Looking for a Pro*C/C++ multithread sample for a W-XP machine

I would like seeing some sample of a multithreaded Pro*C/C++ program on a W-XP machine.
I have tried the sample on the reference (release 9.2.0), but my compiler (MSVC 6.0) seems not to have the thread.h include file (I suppose threads in windows must be handled in a different way).
Thanks in advance.

Here you have also examples.
I have tried the sample on the reference (release 9.2.0),
but my compiler (MSVC 6.0) seems not to have the thread.h
include file (I suppose threads in windows must be handled
in a different way).See MSDN-Library there are lot of explanations (you should use LIBCMT.LIB and MSVCRT.LIB)

Similar Messages

  • I purchased Adobe CS4.  I am now being asked for my serial number and when I put it in the program does not recognize it for Acrobat Pro 9 though it does for PhotoShop, Bridge and the rest of the suite.  What can I do?

    I purchased Adobe CS4.  I am now being asked for my serial number and when I put it in the program does not recognize it for Acrobat Pro 9 though it does for PhotoShop, Bridge and the rest of the suite.  What can I do?

    Contact support if you have serial number issues. Otherwise start by checking this stuff:
    Sign in, activation, or connection errors
    Mylenium

  • You just charged me for Acrobat Pro. You're asking for $14.95 a month. The goddam file won't download to my computer. It made me close it and restart it at least seven times. I don't have it now. I'm calling American Express. You've made me really angry.

    The loading of the program got to 39% seven times. Then it demanded I close it and restart it, which I did. The last time I gave up. I want to be able to edit Adobe files, but I guess I'm going to have to do without your help. You better pull back my charges. American Express is on my side, not yours.
    Richard Gaughan
    [email protected]
    Richard70

    Hi Richard70,
    I'm so sorry that you're having trouble downloading Acrobat--we definitely want a better experience for our customers. Please make sure that you're logged in as an admin, and temporarily disable any anti-virus software. Then, try to download from this page: Download Acrobat products | Standard, Pro | XI, X. If you're still having trouble, or decide that you just want to cancel, please let us know.
    Warm regards,
    Sara

  • Wireless setup for Mac Pro OSX 10.9.4 for HP Deskjet 3054 J610

    HP Deskjet 3054 J610, need to know how to set it up on a wireless network.  The HP installer disk I have says this verison not supported.  I cannot find a newer version.
    The printer worked on old Imac and a different network.  The network now is a Verizon jetpack 4G LTE and a Mac Pro Laptop.  USB connection does work.
    I have reset the printer to defalt.  However I am unable to find a way to tell the printer what network to use.  The Apple printer software does not give me a way to do this.

    Hi Dennis3737,
    Welcome to the HP Forums.
    I see that you are having an issue with connecting the printer to your Mac over wireless.  Just so you are aware, the printer is not supported on the operating system you are using, however I have found a post on the HP Forums that will assist you with getting connected.
    Please click on the following link that is provided by JERENDS.  
    I hope this is helpful.  If you have any other questions, please feel free to write me back at any time.
    Cheers,
    Click the “Kudos Thumbs Up" at the bottom of this post to say “Thanks” for helping!
    Please click “Accept as Solution ” if you feel my post solved your issue, it will help others find the solution.
    W a t e r b o y 71
    I work on behalf of HP

  • Ive just signed up for Acrobat Pro.  Downloaded the app (for Mac) & got config error 1 !

    Having just purchased, and done the auto download/install
    Yet I can't open the app. 
    Get "Error 1  Configuration problem" 

    Hi ericding ,
    Thank you for posting on the Adobe forums, please try the steps mentioned in the below mentioned URL.
    Configuration error 16 | CC, CS
    Thanks,
    Vikrantt Singh

  • GeForce 7300 GT Upgrade Kit for Mac Pro?? G5?

    Hi,
    Just found this on the apple store:
    http://store.apple.com/Apple/WebObjects/ukstore.woa/wa/RSLID?mco=1643C421&nplm=M A567
    "NVIDIA GeForce 7300 GT Graphics Upgrade Kit for Mac Pro"
    Why is it only for mac pro? its PCI express & my g5 is one of the late 2005 models and it has PCI Express so am i wrong in thinking that this should work fine or is it something to do with the new intel architecture?
    If i remember correctly i could have chosen this card or a very similar one when i configured my G5.
    Thanks

    That card is only for the Mac Pro, as it says.
    When you ordered your G5, you had the choice of the nVidia 6600 (or 6600LE), nVidia 7800GT, or the Quadro FX 4500.
    The 7800GT that you could have ordered with your G5 is close in performance to the ATi X1900XT that is an option on the Mac Pro. The 7300GT that you're looking at is an entry level card, which the 7800GT definitely is not.
    The 7300GT and the X1900XT are both Mac Pro only due to the ROM on the card, which is designed to work with the EFI booting hardware that the Mac Pro uses. The G5s used Open Firmware, which requires a different ROM on the video card. So, even though both your G5 and the Mac Pro are PCI-Express based, these video cards are not compatible.
    Now, most PCI-Express cards that you look at for, say, external SATA, will probably work in both the G5 and the Mac Pro. You'd still want to check the specs to be sure, however.
    If you're looking for a new video card to replace your (presumably) nVidia 6600, your only real option is the ATi X1900 G5 edition. This is a different card than the X1900XT that's offered for the Mac Pro.

  • Where can I find Plugins / Transitions for Premiere Pro CS5 (not Cs 5.5 or 6) ?

    Hello,
    I am searching and searching for transition packs for Premiere Pro CS5, there are lots for 5.5 or 6 but none for 5. At least I could't find them.
    Any ideas anyone?
    Thanks in advance
    Alex

    https://www.adobe.com/products/premiere/extend.displayTab4.html
    Chances are most plug-ins working for the later versions will also work for CS5, but you can check with each company if you're not sure.

  • What is APP FOR MACBOOK PRO - COL/AE-ZML?

    ihave just received an invoice and would like to know what APP FOR MACBOOK PRO - COL/AE-ZML is for. im sorry if this is a silly question. i dont have the macbook pro yet but im just curious as to what it is?

    It probably has to do with the shipping. However why not contact the invoice sender and ask them what their codes represent?

  • Why is the transportation C02e 4x higher for Macbook pro 15" compared to iMac 27".

    Why is the transportation C02e 4x higher for Macbook pro 15" compared to iMac 27".

    Both are great machines but have rather different purposes...while the graphics are good on the MBP, the iMac graphics would be a major step up.  Especially if you want to do heavy duty photo or video work, and heavy game use.  If the MBP is getting hot and running the fans hard, that would point you to the iMac with its higher end graphics capability.
    The photo and video work would be much easier with the larger screen and higier end graphics and faster cpu.

  • FAQ: What computer and components should I buy for Premiere Pro or After Effects?

    See this page for the official minimum system requirements for Premiere Pro.
    See this page for the official minimum system requirements for After Effects.
    Note that the minimum system requirements are just that: a minimum to run the software. You will need components that exceed the minimum system requirements to achieve satisfactory performance in many cases.
    These resources are also excellent starting points for informing such decisions:
    "Hardware performance white paper: tips to configure or upgrade a workstation for video software"
    What PC to build? An update... (Premiere Pro Hardware forum thread hosted by Harm Millaard)
    What PC to build? (Premiere Pro Hardware forum thread hosted by Harm Millaard)
    After Effects CUDA benchmark testing results (from Danny Princz)
    After Effects CUDA benchmark testing results (from Teddy Gage)
    Premiere Pro Benchmark test and performance reference materials
    Resources for choosing a graphics card for Premiere Pro
    Specific to the questions of certain kinds of components:
    hard disks: Optimizing Hard Disks
    CUDA/OpenCL cards for Premiere Pro: CUDA, OpenCL, Mercury Playback Engine, and what it all means
    OpenGL in After Effects CS5.5 and earlier: GPU: OpenGL
    CUDA and OpenGL in After Effects CS6 and later: GPU (CUDA, OpenGL) features in After Effects CS6 and later
    Also see these resources:
    optimizing for performance: Adobe Premiere Pro and After Effects

    As David and Hal said
    One thing to consider is that you may also want SATA capability (which you can do with G5 towers easily, the dual cores have cards available or will shortly) and also shortly (fingers cross) for the MacBooks (there are cards for PowerBooks.)
    The only possible fly in the ointment is if you are going to hold onto these computers for awhile, with the Intel Chips the non-Intels will eventually have less support and software. Though for the short term (particularly if you are relying on non-Intel native apps and need peak performance) the Quad G5s are great.

  • Drivers for hp pro 3330 mt pc

    im unable to find drivers for hp pro 3330 mt desktop pc for the OS windows xp...........

    Hetre is the driver page for Win Xp Pro (default OS)
    I am a volunteer. I am not an HP employee.
    To say THANK YOU, press the "thumbs up symbol" to render a KUDO. Please click Accept as Solution, if your problem is solved. You can render both Solution and KUDO.
    The Law of Effect states that positive reinforcement increases the probability of a behavior being repeated. (B.F.Skinner). You toss me KUDO and/or Solution, and I perform better.
    (2) HP DV7t i7 3160QM 2.3Ghz 8GB
    HP m9200t E8400,Win7 Pro 32 bit. 4GB RAM, ASUS 550Ti 2GB, Rosewill 630W. 1T HD SATA 3Gb/s
    Custom Asus P8P67, I7-2600k, 16GB RAM, WIN7 Pro 64bit, EVGA GTX660 2GB, 750W OCZ, 1T HD SATA 6Gb/s
    Custom Asus P8Z77, I7-3770k, 16GB RAM, WIN7 Pro 64bit, EVGA GTX670 2GB, 750W OCZ, 1T HD SATA 6Gb/s
    Both Customs use Rosewill Blackhawk case.
    Printer -- HP OfficeJet Pro 8600 Plus

  • I am trying to download a free trial of photoshop for my macbook pro and it says there is an error and that the requirements for the new version is not supported for the mac I have. I have looked at the list of requirements but have no idea how to tell wh

    I am trying to download a free trial of photoshop for my macbook pro and it says there is an error and that the requirements for the new version is not supported for the mac I have. I have looked at the list of requirements but have no idea how to tell what I do and do not have?

    Apple Menu --> About this Mac.
    Mylenium

  • Looking for tutorial or developer to for hotkey extension for Flash Pro.

    I'm using Flash Pro CS6 on a Windows 8 touch/pen tablet. In put tablet mode, some of the common commands, especially undo, are difficult to reach without hotkeys or keyboard shortcuts.
    What I need is an on-screen panel with big easy-to-hit "Undo" and "Redo" buttons that I can use as hotkeys on the touchscreen, much like the hotkeys on a Wacom Intuos or Cintiq. I have a little programming knowledge, but don't know where to start in creating an extension panel like this.
    Can anyone suggest a good sarting tutorial for this type of add-on, or would anyone be willing to bash out such an extension?
    Thank you for your time.

    Hi Arafat,
    Thank you for the suggestion but I had already looked at that.
    I am looking for a working example or step-by-step tutorial that updates a table in SAP, using ABAP webdynpro. The PO example provided with Designer does not connect with SAP; also, the tutorial steps provided in the Designer Help do not even match the way the example form is constructed! (Help says use table object, the example pdf uses a repeating subform).
    My problem seems to be in the binding between the form and SAP.  I have tried various changes and nothing I try is transferring any data except the first row of the table.
    I hope someone has a SAP example for this situation.
    Margaret

  • Im completely new to Mac. Im swapping my windows laptop for macbook pro and looking for network storage solution which the Time Capsule seems to do. Is it possible to use this as NAS for my desktop Windows PC - windows 7

    Im completely new to Mac. Im swapping my windows laptop for macbook pro and looking for network storage solution which the Time Capsule seems to do. Is it possible to use this as NAS for my desktop Windows PC - windows 7

    Broadly speaking I want some sort of network storage( wireless or through my existing wifi router) that I can access files for both my windows PC and Macbook and also to access files to my iPad/ iPhone. Some sort of backup and sychronisation so that I can access certain files remotely.
    Buy a real NAS.. synology or QNAP are the standard... although companies like Netgear and Western Digital and Seagate make them as well.
    There is no problem sharing between Mac and PC now.. you do not even need a NAS to do that.. you simply share the hard disk directly. Mac talk SMB.. everything talks SMB nowadays.. so it is easy.
    ipad and iphone are not designed to use NAS.. they are designed to backup only to the cloud or itunes.. but you can load an app like file browser if you want.
    http://www.stratospherix.com/products/filebrowser/
    Remote access to the Apple TC is somewhere between difficult, to impossible from a PC.. Apple use BTMM and iCloud but the service is not offered to PC.
    A real NAS will offer HTTPS or SFTP or several other methods.. that both Mac and PC can use.
    You simply plug it into the current wireless router.. it is a network device and assessable over the network. It is not necessary to buy another router.. in fact that is a waste.

  • I am looking for a (free, ideally) virus scan/check for my MacBook Pro -- any suggestions?

    I am looking for a (free, ideally) virus scan/check for my MacBook Pro -- any suggestions?

    Mac users often ask whether they should install "anti-virus" software. The answer usually given on ASC is "no." The answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There  is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, and a technological fix is not going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the scam artists. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software.
    ☞ Rogue websites such as Softonic and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in everyemail attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It's as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

Maybe you are looking for

  • Database connectivity with java!

    hello, has anyone got a "detailed" tutorial they can send on: 1.setting up mySQL database (not just install) 2.setting up J/connector (not just install) 3.a tutorial on how i can get a servlet to interact with a client through a webpage! does it soun

  • W510 - nVidia 880M - GPU throttle not working any more

    Hi everybody, my W510 (2 month old) used to throttle down the GPU from maximum performance (550/790 MHz GPU and Memory) to lower values (135 Mhz or something) when the GPU was nearly in idle mode. I don't know when it sopped working, but today I real

  • No webcams working on Mac Pro, happened suddenly, need troubleshooting.

    I have had a Logitech C910 webcam and a Mac Pro (Early 2008) for years.  They both worked well together.  The Logitech C910 worked out of the box as I recall.  I have been using it for Messages and Facetime, and both video and audio have worked.  A f

  • Edge Animate does not support Windows Vista operating system.

    Vista is not that obsolete, what the heck.

  • Web Analysis cannot start

    Hi, When I'm trying to start the Web Analysis, the system seems to stop at the loading screen and cannot start. It neither prompt me for installing the Java runtime nor returning any error message. Would any experts here be kind enough to advise what