Question about how XI process files in FTP

Hi experts,
I have a file-FTP to JDBC scenario.
XI scans a folder every minute to see if any file has appear.
My question is, does XI process the files in their order of creation, or randomly ?
If not, is there a way to make XI process them in order of creation ?
Thanks a lot, any help would be appreciated.
Kind regards,
Jamal

Hi,
from SAP Help:
If you select files from an FTP server and not from the file system, you need to make the following additional specifications:
○       ftp.host=<ftp-server>
The host name or IP address of the FTP server. If this specification is made, it is assumed that you are accessing an FTP server. The specifications file.sourceDir and file.sourceFileName then refer to the FTP server. The following are then not possible specifications:
■       setAttribute for parameter file.processingMode.
■       byDate for parameter file.processingOrder.
Regards
Patrick

Similar Messages

  • Round trip workflow with proxies between Premiere and AE / a more general question about how these programs work?

    Hi all,
    I'm new to editing with proxies in Premiere and have some questions about how to handle the relationship with After Effects. Say I have a rough cut (with proxies) and I want to send it to AE to do some effects. The simplest thing to do seems to be to replace the proxies with the originals in Premiere, send the project to AE and do my thing. But if I then want to send the project back to Premiere, it will involve the original files, which are too machine-intensive for me to edit. In theory, it seems like there should be a way to send the project with original footage to AE, do effects, send it back to Premiere, and then replace it with proxies to do further editing while retaining the effects.
    This leads to a confusion about how AE works. When I do an effect, am I correct in assuming that it does nothing to the original file? If that's the case, it seems like it shouldn't matter (in the editing stage) what file AE "applies" an effect to (proxy or original). But I feel like there's a hitch in this workflow. The same question could also be asked about going back and forth in Speed Grade.
    Perhaps there is no real answer to this and the best option is to save effects and grading for after I have picture lock, but sometimes that's not entirely possible or convenient, etc.
    Hopefully this makes some sense—It's a little hard to explain.
    Thanks.

    Hi Mark,
    Here are the specific sections of the manual that should give you the best explanation regarding the Check out/in workflow for FCP projects in Final Cut Server:
    Check out:
    http://documentation.apple.com/en/finalcutserver/usermanual/#chapter=7%26section =5
    Editing:
    http://documentation.apple.com/en/finalcutserver/usermanual/#chapter=7%26section =6
    Check in:
    http://documentation.apple.com/en/finalcutserver/usermanual/#chapter=7%26section =7
    -Daniel

  • How to delete file on ftp server

    hello,how to delete file on ftp server?thank you!

    I was trying to hint to the fact that you gave no where near enough information.
    Have you already written anything? Such as software that will connect to an FTP server?
    Are you using a 3rd party package?
    Are you doing it by hand, using sockets?

  • Question about sql batch process in java app

    hi all
    i have few questions about using batch process in the java.sql package. the addBatch method can take sql statements like inserts or updates. can we use a mixture of insert and update then? can we use prepared statement for this? it's just for performance consideration. thanks in advance.

    hi all
    i have few questions about using batch process in the
    java.sql package. the addBatch method can take sql
    statements like inserts or updates. addBatch() is a method that has no parameters. It doesn't 'add' sql statements.
    can we use a
    mixture of insert and update then? can we use
    prepared statement for this? it's just for
    performance consideration. thanks in advance.The point of batching is that you take something that is invariant and then 'add' a variant part.
    Thus a single insert has an invariant part (the table and specific columns) and a variant part (the data for each row by column.)
    You can use anything that is valid SQL (for jdbc, driver, database) and use it presuming your database allows that particular usage in batching. But that does require some regular pattern - it won't work if your usage is random. Nor will it work if some statements need to be executed only some of the time. Finally also note that transaction processing will often require smaller chunks - you can't insert a million rows in one batch.

  • I have a question about using adobe CS files in CS6 edition

    I am a graphic artist . I have a question about using adobe CS files in CS6 edition. when I am gonna open thse adobe CS created files in CS6 Edition i get a color variation than i made with the CS version.Please give me an idea about this issue as soon as possible.If you need i can upload my problem as a screenshot to clearity

    donrulz,
    Are your Edit>Color Settings the same?
    Are you using spot colours, such as Pantone (there have been some changes in CMYK values with new colour books)?

  • Hello! I have a huge question about how can I get connected my iphone 4 with my car Is there any opption on find my car application? I have a Volvo xc60 and I want to be connected all the time with my iphone. Can I do that?

    Hello! I have a huge question about how can I get connected my iphone 4 with my car Is there any opption on find my car application? I have a Volvo xc60 and I want to be connected all the time with my iphone. Can I do that?

    Hello. I can say that you have a quite strange „huge question”… It’s non-sense to stay connected with your car which is hundreds miles away. Unless…
    I have a theory. You don’t want to controll your car, you want to controll somebody who is driving the car. Volvo XC 60 is a nice family car, usually used by married men between age of 35-45, probably with small children, so it’s very unlikely that you want to controll your teanage kid, mainly because probably even if you would give him/her to drive the car in the neighborhoud, I don’t think that he/she would be „several hundred miles away”…  If your child is not young teneage anymore, and he/she has his/her own life, but you want to control him/her, that is sick… So I am convinced that you want to controll your husband who probably travelling often! Am I wright?
    Isnt’t nice at all! Would you like if you would be monitorized in such way? I bet you don’t!
    Anyway, iPhone is smart, you can use for many things, but come on, you really were thinking that there is such kind of application???
    What could you do it's to put in the car a GPS survelling system, however I don't think that you could do it without your husband knowledge, otherwise he won't be able to start the engine...

  • A few questions about how ZPM works.

    We have patch management (in ZCM 11.2.2), but honestly don't use it much. I have a few questions about how it works that might make me use it more, if I understand it more.
    If I deploy a patch (or a set of patches), it creates a bundle for that deployment. That bundle seems to include actions that deploy the actual patch bundles (correct?). Do I have to recreate a new deployment bundle every time I want to push a new patch? i.e. If I push a Java update, and a month later, a new one comes out, do I build out a new bundle with the new patch in it, or do I modify the old one?
    Once the patch is deployed, can I safely delete that deployment bundle, or should they just pile up?
    Is there a way to "auto-approve" patches? Lets say I always want a group of machines to have the latest Adobe Flash Player patches. Can I set up ZPM to automatically cache and push the latest patches for a specific product, or do I have to manually remediate each patch? (I'm thinking of how MS's WSUS does "auto-approval")
    I see most packages aren't cached in list, but occasionally, a patch is cached without me touching it. Why? Can I change what gets automatically cached?
    Thanks for any help/answers you can provide.
    -Adam

    Originally Posted by adrockk
    We have patch management (in ZCM 11.2.2), but honestly don't use it much. I have a few questions about how it works that might make me use it more, if I understand it more.
    If I deploy a patch (or a set of patches), it creates a bundle for that deployment. That bundle seems to include actions that deploy the actual patch bundles (correct?). Do I have to recreate a new deployment bundle every time I want to push a new patch? i.e. If I push a Java update, and a month later, a new one comes out, do I build out a new bundle with the new patch in it, or do I modify the old one?
    Once the patch is deployed, can I safely delete that deployment bundle, or should they just pile up?
    Is there a way to "auto-approve" patches? Lets say I always want a group of machines to have the latest Adobe Flash Player patches. Can I set up ZPM to automatically cache and push the latest patches for a specific product, or do I have to manually remediate each patch? (I'm thinking of how MS's WSUS does "auto-approval")
    I see most packages aren't cached in list, but occasionally, a patch is cached without me touching it. Why? Can I change what gets automatically cached?
    Thanks for any help/answers you can provide.
    -Adam
    For #1, (assuming you're not using baselines), you would check the new version of the patch (vulnerability) and do a new deployment.
    #2 - once you're satisified that the machines are deployed (or the best to your ability) you can delete the DEPLOYMENT package. It doesn't delete the actual vulnerability bundles to my knowledge. That's why it's a good idea to name your bundle deployments with something meaningful, IMO (and maybe include a nice desription).
    #3 - currently I don't believe this is possible. I know you can probably configure it to auto-download the patches, but not auto-deploy everything. Given the propensity for software to wreck other things (hello MS .NET patches), this is probably not a good idea. At least I'd never auto-download and auto-deploy any patches without testing them first, and certainly take my servers a little more cautiously than my workstations.
    #4 - I think you can configure what's cached, but I could be wrong.
    I know there's a lot of improvements coming in the pipeline, and it doesn't hurt to "vote" for your enhancements via the enhancement system (more work for Shaun--haha)
    --Kevin

  • A question about CPS (CPS processing) and CAPolicy.inf file.

    Hello All
    Can someone please help me with the following question.
    Background, I am building a 3-tier PKI infrastructure. offline Root, offline Policy (intermediate), online issuing.
    Now my first question is about CPS (certificate practice statement) for this example lets just call this the InternalIssuancePolicy as below.
    Basically I was thinking it is best not to set a given certificate (aka issuance) policy at the Root, the reason being I may wish to have different issuance policies at a latter date.
    For example right now I just want an issuance policy (CPS) for internal certificates only, therefore I am thinking set this at the Policy CA level, as below [InternalIssuancePolicy] (example OID) and then issuing CA certs from this Policy CA to the
    internal issuing CAs. If at a latter date I want a different policy (CPS) for issuance of external certificates I can build a new Policy CA under the existing Root with a different policy extension.
    Is the above logic sound?
    Questions:
    I am assuming from recent study that the CA cert issued to the Issuing CA will contain a single issuance policy "only" i.e. the one that was specified in the Policy CA 1.3.6.1.4.11111111.1.1.1.  If so I believe you cannot build a new
    issuing CA and submit the CSR to the Policy CA asking for a CA cert with any other certificate policy extension other than 1.3.6.1.4.11111111.1.1.1
    Is that correct?
    Also
    I saw a blog post which stated if are going to use certificate/issuance policies (other than all issuance policies) you should mark the extension as critical=true otherwise the policy just becomes glorified comment. I take the point but that leads me to
    two more questions
    1: How does the certificate changing engine or CryptoAPI enforce a certificate policy (as it is just a policy, e.g. written procedure). I am assuming all this means is it forces the client to process the extension and therefore check the certificate
    policy extension in the certificate does not violate the certificate chain but that is all it can do?
    2: If the certificate policy extension is set to critical and the URL referenced in the extension is not available (e.g. on a WEB Server and the client is working offline, but has a cached CRL), does setting the extension to critical also force the
    client to try and access the URL listed, or not (I am assuming not as you could just have a text block rather than URL).
    Any comments suggestions on my proposed three CAPolicy.inf files below for the 3-tier PKI (again offline Root and Policy)
    ** Root **
    [Version]
    Signature= "$Windows NT$"
    [Certsrv_Server]
    RenewalKeyLength=4096
    RenewalValidityPeriodUnits=Years
    RenewalValidityPeriod=20
    CRLPeriod=Years
    CRLPeriodUnits=1
    LoadDefaultTemplates=False
    AlternateSignatureAlgorithm=0
    [CRLDistributionPoint]
    [AuthorityInformationAccess]
    basicconstraintsextension]
    pathlength = 2
    critical=true
    PolicyStatementExtension]
    Policies = AllIssuancePolicy
    Critical = FALSE
    [AllIssuancePolicy]
    OID = 2.5.29.32.0
    ** Policy CA **
    [Version]
    Signature= "$Windows NT$"
    [Certsrv_Server]
    RenewalKeyLength=2048
    RenewalValidityPeriodUnits=Years
    RenewalValidityPeriod=10
    CRLPeriod=Years
    CRLPeriodUnits=1
    [PolicyStatementExtension]
    Policies = InternalIssuancePolicy
    Critical = False
    [InternalIssuancePolicy]
    OID = 1.3.6.1.4.11111111.1.1.1
    Notice = "Internal Certificate Policy"
    URL="http://pki.lab.local/Certenroll/CPS.txt"
    [AuthorityInformationAccess]
    URL=http://pki.lab.local/Certenroll/PolicyCA01.crt
    [CRLDistributionPoint]
    URL=http://pki.lab.local/Certenroll/PolicyCA01.crl
    [basicconstraintsextension]
    pathlength = 1
    critical=true
    ** Issuing CA **
    [Version]
    Signature= "$Windows NT$"
    [Certsrv_Server]
    RenewalKeyLength=2048
    RenewalValidityPeriodUnits=Years
    RenewalValidityPeriod=5
    CRLPeriod=Weeks
    CRLPeriodUnits=1
    CRLDeltaPeriod=Days
    CRLDeltaPeriodUnits=1
    LoadDefaultTemplates=False
    AlternateSignatureAlgorithm=0
    [AuthorityInformationAccess]
    URL=http://pki.lab.local/Certenroll/IssuingCA01.crt
    [CRLDistributionPoint]
    URL=http://pki.lab.local/Certenroll/IssuingCA01.crl
    [basicconstraintsextension]
    pathlength = 0
    critical=true
    Thanks All
    AAnotherUser__

    > Is the above logic sound?
    not that much. In this case 3-tier PKI could be reduced to 2-tier. Make default Offline Root CA and below it issuing CAs with desired policy OIDs. You will combine issuing CA with policy CA functionality. Additional tier will cost you a license, administration
    overhead and increased certificate chain processing delays. There is nothing wrong if you combine policy CAs with issuing.
    > I saw a blog post which stated if are going to use certificate/issuance policies (other than all issuance policies) you should mark the extension as critical=true
    where did you get this? Certificate policies should not be marked critical. Certificate chaining engine will take care of it, when application reqests CCE to validate desired policy.
    > does setting the extension to critical also force the client to try and access the URL listed
    no. Certificate chaining engine do not inspect policy qualifier URLs.
    > Any comments suggestions on my proposed three CAPolicy.inf files below for the 3-tier PKI (again offline Root and Policy)
    [CRLDistributionPoint]
    [AuthorityInformationAccess]
    [PolicyStatementExtension]
    Policies = AllIssuancePolicy
    Critical = FALSE
    [AllIssuancePolicy]
    OID = 2.5.29.32.0
    these sections are not required in root CA.
    [AuthorityInformationAccess]
    URL=http://pki.lab.local/Certenroll/PolicyCA01.crt
    [CRLDistributionPoint]
    URL=http://pki.lab.local/Certenroll/PolicyCA01.crl
    [basicconstraintsextension]
    pathlength = 1
    critical=true
    These sections are not required at policy CA. Afaik, CDP and AIA extensions are not supported in non-root CA configuration files. The same is with issuing CA. And your issuing CA is missing PolicyStatementExtension section.
    Vadims Podāns, aka PowerShell CryptoGuy
    My weblog: en-us.sysadmins.lv
    PowerShell PKI Module: pspki.codeplex.com
    PowerShell Cmdlet Help Editor pscmdlethelpeditor.codeplex.com
    Check out new: SSL Certificate Verifier
    Check out new:
    PowerShell File Checksum Integrity Verifier tool.

  • Question about RAW to JPG file sizes

    Hello all, I have a question/concern in reference to file size changes when converting from RAW to JPG formats in PSE6. I've recently purchased a CANON 50D, and have started shooting in RAW format (actually RAW2+JPG). I have the CAMERA RAW 5.2 plugin and my workflow process is something akin to this:
    1. Separate all RAW and JPG images into their respective folders.
    2. Open the RAW folder in BRIDGE, and then open up a CR2 file. CR2 file is approx 15MB at this point, as reported in Finder.
    3. Perform various corrections in ACR52 to the file, then do as SAVE AS to a DNG file.
    4. Next step is to OPEN IMAGE, bringing it up in PSE6.
    5. Make any necessary corrections to the picture, and then do a SAVE AS to a new file name and folder, selecting JPG format.
    6. Selection MAX QUALITY from subsequent dialogue box, and SAVE.
    When the file is saved, its now down to a mere 2.1 or 2.2MB, and when viewing its properties (vs. the same file that came from camera in JPG format), its down from a 44x66" format, to somewhere around 4x6" and 240dpi.
    I've been doing some reading on this over the weekend, but cant explain away the severe loss in file size, and whether this is right, or if I'm doing something wrong in the process.
    Appreciate any advice or suggestions to help improve my work processes, and ultimately the final photos!

    Regarding your file size questions, have a look at this thread and see if it answers some of your questions:
    http://www.fredmiranda.com/forum/topic/741532/0
    > When the file is saved, its now down to a mere 2.1 or 2.2MB, and when viewing its properties (vs. the same file that came from camera in JPG format), its down from a 44x66" format, to somewhere around 4x6" and 240dpi.
    Dimensions and resolution are related and multiple combinations can be produced from the same number of pixels. For example, your 50D at maximum image size produces 4,752 by 3,168 pixels. This full-size image could be printed at:
    - 19.8 x 13.2 inches at 240 PPI
    - 47.52 x 31.68 inches at 100 PPI
    - 7.92 x 5.28 inches at 600 PPI
    As you can maybe see, talking about dimensions and resolution doesn't make much sense until you are ready to consider printing. Note also that I used "PPI" or Pixels Per Inch since this is the slightly more correct terminology. DPI or "Dots Per Inch" is usually a reference to how a printer lays down the ink drops onto the paper. Many printers actually put more "dots" on the paper than there are pixels. Many people and companies use DPI when they mean PPI.
    Now in your case you are apparently starting with an SRAW2 raw file. SRAW2 files from the 50D have a reduced number of pixels and are 2,276 pixels wide by 1,584 pixels high. At 240 PPI this would allow you to print the image at 9.9 by 6.6 inches. If you are ending up with something smaller than that, it means you have either re-sampled the image (changed the image so the same image is displayed with fewer pixels) or you have cropped the image.
    Hope that helps.

  • How to process files sequentially in PI using bpm

    Hi Folks,
    I am really looking for one requirement like, Sender file adapter has to pick multiple files by file name based with some time gap? Can we?normally i am getting 40 files in the source directory with some time gap like 1hr and 2 hours.but my in some situations like system got down and if the server stopped for some refresh work then 2 days files will come to source directory and after system is sap pi try to process files at a time but the messages not going in order.
    I have got one BPM in this, I have tried with Process mode : Name and Date, with wait step on BPM, but no use. The way how PI behaving, if 40 files in file directory, it is picking all files in one shot. Start processing but not in order. if it is process also the SNC system can't process 4 at time.it will process files with some time gap.
    The problem is on Receiver system side. The receiver system is SNC system, if old data receives later than earlier date data; we get data obsolete application error.
    Ex: If I receive 25th and 26th files, first I need to process 25th first on PI sends to SNC, I need to give some time gap and pick another file or even PI picks and process 26th file, no problem but I need to give some time gap to send SNC to this 26th date file?
    Please how guys, throw me your great ideas
    Step1: i configured the sender file adapter with by name property to sort the files but some times pi picking new date file first and old one later.here my question is how to configure adapter to pick files in sorted by name.the filename i given like xml_0809008998_*.xml
    step2: after pi picking the files in order but the messages not sending order to target system.i was configure the bpm like first recive step then transformation step then i was used wait step to process files with time gap.after that block step mode is default inside i was used 2 bblock steps.
    here my question how to configure bpm process messages in order?
    Thanks in advance!!
    Regards
    SG

    Hi,
    In the sender file comm channel use Processing Sequence = By Date. After that use Quality of service as EOIO and provide one queue name. Use same queue name in the receiver comm channel as well. So files will be picked by the date of the file and messages will be passed to SNC system in "first in first out" basis.
    Reagrds,
    Nayan

  • How to add files from ftp??

    Hello,
    I am hoping that someone can help me out with this (probably easy) question. Here is the scenario.
    I have a website that I am getting a friend to help me update.
    I am getting him to add new images to dozens of pages on my site.
    I have uploaded the images to the FTP server and he has access.
    The problem:
    If he simply downloads the image folders to his local machine and then adds them to the pages the links do not function (the site is trying to find the images on his local machine).
    So the question is how can he add the images to my site and have the pages correctly link to the image files in the ftp folder in the most efficient way possible??
    Thank you very much for any advice!
    Glenn

    If you are uploading the images to the existing images folder on the server, why is he downloading anything?
    Whoever is working on the HTML pages must be working from a defined site and DW will link the new images properly and they can be uploaded to the same root folder

  • Question about how the Robocopy /B switch works...

    I've been experimenting with robocopy recently, and most switches seem self explanatory for the most part; although I have a question about the /B switch.
    The help says the following:
    /B :: copy files in Backup mode.
    I've checked multiple forums and websites to try and elaborate on this a little more, and from my understanding this switch enables backup mode that essentially gives the ability to change the acls of a file/folder when the account running robocopy does
    not have sufficient privileges, to perform a successful copy.
    My question is, when the acls are changed when using this "backup mode" switch, with the /copyall switch, will the file still retain the same user access that it originally had - or does it change all of the security settings?
    I'm hoping it will somehow change the security settings, create a copy, and retain the same acls as the original - so users can still access necessary files.
    Can someone please explain how this "backup mode" works?
    Thanks in advance.

    This is a very useful thread with a lot of hostility in it.
    I have to agree with Jonathan and hazymat: there are few other forums that will discuss the exact function of /b switch, the TechNet article just says "copies in Backup Mode" (I have the article bookmarked), and when doing a google search, THIS page comes
    up as the top result! Kinda difficult to tell people they should go search, when you are the exact destination of that search, isn't it? ;)
    No offense to anybody working hard to help out here, but this is why sites like Stack Exchange will overshadow every traditional tech forum very soon. More concise question/answer format, more civil, and they actually encourage old questions developing new
    answers! All q&a is cataloged for future reference. Their focus is on being a 'resource'.
    The negativity here is unfortunate, you guys have great potential to be a very helpful resource for people. Who are you trying to be, the guys with all the answers, or the guys who say "get out of here, your answer isn't in here. Go search for it."?
    Regardless, many thanks to jrv! for helping me with my robocopy batch SCRIPT which I just used to create an automated backup! Take care boys. And yes, I just bumped your old-old thread.
    Unfortunately I think you miss the point.  RoboCopy is an application.  It is not a script.  This is a scripting forum.  Many people come here nd never read the forum guidelines and do not ask script related questions.
    The /b switch is documented in RoboCopy help.  Of course it assumes the reader is a trained Windows tech and knows what backup mode is.  It is used by nearly all backup software when backing up a live system..
    ¯\_(ツ)_/¯

  • How to get file from FTP Server using File Control

    Hi,
    Any one did getting file from FTP Server?
    Please let me know any one help me.
    I would need to get file from FTP Server.
    Thanks,
    Madhu

    Yes I have done that. But In FTP Server I cannt read file, because no previliges. Only I need to copy file from FTP Server to local server then only I can read that file.
    I tried all options using FileConrol(getFiles(),read()).
    getFiles() - It wont copy the file, it give information about file.
    read() - I dont have previliges to read the file.
    Please tell me any other procedure would be there for getting file from FTPServer.
    Thanks,
    Madhu

  • How to process files one by one using sender file adapter

    Hi,
    I have to process file one by one using my file adapter (sender), because while doing the G/R materials get locked, if the same materal exist in other files.
    I have maintained QOS as "Exactly Once in Order" & processing Sequence as "by date".
    Processing sequence come in which tab? What will be the Queue name?
    Thanks,
    krishna

    It will come under Processing tab
    Here you need to select the first parameter QOS  as EOIO
    Then QUEUE name and processing sequence will be enabled.
    NOTE: This will work only for NFS protocol not for FTP.

  • HOW to read file using ftp???

    Hi to all,
    I have problem with reading file using ftp connection, i want to read only 1024 bytes for one time, and i have
    next code wich read this:
    byte buffer[] = new byte[1024];
    while( (readCount = input.read(buffer)) > 0) {
    bos.write(buffer, 0, readCount);
    but I dont know how to put all read data in one byte[] if i dont know length of file.
    I can't do some like: byte file[] = new file[1000000];
    Thanks for all sugestions!

          * Download a file from a FTP server. A FTP URL is generated with the following syntax:
         * <code>ftp://user:password@host:port/filePath;type=i</code>.
          * @param ftpServer FTP server address (incl. optional port ':portNumber').
          * @param user Optional user name to login.
          * @param pwd Optional password for <i>user</i>.
          * @param fileName Name of file to download (with optional preceeding relative path, e.g. one/two/three.txt).
          * @param destination Destination file to save.
         * @throws MalformedURLException, IOException on error.
         public void download(String ftpServer, String user, String pwd, String fileName, File destination) throws MalformedURLException, IOException {
            if (ftpServer != null && fileName != null && destination != null) {
                StringBuffer sb = new StringBuffer("ftp://");
                if (user != null && pwd != null) { //need authentication?
                    sb.append(user);
                    sb.append(':');
                    sb.append(pwd);
                    sb.append('@');
                }//else: anonymous access
                sb.append(ftpServer);
                sb.append('/');
                sb.append(fileName);
                sb.append(";type=i"); //a=ASCII mode, i=image (binary) mode, d= file directory listing
                BufferedInputStream bis = null;
                BufferedOutputStream bos = null;
                try {
                    URL url = new URL(sb.toString());
                    URLConnection urlc = url.openConnection();
                    bis = new BufferedInputStream(urlc.getInputStream());
                    bos = new BufferedOutputStream(new FileOutputStream(destination.getName()));
                    int i;
                    while ((i = bis.read()) != -1) { //read next byte until end of stream
                        bos.write(i);
                    }//next byte
                } finally {
                    if (bis != null) try { bis.close(); } catch (IOException ioe) { /* ignore*/ }
                    if (bos != null) try { bos.close(); } catch (IOException ioe) { /* ignore*/ }
            }//else: input unavailable
        }//download()If you don't want to strore the data into a file, use ByteArrayOutputStream instead of a FileOutputStream.

Maybe you are looking for

  • Workflow objects in partner profile

    Hi, I am configuring partner profile for EDI. Is it mandatory to configure workflow objects in partner profile? Can I opt not to have error notification to any person or organazation? In the Post Processing:permitted agent tab, the system is asking f

  • Problem with iBooks app on iPhone

    Having a major problem with iBooks app. Can only get free classic books but nothign contemporary. Cannot update the app either. Works perfectly on my ipad! Should I delete the app and reload? Will I losse all the books I already have??

  • SpDif confusion...

    Hi I'm a little confused - here's my problem. I have a Bass Pod pro and want to use it for recording bass etc. and I want to re-amp some audio from Logic. It's would be most convenient if I could select the output of the audio track I wish to re-amp

  • Word won't start when 'double-clicking' .doc file

    I installed Microsoft Office X, (and removed the trial version that came with the machine). It runs fine if I start up the application and then open a file. However, if the application isn't running, and I double-click on a .doc file, I get an error

  • FF20 - The connection to the server was reset while the page was loading

    Hello, Since FF starts to upgrate itself to FF20 in some of ours PCs, it doesn't load sites and write: (in some PCs it s possible to load the google page and make a search, but not opening any link) "The connection was reset The connection to the ser