Oracle newbie needs help

Hello,
First of all: Sorry for my bad English! :-) Here is the problem: Our program (written in 4D) has the functionality that the users can export some of the data from theirs database (also 4D) into an Oracle database. Until now, the data was imported to oracle via transactions. Is the customer database very big, the export time takes over 36 hours. This is of course unacceptable. As an alternative, we export the data into an SQL file. (5-6 GB) What tool must I use to import the file to oracle?
Has anybody an alternative proposal for a better solution?

As an alternative, we export the
data into an SQL file. (5-6 GB) What tool must I use
to import the file to oracle?Does SQL file mean a text file including DDL (Create, ...)/DML (INSERT, ...) statements? If yes, you could use sqlplus to execute such a "script".
Has anybody an alternative proposal for a better
solution?If you can export data into a .csv file, you could use sqlloader/external tables.
C.

Similar Messages

  • MacBook - Newbie: Need help on printing wirelessly to XP shared printer

    MacBook - Newbie: Need help on printing to XP shared printer
    Bear with me please. I read tons of articles on this but somehow as a newbie to MAC (girlfriends sick daughter), I am missing something. 10.5.2
    Currently, she can print directly if we plug in the HP Deskjet printer directly via USB to the MACBook. No problem.
    When we first got the MACBOOK I tried setting up the MACBOOK wirelessly to recognize the workgroup where the printer was attached via USB to the Windows XP PC. However it printed out garbage since I did not know there was a difference between XP printing and MAC (Gutenberg/gimp printing/drivers).
    Now I know there is a difference.
    But in reading various instructions, I no longer can find how to connect the MAC to the Windows workgroup. Note we do have a printer set up currently as USB-HP Deskjet on the Macbook (not sure I need to delete it yet).
    I went to System Preferences on MACBOOK and clicked on printers, more printers. In the drop down box was CANON, APPLETALK, IP HP printing and Firewire. There was no WINDOWS selection as I saw in other online web instructions.
    So not sure how to proceed to find a way to:
    1. Connect to Windows workgroup (click on what exactly), step by step please!!
    2. Add correct HP Deskjet 5490 printer (perhaps there is one with Gutenberg or perhaps I need Gutenprint-really not sure what I am talking about)
    Thanks so much in advance. Fiancé's kid has had her cancer recur in a different place and someone was nice enough to buy her a MACBOOK as a gift.
    Sincerely
    Peter

    ccarbery wrote:
    OK...I figured it out...no need to reply.  I noticed that there was another Protocol to use to set up the printer on the Mac, I was using LPD, so I switched it to HP Jet Direct-socket, and it prints fine...thanks.  I am curious as to why LPD wouldn't work; if anyone has that answer I would like to know...thanks
    Any chance of posting the Protocol you used to connect to your printer with your laptop?  I'm have the exact same problem printing from my MB.  Same error message "..is busy".

  • Newbie needs help with Flex app

    Hi there. I am very new to Flex and also fairly new to
    programming although I do have a little experience.
    I am trying to create an app which stores code snippets or
    common text I tend to use every day in my documents and emails.
    So basically I need help on a design level. I can refer to
    the developer's manual for exact instructions for commands, but I
    need to know what to code first.
    The app will consist of:
    -a tree directory structure where I can create groups.
    -There will be a basic text editor where I input all my data,
    basic text formatting options (font, bullets etc) would be a bonus.
    -A search function
    -Finally it will ideally allow multiple client apps write to
    a central database file over a network
    Can anyone suggest how I should approach such a project?
    Or are there any tutorials / source files which demonstrate
    each bullet point?
    thanks.

    Hey jono,
    I'm new too. But I think I might know the right components.
    If you google any of these + flex 3 you should get some
    decent documentation
    tree - advanced dataGrid component
    basic text editor - rich text editor component
    search function - well, you're gonna need to read up on
    arrays, and arraycollection. Once you get that stuff working, you
    can write up a function to search for a string in an array.
    network functionality - HTTPService, you can dump the
    datagrid into a database, and have it load the database when you
    open up the application.
    Give these things a shot, tutorials / sources will come with
    the google searches.

  • Newbie needs help comprehending CSS Password Manager functions

    Hello All:
    I own a TP W500 4062-27U running Windows 7 Ultimate.  The computer is trouble-free.
    I am seeking a solution to the following need:  An application that will securely remember my passwords for various websites, etc. and enable me to log in using the fingerprint reader or similar.
    I am aware that Lenovo provides both Fingerprint Reader software and Client Security Solution software, but I don't know whether or not either one (or both) of these applications will provide the functionality I am seeking.  I have spent a fair bit of time looking around the Lenovo website, but cannot find a document that describes (in a general, overview manner) the functionality that CSS provides.
    I don't need to log into VPNs, or company networks, or anything really fancy like that - I just need something that will enable me to log into about 20 different websites, using a different password for each website.  Right now, I'm generally using the same password for every website (that way, I can remember what it is), and as I think you will agree, that is probably not a very good practice so far as security is concerned.
    If anyone could point me towards a document that explains how I can get CSS to do what I want it to do, I would be very grateful.  If CSS does not have the functionality I am seeking, I would very much appreciate a recommendation of software - possibly non-Lenovo - that does provide the functionality I am seeking.
    Thanks very much for your assistance.
    Michael

    Hi PanEuropean2,
    Welcome to Lenovo Forum!
    In regard to your question, Client Security Solution (CSS) should be the right fit for you.
    I have a T410 with Win 7, and have several passwords to remember which is really killing me. However, by using CSS, Fingerprint software and Password Manager, I need to enter all the passwords only once when access a website or a tool, and let it saved in CSS.
    The next time i turn on the machine and open up a website which needs user ID and password, I just need to swipe the fingerprint that I've enrolled, then viola!
    Just take note that after the first swipe of fingerprint, tools or website that are to be accessed later will automatically show the password in the box directly without having to swipe fingerprint again. You just need to click to log in. I"m not sure if this is the experience you're looking for, however, no harm to give it a try.
    Here's the user guide for CSS. It has
    Client Security Solution components
    Client Security Solution installation considerations
    Client Security Solution features
    Hope this helps
    Cheers,
    Cleo
    WW Social Media
    T61, T410, x240, Z500, Flex 14
    Important Note: If you need help, post your question in the forum, and include your system type, model number and OS. Do not post your serial number.
    Did someone help you today? Press the star on the left to thank them with a Kudo!
    If you find a post helpful and it answers your question, please mark it as an "Accepted Solution"!
    Follow @LenovoForums on Twitter!
    How to send a private message? --> Check out this article.
    English Community   Deutsche Community   Comunidad en Español   Русскоязычное Сообщество

  • DVD Studio Pro Newbie Needs Help!

    I have a presentation deadline approaching and I need help desperately. I created my presentation using Keynote 3 (800*600 slides) and exported it to a Quicktime movie using H.264 compression at 29.97 fps (high quality settings). I then proceeded to use iDVD 6 and imported the Quicktime movie and created a simple menu using the templates provided.
    I saved the entire project as a disk image and used the DVD player to check the disk image file. The quality of the DVD disk image file looked nothing like the original Quicktime movie. The images and text looked blurry and unprofessional.
    I've spend quite some time on the iDVD and Keynote discussion forums and can't find a solution to my problem. The conclusion I've come is that the mpeg-2 encoder that iDVD 6 uses is problematic.
    I don't want to start using DVD Studio Pro but I will in order to preserve the quality of my original Keynote presentation. So here are my questions...thank you in advance for your help guys....I really need it:
    - I plan on playing the DVD on a 42" Plasma display at a sales office and also distributing it to potential buyers. Are my Keynote export settings optimal for iDVD use? Should I be using H.264 @ 29.97?
    - If I must use DVDSP then what export/compression settings should I use in Keynote to preserve the quality? Keynote doesn't give me an option to use mpeg-2. I have ffmpegX so I can encode different formats...just need to know the correct one.
    - Keynote exports separate audio and video files. I combined them using Quicktime. Is it possible to use the combined file in DVDSP or do they need to be separate.
    Thanks for taking the time to read this post. Any help would be greatly appreciated. Also, if you have any reading material pertaining to this matter please provide link.
    ~Eddie~
    PowerBook G4   Mac OS X (10.4.5)  

    You can use a mov file that contains both audio and video. DVD Studio Pro will compress the mov itself. I am not overly familiar with the codec H.264 but either way its a codec that compresses the video, and if I am right that codec is used for compressing video to web based file sizes, which means heavy compression. When I create DVD material I use M2V format which is what DVD SP wants anyways so it cuts time and drive space in half. If you export an mov and import it into DVD SP, DVD SP compresses the file again which is M2V. Now you have two files, with twice the compression time. When creating M2V the only thing that you need o be aware of is the bit rate, which needs to be adjusted pending the duration of the video. Use 29.97 if you are NTSC and full frame rate, which you should be.
    If you can not create an M2V file with associated aiff audio file, than export your QT file as uncompressed or as a QT Movie. The file itself will be huge but DVD SP will compress it properly.
    I hope this helps

  • Newbie needs help with browser compatibility

    Ok, so I'm new at this, so this may be something really
    simple, but browser compatibility? I made a site in DW;html and it
    shows up perfect in safari but internet explorer and firefox not so
    much. I did a browser compatibility test in DW and it says nothing
    is wrong with my pages, but obviously something must be!!
    On my home page, the image of a house that I have next to the
    company name shows up fine in safari but not any other browsers.
    And my page layout, everything is moved over funny in other
    browsers. Also there are link boxes around the table I created with
    different brands of products. On safari the boxes do not show, but
    all the other browsers it does!! I'm new at this and frustrated!!!
    Need help!!
    The link is holmeshifi.com and I posted code from the home
    page!

    OK thanks Ned sorry to soo dumb I'm on a learning curve here!  what 
    I'm trying to do is go to the URLs of web galleries of images from my 
    main site
    so I would presumably have to rename them on my server? i.e. does that 
    mean adding the code ", "_blank");
    to the files on the server?
    At the moment I have to use the back button on my browser window which
    takes me back to the main site which then has to reload (tediously!)

  • Newbie Needs Help - Moving to CD

    I'm running winXP and have downloaded the latest CS 5.5 version of Dreamweaver - I've created a small series of interlinking web pages with the 'main site' being a folder on my Desktop called Testsite.  As far as I'm aware all the relevant pages/documets/images are contaned within my Desktop folder and everything runs from index.html which sits within my testsite folder.   Ultimately, I would like to be able put a CD in a drive and automatically launch a browser that would open my home page (i.e. index.html).  I need help on all this but I will googe for the auto launch bit - at the moment I would appreciate any advice on burnng my site to a CD.  Because I have created the site on my PC I'm assuming all my dreamweaver internals/links are in the form C:\Documents and Settings\username\Desktop\Testsite - so I'm guessing if I just copy my Desktop Testsite folder to a CD and run index.html on another PC my little web site is not going to work.  I have googled but keep getting pages about running the actual Dreamweaver applicaton from a CD and installing it on a PC - not the way I want to do it.  I'm not interested in moving Dreamweaver to a CD - just the site/pages I have created.  Any advice apprecited.

    All long as all of your files are linked with relative links (eg: /path/to/file.jpg and not http://www.domain.com/path/to/file.jpg) you should be fine.  Auto-starting can be an issue because there are some operating systems that don't auto start discs.  So you should maybe include instructions with your disc in case the autorun does not work.

  • Storm user newbie needs help with appcenter

    hi everyone. i need help regarding my blackbeery storm 9500. i bought from a friend but he only gave the charger and the the phone. there is no app center. is there anyway i could get the appcenter so that i can get the bbmessenger?

    You can download BBMessenger from your Blackberry browser at www.blackberry.com/bbm
    AppWorld: www.blackberry.com/appword
    You must have the BlackBerry Data Plan on your device to use either of those services.
    1. If any post helps you please click the below the post(s) that helped you.
    2. Please resolve your thread by marking the post "Solution?" which solved it for you!
    3. Install free BlackBerry Protect today for backups of contacts and data.
    4. Guide to Unlocking your BlackBerry & Unlock Codes
    Join our BBM Channels (Beta)
    BlackBerry Support Forums Channel
    PIN: C0001B7B4   Display/Scan Bar Code
    Knowledge Base Updates
    PIN: C0005A9AA   Display/Scan Bar Code

  • Oracle SQL Newbie need help with OE Demo Schema Installation

    Hello everybody !
    I'm hoping some kind soul can help out this SQL newbie.
    First of all i've installed 10g R2 database on a PC running XP SP2.
    Oracle is installed on the root C: drive
    I'm using the SQL Fundamentals I Exam Guide and DBA Handbook (Both Oracle Press)
    as my reference.
    My problem is this.
    I installed the DB and created the demo HR schema without too much problem
    but it's the demo OE schema i'm having problems getting running and cannot
    find anywhere on the net that outlines a step by step SQL process.
    I am using SQL Plus to execute these commands.
    My questions are these:
    -For the default tablespace i specify "users" ?
    -What do i specify for the temporary tablespace ? "temp" ?
    -what directory path do i put for the data files as parameter 6 ?
    I put down "C:\oracle\product\10.2.0\db_1\demo\schema\order_entry" but i suspect it's
    the wrong thing ?
    -What do i specify for the writable directory path for the log files ?
    Is it C:\oracle\product\10.2.0\RDBMS\log
    -And what is "Specify version as parameter 8:" line ?
    I assumed it was the db version but i believe it's wrong.
    Could somebody please help me ? I've already done my CCNA and i wanted to add oracle under my belt.
    I know if i had these few things cleared up for me it would pave the way to actually enjoying learning Oracle :)
    Thank you for any assistance :)

    I installed the DB products from the companion disk and there was no specific mention of the demo schemas. Regardless... They're all there within the demo subfolder and have already created the hr schema.. I just need somebody (I'll pay if necessary) to PLEASE just answer (what would be easy to you guys my questions so i can move on.
    this is a cap from my sql plus..
    SQL*Plus: Release 10.2.0.1.0 - Production on Mon Jun 14 15:01:29 2010
    Copyright (c) 1982, 2005, Oracle. All rights reserved.
    Connected to:
    Oracle Database 10g Enterprise Edition Release 10.2.0.1.0 - Production
    With the Partitioning, OLAP and Data Mining options
    SQL> alter user oe account unlock identified by oe;
    User altered.
    SQL>
    specify password for OE as parameter 1:
    Enter value for 1: mewfymewf
    specify default tablespeace for OE as parameter 2:
    Enter value for 2: users
    specify temporary tablespace for OE as parameter 3:
    Enter value for 3: temp
    specify password for HR as parameter 4:
    Enter value for 4: mewfymewf
    specify password for SYS as parameter 5:
    Enter value for 5: mewfymewf
    specify directory path for the data files as parameter 6:
    Enter value for 6: C:\oracle\product\10.2.0\db_1\demo\schema\order_entry
    writeable directory path for the log files as parameter 7:
    Enter value for 7: C:\oracle\product\10.2.0\db_1\RDBMS\log
    specify version as parameter 8:
    Enter value for 8: 10.2.0
    User dropped.
    old 1: CREATE USER oe IDENTIFIED BY &pass
    new 1: CREATE USER oe IDENTIFIED BY mewfymewf
    User created.
    old 1: ALTER USER oe DEFAULT TABLESPACE &tbs QUOTA UNLIMITED ON &tbs
    new 1: ALTER USER oe DEFAULT TABLESPACE users QUOTA UNLIMITED ON users
    User altered.
    old 1: ALTER USER oe TEMPORARY TABLESPACE &ttbs
    new 1: ALTER USER oe TEMPORARY TABLESPACE temp
    User altered.
    Grant succeeded.
    Connected.
    Session altered.
    Session altered.
    SP2-0310: unable to open file "C:\oracle\product\10.2.0\db_1/demo/schema/order_entry/coe_10.2.0"
    SP2-0310: unable to open file "C:\oracle\product\10.2.0\db_1/demo/schema/order_entry/loe_10.2.0"
    SP2-0310: unable to open file "C:\oracle\product\10.2.0\db_1/demo/schema/order_entry/poe_10.2.0"
    Session altered.
    ...creating subschema OC in OE
    Type created.
    Type body created.
    Table created.
    FROM inventories i, warehouses w
    ERROR at line 6:
    ORA-00942: table or view does not exist
    FROM product_information p
    ERROR at line 10:
    ORA-00942: table or view does not exist
    FROM customers c
    ERROR at line 20:
    ORA-00942: table or view does not exist
    FROM customers c
    ERROR at line 20:
    ORA-00942: table or view does not exist
    FROM customers c
    ERROR at line 20:
    ORA-00942: table or view does not exist
    FROM orders o
    ERROR at line 9:
    ORA-00942: table or view does not exist
    ON oc_orders FOR EACH ROW
    ERROR at line 2:
    ORA-00942: table or view does not exist
    TABLE order_item_list OF oc_orders FOR EACH ROW
    ERROR at line 2:
    ORA-00942: table or view does not exist
    Commit complete.
    FROM oc_product_information o
    ERROR at line 4:
    ORA-00942: table or view does not exist
    FROM oc_product_information o
    ERROR at line 4:
    ORA-00942: table or view does not exist
    FROM oc_product_information o
    ERROR at line 4:
    ORA-00942: table or view does not exist
    FROM oc_product_information o
    ERROR at line 4:
    ORA-00942: table or view does not exist
    FROM oc_product_information o
    ERROR at line 5:
    ORA-00942: table or view does not exist
    FROM oc_product_information o
    ERROR at line 4:
    ORA-00942: table or view does not exist
    FROM oc_product_information o
    ERROR at line 5:
    ORA-00942: table or view does not exist
    FROM oc_product_information o
    ERROR at line 5:
    ORA-00942: table or view does not exist
    FROM oc_product_information o
    ERROR at line 4:
    ORA-00942: table or view does not exist
    FROM oc_product_information o
    ERROR at line 4:
    ORA-00942: table or view does not exist
    FROM oc_product_information o
    ERROR at line 4:
    ORA-00942: table or view does not exist
    FROM oc_product_information o
    ERROR at line 4:
    ORA-00942: table or view does not exist
    FROM oc_product_information o
    ERROR at line 4:
    ORA-00942: table or view does not exist
    FROM oc_product_information o
    ERROR at line 4:
    ORA-00942: table or view does not exist
    FROM oc_product_information o
    ERROR at line 4:
    ORA-00942: table or view does not exist
    FROM oc_product_information o
    ERROR at line 5:
    ORA-00942: table or view does not exist
    FROM oc_product_information o
    ERROR at line 4:
    ORA-00942: table or view does not exist
    FROM oc_product_information o
    ERROR at line 4:
    ORA-00942: table or view does not exist
    1 row created.
    1 row created.
    1 row created.
    1 row created.
    Type altered.
    3 rows updated.
    0 rows updated.
    0 rows updated.
    0 rows updated.
    Commit complete.
    Type body altered.
    Type body altered.
    Type body altered.
    PL/SQL procedure successfully completed.
    SQL>
    Like i can figure out that the "version in parameter 8" has something to do with the coe, poe & loe files
    but i don't know what.
    If somebody can please help me with my questions then i know i can move on.
    Thanks
    Edited by: user11216992 on Jun 14, 2010 3:37 PM

  • Newbie needs help can't compile an Oracle form 10g

    I am trying to compile a form in Oracle 10G. in the /u01/dba/oracle/product/1012ias/bin directory there is a script called frmcmp.sh which I assume is the correct script to use. It calls the frmcmp executable (it does mean form compile, right?). anway I get the error
    FRM-91500: Unable to start/complete the build.
    This is on a HPUX machine running HPUX 11.11.
    I am having no success trying to search for an answer on the Oracle site and all the documentation I have looked at so far fail to address the issue.
    I hate being a newbie!
    Thanks
    Harold

    for this you need Xwindow session, if dont, you can make it command line by running it like.
    * frmcmp.sh USERID=manager/manager@dbname MODULE_TYPE=form MODULE=form.fmb*
    Greetings

  • My Mac keeps crashing--a newbie needs help

    Lately, my Mac keeps crashing.  It's an iMac, with the most recent updates of Yosemite.
    I'll be working, I might have several things open, and then suddenly the screen will go black and I'll have the notification that it shut down and push to restart.
    It has happened more than several times now, and I can't remember if it started doing it before Yosemite or not.
    Not sure how to search out the problems, it's my first Mac.  Are to many things open?  There's no crash report when I restart.
    thanks!

    Mac users often ask whether they should install "anti-virus" software. The answer usually given on ASC is "no." The answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There  is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to take control of it remotely. That threat is in a different category, and there's no easy way to defend against it.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, not machine behavior, and no technological fix alone is going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're better informed than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software. A genuine alert that Flash is outdated and blocked is shown on this support page. Follow the instructions on the support page in that case. Otherwise, assume that the alert is fake and someone is trying to scam you into installing malware. If you see such alerts on more than one website, ask for instructions.
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Rogue websites such as Softonic, Soft32, and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission. All "YouTube downloaders" are in this category, though not all are necessarily malicious.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a padlock icon in the address bar when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It can be as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • [Oracle 8i] Need help pruning branches from a hierarchical query

    My problem is that my hierarchical query seems only to trim out the values that don't meet my criteria, but still includes their children. When my query hits a record that does not meet my criteria, I want it to stop there. I've tried including the criteria in just the 'where' clause of the query, and have also put the criteria in the 'connect by' clause as well, but nothing has fixed it. Please keep in mind I'm using Oracle 8i, so I can't use some of the 'nicer' statements for hierarchical queries that they introduced in 9. I'm stuck with 'Start With...Connect By'.
    I have sample tables/data that I can post if someone needs to see that to help me, but to start with, here's my current query:
    SELECT     *
    FROM     (
              SELECT
                   LEVEL
              ,     c_bill.comp_part_nbr                     AS     c_part_nbr
              ,     (select c_part.part_desc
                   FROM part c_part
                   WHERE c_part.part_nbr=c_bill.comp_part_nbr)     AS     c_part_desc
              ,     (SELECT c_part.part_type
                   FROM part c_part
                   WHERE c_part.part_nbr=c_bill.comp_part_nbr)      AS     c_part_type
              ,     c_bill.qty_per                          AS     c_qty_per_p
              ,     c_bill.qty_per_type                     AS     c_qty_per_type
              ,     (SELECT c_part.qty_on_hand                
                   FROM part c_part
                   WHERE c_part.part_nbr=c_bill.comp_part_nbr)      AS     c_qty_on_hand
              ,     c_bill.oper_nbr                     AS     rqd_at_op
              ,     c_bill.comp_off_adj                     AS     rqd_offset
              ,     c_bill.bom_doc_nbr                     AS     p_part_nbr
              ,     (SELECT p_part.qty_on_hand
                   FROM part p_part
                   WHERE p_part.part_nbr=c_bill.bom_doc_nbr)      AS     p_qty_on_hand
              FROM
                   BILL c_bill
              WHERE
                             (c_bill.status           =      'RL')           
                        AND     (c_bill.view_code     IN      ('M','G'))     
                        AND     (c_bill.end_eff_dt     >      SYSDATE)      
                        AND     (c_bill.begn_eff_dt     <=      SYSDATE)
              START WITH c_bill.bom_doc_nbr=RPAD(?,25)
              CONNECT BY PRIOR c_bill.comp_part_nbr=c_bill.bom_doc_nbr
              AND     c_bill.view_code     IN     ('M','G')     
              AND     c_bill.status          =     'RL'
              AND      c_bill.end_eff_dt     >     SYSDATE
              AND     c_bill.begn_eff_dt     <=     SYSDATE     
         ) a
    WHERE     c_part_type = 'M'

    The outside criterion of part_type='M' isn't my problem. Where I'm actually seeing my issue rear its ugly head is in the criterion:
    (c_bill.view_code     IN      ('M','G'))What I'll have happen is that one of the children or grandchildren of the part number I'm querying for (my parameter), will be of some view code that's not 'M' or 'G'. In my sample data below, I have a level 4 part that is part of the 'H' view code, which I don't want, nor do I want it's children. However, its child is in the 'G' view code, and my query returns it anyway.
    In my sample data below, I'm assuming that the parameter = 'XYZ-100'
    CREATE TABLE part
    part_nbr     varchar(25) not null,
    part_desc     varchar(25) not null,
    part_type     char(1) not null,
    qty_on_hand     double(13,4) not null
    CONSTRAINT part_pk
    PRIMARY KEY (part_nbr),
    CONSTRAINT check_part_type
    CHECK (part_type IN ('M','P','X','Y')),
    CONSTRAINT check_qty_on_hand
    CHECK (qty_on_hand >= 0)
    CREATE TABLE bill
    row_added_ts     char(20) not null,
    bom_doc_nbr     varchar(25) not null,
    comp_part_nbr     varchar(25) not null,
    qty_per          double(9,5) not null,
    qty_per_type     char(1) not null,
    oper_nbr     char(4) not null,
    comp_off_adj     double(3,0),
    status          char(2),
    view_code     char(1) not null,
    end_eff_dt     date() not null,
    begn_eff_dt     date() not null
    CONSTRAINT bill_pk
    PRIMARY KEY (row_added_ts),
    CONSTRAINT check_qty_per_type
    CHECK (qty_per_type IN ('0','1','2','3')),
    CONSTRAINT check_status
    CHECK (status IN ('IN', 'RL')),
    );     Values for those tables:
    INSERT INTO part
    VALUES ('xyz-1', 'purchased part', 'P', 5);
    INSERT INTO part
    VALUES ('xyz-2', 'purchased part', 'P', 1);
    INSERT INTO part
    VALUES ('xyz-3', 'purchased part', 'P', 1);
    INSERT INTO part
    VALUES ('xyz-3a', 'manufactured part', 'M', 1);
    INSERT INTO part
    VALUES ('xyz-4', 'purchased part', 'P', 1);
    INSERT INTO part
    VALUES ('xyz-9-1', 'manufactured part', 'M', 0);
    INSERT INTO part
    VALUES ('xyz-9a', 'manufactured part', 'M', 0);
    INSERT INTO part
    VALUES ('raw-1', 'purchased raw material', 'P', 212);
    INSERT INTO part
    VALUES ('raw-2', 'purchased raw material', 'P', 75.5);
    INSERT INTO part
    VALUES ('XYZ-100', 'manufactured part', 'M', 0);
    INSERT INTO part
    VALUES ('(OPEN)', '(not in use)', 'Y', 0);
    INSERT INTO part
    VALUES ('XYZ-100-1', 'manufactured part', 'M', 0);
    INSERT INTO part
    VALUES ('XYZ-100-2', 'manufactured part', 'M', 1);
    INSERT INTO part
    VALUES ('XYZ-100-3', 'manufactured part', 'M', 0);
    INSERT INTO part
    VALUES ('XYZ-100-4', 'manufactured part', 'M', 2);
    INSERT INTO part
    VALUES ('XYZ-100-A', 'manufactured part', 'M', 0);
    INSERT INTO bill
    VALUES ('2008072153100150000','XYZ-100','xyz-1',3,'1','****',0,'RL','M','01-Jan-2050','01-Jan-1900');
    INSERT INTO bill
    VALUES ('2008072153100150000','XYZ-100','XYZ-100-1',1,'1','****',0,'RL','M','01-Jan-2050','01-Jan-1900');
    INSERT INTO bill
    VALUES ('2008072153100150000','XYZ-100-1','xyz-1',2,'1','****',1,'RL','M','01-Jan-2050','01-Jan-1900');
    INSERT INTO bill
    VALUES ('2008072153100150000','XYZ-100-1','XYZ-100-2',3,'1','****',0,'RL','M','01-Jan-2050','01-Jan-1900');
    INSERT INTO bill
    VALUES ('2008072153100150000','XYZ-100-2','xyz-2',6,'1','****',2,'RL','M','01-Jan-2050','01-Jan-1900');
    INSERT INTO bill
    VALUES ('2008072153100150000','XYZ-100-2','xyz-4',6,'1','****',2,'IN','M','01-Jan-2050','01-Jan-1900');
    INSERT INTO bill
    VALUES ('2008072153100150000','XYZ-100-2','xyz-100-3',1,'1','****',0,'RL','M','01-Jan-2050','01-Jan-1900');
    INSERT INTO bill
    VALUES ('2008072153100150000','XYZ-100-3','xyz-3',8,'1','****',1,'RL','M','01-Jan-2050','01-Jan-2000');
    INSERT INTO bill
    VALUES ('2008072153100150000','XYZ-100-3','xyz-3a',8,'1','****',1,'RL','M','01-Jan-2000','01-Jan-1900');
    INSERT INTO bill
    VALUES ('2008072153100150000','XYZ-100-3','XYZ-100-4',4,'1','****',0,'RL','M','01-Jan-2050','01-Jan-1900');
    INSERT INTO bill
    VALUES ('2008072153100150000','XYZ-100-3','XYZ-100-A',2,'1','****',2,'RL','M','01-Jan-2050','01-Jan-1900');
    INSERT INTO bill
    VALUES ('2008071153100150000','XYZ-100-3','(OPEN)',2,'1','****',0,'RL','E','01-Jan-2050','01-Jan-1900');
    INSERT INTO bill
    VALUES ('2008071153100150000','XYZ-100-3','xyz-9-1',2,'1','****',0,'RL','H','01-Jan-2050','01-Jan-1900');
    INSERT INTO bill
    VALUES ('2008072153100150000','XYZ-100-4','raw-1',8.75,'1','****',0,'RL','M','01-Jan-2050','01-Jan-1900');
    INSERT INTO bill
    VALUES ('2008072153100150000','XYZ-100-A','raw-2',3.75,'1','****',0,'RL','M','01-Jan-2050','01-Jan-1900');
    INSERT INTO bill
    VALUES ('2008075911100150000','xyz-9-1','xyz-9a',1,'1','****',0,'RL','G','01-Jan-2050','01-Jan-1900');
    INSERT INTO bill
    VALUES ('2008087711100150000','xyz-9a','raw-2',3.75,'1','****',0,'RL','G','01-Jan-2050','01-Jan-1900');Sample data displayed in table format:
    --PART table (from insert statements above)
    part_nbr     part_desc          part_type     qty_on_hand
    xyz-1           purchased part          P          5
    xyz-2           purchased part          P          1
    xyz-3           purchased part          P          1
    xyz-3a           manufactured part     M          1
    xyz-4           purchased part          P          1
    xyz-9-1           manufactured part     M          0
    xyz-9a           manufactured part     M          0
    raw-1           purchased raw material     P          212
    raw-2           purchased raw material     P          75.5
    XYZ-100           manufactured part     M          0
    (OPEN)          (not in use)          Y          0
    XYZ-100-1     manufactured part     M          0
    XYZ-100-2     manufactured part     M          1
    XYZ-100-3     manufactured part     M          0
    XYZ-100-4     manufactured part     M          2
    XYZ-100-A     manufactured part     M          0
    --BILL table (from insert statements above)
    row_added_ts          bom_doc_nbr     comp_part_nbr     qty_per     qty_per_type     oper_nbr     comp_off_adj     status     view_code     end_eff_dt     begn_eff_dt
    2008072153100150000     XYZ-100          xyz-1          3     1          ****          0          RL     G          01-Jan-2050     01-Jan-1900
    2008072223100150000     XYZ-100          XYZ-100-1     1     1          ****          0          RL     M          01-Jan-2050     01-Jan-1900
    2008072411100150000     XYZ-100-1     xyz-1          2     1          ****          1          RL     M          01-Jan-2050     01-Jan-1900
    2008072459100150000     XYZ-100-1     XYZ-100-2     3     1          ****          0          RL     M          01-Jan-2050     01-Jan-1900
    2008072578100150000     XYZ-100-2     xyz-2          6     1          ****          2          RL     M          01-Jan-2050     01-Jan-1900
    2008072694100150000     XYZ-100-2     xyz-4          6     1          ****          2          IN     G          01-Jan-2050     01-Jan-1900
    2008072786100150000     XYZ-100-2     xyz-100-3     1     1          ****          0          RL     M          01-Jan-2050     01-Jan-1900
    2008072865100150000     XYZ-100-3     xyz-3          8     1          ****          1          RL     M          01-Jan-2050     01-Jan-2000
    2008073100100150000     XYZ-100-3     xyz-3a          8     1          ****          1          RL     M          01-Jan-2000     01-Jan-1900
    2008073159100150000     XYZ-100-3     XYZ-100-4     4     1          ****          0          RL     M          01-Jan-2050     01-Jan-1900
    2008073346100150000     XYZ-100-3     XYZ-100-A     2     1          ****          2          RL     M          01-Jan-2050     01-Jan-1900
    2008073478100150000     XYZ-100-3     (OPEN)          2     1          ****          0          RL     E          01-Jan-2050     01-Jan-1900
    2008073529100150000     XYZ-100-3     xyz-9-1          2     1          ****          0          RL     H          01-Jan-2050     01-Jan-1900
    2008073798100150000     XYZ-100-4     raw-1          8.75     1          ****          0          RL     M          01-Jan-2050     01-Jan-1900
    2008073811100150000     XYZ-100-A     raw-2          3.75     1          ****          0          RL     M          01-Jan-2050     01-Jan-1900
    2008075911100150000     xyz-9-1          xyz-9a          1     1          ****          0          RL     G          01-Jan-2050     01-Jan-1900
    2008087711100150000     xyz-9a          raw-2          3.75     1          ****          0          RL     G          01-Jan-2050     01-Jan-1900--What I want to get with my query (branches pruned off my tree)
    LEVEL     C_PART_NBR     C_PART_DESC          C_PART_TYPE     C_QTY_PER_P     C_QTY_PER_TYPE     C_QTY_ON_HAND     RQD_AT_OP     RQD_OFFSET     P_PART_NBR     P_QTY_ON_HAND
    1     XYZ-100-1     manufactured part     M          1          1          0          ****          0          XYZ-100          0
    2     XYZ-100-2     manufactured part     M          3          1          1          ****          0          XYZ-100-1     0
    3     xyz-100-3     manufactured part     M          1          1          0          ****          0          XYZ-100-2     1
    4     XYZ-100-4     manufactured part     M          4          1          2          ****          0          XYZ-100-3     0
    4     XYZ-100-A     manufactured part     M          2          1          0          ****          2          XYZ-100-3     0--What I actually get with my query (includes children of items that don't meet query criteria)
    LEVEL     C_PART_NBR     C_PART_DESC          C_PART_TYPE     C_QTY_PER_P     C_QTY_PER_TYPE     C_QTY_ON_HAND     RQD_AT_OP     RQD_OFFSET     P_PART_NBR     P_QTY_ON_HAND
    1     XYZ-100-1     manufactured part     M          1          1          0          ****          0          XYZ-100          0
    2     XYZ-100-2     manufactured part     M          3          1          1          ****          0          XYZ-100-1     0
    3     xyz-100-3     manufactured part     M          1          1          0          ****          0          XYZ-100-2     1
    4     XYZ-100-4     manufactured part     M          4          1          2          ****          0          XYZ-100-3     0
    4     XYZ-100-A     manufactured part     M          2          1          0          ****          2          XYZ-100-3     0
    5     xyz-9a          manufactured part     M          1          1          0          ****          0          xyz-9-1          0Edited by: user11033437 on Jul 30, 2009 7:27 AM (grammar)

  • Stand alone oracle report - need help asap

    Hi,
    We are in ORACLE Apps 11i. We started using ORACLE BI Publisher to create templates for the Oracle Reports. How we are doing reports now is
    1) create data definition XML which has all the queries embedded.
    2) Create Data definition in XML Publisher Admin responsibility.
    3. Attach the Data definition XML to that.
    4. Create a concurrent program definition for the report with XML Type and run the report and save the data file with tags.
    5. Create the template ,rtf in Word and export data using ORACLE BI Publisher. 6. Create template definition in the XML Publisher Admin responsibility and attach this .rtf to that and run the report.
    Now I have a requirement stating that the REPORT SHOULD BE AN ORACLE STAND ALONE REPORT AND THE REPORT NEEDS TO BE RUN THROUGH CONCURRENT PROGRAM SCREEN. I am planning on doing the following steps.
    1. I have to create an .rdf using report builder.
    2. Create concurrent program executable and definition for the report.
    3. Create data definition in XML Publisher admin responsibility.
    4. Run the report in apps.
    5. Create the tempalte .rtf in word and export data with the XML Data file with tags,
    6. Run the report.
    Am I correct? Any help is appreciated asap.
    Thanks
    Akil

    You said,
    standalone report ?? is that mean without using bipublisher ??
    1st method.
    create concurrent program, output xml,
    create data template, create datadefintion , attach Datatemplate.
    run the cc pgm, get xml, design RTF , create template definition , attach RTF,
    run the cc pgm, you get the pdf output.
    2nd method.
    create rdf,
    create concurrent program, output xml,
    run the cc pgm, get xml, design RTF ,
    create datadefintion , create template definition , attach RTF,
    run the cc pgm, you get the pdf output.
    , both requires, cc pgm, rtf, data defintion , template definition.
    only differnece is , how do you get the data, i mean, xml...
    data template or RDF.

  • Flash CS5 Newbie - Need help adding URL link to animated banner

    I apologize if this is a very basic question, but I am a newbie at designing in Flash. I have created a basic animation in Flash CS5 and I need to add a clickable URL link to it. I've tried a few tutorials that looked promising, but none of them solved my problem. I've tried a number of things including converting parts or all of the images to simple buttons or movies and linking them that way as well as typing in code for ActionScript 2 and 3, none of which were successful. The animation plays correctly when viewed in my browser, but when I click on it, the link does not work. I would prefer that the entire banner be clickable to take viewers to the linked website rather than using hyperlinked text. Also, when I open the Code Snippets window, it is empty, no matter what image or frame I've selected. Do I need to import code snippets from somewhere or am I simply going about things the wrong way? Any help is greatly appreciated!

    It all depends whether you're decisively using AS2.0 or AS3.0 .
    In the latter, you would need to use a URLRequest() method in conjunction with a navigateToUrl() call (not sure the exact syntax for navigate to Url, it might be a capitalized "URL" in the method but the request takes a String argument such as http://www.adobe.com)

  • Flash newbie needs help

    i'm quite a newbie when it comes to flash and need some help
    http://www.sas.se/sv/?vst=true
    you look to the right you'll see an airplane and i'll say "Billiga avgångar" next too it
    under the text you can see text in yellow being scrambled then reappear
    i was wondering how you make the text scramble then display the messeage like that?

    this is a better way to do it in one textfield.  it's easily amended to display one letter per textfield and add textfields as needed.
    (to speed up the display shorten charS even down to a one character string.)
    var charS:String = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ 01232456789,./<>?;':\"[]{}\|!@#$%^&*()-_=+";
    var charA:Array = charS.split("");
    var displayTO:Number
    // user defined params:
    // character change in ms
    var speed:Number = 1;
    encodeF(yourstring,yourtextfield);
    function encodeF(s:String,tf:TextField){
        tf.text = charA[0];
        displayTO = setTimeout(displayF,speed,s,tf,0,0);
    function displayF(s:String,tf:TextField,charNum:Number,index:Number){
        tf.text = tf.text.substr(0,-1)+charA[index];
        if(s.charAt(charNum)==charA[index]){
            tf.text += charA[index];
            charNum++;
            index=0;
            if(charNum<s.length){
                displayTO = setTimeout(displayF,speed,s,tf,charNum,index);
            } else {
                tf.text = tf.text.substr(0,-1);
        } else {
            index++;
            if(index<charA.length){
                displayTO = setTimeout(displayF,speed,s,tf,charNum,index);
            } else {
                charA.push(s.charAt(charNum));
                displayTO = setTimeout(displayF,speed,s,tf,charNum,index);

Maybe you are looking for

  • Galleries and 'losing' them

    Hi I posted a gallery and then told all my friends about it. Then I switched off my computer ... and I started to get all these messages saying people couldn't see anything any more. So I switched on the computer, and iPhoto and then they could see e

  • Iphoto import creating and importing duplicates/ios8

    I'm using iphoto 9.4.3 and my iphone 5s with ios8.  Since septemberish (ios8 update), it's been double-importing all my pix on from my iphone - none are showing up as duplicates on the phone but import/iPhoto view shows and imports them all twice.  A

  • C6180 only prints in fast draft

    My Photosmart c6180 (on a Dell Precision M4400 laptop, 2.53ghz, 18 months old, Windows XP sp3/quad core/4.0 GB  memory/68% HD available/ZoneAlarm firewall and antivirus, I run virus/spyware scans frequently using ZA and Advanced System Optimizer/disk

  • Function of Outbox

    I am using an iMAC with OS X, version 10.9.4. My problem is inability to easily send e-mail.  Since doing updates on all programs now when I have an e-mail drafted and hit "Send"  the e-mail goes into the "outbox"  which I never previously used.  To

  • Basic Questions regarding InterMedia

    Hi, I have few questions related to this Intermedia. 1. is it client-server kind of software piece? I mean will it needed to be installed on each and every user's machine? 2. Just to make sure , it's a programmatic way to do the conversion from text