******* INTERESTING QUESTION *********
hi
I have to find out ascii value of all the characters in a String.
The String which i get in my program are dynamic .
i get it from a remote place.
if i receive a String say "Welcome\2002";
i should convert each character to ascii value irrespective of having escape characters.
when i printout this string it is printing "Welcome?2"
The problem is if i have escape characters the ascii value is different.it is giving me the ascii value of '?'
how to get the ascii value of escape characters??
Thanks
you don't need to convert an occurrence of "\" into "\\". The previous posters are forgetting that you receive the String at run time, where the String instance wraps the proper character codes. Escape sequences like the patterns described above are only necessary for compilation. Any way, I really don't understand why you would break apart a String into its ASCII patterns, only to rebuild it, but getting the ASCII codes is easy:
for (int i = 0; i < args[0].length(); i++) {
char current = args[0].charAt(i);
System.out.println("ASCII code for " + current + " is " + ((int)current));
}...that above code will return an ASCII value of 92 for the slash character.
Similar Messages
-
Trust Key Store - Interesting question ....
Hi,
Currently, using one way SSL, we get a 200 millisecond overhead from the client perspective. I have a gut feel that the trust key store check adds a lot of overhead (since it does an I/O check)
if my gut is right ...
IS there anyway to cache the trust keys store (I am using a stand alone java client running it on Junit)
Thankswhat this means to an end user ?I have no idea, but what it means to me is that JBoss don't understand the difference between them any more than you did when you asked the question.
A keystore is a high-security item that needs to be kept under lock and key as it contains credentials sufficient to identify that peer legally, and I mean in a courtroom in a dispute over millions of dollars. A truststore on the other hand is a collection of public certificates whose security requirement is to prevent people adding untrustworthy certificates to it. A completely different matter. In any large organization, the personnel with the authority over the keystore would never be the same as the personnel with authority over the truststore. Putting both in the same file compromises the security of both. It makes no sense whatsoever. -
Java reflection (interesting question)
hi folks,
class A {
void foo() {
Class B overrides method foo() in A
class B extends A {
void foo() {
Now i create a object of class B and assign to A
A aref = new B();
aref.foo() will call method foo()of class B. //polymorphism
Using reflection, is it possible to call method foo() of class A using the handle aref.
thanks
venkathi bondvenky,
What abt the answer for my original question. How to
access the base class methods using the handle for
child class object using reflection ?as far as i know, this isn't possible - your next question is probably going to be "why". It certainly seems slightly surprising that you can't do this, but you can access private methods. Unless you consider the latter a weaker way of breaking encapsulation (!?).
what was the sun's purpose behind allowing access to
the private methods of an object using Java
Reflection? good question.. its very useful but on the other hand i can't think of a time i've used it that couldn't be classed as a hack.
Is it not a security threat to java security model?it doesn't break anything - ie its not a security loophole. It links in with your question above though - would it have been possible/useful to not allow it period?
sorry for the vague answers :(
asjf -
OK - I got a really interesting question down in ABAP General and NW AppSer
This one is so interesting that I thought I'd draw a little extra attention to it here.
See:
Hang on to your hats! (shared buffer in multi-WAS/multi-update process env)
or:
Hang on to your hats! (shared buffer in multi-WAS/multi-update process env)
Any and all <i><b>informed</b></i> opinion welcome.This is really cool: the <b>export to database</b> statement with a given key value for ID <i><b>replaces</b></i> what's already in the table for the same key value.
To see that this is true, copy the system table INDX to a custom table called ZINDX_QM (so you won't have to change the code below.) Activate this custom table.
Then run the following code twice as follows:
1) the first time, leave the value of wa_stuff as it is declared, i.e.:
"This is some stuff"
2) the second time, change the value of wa_stuff to:
"This is some stuff - pass 2."
You'll see that the second value has replaced the first value in the custom table.
So the export to database statement actually does <b>a "replace", not an "append"</b>, if the key value is already in the table.
REPORT ZFOO.
type-pools: thfb.
TABLES:
zindx_qm.
DATA:
context_id TYPE thfb_context_id,
cntxt_user_dt(60) TYPE c,
cntxtud_s TYPE string,
rtrnd_hash TYPE i,
rtrnd_hash_n(22) TYPE n,
rtrnd_hash_c(22) TYPE c,
wa_zindx_qm TYPE zindx_qm,
v_chk_cnt TYPE i,
wa_stuff(40) TYPE c VALUE 'This is some stuff - pass 1'.
CALL FUNCTION 'TH_GET_CONTEXT_ID'
IMPORTING
CONTEXT_ID = context_id.
CONCATENATE context_id
sy-datum
sy-uname
INTO cntxt_user_dt.
cntxtud_s = cntxt_user_dt.
CALL FUNCTION 'LCRDB_STRING_HASH'
EXPORTING
TEXT = cntxtud_s
IMPORTING
HASH = rtrnd_hash.
rtrnd_hash_n = rtrnd_hash.
rtrnd_hash_c = rtrnd_hash_n.
wa_zindx_qm-aedat = sy-datum.
wa_zindx_qm-usera = sy-uname.
wa_zindx_qm-pgmid = sy-repid.
EXPORT wa_stuff
TO DATABASE zindx_qm(mo)
ID rtrnd_hash_c
FROM wa_zindx_qm.
CLEAR wa_stuff.
IMPORT wa_stuff TO wa_stuff
FROM DATABASE zindx_qm(mo)
ID rtrnd_hash_c.
WRITE: / wa_stuff.
Also, the second cool thing is that the "relid" (area) field of the custom table actually makes coding multiple storage statements much easier. To see why this is so, just compare what's been commented out in the following BAdI method with what's replaced it:
method IF_EX_INSPECTIONLOT_UPDATE~CREATE_IN_UPDATE.
* 11/10: new export statements from XSQM exit
*EXPORT gt_outtab TO DATABASE zindx_qm(tb) ID rtrnd_hash_c.
*EXPORT s7_tab_mseg TO DATABASE zindx_qm(ms) ID rtrnd_hash_c.
*EXPORT v_cntr_recursion TO DATABASE zindx_qm(rc) ID rtrnd_hash_c.
* 11/10 - original decs/imports before switch to database exports from shared buffer exports
*v_memkey(60) TYPE c,
*v_memkey2(64) TYPE c,
*v_memkey3(65) TYPE c,
*v_memkey4(65) TYPE c,
*v_memkey5(65) TYPE c,
*v_memkey6(65) TYPE c,
*IMPORT gt_outtab TO gt_outtab FROM SHARED BUFFER indx(st) ID v_memkey. now tb
*IMPORT s7_tab_mseg TO s7_tab_mseg FROM SHARED BUFFER indx(st) ID v_memkey2. now ms
*IMPORT v_cntr_recursion TO v_cntr_recursion FROM SHARED BUFFER indx(st) ID v_memkey3. now rc
*IMPORT v_do_exit TO v_do_exit FROM SHARED BUFFER indx(st) ID v_memkey4. now de
*IMPORT wa_zzqa02 TO wa_zzqa02 FROM SHARED BUFFER indx(st) ID v_memkey5. now wz
*IMPORT i_zzqa02 TO i_zzqa02 FROM SHARED BUFFER indx(st) ID v_memkey6. now iz
* for context id typing
TYPE-POOLS:
thfb.
DATA:
context_id TYPE thfb_context_id,
cntxt_user_dt(60) TYPE c,
cntxtud_s TYPE string,
rtrnd_hash TYPE i,
rtrnd_hash_n(22) TYPE n,
rtrnd_hash_c(22) TYPE c,
wa_zindx_qm TYPE zindx_qm,
v_chk_cnt TYPE i.
DATA:
v_do_exit TYPE c,
v_cntr_recursion TYPE i,
v_itab_cnt TYPE i,
v_index TYPE i,
v_mapl_cnt TYPe i.
DATA:
s_qals TYPE qals,
s7_tab_mseg TYPE STANDARD TABLE OF mseg,
wa_mseg TYPE mseg,
gt_outtab TYPE STANDARD TABLE OF zzmseg_qm_2007,
wa_zzqm TYPE zzmseg_qm_2007,
wa_zzqa02 TYPE zzqa02_prueflos,
i_zzqa02 TYPE STANDARD TABLE of zzqa02_prueflos,
wa_zqm_lottrck TYPE zqm_lottrck,
wa_mapl TYPE mapl,
v_mtart TYPE mtart,
v_qmatv TYPE qmatv.
DATA:
v_cnt_wyt3 TYPE i,
v_debug TYPE i.
CALL FUNCTION 'TH_GET_CONTEXT_ID'
IMPORTING
CONTEXT_ID = context_id.
CONCATENATE context_id
sy-datum
sy-uname
INTO cntxt_user_dt.
cntxtud_s = cntxt_user_dt.
CALL FUNCTION 'LCRDB_STRING_HASH'
EXPORTING
TEXT = cntxtud_s
IMPORTING
HASH = rtrnd_hash.
rtrnd_hash_n = rtrnd_hash.
rtrnd_hash_c = rtrnd_hash_n.
* CONCATENATE 'DEXIT'
* sy-uname
* sy-datum
* context_id
* INTO v_memkey4.
* IMPORT v_do_exit TO v_do_exit FROM SHARED BUFFER indx(st) ID v_memkey4.
IMPORT v_do_exit TO v_do_exit
FROM DATABASE zindx_qm(de)
ID rtrnd_hash_c.
* CONCATENATE 'CRCSN'
* sy-uname
* sy-datum
* context_id
* INTO v_memkey3.
* IMPORT v_cntr_recursion TO v_cntr_recursion FROM SHARED BUFFER indx(st) ID v_memkey3.
IMPORT v_cntr_recursion TO v_cntr_recursion
FROM DATABASE zindx_qm(rc)
ID rtrnd_hash_c.
* CONCATENATE sy-uname
* sy-datum
* context_id
* INTO v_memkey.
* IMPORT gt_outtab TO gt_outtab FROM SHARED BUFFER indx(st) ID v_memkey.
IMPORT gt_outtab TO gt_outtab
FROM DATABASE zindx_qm(tb)
ID rtrnd_hash_c.
DESCRIBE TABLE gt_outtab LINES v_itab_cnt.
IF v_do_exit = 'N'.
v_do_exit = 'Y'.
* EXPORT v_do_exit FROM v_do_exit TO SHARED BUFFER indx(st) ID v_memkey4.
EXPORT v_do_exit FROM v_do_exit TO DATABASE zindx_qm(de) ID rtrnd_hash_c.
* CONCATENATE 'SQALS'
* sy-uname
* sy-datum
* context_id
* INTO v_memkey5.
* IMPORT wa_zzqa02 TO wa_zzqa02 FROM SHARED BUFFER indx(st) ID v_memkey5.
IMPORT wa_zzqa02 TO wa_zzqa02
FROM DATABASE zindx_qm(wz)
ID rtrnd_hash_c.
IF v_cntr_recursion < v_itab_cnt.
* CONCATENATE 'TQALS'
* sy-uname
* sy-datum
* context_id
* INTO v_memkey6.
* IMPORT i_zzqa02 TO i_zzqa02 FROM SHARED BUFFER indx(st) ID v_memkey6.
IMPORT i_zzqa02 TO i_zzqa02
FROM DATABASE zindx_qm(iz)
ID rtrnd_hash_c.
ENDIF.
APPEND wa_zzqa02 TO i_zzqa02.
* EXPORT i_zzqa02 FROM i_zzqa02 TO SHARED BUFFER indx(st) ID v_memkey6.
EXPORT i_zzqa02 FROM i_zzqa02 TO DATABASE zindx_qm(iz) ID rtrnd_hash_c.
IF v_cntr_recursion = 0.
CALL FUNCTION 'ZZQA02_ASSIGN_BDC' IN BACKGROUND TASK.
ENDIF.
EXIT.
ENDIF.
* CONCATENATE 'MSEG'
* sy-uname
* sy-datum
* context_id
* INTO v_memkey2.
* IMPORT s7_tab_mseg TO s7_tab_mseg FROM SHARED BUFFER indx(st) ID v_memkey2.
IMPORT s7_tab_mseg TO s7_tab_mseg
FROM DATABASE zindx_qm(ms)
ID rtrnd_hash_c.
v_index = v_itab_cnt - v_cntr_recursion + 1.
READ TABLE gt_outtab INTO wa_zzqm INDEX v_index.
READ TABLE s7_tab_mseg INTO wa_mseg INDEX v_index.
IF wa_mseg-bwart <> '101'
AND wa_mseg-bwart <> '103'.
EXIT.
ENDIF.
IF wa_mseg-werks <> '2000'.
EXIT.
ENDIF.
SELECT
SINGLE mtart
FROM mara
INTO v_mtart
WHERE matnr = wa_mseg-matnr.
SELECT
SINGLE qmatv
FROM marc
INTO v_qmatv
WHERE matnr = wa_mseg-matnr
AND werks = wa_mseg-werks.
IF v_mtart <> 'ROH'
AND v_qmatv <> 'X'.
EXIT.
ENDIF.
s_qals = insplot.
* v_lifnr_save = s_qals-lifnr.
CALL FUNCTION 'QPBU_LOT_DELETE'
EXPORTING
I_QALS = s_qals.
s_qals-lifnr = wa_zzqm-zzlifnr.
s_qals-pplverw = '5'.
s_qals-stat19 = 'X'.
SELECT
SINGLE plnty
plnnr
plnal
zkriz
zaehl
FROM mapl
INTO (s_qals-plnty,
s_qals-plnnr,
s_qals-plnal,
s_qals-zkriz,
s_qals-zaehl)
WHERE matnr = wa_mseg-matnr
AND werks = wa_mseg-werks
AND lifnr = wa_zzqm-zzlifnr.
v_do_exit = 'N'.
* EXPORT v_do_exit FROM v_do_exit TO SHARED BUFFER indx(st) ID v_memkey4.
EXPORT v_do_exit FROM v_do_exit TO DATABASE zindx_qm(de) ID rtrnd_hash_c.
v_cntr_recursion = v_cntr_recursion - 1.
* EXPORT v_cntr_recursion FROM v_cntr_recursion TO SHARED BUFFER indx(st) ID v_memkey3.
EXPORT v_cntr_recursion FROM v_cntr_recursion TO DATABASE zindx_qm(rc) ID rtrnd_hash_c.
wa_zzqa02-prueflos = s_qals-prueflos.
* CONCATENATE 'SQALS'
* sy-uname
* sy-datum
* context_id
* INTO v_memkey5.
* EXPORT wa_zzqa02 FROM wa_zzqa02 TO SHARED BUFFER indx(st) ID v_memkey5.
EXPORT wa_zzqa02 FROM wa_zzqa02 TO DATABASE zindx_qm(wz) ID rtrnd_hash_c.
SELECT COUNT( * )
FROM mapl
INTO v_mapl_cnt
WHERE matnr = wa_mseg-matnr
AND werks = wa_mseg-werks
AND plnty = 'Q'
AND plnnr <> '99999999'.
IF v_mapl_cnt = 1.
wa_mapl-matnr = wa_mseg-matnr.
wa_mapl-werks = wa_mseg-werks.
wa_mapl-plnty = 'Q'.
wa_mapl-plnnr = '99999999'.
wa_mapl-plnal = '01'.
wa_mapl-zkriz = '0000001'.
wa_mapl-zaehl = '00000001'.
wa_mapl-lifnr = 'ZZZZZZZZZZ'.
wa_mapl-datuv = sy-datum.
INSERT INTO mapl VALUES wa_mapl.
ENDIF.
CALL FUNCTION 'QPBU_LOT_INSERT'
EXPORTING
QALS_NEW = s_qals.
IF wa_zzqm-zzltno IS INITIAL.
EXIT.
ENDIF.
wa_zqm_lottrck-zzltno = wa_zzqm-zzltno.
wa_zqm_lottrck-werk = wa_mseg-werks.
wa_zqm_lottrck-prueflos = s_qals-prueflos.
wa_zqm_lottrck-mblnr = s_qals-mblnr.
wa_zqm_lottrck-mjahr = s_qals-mjahr.
wa_zqm_lottrck-zeile = s_qals-zeile.
INSERT
INTO zqm_lottrck
VALUES wa_zqm_lottrck.
ENDMETHOD. -
Interesting question about AppXRay
I am sometimes working on the
http://www.itracker.org
Open Source project.
Interestingly sometimes AppXRay does not see the errors. I can't exactly say, when. It seems to have to do with Struts forwards (Global Forwards, Multi-Modul-Forwarding, Dynamic Forwards).
For example I had the code:
return mapping.getInputForward();
which I had to replace with
return mapping.findForward("edituserform");
What do you know about the Struts limitations of AppXRay?Yes, I think I can confirm this, although I am not absolutely sure what AppXRay can trace, and what not.
If you (now) checkout the itracker source, and if you then (now) compare the source to the SourceForge bug list, then you will see that there are bugs in the application, that the Workshop does not see. And some of the not seen bugs seem to be related to AppXRay limitations and / or the way the itracker is currently programmed. -
Numbers Loan Calculator Template interesting question
Hi all,
if you note the Loan Calculator program has a Form for inputting data.
However you can only change a few values and the other fields are 'locked'.
How can you unlock those fields?
How can I add another field into the form without it being visible in the corresponding sheet?
Thank you for your adviceWelcome to Apple Discussions
And if you are asking about the desktop version of Numbers, please post your question in the appropriate sub-forum in the Numbers forum category. -
Strange But Interesting Question!!!!
Hi,
I am wondering is that is there any way to track the DML statements forms issues implicitly whenever a commit operation happens.Is there any system variable similar to :system.last_query for this??..... "
Any inputs???
Alfredhi, Murali
thanks.
I have another confusion that, we can configure the valuation document type in valuation method, and also we can configure the reversal document type in generic document type setting, which should be the default reversal document type.
but during the valuation, the valuation and reversal document types are the same, has not taken the reversal document type, is that right? I think that is an old question, is there any solution or explanation for that?
best regards, Lawrence -
Interesting question in Java!!!!!!!!
Hi,
I am in need of getting some help on the following Java problem,
I have a String variable with a value of,
"if (flag) i=i+1 else i=i-1;" or "...some other arthmetic operation.."
and at one poing of time i need to execute the code inside this String. Is there anyway? Pls do help me. Thanks in advance.
CraoI don't know of anything that will handle both expression evaluation and program logic...
http://www.beanshell.org/intro.html
http://jep.sourceforge.net/ -
Can ne 1 answer this interesting question!!! ?
Hi,
I have the name of the method in a String format. I want this information to get evaluated as a method/function. How can I do that?
For example, I have a string named "setName" and another string "str". I want this information to get evaluated as :- setName(str), ie. string 'setName' should get interpreted as a method name 'setName( )'. 'setName(String str)' is a method in the same class.
Thanks!
-Vaibhav.Hi...
import java.lang.reflect.*;
public class Test {
public Test (String setName, String str) {
try {
Method m = this.getClass ().getMethod (setName, new Class [] {str.getClass ()});
m.invoke (this, new Object [] {str});
catch (Exception e) {}
public static void main (String [] args) {
Test t = new Test ("setName", "Rick");
System.out.println (t.getName ());
public void setName (String name) {
_name = name;
public String getName () {
return _name;
String _name = "Boab";
[\code] -
Interesting question for original iPhone owners
Hi,
I was looking at the back of my device today while it was out of the case (more then usual) and when looking at the two lines of text (below the word "iPhone" but above the memory size icon...in my case mine says "8GB" with a square around it, if you look at the two lines really closely it looks like the lines of text are not straight (more on the right part of the two lines verses the left part of the two lines.
When I turn the phone sideways looking at the text, then it pretty much looks aligned. I'm wondering if what I'm seeing is just an optical illusion when looking at it right side up or are the two lines really not imprinted on the device in a straight line?
Intersted to hear other owners in their findings. It's kinda bugging me now so I wanted to ask other people if they see the same thing as I do.Are you referring to the second line, beginning roughly with the IMEI number? Using a Schaedler Precision rule, magnification glasses, and a lot of squinting under a halogen lamp, it appears the capital letter height of IMEI is approx. 1/64th of an inch taller than the capital letters ~ FCC ID ~ on the far left of that line. 1/64th is the smallest unit on this ruler. The IMEI on my phone is aligned on the upper portions of the FCC letters, but not along the IMEI baseline of that second line. It's optically insignificant to me, especially since it's on the back and in a case. Hope this helps.
-
Webdispatcher Sizing - Interesting question
Hi ,
I have few queries on sizing the webdispatcher . I was actually refering to the sizing guide for web dispatcher in service.sap.com/sizing . It says that average size of a message is 16 KB .How do we measure the message size or in other words for portal connected with a webdispatcher having a 1000 users , how much messsage with be flowing back and forth ?
Any clue abt this
AneezHi,
I would say - nearly each click of a user in the portal will end up in a request to the portal server which means a request to the SAP WebDispatcher.
Depending on the content of you portal users will click lets say every 30 seconds... Having 100 of the 1000 users on the portal at the same time leads to 200 clicks per minute. Meaning 3200 KB of message size per minute... Multiplied by 2 = 6400KB because the portal server is sending its answer back through the WebDispatcher, right?
But this is really heavily depending on the number of concurrent users and the type of content...
Hth,
Michael -
An interesting question.
Ok, let me explain my problem. I am making a program which writes a program in a .txt file. It is run by a GUI. For example if the user wants to add a button or a label they click the "add button" or "add jlabel" buttons and it will add it too an array and then you can finish the program, and in the text file it will be writen in java. One of the functions that you can choose for the button is too dispose of the jframe (f1.dispose();) Just check out the following code, this is a very unique assignment and its hard to explain.
this creates an array with all the stuff thats gunna be written to the txt file
there are 2 check boxes that you can select if you want to change text and/or dispose of the frame. i need a way to where if the user selects only one of the 2 choices in the code writen to the txt file it will ONLY be the choice that was selected, but with the code i have now it just writes them all. this is extreamly hard to explain, but thanks for checking this out.
listener.add("public void actionPerformed(ActionEvent event); \n {");
for(int i = 0; i< button.size(); i++){
listener.add("if (event.getSource() == b"+i+")");
listener.add("{");
//action events text:a dispose:f
for(int a = 0; a< textcheckarray.size(); a++){
ts = textcheckarray.get(a);
if (ts.equals("selected")) //check box
listener.add("textbox.setText(changetext)");
for(int f = 0; f< disposecheckarray.size(); f++){
ds = disposecheckarray.get(f);
if (ds.equals("selected")); //checkbox
listener.add("f1.dispose()");
listener.add("");
listener.add("}");
this is the part that writes the file.
try{
FileWriter outfile = new FileWriter("program.txt");
PrintWriter out = new PrintWriter(outfile);
for(int i = 0; i< importstatements.size(); i++)
out.println(importstatements.get(i));
out.println(classname);
out.println("{");
for(int i = 0; i< variables.size(); i++)
out.println(variables.get(i));
out.println(constructor);
for(int i = 0; i< const_statements.size(); i++)
out.println(const_statements.get(i));
out.println("}");
for(int i = 0; i< listener.size(); i++)
out.println(listener.get(i));
out.println("}");
out.println("}");
out.close();example:
if i make 3 buttons and each of them has different choices of weather they dispose or change text this happens.
import javax.swing.*;
import java.awt.*;
import java.awt.event.*;
public class fddffd implements ActionListener
JFrame f1;
Container c1;
JPanel p1;
JButton b0;
JButton b1;
JButton b2;
JButton b3;
public fddffd()
f1 = new JFrame();
f1.setSize(3443,3434)
c1 = f1.getContentPane();
p1 = new JPanel();
b0 = new JButton(" dfdf ")
b1 = new JButton(" fdfd ")
b2 = new JButton(" fd ")
b3 = new JButton(" ffdf ")
b0.addActionListener(this);
b1.addActionListener(this);
b2.addActionListener(this);
b3.addActionListener(this);
p1.add(b0);
p1.add(b1);
p1.add(b2);
p1.add(b3);
c1.add(p1);
f1.show();
public void actionPerformed(ActionEvent event);
if (event.getSource() == b0)
textbox.setText(changetext) // this one was spose to only have "f1.dispose"
textbox.setText(changetext)
textbox.setText(changetext)
f1.dispose()
f1.dispose()
if (event.getSource() == b1) // this one was only spose to change text
textbox.setText(changetext)
textbox.setText(changetext)
textbox.setText(changetext)
f1.dispose()
f1.dispose()
if (event.getSource() == b2) // this one was spose to do nothing
textbox.setText(changetext)
textbox.setText(changetext)
textbox.setText(changetext)
f1.dispose()
f1.dispose()
if (event.getSource() == b3)
textbox.setText(changetext)
textbox.setText(changetext)
textbox.setText(changetext)
f1.dispose()
f1.dispose()
} -
Which brings up an interesting question...
How far does intellectual property span on a film, commercial, music video etc...
If I wrote a script but shot it shot for shot the way Psycho was shot (not a Psycho film... a loving film about 3 brothers) but SHOT FOR SHOT editing was exactly the same frames for frames...
I mean, we spend a lot of time figuring out effects and editing techniques here that -- well -- if I took the chord structure of the Ghostbusters theme and made a song of well... Axel F - I'd get thrown in jail!
Can poor Shane/Danny put a little circle-c next to each cut in Blood Diamonds?
CaptMCan poor Shane/Danny put a little circle-c next to each cut in Blood Diamonds?
Why would we do that? Sure, we worked hard to find the right footage and cut it to the music, but how can you copywrite a cut? I mean...it is a simple cut. If you throw differen footage in there, but cut at the same time, it wouldn't remotely be the same, because the footage is different.
How can a film be different from Psycho, but shot and edited shot for shot? If you have different footage and different characters and different plot, it couldn't POSSIBLY be the same.
And editing techniques can't be copywritten. THANK GOODNESS. God, that would suck. How would anyone be able to edit anything? I copy other editing styles I see, and hopefuly people will copy mine. If they did, i'd be flattered. I mean, people are going too far with this "intellectual property" thing. There are a few basic storylines (like 26 I beleive), and everything is a variation of those. If someone had copywritten them, then what would happen?
Sorry, I have strayed. I am just saying that I wouldn't want to copywright editing techniques. If we did, then innovation and adaptation would be stifled. If someone copied a film or music video shot for shot, then they would look dumb and unimaginative. But if they took what they saw and adapted it to what they were doing, it would be different.
Shane -
Very very interesting question
how to return the value from the procedure with out using the out paramter in java?
generally we use the out parameter while using the callablestatment,but i dont watn to use the out parameter to retrurn value
please give me answer clearlyhow to return the value from the procedure with out
using the out paramter in java?We don't use out parameter in Java. We register the output parameters in CallableStatement.
generally we use the out parameter while using the
callablestatment,but i dont watn to use the out
parameter to retrurn valueGet that value from a resultset.
You should reconsider your requirement IMO.
please give me answer clearlyRead the docs. -
Interesting question in inheritence
What will the output when i do " java inh" ???? Can anyone explain the output???
class inh extends inh1 {
inh() {
super();
public static void main(String a[]) {
inh o1 = new inh();
void getme() {
System.out.println(" in inh");
class inh1 {
inh1() {
getme();
void getme() {
System.out.println(" in inh1");
}How can a super class looks down and execute the
child getme() method?Every object contains one little pointer to its Class object. The Class
object itself stores a 'vtab' i.e. a list of pointers to methods. When a
class is loaded, its Class object is constructed together with that vtab.
When a subclass is loaded, first its parent class is loaded and the
entries present in the parents vtab are copied to the subclass vtab.
Then the entries for the methods present in the subclass itself are
writen over the entries copied from the parent's vtab. The jargon is
that the subclass method 'overrides' the super class method.
The constructor of the superclass executes in the context of the subclass'
vtab hence the behaviour you've noticed. iow, the superclass doesn't
'search for' methods in a possible subclass.
kind regards,
Jos
Maybe you are looking for
-
Dear Experts, I have created a quotation in CRM system. I want that to be downloaded into ECC, so that, I can create a sales order there with reference to that quotation. What are the parameters that I need to set in CRM system so that my quotation g
-
Help me explain the need for RAM? Please???
Hi, I work on a G5 in my new job as a 'Mac operator' (I'm in pre-press). At first I thought this has to be one of the original G5's that had issues, because it is pretty slow for a G5. So I decided to check the profiler and see just what my little Ma
-
JOptionPane.showInputDialog cancel brings up a blank box
String name = JOptionPane.showInputDialog( null, "My message", "My title", null, null, null) // real list of options deleted for brevityThis works okay, but when I press the cancel button, I get a blank warning JOptionPane (m
-
Error 500 internal server error on every page!
Ok I was browsing myspace when all the sudden it said error 500 internal server error. Now no matter what website i go to even things like google, it still says that. any help?
-
Convert to PDF in landscape orientation
Hi experts ! I´m using the CONVERT_ABAPSPOOLJOB_2_PDF function to convert a txt into PDF, but i have not found, how to convert this in landscape orientation, anybody can help me, pls. Thanks in advanced !