users

    Hello,
    I have defined a POWL query which executes properly. But if I map the same POWL query to 2 portal users and the 2 portal users try to access the same page simultaneously then it gives an error message to one of the users that
    "Query 'ABC' is already open in another session."
    where 'ABC' is the query name.
    Can you please tell me how to use the same POWL query for multiple users ?
    A fast reply would be highly appreciated.
    Thanks and Regards,
    Sandhya

    Batch processing usually involves using actions you have recorded.  In Action you can insert Path that can be used during processing documents.  Path have some size so you may want to only process document that have the same size.  Look in the Actions Palette fly-out menu for insert path.  It inserts|records the current document work path into the action being worked on and when the action is played it inserts the path into the document as the current work path..

  • How to get the "last changed by" for a set of function modules?

    How to get the "last changed by" for a set of function modules?
    is there any table to get it??

    See [this|Re: Date of creation of function module] I posted earlier.
    >TFDIR will give you the name of the function group program and the include number.
    >E.g. SAPLZFUNCGROUP Include 01.
    >From this you can construct the include name: LZFUNCGROUPU01.
    >You can look this up in TRDIR to find the creation date (CDAT) of the function module.
    In your case, you need unam and udat.
    matt

  • How to use the same services-config for the local and remote servers.

    My flex project works fine using the below but when I upload my flash file to the server I doesn't work, all the relative paths and files are the same execpt the remote one is a linux server.
    <?xml version="1.0" encoding="UTF-8"?>
    <services-config>
        <services>
            <service id="amfphp-flashremoting-service"
                class="flex.messaging.services.RemotingService"
                messageTypes="flex.messaging.messages.RemotingMessage">
                <destination id="amfphp">
                    <channels>
                        <channel ref="my-amfphp"/>
                    </channels>
                    <properties>
                        <source>*</source>
                    </properties>
                </destination>
            </service>
        </services>
        <channels>
        <channel-definition id="my-amfphp" class="mx.messaging.channels.AMFChannel">
            <endpoint uri="http://localhost/domainn.org/amfphp/gateway.php" class="flex.messaging.endpoints.AMFEndpoint"/>
        </channel-definition>
        </channels>
    </services-config>
    I think the problem  is the line
            <endpoint uri="http://localhost/domainn.org/amfphp/gateway.php" class="flex.messaging.endpoints.AMFEndpoint"/>
    but I'm not sure how to use the same services-config for the local and remote servers.

    paul.williams wrote:
    You are confusing "served from a web-server" with "compiled on a web-server". Served from a web-server means you are downloading a file from the web-server, it does not necessarily mean that the files has been generated / compiled on the server.
    The server.name and server.port tokens are replaced at runtime (ie. on the client when the swf has been downloaded and is running) not compile time (ie. while mxmlc / ant / wet-tier compiler is running). You do not need to compile on the server to take advantage of this.
    Hi Paul,
    In Flex, there is feature that lets developer to put all service-config.xml file configuration information into swf file. with
    -services=path/to/services-config.xml
    IF
    services-config.xml
    have tokens in it and user have not specified additional
    -context-root
    and this swf file is not served from web-app-server (like tomcat for example) than it will not work,
    Flash player have no possible way to replace token values of service-config.xml file durring runtime if that service-config.xml file have been baked into swf file during compilation,
    for example during development you can launch your swf file from your browser with file// protocol and still be able to access blazeDS services if
    -services=path/to/services-config.xml
    have been specified durring compilation.
    I dont know any better way to exmplain this, but in summary there is two places that you can tell swf  about service confogiration,
    1) pass -services=path/to/services-config.xml  parameter to compiler this way you tell swf file up front about all that good stuff,
    or 2) you put that file on the webserver( in this case, yes you should have replacement tokens in that file) and they will be repaced at runtime .

Maybe you are looking for

  • Swapping between different logical views

    I am designing an applet that has several logical views, such as Login, Registration, Waiting Area, and Game. I am very new to applets and Swing, and I can't figure out how to have each of these designed separately and then swap between them. Ideally

  • Add page break to tables in a section report

    I have one sectioned report when I export to excel I can manually add page breaks so that different regions print on a seperate page. However I want to do this in webi. In webi when i highlight the table in the section that i want to have on a sepera

  • How to apply Property Loader to all sequences in the Sequence File?

    HI, I'm following the help instructions for the Property Loader and it states.... Use Current Sequence File-Selects the file where the step is located. Sequence-Specifies the name of the sequence into which to import variables and properties. The spe

  • RAC on solaris 10 zones

    Hi Can I setup RAC on solaris 10 zones? Thanks!

  • I can not get the line guides to display in the viewport in firebug

    When I choose it from the web developer toolbar the feature comes down but no lines on the screen if I hit the add a vertical or horizontal line nothing happens and I tried to reset it under the "options" menu and and that didn't work ??? What gives