Need some advice on what kind of printer to purchase???

Hello!
I'm a graphic designer in a small town and I'm wanted to break away from working under someone and start my own small business. I want to be able to print my own work and I'm looking for some suggestions on what kind of printer to purchase (something comparable to the xerox 7750?? or if there is something better???) I was looking at Xerox and not sure if that is the way to go. Most of my work will be small: business cards, wedding invites, graduation announcements, etc. I work at a print shop now and we do a TON of that type of work off our Xerox 7750.
I'd appreciate any advice you have on purchasing the right printer and getting my small business started!
Thanks

I also have a Oki C9800hdn postscript and am a solo operator. The Oki also does banners 325x900mm (up to 1200mm long too)on paper and a special weatherproof paper. Standard sizes are up to oversize A3. Remember to order the POSTSCRIPT version of whatever printer you get.
Consumables are the thing to look at which makes it hard to price cost of prints.
I used to have a FujiXerox where I paid monthly on a rental agreement - but it was over 5 years which was too long for me. In real terms it worked out about $850 per month including the cost per 'clicks' which I didn't like either. The black toner and maintenance was included for the Xerox, but I still had to pay for the colour toners which were the same price as the Oki colour toners. (Colour approx AUD$480 each and mono approx $170AUD each). Plus the drums for each colour have to be replaced at 30,000 prints. However the Oki colour toners last longer and do more prints. Don't believe the 'number of prints with 5% coverage'. My average coverage is 80% with full colour or mono. Weight of card is up to 250gsm (more than the Xerox did). You can set up profiles so that what you print is very close to any commercial prints you get done for larger runs.

Similar Messages

  • I need some advice on what kind of virus protection program to buy.I am new to using a Mac,the promotional one is expired .I need to decide soon

    I need advice about what security program to buy the promotional one is expired. To keep the Webfoot program is expensive.Is there another less costly one recommended ?

    Mac users often ask whether they should install "anti-virus" (AV) software. The usual answer is "no." That answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions.
    It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to take control of it remotely. That threat is in a different category, and there's no easy way to defend against it. AV software is not intended to, and does not, defend against such attacks.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't been checked for security by Apple unless it comes from the App Store, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has taken far too long to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. Those lapses don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, not machine behavior, and no technological fix alone is going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're better informed than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software. A genuine alert that Flash is outdated and blocked is shown on this support page. Follow the instructions on the support page in that case. Otherwise, assume that the alert is fake and someone is trying to scam you into installing malware. If you see such alerts on more than one website, ask for instructions.
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Rogue websites such as Softonic, Soft32, and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission. All "YouTube downloaders" are in this category, though not all are necessarily malicious.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a padlock icon in the address bar when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial AV or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It can be as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • Video blog - need some advice on what to charge

    hi, i have been asked to put together a price proposal for producing a monthly video "magazine" for a major company in austria and could sure use some input from the video producer community on what i should charge for such a thing. i am not new to video and work as a veejay and produce other forms of videos. i am working on my own feature documentary. but this is for someone else, and i don't have much experience pricing such a job.
    i am the creative designer and director, and would
    a) shoot the subject on a DVX100 myself (2-4 hrs on location)
    b) transfer and edit the footage in FCP
    c) add sound fx and possibly music that i have composed
    c) export for the web and deliver a finished 3-5 minute episode once a month.
    can any of you more experienced producers offer me some pricing guides? i figured per episode 1000 for creative direction plus 1000 for the shoot plus edit. is that too low? too high? i just want to get paid what is worthy for such a job. they bought my skills based on what they have seen from my existing work.
    many thx!
    iMac G5, 20, 1.8Ghz, 2GB Ram   Mac OS X (10.4.3)   power user of pro apps

    I VJ and don't use audio engineers or gaffers. If I needed to, I would hire crew in ad hoc, but for most simple productions I get by through pure one-man-band videojournalism. And let's face it, a production for a company intranet/internet site is not the equivalent of filming the next Chanel TVC.
    It's always very difficult working out a freelance price. One method is to work out how many hours or days it would take you. Decide what you would expect to be earning if you did that job as a full-time employee. Calcuate the value of your job at that rate, then double it.
    I work in the Middle East, where rates are different (and probably much lower). Cameramen here charge US$1,000 a day for shooting. Editing varies wildly. VNRs are usually budgeted at no less than US$1,000/minute (including the basics: production, filming, writing, editing - extra for translations, voice overs, animation). Bear in mind these prices are for western expat crews, in this place you can literally knock off a zero and hire regional workers, given there are no unions and no minimum wage laws here.
    For what you are doing, maybe consider at least US$2,000/month, more likely US$3,000 and upwards. I have no clue if these prices are absurdly high or absurdly low in Austria though.

  • My iMac is dying and I need some advice on what is wrong with it

    Since about October my imac has decided to restart itself and sometimes just glitch. This started just before I bought starcraft 2. It ran fine for a good few monthes, however it began to start glitching or restarting itself. It has got to the point where I cannot load any games without it glitching or restarting.  I now have to use my windows laptop which is prone to overheating so I can't win either way...
    I have also begun finding multi coloured strikes running through my safari browser. I took a screen shot so I could show you, below is a link to the picture.
    http://i1091.photobucket.com/albums/i390/mmloraculum/Picture3.png
    My computer setup is as follows:
    OS X 10.5.8
    Processor: 2 GHz Intel Core 2 Duo
    Memory: 2 GB 667 MHz DDR2 SDRAM
    My graphics is:
    Chipset Model:          ATY,RadeonX1600
    Thanks for reading this.

    Try reinstalling Leopard:
    How to Perform an Archive and Install
    An Archive and Install will NOT erase your hard drive, but you must have sufficient free space for a second OS X installation which could be from 3-9 GBs depending upon the version of OS X and selected installation options. The free space requirement is over and above normal free space requirements which should be at least 6-10 GBs. Read all the linked references carefully before proceeding.
    1. Be sure to use Disk Utility first to repair the disk before performing the Archive and Install.
    Repairing the Hard Drive and Permissions
    Boot from your OS X Installer disc. After the installer loads select your language and click on the Continue button. When the menu bar appears select Disk Utility from the Installer menu (Utilities menu for Tiger, Leopard or Snow Leopard.) After DU loads select your hard drive entry (mfgr.'s ID and drive size) from the the left side list. In the DU status area you will see an entry for the S.M.A.R.T. status of the hard drive. If it does not say "Verified" then the hard drive is failing or failed. (SMART status is not reported on external Firewire or USB drives.) If the drive is "Verified" then select your OS X volume from the list on the left (sub-entry below the drive entry,) click on the First Aid tab, then click on the Repair Disk button. If DU reports any errors that have been fixed, then re-run Repair Disk until no errors are reported. If no errors are reported click on the Repair Permissions button. Wait until the operation completes, then quit DU and return to the installer. Now restart normally.
    If DU reports errors it cannot fix, then you will need Disk Warrior and/or Tech Tool Pro to repair the drive. If you don't have either of them or if neither of them can fix the drive, then you will need to reformat the drive and reinstall OS X.
    2. Do not proceed with an Archive and Install if DU reports errors it cannot fix. In that case use Disk Warrior and/or TechTool Pro to repair the hard drive. If neither can repair the drive, then you will have to erase the drive and reinstall from scratch.
    3. Boot from your OS X Installer disc. After the installer loads select your language and click on the Continue button. When you reach the screen to select a destination drive click once on the destination drive then click on the Option button. Select the Archive and Install option. You have an option to preserve users and network preferences. Only select this option if you are sure you have no corrupted files in your user accounts. Otherwise leave this option unchecked. Click on the OK button and continue with the OS X Installation.
    4. Upon completion of the Archive and Install you will have a Previous System Folder in the root directory. You should retain the PSF until you are sure you do not need to manually transfer any items from the PSF to your newly installed system.
    5. After moving any items you want to keep from the PSF you should delete it. You can back it up if you prefer, but you must delete it from the hard drive.
    6. You can now download a Combo Updater directly from Apple's download site to update your new system to the desired version as well as install any security or other updates. You can also do this using Software Update.

  • I'm Back! Need some Advice! Rebuild time! 6/19 UPDATE! 2nd UPDATE 7/6/15

    WooHooooooo! Another quick update, only 5 minutes ago I found this link on credit karma http://www.creditonecards.com/pre-qualification.php?C1BSourceID=C1B1  that lets you prequalify for a credit card! Which I have tried many many many times  only to recieve the message sorry we couldn't prequalify you at this time but here are some SECURED cards you may like which sucks! I decided to try one more time at this link and was totally surprised to get preapproval for a platinum card yay! Mind you, this card is probably the worst card to get and I will probably never ever use it, just need it to help with my utilization scores. The fees are high, the rates are high, the balance is low........but oh well I am still doing the happy dance!!!

    izzesparks wrote:
    Hi everyone! Long time no see! Just need some advice on what else I should be doing. I have been a part of this forum for many years now and I have taken and heeded so much advice that my head is about to explode and now I just want to make sure I am not forgetting anything. I tried to keep it short  Last time I was on I hadn’t reached the 600 club yet. But I am here now in the 600 club! Still the low 600’s but its progress. Unfortunately slow progress because a lot has happened since I was last on here. I am now officially divorced. I finally have permanent steady income, no temp services anymore phew. I have had to reevaluate my budget and cut a lot of things out. No cable, no home phone, monitor my electric bill like a hawk and learn to like the darkness, cold in the winter and the heat in the summer. I have an older smart phone, had to do without the latest gadgets and gizmos, which truly hurts my heart because I am an electronic fiend. No tablets here, no high tech laptops. Instead of buying a new car and making payments I bought a really good used gas-efficient car cash, paid in full. But since it’s still a newer car I am paying for full coverage insurance, my only splurge. I have spent this time away from this forum truly taking heed to the lessons I learned on here and reflecting on my situation. I have paid nearly everything off! It took some time but I only have 2 creditors left ‘that I know of’ to pay.One of the creditors has not reported to the bureaus yet but I want to take care of them before they do. Most of the ones I paid have already fallen off because of SOL. I was getting to the point I had the problem where I didn’t just have bad credit, I had NO credit. I hadn’t opened any new accounts until this year. Just today I opened a $500 Secured Personal loan and a few months ago I opened a $300 Secured Credit Card at my credit union. I also applied for a Quicksilver CapOne card and was approved for $300. I just started school this year and there is now a financial aid loan of $1750 that is reporting on my credit report as deferred right now. I tried to prequal for some more but was denied by all of them. So far only quicksilver would approve me.  My plans are to move out of state next May and get an apartment for 6 months while I get the lay of the land and then purchase my FIRST home!! Hopefully everything has aged by then and I have had some CLI’s.  My situation in a nutshell (Transunion was only report pulled) USED CREDITCHECKTOTAL TO PULL ALL 3 FICO REPORTS The good:UPDATES BELOW FROM 7/6/15SDFCU Visa Secured $300 – reporting paid on time every timeQuicksilver Unsecured $300 – not reporting yetSecured Personal Loan $500- not reporting yetUtility- reporting paid on time every timeNEW CARDS ADDED-Cap One Platinum MC Unsecured-not reporting yetVictoria Secret-not reporting yetMarisota-not reporting yetSent a Goodwill email for the Portfolio account listed below 6/1/15, now must wait patiently. UPDATE!! 7/6/15 SENT 3 GOODWILL LETTERS NO RESPONSE. The bad:                                                                                                                                                                                                     DEBT RECOVERY SOLUTIONS- I PAID IN FULL ON 5/27/15 Haven't found a good email contact to send a GW letter, but the search continues....Original Creditor11 VERIZON MARYLAND INCStatus-OpenOpened Date-Mar 06, 2014Balance -$146 Collection Agency-FCOOriginal Creditor HERITAGE WOODSStatus -OpenOpened Date -Jan 21, 2011Responsibility – Joint (THIS IS IN BOTH MY NAME AND MY EX-HUSBAND, AND HE SAYS HE WILL HELP PAY, BUT HE IS NOT GREAT AT FOLLOW THRU)Balance- $1,912 (They have agreed to settle for less than owed for $978)    STARTED PAYMENTS, ASKED SEVERAL TIMES FOR A PFD, EVEN ASKED A SUPERVISOR AND THE RESPONSE WAS A BIG FAT NO, SO I AM GOING TO GO THE GOODWILL ROUTE. Collection AgencyPORTFOLIO Recovery (I ALREADY PAID A SETTLEMENT FOR LESS THAN OWED, ON 5/27/15)Original Creditor HSBC BANK SENT GW LETTER, NO RESPONSEStatus -OpenOpened Date-Apr 15, 2013Balance -$518 Collection AgencyRECEIVABLE SOLUTION (PAID IN FULL ON 5/27/15) THEY HAVE AGREED TO DELETE YAY!Original Creditor MED1 AMERICAN CURRENT CAREStatus OpenOpened Date Jul 25, 2013Balance $101 Collection AgencyUNITED CONSUMERS (PAID IN FULL ON 5/27/15) THEY HAVE ALREADY DELETED FROM ALL 3 CRA'S YAY!Original Creditor MED1 EMERGENCY PHYSICStatus OpenOpened Date Oct 06, 2011Balance -$109 ACS/JP MORGAN (PAID IN FULL ON 2/25/15) Tried several times for a goodwill, no responseOriginal Creditor- Wells Fargo education servicesStatus- closedopen date- 04/2004balance- $3000 ACS/JP MORGAN (PAID IN FULL ON 2/25/15) Tried several times for a goodwill, no responseOriginal Creditor- Wells Fargo education servicesStatus- closedopen date- 04/2004balance- $800 ECMC (TRANSFERRED TO ACS/JP MORGAN) Tried several times for a goodwill, no responseOriginal Creditor- Wells Fargo education servicesStatus- closedopen date- 04/2004balance- $800 ECMC (TRANSFERRED TO ACS/JP MORGAN) Tried several times for a goodwill, no responseOriginal Creditor- Wells Fargo education servicesStatus- closedopen date- 04/2004balance- $3000 A new account was added to my credit report Trident asset - original creditor - Lowe's home improvementI disputed the account since I do not remember ever shopping there, claims I wrote a bad check. I don't even have a checkbook, never have. A new creditor sending letters to me now (boy they sure are coming out of the woodworks, not that I have started paying everyone off) NOT reporting to CRA's yet, going to try to take care of this next week before it does. Sooooooooooo what should I do know????!!!! Thanks in advance for any advice given! 

  • Business Delegate pattern - need some advice

    Hi. First let me apologize for the long post. I could see no other way. I�m building a system that quite large and I need some advice. The system is a type of transaction system, let�s suppose a shopping cart. I�m using struts taglibs and tiles for presentation, struts proper for controller, and POJOs for business logic. Also I�m using OJB for my data tier.
    Now I�ve been reading Pro Jakarta Struts (Apress), which BTW is a recommended read to anyone with novice experience in struts and related technologies. I�ve assimilated most of the techniques and patterns described in the book, and most of them make sense to me. However, I�ve hit a snag while reading the Business Delegate and Service Locator patterns.
    The way I had though of building my application before reading the book, was to have a wrapper class, such as the following:
    public class ShoppingCart {
      private IAuthenticationService authenticationService;
      private ITransactionService transactionService;
      public ShoppingCart() {
         authenticationService = new DBAuthenticationService();
         authenticationService = new DBTransactionService();
      public login(String username, String password) {
         String sessionToken = authenticationService.logon(username, password);
         return sessionToken;
      private boolean isValidUser(sessionToken) {
         bolean validUser =  authenticationService.isValidUser(sessionToken);
         return validUser;
      public performTransaction(sessionToken, TransactionVO) {
         if (!isValidUser(sessionToken) {
              throw new AuthenticationException();
         transcationService.performTransaction(TransactionVO);
      public editPreferences(sessionToken, PreferencesVO) {
         if (!isValidUser(sessionToken) {
              throw new AuthenticationException();
         authenticationService.performTransaction(PreferencesVO);
    }My idea was that my wrapper class would isolate all the business logic and could perform login service in case my application was ever to be used with other presentation layer than struts (standalone client, web services). However I believe that this overlaps the Business Delegate pattern and maybe even totally implements it. The way I understand the code I�m reading in the book, they suggest having a BD for each major service such as AuthenticationServiceBD, TransactionServiceBD, etc� However this would break my single point of entry for authenticating users. I really need some advice on my design and how it fits with the BD and SL patterns (or others). I would also like to know what you think/recommend of my authentication strategy.
    thanks in advance
    Raphael

    Thanks for your reply. This however, I understood. My concern is regarding my application in regards to business delegate pattern. You see I have this class (simplified for clarity):
    public class ShoppingCart {
       private ILoginService ls = new DBLoginService();
       private ITransactionService ts = new DBTransService();
       // and so on for all services I offer.
       //  then I mirror all the calls of my private interfaces
       //  and pass them through internally
       public String sessionToken login(String username, String password) {
            ls.login(username, password);
       public boolean addToCart(sessionToken, itemNo) {
            // check session
            ts.addToCart(sessionToken, itemNo);
       //  and so on
    }Multiple questions for this one:
    1) Am I not already implementing the Business Delegate pattern with my ShoppingCart class since all interfaces are private and all calls are mirrored from the wrapper class (ShoppingCart) to the private interfaces? All services are implemented as POJOs and I am not using JNDI at the present so I don't use the ServiceLocator pattern.
    2) I store a reference to the wrapper class (ShoppingCart) in the ServletContext so I can grab it from my Action classes. What do you think of this approach?
    3) How many BDs should an application contain. In my case I use just one. What is the advantage of using more?
    4) I create my own session tokens in case I ever want to use to business code in a non-web applications where sessions are not available readily. This brings about the problem that I can't pass the interfaces directly to the Action classes because the login session needs to be checked before any calls to services. So all methods include a sessionToken parameter which I use to check the session. This way, if I want to expose some of the services through web services, I can still use a login. What do you think of this approach.
    5) Any other remarks are very welcome...
    I really need help with this from an experienced programmer. Most things I can handle on my own but with this type of design issue, books just don't cut it. I need experience. I would really apreciate some feedback.
    Raphael
    ps: I would give all my Duke dollars for this (I only have 30), but I'm not sure how. If you want them I can create a dummy question and give them to you.

  • I need some advice about the macbook pro and iPhone 5. I took a video on my iPhone and tried to email it it said it was too big to send? So i downloaded it to my macbook pro and tried to mail it to no avail? The macbook tells me the server won't let it th

    I need some advice about the macbook pro and iPhone 5.
    I took a video on my iPhone and tried to email it it said it was too big to send? So i downloaded it to my macbook pro and tried to mail it to no avail? The macbook tells me the server won't let it through other mail goes through any ideas how to resize it or what it might take to send it?

    I agree with LowLister, the best option for you to share the video online is to upload it to your online storage account for example : Box, Dropbox, SkyDrive (All of them provide free storage beginning from 2GB).
    You can upload the files which you want to share in this online storage and then they have sharing options in which you'll will get the link of the file to be sent and send the email. You're good to go!
    Tip : You can store multiple files for backup purposes.

  • When I burn a disc from a playlist in iTunes, the track names and artist info does not display on the disc when friends view/listen to it. This probably is an easy fix, but I need some advice.

    When I burn a disc from a playlist in iTunes on my MacBook, the track names and artist info does not display on the disc when friends view/listen to it. This probably is an easy fix, but I need some advice.

    No, this standard has been implemented for several decades.
    How iTunes remembers audio CDs - http://support.apple.com/kb/TA27785
    It is just conceivable you burned a CD that exactly matched one already in the Gracenote database.  Gracenote uses track count and duration to decide what CD it is you have in a computer.  If you have one that matches that it will label it.  You could conceivably even have one that matches it that is not the correct one.
    This script will only work on Macs:
    http://dougscripts.com/itunes/scripts/ss.php?sp=cdtexttocdinfo - script to use CD-text file on CD to label CD in iTunes

  • Having some serious issues with my iPhone and need some advice

    I'm going to these two issues which have been occuring with me for the past weeks-
    1.) I am facing a problem with my iPhone 5's lightning port or the cable. This started happening all of a sudden; one second my phone is charging, and the other it is not. Even if it is slightly moved from its position, it would stop charging, and further shaking starts it again, so on and so forth. At first I thought the issue might be with my cable, so I asked my friend to bring his lightning cable to my house so we could test that. It happened again- one shake the phone will charge, another shake stops it. (Note that any kind of movement does this, not only shaking) I'm a bit skeptical about his (my friend's) cable too, though- it shows NOT CHARGING on his iPad while it is in fact actually charging. His cable is only 3-4 weeks old though, so this confuses me even more. I think the issue might be with my port, but as of now I cannot draw a valid conclusion to my problem.
    2.) The second problem is that I've noticed my battery drains a **** lot faster now- ever since the first issue started. I manage to get my phone charging by placing it very carefully on the table and it charges overnight. However, when I pick it up in the morning, and read some news, it drains from 100% to 99% in ~60 seconds. This never happened before. Before this, it used to be at 100% for at least 10-15 minutes (might be even more). If I reboot my phone, it shows 100% again, but it still drains a lot faster now. I know because I've been using this phone for the past 4 months now, and I know when it drains and when it does nots
    Please, help! I need some advice as to how I should approach this problem. My phone is in the warranty period, however, I would like to have an expert's opinion first.

    Hello,
    First: I've experienced the same problem with my iPhone 5. I've bought a new charger and it still did the same thing. I went to the Apple Store to get my iPhone checked out and they said that the pins inside my iPhone we're damaged, and I had to get a replacement.
    ~ Josh

  • I need some advice...

    Hi, I'm not quite sure where this topic should go exactly as it isn't about a specific topic. So plz fogive me if it's wrongly placed in your opinion.
    Anyway, I've been a long time fan of Linux and I don't want to have to stop using it. I've just recently converted my whole computer to a linuxbox only system, as I was running winxp(uke) before and couldn't stand it. It would lag during simple tasks like going from one directory to another and for no apparent reason, which aided me in my conversion. Enough about winblows, I don't need to tell you guys why it sucks, we all have our reasons. But there is just one thing bothering me now... and that is gaming. I am a huge fan of gaming and have been doing so for quite some time now (years) and well... gaming on linux hasn't been too pleasant for obvious reasons.
    1) the games I play except for quake3 are written and made to run solely on a winblows workstation.
    2) Wine and Winex3 have limited, but growing support for a range of games.
    3) Lastly the main game I would like to play (Steam CS 1.6) doesn't like to run on linux due to its constant updates, which throws WInex3 out of wack. Where it could have been working the day before but due to the update it no longer runs.
    I'm thinking of just making a partition for winxp(uke) so that I can game, but this isn't something I'm totally willing to do.
    Basically I need some advice and/or suggestions that anyone is willing to share with me.
    Thank you in advance.
    BTW: I'm not new to linux, I've been using it for almost 2 years now and have tried ALL of the distro's you can think of. (Arch is my distro of choice at the moment, along with slackware.)

    Enemy Territory is an excellent game, and it is totally free.
    I haven't played the free game from the US Army, but heard it is really good, and is totally free.
    I bought Return to Castle Wolfenstein, which plays perfectly in Single player mode, but I have some trouble in multiplayer mode (and I'm not an expert either).
    I bought Unreal Tournament 2004, which plays perfectly in both single player and online, but I simply suck at the game.
    I bought Never Winter Nights because I know the company has a linux version you can download once you have a registered copy.  I havent installed it yet, though, been playing UT2004.
    Doom3 is supposedly going to have a linux installer on the CD's, like UT2004 does.
    Anygame that uses OpenGL graphics instead of DirectX will prolly run under WINE or WINEX, or be easy for the original company to port (if they choose to).
    There are some "up and coming" linux only OpenGL games, light flightgear (a flight simulator), and a couple of 'massive online games".
    Betweet RTCW, EnemyT, Never Winter Nights, UT2004, and soon Doom3 - I have enough games to play, and thats without buying winex.
    Fergettabout Windows! You simply don't need it anymore.
    If you are determined to run Windows, get a removeable drive bay, and just swap boot drives when you want to swtich.  Or use GRUB if you want to select from multiple OS's.
    thx

  • Hi Just got a iMac A1418.21.5 I am looking for some advice on what Final Cut pro would work well with it? many thanks

    Hi Just got a iMac A1418.21.5 I am looking for some advice on what Final Cut Pro  series would work well with this set up ? regards

    How much Ram? Final Cut Pro X is the only version curently developed and is available on the App Store.

  • Dell Live! Value Soundblater card!!!! Need some advice

    I have an old 400 that has this card installed model #CT4780. I have purchased a new Dell E30 and want to install this card in it. I have downloaded the driver pack <FONT face=Verdana color=#ff0000 size=3>Li'veDrvUni-Pack(ENG).exe. This<FONT face=Verdana color=#ff0000 size=3> was<FONT face=Verdana color=#ff0000 size=3> listed<FONT face=Verdana color=#ff0000 size=3> on<FONT face=Verdana color=#ff0000 size=3> the<FONT face=Verdana color=#ff0000 size=3> website<FONT face=Verdana color=#ff0000 size=3> as<FONT face=Verdana color=#ff0000 size=3><FONT face=Verdana color=#ff0000 size=3> the<FONT face=Verdana color=#ff0000 size=3> correct<FONT face=Verdana color=#ff0000 size=3> one<FONT face=Verdana color=#ff0000 size=3> for<FONT face=Verdana color=#ff0000 size=3> XP.<FONT face=Verdana color=#ff0000 size=3> I notice that in the old computer there is a cable from the card to the CD-Rom and also one from the card to the modem. Are these cables need in the new computer? Also will I have a conflict with the integrated sound card that came with the new computer? I have not done anything expect download the driver pack.
    I know some about computers but do not like to install boards and new computers fearing some thing will go wrong. I need some advice and the procedure before I preceded. Any help would be greatly appreciated. Thanks

    Newer operating systems, computers, & audio cards do not require the use of the cable from the CD Rom to the soundcard. It is now handled via the IDE cable. Being that you only upgraded half of this equation (that being the computer and not the soundcard), this may be a "trial & error" situation. I do not have the experience with modem cards to comment on that one.
    Finally, you will need to disable the onboard soundcard via the motherboard's Bios. Look in the MB's manual to perform this action.
    Message Edited by johnston2 on 0-25-2006 06:49 PM

  • Songs disappearing. Need some advice.

    I need some advice regarind my ITunes library. I spent a lot of time importing all my cd's. I now have approx. 14,000 songs now. First I had put them all in as mp3's, then I heard about the quality and smaller size of AAC. I think that is where some duplicates came from. But some how I've ended up with up to 6 of a lot of my songs, at least it is showing 6 copies of many of my song in my ITunes library. But when I go to delete all but one of the songs, through ITunes, sometimes it is fine and sometimes I get the ! icon. I guess even though I left one in Itunes it actually deleted all copies. I did not know I was doing this because it doesn't show the ! icon until you go back and try to select the song. This took days and days to deleted over 6,000 duplicates.
    Now I'm finding some albums are missing songs and some are missing the whole albums even though they show in Itunes. I even have gone through and tried to "FIND" the songs some are really there but most are not. So how to I go about reconstructing the library. Is it best to try and find each one or just wipe (delete) my library clean and just reimport the entire library? I'm talking about reconstructing approximately 12,000 songs and I have no idea how many cd's.
    I just would like to know how you guys would handle this. Thanks for your help.
    Nancy

    miner78 wrote:
    Need some advice....I just bought the new retina MacBook Pro (2,199 model) and after reading about the ghosting or burn in issues that some users are experiencing I am starring to wonder if I made the right decision.  I am still waiting for my laptop to come in so I can still cancel my order.  I'm seriously considering opting for the non-retina MacBook Pro instead.  This will be my first Mac and I will mainly be using it to browse the web and do photo editing (I'm an amateur photographer) I know the non-retina doesn't not come with SSD and wondering how much of difference that makes.  Any advice, suggestions will be welcomed
    That's incorrect:
    Order online and for a fee you can have an SSD.

  • What kind of printer would you use to print on a lorry?

    Hi,
    One of my client sells items from the lorry, so he wants his drivers to print invoices on the way. My question is what kind of printer would you use to print on a lorry? Any idea, experience?
    Thx in advance,
    Laci

    Hi Laci,
    There are quite a few mobile printers, for example HP does a range of battery powered Officejet printers which you could use on the go. For instance, check this out:
    http://www.shopping.hp.com/product/CB026A%2523B1H
    I hope this helps!
    xx Nat

  • Need advice on what kind of report, queries to tune database slow issues

    Currently we have AWR reports. Our system is 11.1.07 version on AIX/Linux.
    Sometimes application will say it is slow running some queries.
    We have firewalls implemented so we cannot use toad, or other tools to access through our workstation.
    Any good manual suggestions to pinpoint what exact wrong in the system?
    Any good suggestions?
    Thanks in advance.

    846422 wrote:
    Any good suggestions?
    Try to forget for a moment the nice GUI tools and read instead what experts do when trying to answer "Why my database is slow ?" in http://www.nocoug.org/Journal/NoCOUG_Journal_201105.pdf.
    In your case I would try to work with end users to identify application scenarios that are slow and use SQL trace/TKPROF on related database sessions. For this you only need command line interface (CLI) access to run SQL statements and access to machine hosting database server: that should be possible with the jump server otherwise you cannot do anything and you would better ask someone that has CLI access to database and database server machine.
    If you have license to use AWR, you can also use ADDM report which runs an automatic analysis of AWR report and give some advices:
    SQL> @?/rdbms/admin/addmrptEdited by: P. Forstmann on 22 juil. 2011 20:15
    Edited by: P. Forstmann on 22 juil. 2011 20:40

Maybe you are looking for

  • "Aperture (3.2) cannot be opened because of a problem." on MBP Core 2 Duo, 10.7.2

    I recently upgraded to 3.2 from the App Store and was able to run the program until today. I am now completely unable to open it. I have tried the standard troubleshooting, including moving the application support files to the desktop, deleting the c

  • Exchange profile error: dbconnect.prop: failed to load properties file .\dbconnect.properties

    All, We are using PO 7.4 with SP5, and we have an issue while accessing URL Exchange profile page (http://<host:port>/webdynpro/dispatcher/sap.com/com.sap.xi.exprofui/XIProfileApp) it throw's the below error. dbconnect.prop: failed to load properties

  • Lens Profile Applied To Downloaded RAW Files

    Hi, I did a search and I can not find how to apply Auto  Lens Profile to a folder of Canon CR2 RAW files that I have downloaded. Any Suggestions Appreciated. Thank You, Hersul

  • Developer Platform for Mac

    Hi im new to Mac world and im a developer a .NET developer but i would love to use Mac in my work, so what Mac have similar to Visual Studio for Microsoft ? and what language it uses ? and the softwares made with it just run on Mac ? thank you

  • Sample rate will not change

    Logic refuses to change its sample rate from 44100. This happened all of a sudden last night when I opened a session I was mixing at 48000 and noticed it was playing back at 44100 (as it sounded flat and slow, obviously). When I select a new sample r