How to show asterisk * effect once the user starts editing the document??

I wrote a java text editor. I creat a new internal frame and allows to open a document.
How to have an effect (an asterisk * follows the filename in title bar) once
the user starts editing the document? And once I save that file, that asterisk * will
disappear. It seems to me we need to add a listener, but not sure how to change
the title bar of internal frame??

just use DocumentListener like
myTextArea.getDocument().addDocumentListener(new DocumentListenet(){
public void changedUpdate(DocumentEvent e){
frame.setTitle( frame.getTitle() + "*" );
implements two other methods too

Similar Messages

  • Roles for the user to Edit the Dimension without being an administrator

    Dear Users,
    I have a query based on Planning security.
    I want the user to edit the dimensions and members in planning application. However, the user cannot be administrator.
    I have created a user and assigned the role of "Interactive User" on Planning roles and of "Dimension Editor" on Shared Services access. With this provisioning user the "Administration-->Dimension" is grayed out for the user.
    Please suggest if roles can be assigned to the user in order to Edit the Dimension without being an administrator?
    Regards,
    Praveen.

    I am sure this question gets asked over and over, they need to be an administrator.
    Cheers
    John
    http://john-goodwin.blogspot.com/

  • Apple please allow the user to edit the genres

    You know after apple revamped iTunes 12, and I think that they did a great job,, I started to think about the  genres.  I really wish that I had control over what genres appeared in my list because the overwhelming majority go unused and I'd like to have only the ones that are pertinent to me in my list.  So apple if you are reading this please allow the end user to choose which genres appear in their list and allow them to delete the rest.

    See this article.
    tt2

  • How to find out that user starts editing data ?

    Hi all,
    I need to do something like changing icon to indicate editing session when the user starts editing cell in JTable, what event should I listen to ?
    Thanks in advance
    Setya

    Hi,
    add a PropertyChangeListener to your JTable and listen to the property "tableCellEditor". When it its null, editing is stopped, if it is non-null, editing was started.
    Thus you can determine when an editing session was initiated.
    Michael

  • How can I create a scrolling effect where when the user scrolls down the image will blur out?

    How can I create a scrolling effect where when the user scrolls down the image will blur out?

    Hi there,
    You can create a scroll motion where the image will fade out on scrolling, you need to use the Opacity tab under Scroll Effects Panel.
    If you particularly need the image to be blur out, then you need to edit that image in any image editing program and make one copy of that image as blurred, then place both images (actual and blurred) on that page and use scroll motion or fade option to replace images.

  • How can I restrict more then one user to access the table?

    Hi !
    I have a problem and two solutions and I am a bit confused as to
    which one is the best one and/or can there be any better way of
    handling the problem ?
    Problem : I have to update a key field of a table when I update
    it in the form 5.0 screen. I am basically doing a maintenance of
    a table and if a certain field is updated then the change has to
    be reflected in two more tables. But the issue is that the field
    is a part of the key in those two tables. So all I can think of
    is that I need to insert new set or rows for that new value of
    the field and delete the old set of records for old values of
    the field.
    There are two ways of doing it;
    1.One option can be to explicitely define two cursors separately
    and fetch the values in them one by one and then insert the new
    records and then delete the old records in both the tables. This
    I feel will be a cumbersome process both in terms of processing
    time and the coding.
    2.Second option I was thinking can be to create two flat tables
    (without keys) and insert the values in them and update the
    changed field there and then insert the rows in the respective
    tables. Delete the old records in the main tables and delets the
    records in these flat tables. This is a bit more faster and
    easier to predict and code. This seems to be a better option for
    me.
    Any comments on these ?
    In both the cases I was thinking of making some provision so
    that more then one person can't update the table simultaneously.
    Since if there are more then one persons doing the processing
    then some inconsistency might creep into the whole process.
    This is easier to do in the second process as if I check the
    data in the flat tables and if there is some data then I can
    presume that some one is doing the processing and I can ask the
    other person to hold for a while. But in this case how can I
    stop more then two people to simultaneously check for the empty
    table and start inserting the record ?
    I was just thinking of having a sepatare table having only one
    field and this will be a key field and as the process begins the
    process will insert a fix value say 'Y' in the key field and at
    the end of the process the record will be deleted and this way
    we can restrict the user to access the process more then one at
    a time..? Since you can't have same value of the key in a table
    more then once.
    Any better way of handling it will be deeply appreciated.
    How about locking the table at the begining and releasing the
    lock at the end ? Will there be any issue in that? since I am
    inserting and deleting the rows in the same transaction.
    Comments welcome,
    Shobhit
    null

    How about performing the update IN the database using a stored
    procedure?
    By using non-database fields on your form to get the
    information, you can then call the procedure in the database to
    perform the updates. If an error occurs in the procedure you
    rollback, if necessary, and send a message or status back to the
    form. If it succeeds you might wish to commit and then re-
    execute the form's query -- using either the original key values
    or the new key values...
    null

  • How can I find out the screen size of the users moniter using the Acrobat SDK?

    How can I find out the screen size of the users moniter using the Acrobat SDK? I need to know how much sreen real estate that is available on the users moniter. Is there some call that I can make from the SDK to discover the maximun X and Y coordinates?
    Thanks,
    Gregory

    Currently, I am testing on multiple moniters and it is defaulting to the moniter designated as the #1 moniter. For our purposes, this is acceptable. Once the two documents have loaded, the user can move and re-size at will.
    Gregory

  • How can I allow the user to pause the audio of a slide (and restart it) before continuing on to the

    Most of my slides have a combination of test/graphics and voiceover.  I would like to allow the user to pause, resume, and replay the audio of each slide.  I know, as a learner, I sometimes need to go back and hear something again -- or pause until a distraction has passed.
    How can I tie audio to a playbar or set of buttons?  I know if it's video, it can be done.  How do I give them control of the audio? 
    I am in Captivate 7.  My files are .mp3 files.
    Thanks - TL

    You cannot add extra buttons to the playbar but you could add a Replay button to the slide and have this button execute a Standard Advanced action with a Jump to Slide action that points to the same slide you are currently on.  This should effectively jump your user back to the beginning of the same slide.

  • Text in VA02 - how to find the user who added the text

    Hi
    The user is adding text in the sales order through VA02, sometime after creating the order. This is not making any changes to the existing data, but adding the text in Header Text.
    When trying to findout who made the addition of text (not changes) from VA03 - menu - environment - changes ---it is not showing any details regarding this. Please guide me how to find out the user who made the addition of text in sales order through VA02.
    Thanks,
    Ravi

    Hi Ravi,
              I think there is no option available to find the name of the person who added text to the sales order.
             If the person who creates sales order, should also maintains the text we can find the name who created sales order. I am sure that u might be knowing the way.
           Still for the benefit of friends who r not aware, in the sales order> GOTO>Header data--> Sales tab.
    Regards,
    Ravi Duggirala.

  • How to use progress indicator which block the user for editing ?

    Hi All,
    I have a requirement where i need to show a round progress bar while processing to the database.For example :- I have a bounded taskflow and inside it I have a two jspx page called as "First.jspx" and "Second.jspx".And i have two textboxes and one "Save" button on first.jspx page.
    Now when user puts the values in the textboxes and hits the "Save" button , my ticker or progress indicator should say "Please wait while processing" and as soon as the transaction is complete , i need to show another page which is "Second.jspx" page. "Save" button action has method inside a managed bean which has some functionality and then it executes the VO(View Object) and commits the data.
    How should i implement the indicator?
    I have read this article :- http://www.oracle.com/technetwork/developer-tools/adf/learnmore/42-progressbarcolor-169184.pdf but it doesn't fit to my requirement.I need indicator which holds the user to edit anything on the page.Like what we get when we do any transaction in banks while navigating to payment gateway.
    Please suggest!!!
    Thanks and Regards,
    Shah

    Hi Shah,
    The answer was around the same are that you were looking into. http://www.oracle.com/technetwork/developer-tools/adf/learnmore/27-long-running-queries-169166.pdf but the sample was the 27.
    - Juan Camilo

  • How to check if the user has only the display authority of a message

    hi,
    How to check if the user has only the display authority of a message but does not have the change authority for a certain message?
    Best regards,

    hi blake
    though i am an application consultant and for authorisation u need to have help of BASIS person if u r not the one but still i can guide u regarding the same,
    Basically Authorization Management 
    Use
    You can use the following authorization objects to control the authorizations for maintaining business partner data:
    •        Authorization objects for the Business Partner:
    •             B_BUPA_GRP
    •             B_BUPA_ATT
    •             B_BUPA_FDG
    •             B_BUPA_RLT•       
    Authorization objects for relationships:
    •             B_BUPR_BZT
    •             B_BUPR_FDG
    In addition, you can assign an authorization group to a business partner in the dialog. The authorization group controls which users may maintain data for this business partner.
    You can also define authorizations for fields and field groups using the Business Data Toolset (BDT). Depending on the settings you have made, the system carries out the relevant authorization checks.
    In the dialog in the SAP GUI, you can display an overview of the authorizations assigned to you by pressing the button Settings.
    For more information on authorization management, see the Implementation Guide (IMG) of the Business Partner, as well as in the Developer’s Handbook for the BDT under  Authorizations.
    IntegrationAuthorization management for the Business Partner forms part of the  SAP authorization concept.
    Prerequisites
    You have made the necessary settings in Customizing of the Business Partner under Basic Settings--> -Address Management.
    Moving over
    AS ABAP Authorization Concept 
    The ABAP authorization concept protects transactions, programs, and services in SAP systems from unauthorized access. On the basis of the authorization concept, the administrator assigns authorizations to the users that determine which actions a user can execute in the SAP system, after he or she has logged on to the system and authenticated himself or herself.
    To access business objects or execute SAP transactions, a user requires corresponding authorizations, as business objects or transactions are protected by authorization objects. The authorizations represent instances of generic authorization objects and are defined depending on the activity and responsibilities of the employee. The authorizations are combined in an authorization profile that is associated with a role. The user administrators then assign the corresponding roles using the user master record, so that the user can use the appropriate transactions for his or her tasks.
    Authorization Checks 
    To ensure that a user has the appropriate authorizations when he or she performs an action, users are subject to authorization checks.
    The following actions are subject to authorization checks that are performed before the start of a program or table maintenance and which the SAP applications cannot avoid:
    •        Starting SAP transactions (authorization object S_TCODE)
    •        Starting reports (authorization object S_PROGRAM)
    •        Calling RFC function modules (authorization object S_RFC)
    •        Table maintenance with generic tools (S_TABU_DIS)
    Checking at Program Level with AUTHORITY-CHECK
    Applications use the ABAP statement AUTHORITY-CHECK, which is inserted in the source code of the program, to check whether users have the appropriate authorization and whether these authorizations are suitably defined; that is, whether the user administrator has assigned the values required for the fields by the programmer. In this way, you can also protect transactions that are called indirectly by other programs.
    AUTHORITY-CHECK searches profiles specified in the user master record to see whether the user has authorization for the authorization object specified in the AUTHORITY-CHECK. If one of the authorizations found matches the required values, the check is successful.
    Starting SAP Transactions
    When a user starts a transaction, the system performs the following checks:
    •        The system checks in table TSTC whether the transaction code is valid and whether the system administrator has locked the transaction.
    •        The system then checks whether the user has authorization to start the transaction.
    The SAP system performs the authorization checks every time a user starts a transaction from the menu or by entering a command. Indirectly called transactions are not included in this authorization check. For more complex transactions, which call other transactions, there are additional authorization checks.
    •             The authorization object S_TCODE (transaction start) contains the field TCD (transaction code). The user must have an authorization with a value for the selected transaction code.
    •             If an additional authorization is entered using transaction SE93 for the transaction to be started, the user also requires the suitable defined authorization object (TSTA, table TSTCA).
    If you create a transaction in transaction SE93, you can assign an additional authorization to this transaction. This is useful, if you want to be able to protect a transaction with a separate authorization. If this is not the case, you should consider using other methods to protect the transaction (such as AUTHORITY-CHECK at program level).
    •        The system checks whether the transaction code is assigned an authorization object. If so, a check is made that the user has authorization for this authorization object.
    The check is not performed in the following cases:
    You have deactivated the check of the authorization objects for the transaction (with transaction SU24) using check indicators, that is, you have removed an authorization object entered using transaction SE93. You cannot deactivate the check for objects from the SAP NetWeaver and HR areas.
    This can be useful, as a large number of authorization objects are often checked when transactions are executed, since the transaction calls other work areas in the background. In order for these checks to be executed successfully, the user in question must have the appropriate authorizations. This results in some users having more authorization than they strictly need. It also leads to an increased maintenance workload. You can therefore deactivate authorization checks of this type in a targeted manner using transaction SU24.
    •             You have globally deactivated authorization objects for all transactions with transaction SU24 or transaction SU25.
    •             So that the entries that you have made with transactions SU24 and SU25 become effective, you must set the profile parameter AUTH/NO_CHECK_IN_SOME_CASES to “Y” (using transaction RZ10).
    All of the above checks must be successful so that the user can start the transaction. Otherwise, the transaction is not called and the system displays an appropriate message.
    Starting Report Classes
    You can perform additional authorization checks by assigning reports to authorization classes (using report RSCSAUTH). You can, for example, assign all PA* reports to an authorization class for PA (such as PAxxx). If a user wants to start a PA report, he or she requires the appropriate authorization to execute reports in this class.
    We do not deliver any predefined report classes. You must decide yourself which reports you want to protect in this way. You can also enter the authorization classes for reports with the maintenance functions for report trees. This method provides a hierarchical approach for assigning authorizations for reports. You can, for example, assign an authorization class to a report node, meaning that all reports at this node automatically belong to this class. This means that you have a more transparent overview of the authorization classes to which the various reports are transported.
    You must consider the following:
    •     •         After you have assigned reports to authorization classes or have changed assignments, you may have to adjust objects in your authorization concept (such as roles (activity groups), profiles, or user master records).
    •     •         There are certain system reports that you cannot assign to any authorization class. These include:
    •     •         RSRZLLG0
    •     •         STARTMEN (as of SAP R/3 4.0)
    •     •         Reports that are called using SUBMIT in a customer exit at logon (such as SUSR0001, ZXUSRU01).
    •     •         Authorization assignments for reports are overwritten during an upgrade. After an upgrade, you must therefore restore your customer-specific report authorizations.
    Calling RFC Function Modules
    When RFC function modules are called by an RFC client program or another system, an authorization check is performed for the authorization object S_RFC in the called system. This check uses the name of the function group to which the function module belongs. You can deactivate this check with parameter auth/rfc_authority_check.
    Checking Assignment of Authorization Groups to Tables
    You can also assign authorization groups to tables to avoid users accessing tables using general access tools (such as transaction SE16). A user requires not only authorization to execute the tool, but must also have authorization to be permitted to access tables with the relevant group assignments. For this case, we deliver tables with predefined assignments to authorization groups. The assignments are defined in table TDDAT; the checked authorization object is S_TABU_DIS.
    You can assign a table to authorization group Z000. (Use transaction SM30 for table TDDAT) A user that wants to access this table must have authorization object S_TABU_DIS in his or her profile with the value Z000 in the field DICBERCLS (authorization group for ABAP Dictionary objects).
    please See also:
    •        SAP Notes 7642, 20534, 23342, 33154, and 67766
    guess this info will help you,there is one graphic which actually explain the hierarchy of authorisation,i will find some time out to let u know more info about the authorisation
    but if u sit with ur BASIS guy then u can learn lot of things in PFCG
    i guess u r a basis guy,then its not a problem
    best regards
    ashish

  • I bought a Used iPad. How I can sign in in Apple. always the user name of the former owner appears

    I bought a Used iPad. How I can sign in in Apple. always the user name of the former owner appears

    Go to Settings>Store>Apple ID - tap the ID that is showing and sign out. Sign in with your own ID.
    Why the previous owner did not remove his information is a mystery.

  • How can I login and retrieve my user file from the trash?

    I was trying to find out where all my HD had gone, which a did using ‘What Size’.
    I found what looked like an old backup file so I put the file in the trash.
    It turns out that the file was my user file. So now I can’t login to as the user.
    How can I login and retrieve my user file from the trash?

    The Digital Editions forum is here, in case this is what you are talking about:
    http://forums.adobe.com/community/adobe_digital_editions
    If you are not, I apologize for the misunderstanding.

  • How to track the user who deleted the info object.

    Dear Gurus,
    In our BI system one info object has got deleted.  If I need to track the user who has deleted that how can I track it(in which DBtable).  And the complication is one user ID is being used by many people, in this case how can I track that from which machine the Info Object has been deleted(if there is any possibility to track the machines by IP address).
    Kindly let me know if there is any procedure to find it out. Your help will be rewarded with a great honour.
    Regards
    Mohan Kumar

    Hi dear,
    you have to go in SLG1 transaction, and then select
    Object: RSD
    Subobject: IOBJ_DEL
    External ID: (put here the name of your deleted IO)
    Then choose a time range...and voilà, you can find the user who deleted the IO...
    Hope it helps!
    Bye,
    Roberto
    About the IP...look at USR41 table, but I think it's a bit difficult fo find data referred to the past...
    If you haven't activated logon auditing in SM19...

  • How to identify the user who created the variant

    Hi All,
    Can anyone tell me how to identify the user who created the variant ?

    Hi Dear,
    For the same go to SE11 and view the table "VARID". This table give the details of the program,user,variant etc.
    From this table u can know which user created the variant. Hope this solve your purpose.
    Regards

Maybe you are looking for

  • Safari not displaying Facebook properly

    Since yesterday, Safari stopped displaying Facebook properly. I get a white page with no formatting, just a column of links. That is the only site I have problems with. All others seem to work fine and Facebook displays properly if I'm using Firefox.

  • Adobe Reader XI running problems

    Just upgraded from Reader X to reader XI. Since upgrade each time I open a PDF file I get error message stating Adobe Reader has stopped working and will now close. It states you will be notified once a solution is available. This has been going on f

  • ISE WLC 4400 configuration

    Up until now, my experience has been with 5500 controllers and ISE. My customer is using 4400 controller, on 7.0.240 code. I cannot locate any documents referencing 4400 controller configuration for webauth, named ACLs, posturing, etc... Does anyone

  • Lightroom has stopped opening up images into PS

    Hello,<br /><br />All of a sudden Lightroom has developed a new problem for me. In the Develop module when I right click on an image and go to open in Photoshop, I get this message:<br /><br />Lightroom was unable to prepare the the selected file at

  • Design a menus instead of menu bar as like web pages

    sir i want to design a menus looks like in websites instaed of menu bar. and put it into java application. can it is possible ? and which components can be used?