More questions about networking....

I have my server and clients set up to the point where they are relaying the information back and forth and doing the appropriate things with that information. The problem is that on one client the fighter (im doing a fighting game) moves fast, but on the other client it doesnt move as much or as fast. is there any reason this might be happening due to my code or something?

Yes, most likely it's due to your code.

Similar Messages

  • Basic questions about Network Licence

    Hi,
    Before buying, I have some basics questions about the network licence of Acrobat
    As an example, if I buy 5 network licence for 20 users.
    If the 5 licence are used or if one user is outside and can't access the licence serveur, is there still some basic features available? I mean, is there a "acrobat reader" part that still allow users to read pdf?
    In the same kind of problem, if 10 users are using Acrobat just for reading pdf file and that a user now want to use acrobat to create a pdf, is there still available licence  or the 5 firsts that are just reading have take the 5 licences available?
    Thank you for your answers

    This is a user to user forum, with the space provided by Adobe
    This is not official Adobe support... I think you need to contact Adobe

  • More questions about pointers

    Sorry to post so many threads -- I hope I'm not pinching any nerves around here, but I've been in a programming trance recently, and I'm trying to learn as much as I can. If anyone has time to spare, there's still some things about pointers I'd like to try to understand. To start with, consider this simple character pointer declaration:
    char * pChar;
    What I'd like to know is what exactly is going on internally when this statement is compiled (before any other pointer or string literal assignment or anything like that -- just the declaration above). I mean, in terms of memory addresses and what not, what is happening here? This pointer variable would be created on the stack, right? What else happens?
    To expand on this question, let's say the above statement is the only statement in the entire program (so, again, there's no additional assignments to a string literal like +pChar = "a string"+ or to a character's address like +pChar = &charVariable+ -- I simply declare the character pointer +char * pChar+ and leave it at that.) If I then add the following printf() statement after it, like so:
    char * pChar;
    printf("%c", pChar);
    then the character 'K' is printed to the console. Alternatively, if I dereference pChar in the same printf() statement, like so:
    char * pChar;
    printf("%c", *pChar);
    then the character '[' (an opening brace) is printed to the console. All this seems odd to me given that the pointer hasn't been assigned to anything, so I would think it would produce a null value or something like that.
    I would really like to understand all this. Even after all the work I've put into trying to understand pointers, and even after all the help I've gotten from the devs around here, I still feel lost whenever I go back to pointers after having left them alone for even a short period of time.
    Any information on this topic, no matter how short or how long, will be very, very much appreciated. Thanks again.

    Yes -- I was referring to a local variable. Should have specified -- sorry about that.
    So we have a random address consisting of 4 bytes, e.g. in hex: [FE] [00] [09] [4B]. Assume when we tell printf to make a single char out of those bytes, it will select the lowest byte in the address (for extra credit, the student may determine if this assumption is true on his or her Mac; however students who fail to close this thread until that question is resolved will get no credit).
    hehe -- are you referring to the time you gave me that pointers exercise to do and it took me like two weeks to actually get around to actually doing it? Sorry about that, Ray -- it just took me awhile to find a time where I could put as much time and effort into as I wanted to (I don't know if you ever got around to reading the response, but I did put quite a lot of time and effort into that exercise, and it really was very helpful to me, so it didn't go to waste by any means, and I really appreciate your putting it up there for me to do). Anyways, the student apologizes to the instructor for that.
    This time around, though, the student would like to respond promptly to the instructor's exercise in order to receive his extra credit. The question that the instructor asked was to find out if "this assumption is true on his or her Mac" (this particular student is a he, by the way). I'm confused, though, about what particular assumption I'm supposed to be confirming. In the paragraph above, you said "we declare the char pointer pChar, and we assume that its value is random" -- is this the assumption I'm supposed to be confirming?
    I had changed the code a few times over the last 24 hours since I wrote this thread, and this time, when I went back and ran the following code:
    char * pChar;
    printf("%c", pChar);
    The student didn't get anything but a blank line. Instead of 'K' like before, nothing was written to the console that could be seen. Maybe it was a space or something this time, and that's why it wasn't visible? So, the student added another declaration after the first and used the same printf() statement to print the char-formatted value of the first char pointer, like so:
    char * pChar;
    char * pChar2;
    printf("%c", pChar);
    And this time I got a 'K' like before. If I change the printf() statement to print pChar2 instead of pChar then I get the space (or blank line or whatever) again. If I add another declaration, before the other two this time instead of after, like so:
    char * pChar3;
    char * pChar;
    char * pChar2;
    printf("%c", pChar);
    This time I still get 'K' for pChar. If I change the printf() statement to print pChar2, I get the blank line again. If I change the printf() statement to print pChar3, I get the blank line with it as well.
    I don't really know what to make of all that to be honest -- it seems like the pointer's value is pretty random to me, though. I don't know if that's the assumption you wanted me to check on or not. The only other one I can think of that you may have been referring to is when you mentioned that some compilers will check to see if the printf() function's arguments match the format specifiers, but I don't know what code I should run to find out if this is true or not for my compiler. I tried using printf() to print an int with a %c specifier and that ran fine, and when I did the opposite and used it to print a char with a %d specifier that worked fine too. But characters are integers (right?), so that's no surprise. If I declare an int, however, and try to use printf() to print it with a %s specifier, then the debugger comes up with a signal 10 error after the program starts, but I don't get any warnings ahead of time, so maybe that means the answer is no (meaning that the compiler does not check to see if the arguments match the format specifiers)
    Anyways, I think the student is butchering the instructor's exercise completely. The student feels very unintellegent at the moment, but he wanted to try...
    If the address stored in pChar is random, then the contents at that address will also be random.
    I would have thought that if the address is random, then the contents of that address would be empty since it is not an address that's being used, right? Does this mean that all memory addresses have something in them, even if they are not in use? I mean the frequently used "mailbox" analogy for pointers says that when you declare a variable, an empty mailbox is used to hold it, right? And if that's the case, doesn't that mean that the empty mailboxes have no contents? So how would the contents be random? I don't if any of that made any sense or not -- feel free to ignore me. I can't seem to get myself to understand how all this memory address business and everything surrounding it works -- I feel very lost.
    What do you expect to happen in this case?
    You asked this about running the following code:
    char * pChar;
    *pChar = 'A';
    Honestly, I really have no idea what to expect here. I mean, I know that usually, before you dereference a pointer to assign the value it points to to something (like in the second statement above), you usually assign the pointer to the address of another variable or something (like +pChar = &charVariable+). So, the student proceeded to cheat and run this code in his compiler, at which pointer the program ran, but he received a signal 10 error. He doesn't know what to make of this.
    My understanding of pointers is much, much better than what it used to be, and most of that is thanks to you and the other devs around here in previous threads I've started. Nevertheless, I still feel like I don't know much of anything in the realm of things when it comes to pointers.
    Thanks to the rest of you guys as well for all your responses. They were all helpful, and I read them all thoroughly, but it seems like, for every answer I get, five more questions come up that I'm equally confused about. I'm determined, though -- I'm not going to give up until I understand how all this works, so thanks to everyone for continually answering my questions.

  • One more question about "snap to" points in audio objects

    sorry, one more question people.............. is there a way to set a "snap to" point in an audio region? Can I have logic set a point, or an "anchor" within an audio region that would coincide with the cursor. Once I get the cursor to a bar or a beat, is there a command that would allow a "snap to" point to be created in an audio object? That way I could clean up any "noise" or "chatter" at the beginning of an audio bounce or any audio object, and still have no problem pasting it all over my arrangement. I'm sure it's in here somewhere, but can't find it in the manual..
    thanks again!!!

    The anchor point in an audio region can be moved to wherever you want it to be. Let's say you recorded a loud piano bass note and afterwards you trimmed the file so that the attack of this sound happens right at the beginning of the audio region. Your anchor point will now coincide with the begnning of that region. This means that you can place that audio at, say, bar 37 and it's guaranteed that the attack of that sound will play exactly at bar 37. In this case anchor point = position of audio region in the Arrange Window.
    Even though you haven't played a MIDI note into the song in order to place this audio region, an "event" is generated for this sound which can be viewed in a special version of the Event Editor which shows the position of all audio regions in the arrangement. Access this by simply clicking on a blank area of the Arrange window and then opening the Event Editor.
    So let's say this sound is positioned at bar 37. Open the Event Editor (as described above) and you'll see an event at 37 1 1 1 and the name of that audio region to its right. In this case, the event's position = the start of the sound file = the position of the anchor within that sound file. If you changed the position of that event to 38, or 109, or 3, that audio region will be "triggered" at any of those positions. That sound will always "attack" on a downbeat.
    Now let's say you reversed that pinao note in order to create a dramatic swell into a section of your song. (Open the sample editor and use the Reverse function). At this point, the anchor point is still positioned at the beginning of the file! Play back the sequence (from our bar 37) and the audio will play back from bar 37, only backwards this time; the peak of that piano note will be at some point later than 37.
    So let's say you wanted to position this sound so that it hits exactly on the downbeat of bar 37. How do you do it? Well, you could always slide the audio file in the Arrange Window and try to line up the attack of the audio waveform with the downbeat of bar 37, but there's an easier way...
    Open the sample editor and move the anchor point to the end of the file, coinciding with the peak of the waveform (the piano's attack is now at the end because we reversed the audio). Next, close the sample editor window, click on a blank area in the Arrange Window and open the Event Editor. You'll see that this audio region is still positioned at bar 37, but the actual beginning of the sound file now starts before bar 37. Now when you play back, Logic will start playing that sound file before bar 37, but the audio's peak will be lined up at bar 37.

  • Questions about networking a desktop app

    So the background first: I'm working on a hobby program, and wanted to try my hand at networking it. It's a desktop app (a simple game) that two or more users can play at the same time. There's no centralized server to connect to, it will be an ad hoc connection. One user hosts a game (starts a server) and then others join the game (start their clients). I've done a lot of research, but still have some unanswered questions. I plan on using ssl encrypted socket connections. I used this tutorial to learn about trust managers and such.
    My questions are:
    1) What's the best way to give the users the info they need to connect to each other? I haven't looked into it yet, but I'm assuming it's not to hard to display the server's ip address, which they can give to the clients to connect to the server. PC games used to do this years ago before companies began hosting matchmaking services. Is there more required than that?
    2) What's the best way to pick a port number that all user's have access to? I know I need to pick a port that isn't registered by another app, and that the port number will need to be given to the clients along with the server's ip. If the server is able to open that port, is there a situation where clients wouldn't be able to access that port?
    3) Since this is basically a toy, I don't want to to the trouble of something like Verisign for security. Will a self-signed certificate authority be adequate? My concerns are not opening user's computers to attack, and protecting the data in transit. I know ssl will protect the data, but I'm not knowledgable with security to be sure if a shared trust manager will be enough to only let the app access the connection. What are the risks of someone bypassing the security and gaining access to our systems?
    I've never written an application that had to deal with network security, so please pardon my paranoia, and thanks very much for any help.

    If you are getting the week or intermittent wireless connection then,try the following settings on the router...Under the Wireless tab,Change the Channel Width to 20MHz and Channel to 11..Provide unique SSID.Under the Advanced Wireless Settings..Change the Beacon Interval to 50,Change the Fragmentation Threshold to 2304,Change the RTS Threshold to 2304 and Click on Save Settings...Power Cycle the network and check the connection.
    WPA2 is very secured Secured type,so it is advisable to use it.However,it is not necessary to use WPA2.
    If you are using "N"Router then,to get the full advantage of N Speed,you should "N" Adapter.
    If you want to set the static DNS on the computer or any other wireless device then,you can set any DNS numbers.
    To repeat the wireless signal of the N Router,I would suggest you to go for an Access Point like WAP610N.

  • Question about Network In/Out in the Monitor of the Cloud Service

    Hi there
    My question is that what kind of data is the monitor monitoring? The monitor is in the cloud service.
    And what are network in/out  in the monitor stand for? The network in/out are in the monitor.
    The monitor had monitored a huge amount of data in my cloud, but I have no ides what are they.
    Thanks a lot!

    hi Tianchi,
    Thanks for your posting!
    >>what kind of data is the monitor monitoring? The monitor is in the cloud service
    From the concepts side, By default, minimal monitoring is provided for a new cloud service using performance counters gathered from the host operating system for the roles instances (virtual machines). The minimal metrics are limited to
    CPU Percentage, Data In, Data Out, Disk Read Throughput, and Disk Write Throughput.
    If you want to monitor other metrics, you could use the azure Diagnostic to custom
    performance counter in your cloud service or set
    Verbose setting on the azure portal. For this issue, I suggest you could refer to the concepts part of this page (http://azure.microsoft.com/en-us/documentation/articles/cloud-services-how-to-monitor/
    >>And what are network in/out  in the monitor stand for? The network in/out are in the monitor.
    Base on my understanding, Network in/out include the
    performance counter "Bytes receive" and "Bytes send". Maybe it seems that your data size of network in/out is huge amount. But only your outbound data
    can be charged. Of course, if you have some doubt about data or data billing, you could contact Azure Billing support for more details.
    Regards,
    Will
    We are trying to better understand customer views on social support experience, so your participation in this interview project would be greatly appreciated if you have time. Thanks for helping make community forums a great place.
    Click
    HERE to participate the survey.

  • Question about networking

    So I've gotten placed into the role of UCS manager having only a basic understanding of upkeep (currently taking training).  I've noticed some things that I'm curious about but don't know where I should look for more information.
    For one.  We were orinigally using port channels to do networking when we had a 1g connection to the core from the FI, now that we're 10g my network team told me that we wouldn't do port channel anymore and what I've got currently setup is 3 connections marked network and 1 connection marked unified uplink 2 Network in FI B and 1 Unified Uplink and 1 network in FI A. 
    This seems very incorrect to me but I also can't seem to set the unified uplink port back to a network port (I don't see that as a configure choice).
    If anyone has some good info on what I really need to be looking at that'll be great but if you've run into a similar issue that would be awesome.
    Thanks

    Sean,
    Doing a deeper research in our data base I found that  this has  no problems and actually is saying that it works as uplink port  for  FCoE and Ethernet at the same time and it should show up under the  LAN  and SAN tab as uplink ports.
    We set the role of the port to either "Network",  "FCoEUplink" or "UnifiedUplink" based on whehter the port is used as an  ethernet uplink, fcoe uplink or both.
    If you go to the LAN/SAN tab and check the interface you should be able  to see the interface as uplink for both as these are Unified Ports that  can be FC or Eth ports.
    Can you try to unconfigure the port from the  "Equipment"  tab? the LAN/SAN tabs will only let you delete/disable the  interface, and then just configure it as LAN OR SAN uplink?
    Let me know what happens.
    Rate ALL helpful answers.
    -Kenny

  • General questions about network setup

    Hi everybody,
    I am in the process of migrating the network of our small nonprofit-organization from windows to linux. I searched for a while and had a look at several distros but it seems that arch is what we need ;-) Some months ago I migrated my own laptop and desktop at home to arch and learned a lot about KISS since then. But now I need some hints that point me in the right direction. The net consists of a router (running fli4l for firewalling, ntp, dhcp and dns-server), a main Server (SuSE 9.1 samba domain controller by now) and a backup server (arch). There are some workstations running Win2000 or XP and two arch systems with a KDE-desktop.
    How can I manage single sign on for all these machines? NIS seems to be insecure, LDAP very complicated. Any other options? Maybe someone with a working configuration as an example? The setup should take care about the possibilty of one server going down and the backup server then taking all services over.
    On each windows machine I needed antivirus and desktop firewall software. Any need for this on linux machines? I am a bit concerned about degrading performance since all workstations are 1GHhz Durons which is not so much these days...
    By now the main task for all workstations is doing some text processing and spreadsheet work. The servers do the file sharing using samba. In the future I want to set up an internal email server, maybe some kind of networked PIM-Software for all users. What would you use for this purposes?
    Are there any other things I have to keep in mind while setting up a small network like this?
    Thanks for your help.
    Harvey
    BTW, English is not my native language so don't shoot me if I put something wrong ;-)

    TB2 wrote:If the main tasks are text processing and spreadsheet work, then why are there any Windows machines?
    Because this environment has grown over years and is now moving towards Linux. And there is some special software that only exists as windows software (medical databases) which I was not able to run in Wine. Virtualbox is a good hint, though I am using vmware in the moment for my own boxes. So vmware-player would do as well, I guess. 
    Then you will also be able to drop samba...
    Mmmh, I'm a bit concerned about that. I suppose you suggest using NFS/NIS? Isn't that believed to be insecure?
    and there's loads of IPM programs for Linux
    Well, not so much if you are looking for a networked one which archlinux supports. Evolution looks nice though I'd personally prefer Kolab, but for groupware features it needs a server which I wasn't able to find in the repositories. And making packages is not one of my skills...
    switch from KDE to a more ressource-friendly DE, like Xfce, Window Maker or Fluxbox.
    Tried XFCE, which looks nice, but I need a login manager for my users. Had a look at slim, but was not able to configure it right. The wiki seems to be outdated here. It runs on boot, but never lets me login. I come back to the login screen in an infinite loop. Still looking for a solution here.
    In general I think it's better if all machines run the same setup. Mixing Win2000, XP and Linux machines can be done, but I think it's not recommended
    This is what I am thinking too. And I want to migrate, but in the moment there are some caveats I have to deal with.
    Harvey
    Last edited by Harey (2008-01-29 12:39:25)

  • Question about networking iMac and streaming video to TV

    I have the 24" iMac 2.66GHz with 4 G ram. Currently using Motorola SBG900 (Docsis 2) cable modem & router to stream Comcast through house (another PC, iPhones, LG Blu Ray player/digital video streamer).
    Recently acquired a Netgear Rangemax 3700 which is supposed to be the fastest current wireless router. Here are my questions:
    1) Can I just use the Motorola SBG900 as modem ONLY and run the ethernet out of it to the Netgear router (thus bypassing the router built into the SBG900). Will this accelerate the streaming of video to other receivers?
    2) Would I be better off with a Motorola 6120 Docsis 3 Cable modem feeding the Netgear router (even though my Comcast cable feed is Docsis 2, not 3)?
    3) Since my Comcast account is rated 10 Mbps max (though it sometimes goes up to 15 or so late at night) and I believe the existing Motorola SBG90 is rated at 54 Mbps, is the limiting factor the speed of my Comcast connection and all else doesn't matter? That is, is it impossible to speed up my streaming or download speed without a faster connection to the Internet?
    4) What kinds of connections are there that are faster than Comcast cable connections?
    Basically, I don't want to waste money or time if I'm already at the maximum throughput available given my connection. If I can get marginal speed increases by adding new modem and router, that's fine. I'll do that.
    Thanks for your help.
    PS: I owned and returned the Airport Extreme Base Station. It did not increase the speed of my connection or streaming, but then it tested very poorly at www.smallnetbuilder.com -- about half the speed of the Netgear Rangemax.

    Can't help with Q 1 + 2, but here are some things to consider re:
    +3) Since my Comcast account is rated 10 Mbps max (though it sometimes goes up to 15 or so late at night) and I believe the existing Motorola SBG90 is rated at 54 Mbps, is the limiting factor the speed of my Comcast connection and all else doesn't matter? That is, is it impossible to speed up my streaming or download speed without a faster connection to the Internet?+
    My Comcast account is rated 15 Mbps and I never get that. I've done everything I can here including Cat 6 cables (instead of Cat 5), but the major problem/hangup in my case is: Comcast is using 20-year old buried cables from their hub (approx. 10 mi across town) to the neighborhoods here - those cables are "leftovers" from the company Comcast purchased the rights from. So, we not only have old cables, but the little boxes all over the neighborhood feed at least 6 - 10 homes each, so you are sharing the available bandwidth with the neighbors. And, whenever everyone seems to be online at the same time, my downloads slow down to a c r a w l (as slow or slower than dialup occasionally!).
    So, unless you have a better/newer cable setup where you are, you need to keep that in mind; in that case, no matter what you do, you are at the mercy of Comcast's equipment and your neighbors' usage.
    4) The only one I know of is FioS (fiber optic).

  • Question about network statement in OSPF and BGP

    The network statements in OSPF and BGP can be used to advertise networks. But I'm not clear under what circumstances would make more sense to use network statements to advertise a network than by using other methods to have the network learned by other routers.
    Here is an example: assume I'm running BGP on router A. I want to advertise network 10.1.1.0/24 to other BGP peers. I have a OSPF route for this network. I can do 2 things: one is to use "network 10.1.1.0 mask 255.255.255.0", the other is to do "redistribute OSPF ... route-map OSPF-INTO-BGP", and create a prefix list to permit 10.1.1.0/24.
    Both would work to have this network learned by other BGP peers. But which is better for what purpose?
    Thanks a lot
    Gary

    Hi Gary,
    There is one little difference between the use of the two approaches - the route injected into BGP by using a network statement will carry an Origin attribute of IGP, whereas the route injected using redistribution will have an Origin attribute of Incomplete. Now, that is not a huge issue since you can always change that whatever value you desire both with the use of the network statement and redistribution. The important thing, however, is that in the BGP best path selection process, the Origin attribute comparison is fairly high up and will prefer a route with the attribute of IGP.
    Apart from that, there is absolutely no difference between using the network statement and using redistribution with a route-map that matches exactly on the same route that you would have specified with the network statement.
    I guess one advantage of using the redistribute approach is that it does not clutter up the BGP config. If you wish to add more routes, you simply add them to the prefix list so that you don't really touch the BGP config portion at all..
    Hope that helps - pls do remember to rate posts that help.
    Paresh

  • More questions about bitrate...

    Sorry that this is posted twice. It occured to me that it would be better to post it as a separate question since the previous is now marked solved... Anyway:
    Hi there Jim. just wanted to say that your suggestons worked. Many thanks. However, I am still curious as to why the dvd burned the first time round on such a high bitrate.
    In fact after having concluded that the only difference of any significance between the first and second projects, was the additional audio, I did try removing it and burning the project again but had no success. That was before my first post on this forum. This seems to me to represent an inconsistency that I cannot fathom. Any insights?
    While we're at it I'm curious about the one pass CBR versus one and 2 pass VBR what's the difference ans is there a significant quality variation? I noticed there was only one variable bitrate option on the CBR preference you had suggested. What will get me the best possible quality video and audio with the amount of video you mentioned and still actually build... as a rule anyway. Any further suggestions would be appreciated.
    BTW the late reply is due to a bad link from my end.
    Thanks again.
    4 x 2.5 GHz PowerPC G5   Mac OS X (10.4.6)   8 GB DDR2 SDRam</

    Sorry that this is posted twice. It occured to me that it would be better to post it as a separate question since the previous is now marked solved... Anyway:
    Hi there Jim. just wanted to say that your suggestons worked. Many thanks. However, I am still curious as to why the dvd burned the first time round on such a high bitrate.
    In fact after having concluded that the only difference of any significance between the first and second projects, was the additional audio, I did try removing it and burning the project again but had no success. That was before my first post on this forum. This seems to me to represent an inconsistency that I cannot fathom. Any insights?
    While we're at it I'm curious about the one pass CBR versus one and 2 pass VBR what's the difference ans is there a significant quality variation? I noticed there was only one variable bitrate option on the CBR preference you had suggested. What will get me the best possible quality video and audio with the amount of video you mentioned and still actually build... as a rule anyway. Any further suggestions would be appreciated.
    BTW the late reply is due to a bad link from my end.
    Thanks again.
    4 x 2.5 GHz PowerPC G5   Mac OS X (10.4.6)   8 GB DDR2 SDRam</

  • Question about Network (JNet)

    Dear experts:
    I use Network in my WebDynpro program, in the graphic, first node (A) act as a container, it contain two other nodes: B and C. I found that B and C displaied vertically in A, but I want them are horizontally displayed in A. Anyone know how to do that?
    Thanks.

    If you're talking about round robin DNS, then no.
    DNS is completely blind as to the state of the servers in its table.
    Sure, you can say that your server has two IP addresses, and BIND will happily hand out both addresses to each client, effectively splitting the load between them, but if one of the servers goes down BIND has no way of knowing that and will continue to offer the second IP address as valid, even if users can't get there.
    There are load balancing technologies available that will automatically failover connections from a failed server, but they tend to cost $$$ (or, at the very least require running a separate 'traffic cop' server in front of your real servers and if that goes down then all bets are off).
    That's not to say you're out of options altogether. It's possible to configure Mac OS X's IP Failover - a system that automatically kicks in when a partner server fails. You could use this to take over the second machine's IP address and start up services as soon as the partner fails - users would continue to connect to the hostname they're familiar with, but behind the scenes that IP address has moved to a different box. This is covered in the Mac OS X Server docs - look for IP Failover.

  • Question about network simlocks and countries

    No, I'm not asking how to unlock the phone, as that would be unethical. (Whether or not it is illegal is an interesting question, but not one I'm prepared to venture into here.)
    A friend of mine has a phone that is simlocked to Orange in the UK, and I'm contemplating buying it from him.
    However, even though I'm with Orange, I live in Switzerland.
    Will a phone simlocked to Orange(UK) work with Orange(CH)?

    The simlock information stored in the usually specifies network operator and country. The phone may ignore the country setting if the operator information is correct but I wouldn't bet on it!

  • One more question about upgrading HD

    EVeryone was really helpful last time, I have one final question:
    Does the name matter for the HD?
    I have bought my HD, used SuperDuper and am actually already working off the new HD via Firewire.
    Does it matter what I NAME the new Drive? When I used Super Duper I called it "New Startup". The current HD is called "Macintosh HD". Is this a problem?
    Thanks guys!

    @Niel: How about localized chars (ä, ß, î, etc.) and such ones that may have a special technical meaning (like /, *, -) ?

  • [SOLVED] Question about network setup static and dynamic

    I am trying to set up an Arch install on my other pc.  I have used Ubuntu and then Linux Mint for a year+ and Arch has always intrigued me so I am attempting to install it now.  I do consider myself a pretty advanced computer user/programmer but computer networking has always confused me a little.  I'm not quite understanding whether I setup my network with a static or dynamic ip.  This is what I know
    I have a static ip assigned to me by my ISP but I do have a router so it assigns me a different internal ip.  Does that make my ip dynamic?
    Last edited by c26zwj (2013-03-14 18:24:35)

    If your ISP assigns a static IP then your IP in the internet is static. If you have a different internal IP then your router is running a DHCP server and performing network address translation. Your IP on the LAN is dynamic (unless you configure your router to assign static IPs, which can be useful if you want to forward ports to a specific computer). You most likely want to use DHCP to obtain a dynamic internal IP when you connect. The external IP is beyond your control (it is managed by the ISP and assigned to the router) so you do not need to worry about it.

Maybe you are looking for