Need for persistence layer?

I don't know if this is the correct forum but this is my question:
Me and my colleague build a project that can be deployed on Oracle AS and Tomcat (struts DAO pattern). We have two database both are Oracle, one already exist and the other is a new Oracle DB(both are on different machines). We put db link on the two databases so we can have single queries on the tables of the 2 different DB. We also have web services for stored procedure calls. Now my question is do we need a persistence layer(e.g. Oracle Toplink, hibernate) to access the database object of the two different databases?

thanks fo the idea ram. im only just confused if i needed the mapping.. in this case DAO is enough.

Similar Messages

  • Macro/script needed for automatic layer naming

    Hi. I'm new to the forums, but I did a search for this and found something similar, but not quite right. I'm looking for a macro (that I've used in the past, so I know it exists) that will unlock and name the background layer after the filename AS YOU OPEN the file in Photoshop. For example: I'm in Bridge/Finder, and I drag a file named "istock123456.jpg" into Photoshop. As PS opens the file in its own window, instead of the only layer being locked and called "Background", it will be unlocked and called "istock123456.jpg". I've used this macro before at my old job, and it's extremely helpful for referencing back to original files when you need to.
    Can anyone help with this? As I mentioned, I found a similar discussion on here, but all that script does is create a new empty layer with the filename on top of the background layer, and you have to manually run it as it's not automatic like I'm talking about here.
    Thanks in advance.

    This should do it...
    activeDocument.activeLayer = activeDocument.layers[activeDocument.layers.length-1];
    if(activeDocument.activeLayer.isBackgroundLayer) activeDocument.activeLayer.name = activeDocument.name;
    Set up Scripts Event Manager to call this script on Open Document.

  • What pattern for persistence layer of swing app

    Hi,
    I have a swing application that needs to perfom a great many database actions. I have currently architected it such that I have a singleton class that contains all of the methods and interact with the DB via JDBC. I have always wondered if this is the correct approach.
    Thanks
    Juckky

    Hi,
    I have a swing application that needs to perfom a
    great many database actions. I have currently
    architected it such that I have a singleton class
    that contains all of the methods and interact with
    the DB via JDBC. I have always wondered if this is
    the correct approach.
    Thanks
    JuckkyThis is a feasable approach, if the database is simple, you can just use JDBC directly, if it's more complex Hibernate is probably a good choice. The database singleton should act as a worker thread processing actions off a queue and posting back results using a listener. This way the GUI remains responsive even when the database gets blocked.
    BTW. I've found very few bugs in mature open source programs. they tend to be more robust than proprietary systems.

  • Accessing LCDS Persistence Layer for use in Server-Side Business Logic

    Within server-side business logic, I want to be able to get a persisted object from LCDS, manipulate  that object, and then use LCDS to persist those changes to the database  as well as send those changes to the client.
    Is it possible to access LCDS' persistence layer (Hibernate) to be used by server-side business logic?
    I have attempted to use DataServiceTransaction.getItem(...).  However, for objects that contain a collection of other objects I get this error:
    [LCDS] Runtime exception while trying to fetch a property from hibernate: flex.data.DataServiceException: There is no current message broker to return.
    When calling DataServiceTransaction.updateItem(...) for objects that contain a collection of other objects, I get this error:
    org.hibernate.LazyInitializationException: failed to lazily initialize a collection of role: com.sd.pojo.Book.chapters, no session or session was closed
    Also, it appears that DataServiceTransaction.updateItem does NOT update the database?
    I have resorted to building my own Hibernate SessionFactory, but that seems unnecessary.
    One other piece of information is that I am using the Fiber modeling tool to build and deploy the model to the server.  I am generating the Java classes with Fiber and making them available to be used on the server.
    Thanks,
    Collin

    Thanks for the help guys.
    I guess what I'm really trying to get straight in my own mind is whether supporting interraction and control of eJB database interraction is still using the same functionality as having a stand alone app interracting with a db.
    I'm thinking about; the implications of using eJBs specific query language and the different way in which eJBs use db connections (either for the period of their lifetime or just for the duration of one interaction) compared with a stand alone app, which would maintain a connection to the database(s) while it is open.
    Connection pooling and caching of DB objects is often quoted as being a middle tier activity, but what does this mean when all 3 tiers reside on the same machine?
    Once again thanks for your comments and advice.
    Mark

  • SXMB_MONI - Error accessing persistence layer

    Hi,
    In SXMB_MONI there are messages with status "system error manual restart possible" and "scheduled". when i try opening those messages it says "XML message not found". I no longer need those messages and want to delete them. But when i try to cancel those messages it says " Error accessing persistence layer". 
    Is there any way by which I can delete those messages?
    Regards,
    Mateen.

    Hi Meetan
    refer these thread for the same may be helpful for you
    IS_Retry and RSXMB_RESTART_MESSAGES
    release queue
    BPM error
    /people/krishna.moorthyp/blog/2005/11/28/inactive-integration-process-ip-at-run-time
    Thanks!!

  • Persistence Layer return convention issue and question - null vs. exception

    I'm writing a position paper on persistence layer query returns. It deals with querying for a single object or a collection of objects and what to do if the object or collection of objects are not found in the database. I've googled many different search terms and have not come up with any authoritative references for this scenario. Do any of you know of any sources that have discussed this before?
    My current logic is that when searching for a single object in a persistence layer that the persistence layer should return a simple null if the object isn't found. If searching for a collection of objects then the PL should return an empty collection object.
    1.
    /** Returns a list of objects that match the non-null fields in the provided example object.
    This will return an empty Collection if no matching objects are found */
    public Collection retrieveByExample(MyBO example);2. /** Returns a business object.  This will return a null if no matching object is found */
    public MyBusObject retrieveById(int aMyBusObjectId);These two methods would not return a "checked or unchecked" exception if the object(s) are not found. I think that they are the simplest to implement and do not break the convention of not using exceptions in non exceptional situations. I don't feel that it is the persistence layer's responsibility to make a business decision on an object's existence being an exception. There are many times where applications search for an object to see if it exists or not and then proceed to create the object or use the object if it exists or doesn't. These two methods also don't force using application layers to catch or throw any declared exceptions.
    Notes on scenario 1: program control flow is simple by using an iterator and hasNext(), if the collection is empty then any code that needs the objects can be skipped.
    Notes on scenario 2: program control flow is simple in this case with a " != null or == null check. If the method returned an uninitialized object instead of null then the calling application would have to have additional business logic to tell whether the object was truly uninitialized or not. I can see the method having a UnexpectedMultipleBusinessObjectsFoundException if more than 1 object is found since the method is looking by primary key, but would this ever happen if searching by primary key. However in a similiar method that searches on non primary key then the UMBOFE would be warrented. Any thoughts?
    Others have brought up some additional scenarios.
    3. /** Returns one and only one business object from persistence with a matching primary id. 
    If one and only one match is not found, null is returned if isLenient is true, otherwise an exception is thrown. */
    public MyBusObject retrieveById(int aMyBusObjectId, boolean isLenient) throws BusinessObjectNotFoundException;I feel this option is bad in that it forces the calling or using application layer to still declare the BusinessObjectNotFoundException. It adds bulk and unneeded complexity to the the code.
    While looking at it I can see that since a caller is searching for exactly 1 object then if the query finds more than one object then a UnexpectedMultipleBusinessObjectsFoundException could be thrown. But I don't believe an NotFoundException is warranted. What are your thoughts?
    Message was edited by:
    smalltalk

    Hibernate (for example) actually does both.
    public Object get(Class clazz, Serializable id) throws HibernateException - "Return the persistent instance of the given entity class with the given identifier, or null if there is no such persistent instance. (If the instance, or a proxy for the instance, is already associated with the session, return that instance or proxy.)"
    public Object load(Class theClass, Serializable id) throws HibernateException: "Return the persistent instance of the given entity class with the given identifier, assuming that the instance exists.You should not use this method to determine if an instance exists (use get() instead). Use this only to retrieve an instance that you assume exists, where non-existence would be an actual error."
    Certainly get is the more commonly used of these methods.
    If you are returning something like an array I believe it is always preferable to return a zero length array rather than null to save the extra client code.

  • About the bottlenecks in persistence layer

    Hi,
    is there anyone who would like to share to strategies for avoiding persistence layer bottlenecks (lazy loading, for example).
    I'm not really interested in discussing the technologies itself (like hibernate of jdo), but i'm sure really interested in what they do behind the scennes to make it work.
    Thanks,
    ltcmelo

    Lazy loading is a good strategy that helps improve performance when your app is doing alot of reads.
    In general if you REALY need to improve performance - caching data in your business tier is a good strategy, but implemenation can be quite compex if you need to do many updates to the cached data.
    Write-through cache implemenation is usually very efficient.
    Implementing it is relatively straightforward if you have one app server instance for your business tier, but gets exponentially more complex if you have a cluster.
    And remember the first rule of optimization: DON'T OPTIMIZE :) Just throw in better/faster hardware and try to stick to standard optimization features provided by your application server.

  • What settings do I need for high quality web video?

    I've created a video via animoto.com for my website. The video resolution they recommend for web is 432 x 240 @ 15 fps. I used this and it's not as crystal clear as I'd like. Still looks pixelated a bit and I'd like a higher def version. So I downloaded the hi res version (864 x 480 @ 24 fps). This looks great but takes forever to load due to buffering. Then the video stops every few seconds. I understand this res is not meant for web.
    What is the resolution I need for best quality & fast loading? I've seen great videos on the web before that loaded very quickly. This is what I'm looking for. I have Quicktime Pro for Mac and can pretty much save in any formats & resolutions. So what's recommended?
    Thanks!

    Hi
    There are some important things.
    • Set down burn speed to x1. In iDVD08 You can do this in preferences.
    • Use high quality media. I only use Verbatim
    • Use right type of DVDs. I only use DVD-R (Single Layer)
    • Best quality - I use Pro-encoding Quality.
    • IMPORTANT: Secure a minimum of 25Gb free space on Your internal (start-up) hard disk
    • Use a CD/DVD cleaning disk from time to time
    • Don't burn more than three DVD at a time then let Your DVD-burner rest in 15 minutes to cool down.
    Good Luck
    Yours Bengt W

  • Transformation: Need for calling a custom function module on source system

    Hi Gurus,
    I need to use a custom FM residing on source system within the transformation to determine the type (e.g. posting type) of a document item. The logic is quite complex with many exceptions (many if statements) and 2 customizing & few transparent tables are in use as well in the FM.
    From my point of view, there are few options for achieving the outcome:
    1. Copy the FM logic 1:1 in transformation
    2. Transport the FM from ERP to BW system
    3. Source system delivers the info (e.g. with an extra field "posting_type")
    4. Access the FM directly via RFC/BAPI
    However, there are pros and cons for each of the alternatives:
    *Option 1*
    pros:
    cons: consistency problem, need for importing customizing tables & source tables, high maintenance effort
    *Option 2*
    pros: better consistency compared to Option 1
    cons: need for importing tables, administrative efforts
    *Option 3*
    pros: no logic is needed at BW side, no transformations means no impact on performance, high consistency, no administrative effort
    cons: structure in source system has to be changed, impact on historical records
    *Option 4*
    pros: best consistency (better than Option 3 as FM might change), no administrative effort
    cons: impact on performance during transformation
    Could you please verify my assumptions and give suggestions on solving the problem?
    Thanks a lot!
    Regards,
    Meng

    Hi Joon,
    According to me.
    If Historical data amount is so high, historical data is available in BW(at PSA level or acquisition layer or corporate memory layer) and headache to load history data(because of overload on ECC due to huge amount of data) from ECC then I will suggest combination of 3 and 4 steps.
    If fetching history data from ECC is not headache for you then go for step 3.
    Step 3 is most common approach in BW, which is easy for implementation and support.
    Regards,
    Ashish

  • SelectOneChoice value needed for find-method to refresh table

    I would like to implement a filter that will filter the dataset, resultset returned by my adf-table.
    The user has to select a value in the dropdown-list and after he has made a selection the table has to be refreshed using the value of the dropdown as a parameter-value for the find-method.
    I'm using a partialtrigger to raise the refresh-event on my table, autosubmit on my dropdown and partialtrigger-attribute on my table. Now I want to pass the value of the selectOneChoice to the key-value pair used for the find-method in my pageDefinition-file.
    What's the best practice to add this parameter-value?

    Frank,
    We tried the ValueChangeListener already on the selectOneChoice-component, but the listener doesn't get fired when you choose a new value in the selectOneChoice. Only the first time the method in our backing bean is accessed, and no other times.
    We are using datacontrols based on ejb 3.0 session beans as our persistence layer instead of BC and we would like to put the chosen value of the selectOneChoice-component in the parameter of our method binding. We should be able to it in the same manner as you've mentioned in the example, by accessing the paramMap.
    Thanks for the advise !

  • Design of reusable data persistence layer with single container

    Hi,
    I am designing an 3-tier application using cmp for my data persistence layer (DPL). The customer now wants to run multiple versions of the application on one server using different data sets for each application. One solution I see, but don't like very much, is to add an application ID to each enity bean in my DPL. However, I would rather run multiple DPL's on different databases and reuse my business logic layer and my presentation layer. Has anybody solved this problem or see the obvious solution that I am missing here?
    Thanks a lot,
    Sandigo.

    Hi KPSeal,
    there is absolutely no relation between the different versions of the application. Although I would prefer to run a single business logic layer it is very much an option to have different versions of the entire application. Could you elaborate on how I would achieve these different versions? Would I have to rewrite the deployment descriptors so that each bean can exist twice or would that give me two instances?
    Thanks,
    S.

  • Switch for Distribution Layer

    I need your expert opinions for selecting a switch for distribution Layer
    My requirement is 24Gig ports @ dist layer which will connect to 3750?s for server farm. I don?t want to negotiate with the bandwidth.
    Which switch will be best for this scenario with max Backplane speed

    Yes L3 routing will there.
    I am considering 3750 for access switch for my server farm, and 4506 for distribution layer with the following port requirement
    Catalyst 4500 Gigabit Ethernet Module, 6-Ports (GBIC)
    Catalyst 4500 GE Module, Server Switching 18-Ports (GBIC)
    Catalyst 4500 Enhanced 48-Port 10/100/1000 Base-T (RJ-45)
    Catalyst 4500 Supervisor IV (2 GE), Console (RJ-45)
    Most of the gigabit port will be occupied since I have a huge server farm to connect. By using almost all the ports on 4506 will I be able to get the maximum through put??
    I have not considered 6500 due to budget. If I consider 6500 will it be a good design to have 6500?s on both core and distribution layer

  • Is an anti-virus needed for a new macbook pro?

    Is an anti-virus needed for a new macbook pro with retina display?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use one of the free anti-virus products in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use the software unless a network administrator requires you to do it.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • How to design model for staging layer.

    Hi expert,
         what is the rule when design staging layer? such as how much layer needed for staging? and what objects used in staging? why different layers needed for staging .etc.?

    Hi,
    Please have a look at SAP Help - Enterprise Data Warehouse (EDW) for basic information around layers and architecture. Moreover, please have a look at my blog Layered, Scalable Architecture (LSA) from an Implementation Perspective - Overview where you can find several "accelerators" to facilitate your implementation.
    Best regards,
    Sander

  • Persistence Layer Analysis

    Hi Experts,
         what do we check in Sxmb_moni - Integration Engine Monitering - Persistence Layer Analysis.
    and the utility of the tab - Status records for sync / async communication.
    Regards,
    Arnab .

    Hi Arnab,
    Status records for sync / async communication
    USE:
       You use the monitor for sync/async communication to display status information about persisted      messages where a coupling of synchronous and asynchronous processing has occurred.
    The status monitor for sync/async communication provides the following information as the default:
    ·        The number of active synchronous calls that are still waiting for a response
    ·        The number of processes with errors (synchronous calls) whose status has not yet been deleted
    ·        A table containing status information about the involved synchronous request messages
    The system displays the following status information:
    ¡        The overall status with a green, yellow, or red traffic light
    Activities
    In the status monitor for sync/async communication, you can execute the following activities:
    ·        Close all processes with errors.
    ·        Update the entire display by choosing Update in the application function bar.
    ·        Update the table of displayed messages by choosing Update in the table symbol bar.
    ·        Navigate from the list of displayed messages to the corresponding workflow log. To do this, click the message ID of the respective message.
    Regards
    Praveen K

Maybe you are looking for

  • How do I delete apps's windows from the new "app exposé"? Particularly Pages-

    Hi, I'm having an enourmous trouble with organizing my "recent" (rather ALL GOD **** WINDOWS!!!) documents in apps that support App Exposé. When I do the gesture with 4 fingers moving simoultanously down, it shows the currently opened window along wi

  • Hosting  problem

    tomcat is running well on my domain and showing welcoming page. the problem is tomcat shows its servlet examples as http://domainname/servlets-examples/servlet/RequestInfoExample I want to set as http://domainname/servlet/* please help me thanks & be

  • Calling StoredProcedure from program!!

    Hello all, I have a stored proc. in my Oracle8i and when I try accessing it from my EJB, I get the foll. error: javax.transaction.TransactionRolledbackException: EJB Exception:: javax.ejb.EJBE xception: Error executing STORED PROC INS_EXPENSE java.sq

  • Error in generating the pdf form:HR_F_6559

    Hi  Gurus, I  canu2019t create W2s out , i have the message  Error in generating the pdf form: HR_F_6559                                                                                 HR_F_W2_07                                                       

  • HAL and Pillar

    Is there anyone out there familiar with Hyperion Application Link and pulling data out of Pillar?