SEO and Flash, can they ever be friends

Hi All,
I have recently been questioning the SEO side of things; and
am currently trying to better optimize my site. I use quite a lot
of flash on my site, and it sorted dawned on me that Flash is doing
me no favours when it comes down to SEO - I will need to get a good
ranking, as this year I will be putting a lot of money and time
into making our site a success story ;)
Am I a little green on this or what?
Anyone know any tips/tricks on how best to bring SEO and
Flash together, to better work in page ranking?
What do folks with totally 100% Flash sites do when it comes
down to SEO? As there is only a few meta tags and title tag
available?
I love Flash, and would never let go! However, this SEO thing
will always be a "Flash Avoidance" for new clients; how can one
best assure them that Flash provides more than just a better brand
image?
A few weeks ago, a potential client stated "I would never
have a flash menu".
Kind Regards,
Boxing Boom

@kglad: swfaddress need not be timeline based, flash just has
to respond by displaying the relevant content - which could be
loaded content.
My view is that the best way to achieve SEO is to use
swfaddress in combination with a CMS. The CMS provides the same
content in html for search spiders and to flash in a more 'flash
friendly' format when flash is 'rendering' it. SWFaddress supports
the deep-linking from search queries etc.
The way you could think about this is that when flash
requests the same content it gets (for example) xml defining what
it needs to do, whereas if the browser requests it , it gets the
basic html version. But the content is only ever defined once for
both versions of the output from the CMS.
Drupal (a CMS I am familiar with, but I'm sure other CMSes
have similar modules) has a swfaddress module as well as
services/amfphp modules that let flash request content.
My own (somewhat neglected) site has flash requesting all the
content via Drupal. I am not currently 'displaying' it using flash:
flash is loading the content (using as2 LoadVars in json format)
and 'rendering' it via the browser via ExternalInterface and
javascript. This was a kind of experiment just to see if I could do
it - it does store pages in flash memory so some things happen a
little different when navigating to a previously viewed page. But
it could also easily do its own alternate rendering of the same
content, as more structured data and rendering them in its own way
inside flash.
My own example is not so great (it is due for an overhaul)
but I know there are examples out there using this approach with
flash.
The beauty of this approach is that you get SEO via the
traditional spidering approaches, deeplinking to the correct
content from search query results, forward/back button support,
non-flash based browser support, along with easy content
maintenance. It does require learning a CMS and the approaches for
integration with flash though.

Similar Messages

  • Stolen laptop, if password protected, can they ever get my files?

    Someone broke into my car and stole my Macbook Pro (among other expensive things in the trunk), if it is password protected on both the OS X and Vista sides, can they ever get to my files?
    I think they'd wipe the drive, right?
    I'm so not lucky...
    MacBook Pro 17"   Mac OS X (10.4.8)   dual boot Vista Ultimate

    http://www.samspublishing.com/library/content.asp?b=MacOS_XUnleashed&seqNum=104&rl=1
    Enabling the root Account
    As mentioned earlier, the administrator account is a powerful account. But the most powerful account on a Unix machine is the account called root. People also refer to root as the super user, but the account name itself is root. On most Unix systems, the first available account is the root account. In OS X, however, the root account is disabled by default as a security precaution.
    At some time, however, you might find it necessary to enable the root account. The root account can modify system settings, modify files it does not own, modify files that are not writable by default, modify a user's password, install software, become another user without having to know the password of that account, and so on. In other words, root can do anything anywhere, making the power of root immense. Because root has so much power, the only users who can become root are users with administrative privileges. Because a user with administrative privileges can become the root user, you should assign these capabilities to only completely trusted individuals.
    If you choose to enable the root account, please remember to use it with caution. Although the root account might provide some extra utility, you could accidentally wipe out your system if you do not pay careful attention to what you type. In addition, the root password you choose should be difficult to guess. Finally, become the root user only as long as necessary to complete the task at hand.
    With the presence of an administrative user, it might be a long time, if ever, before you discover a need for enabling the root user. There are many approaches that you can take for dealing with the root user, from ways to use root without enabling the root account to actually enabling the root account.
    Let's take a look at four different ways to gain root access to your system. Although you can choose whichever method you like, it's useful to understand that even though some of these methods appear to work magic, they all accomplish very much the same thing.
    The root user is disabled because it does not have a valid password set. Because there are a number of ways to set a password, there are also several ways to enable root, including one method (the first we'll look at), that was designed specifically for assigning the root account password and only the root password. In addition, you'll see how the sudo command can provide root-level access even when the root password is disabled. We recommend that users access the root account only when absolutely necessary.
    Using the NetInfo Manager Utility
    There are a couple of graphical ways to enable the root account using the NetInfo Manager utility. Do not worry if you do not understand what the NetInfo Manager utility is at this time. We will take an in-depth look at the NetInfo Manager utility in Chapter 23.
    NetInfo Manager: Method One
    Click on Applications in the Finder window toolbar. Open the Utilities folder and then open the NetInfo Manager utility.
    If nothing appears automatically when you open the NetInfo Manager, under the Domain menu, select Open; then select the default domain, which will be /.
    Click on the lock button in the bottom-left side of the window to enable a mode that allows making changes. Enter the name and password of an administrative user; then click OK.
    Under the Domain menu, select Security. Then choose Enable Root User from the submenu. Unless you have previously set a root password, a message appears with a NetInfo Error, indicating that the password is blank. Click OK.
    Enter the root password you want to use, and then click Set. Remember that the root password should not be easily guessable.
    Enter the password again for verification, and then click Verify.
    Under the Domain menu, select Save. A request to Confirm Modification appears. Click on Update this copy.
    Under the Options menu, select Restart All NetInfo Domains on Local Host. An alert asking whether you really want to restart the machine's NetInfo servers appears. Click Yes.
    Click on the lock button again to prevent any further changes. Then close the NetInfo Manager.
    You might find it sufficient just to click on the lock button again to save your changes. Figure 11.5 shows an example of what an enabled root account looks like in the NetInfo Manager. Note that the password field no longer has an * in it.
    Figure 11.5 The root account has been enabled on this machine. Note the * that was in the password field has been replaced with an encrypted password.
    NetInfo Manager: Method Two
    You could try this alternative NetInfo Manager utility method if the first one does not work for you. The danger to this method is that it copies the password of another user to the root user.
    Click on Applications in the Finder window toolbar. Open the Utilities folder; then open the NetInfo Manager utility. If nothing appears automatically when you first open the NetInfo Manager, from the Domain menu, select Open and then select the default domain, which will be /.
    Click on the lock button in the bottom-left side of the window to enable a mode that allows making changes. Enter the name and password of an administrative user. Then click OK.
    Click on Users in the second list, and then click on a user you created whose password you know.
    Double-click on the value across from passwd in the bottom section of the window and copy it. What you are looking at is an encoded copy of the user's password.
    Click on root in the users list. Note that the default value for the password for root is *, which means that no one can log in as root right now. Using * in the passwd field is a way to lock a user from the machine.
    Double-click in the field with the *; then paste in the encoded password from the previous user to replace the *. The * should no longer be present when you are done.
    Select Save from the Domain menu. A request to Confirm Modification appears. Click Update This Copy.
    Select Restart All NetInfo Domains on Local Host under the Options menu. An alert asking whether you really want to restart the machine's NetInfo servers appears. Click Yes.
    Click the lock button again to prevent any further changes; then close the NetInfo Manager.
    Again, note that you might find it sufficient to just click on the lock button again to save your changes.
    Using the OS X Installation CD
    Because the OS X installation CD comes with an option to reset a user's password, you could use the installation CD itself to enable the root user.
    To enable the root account using the OS X installation CD, do the following:
    Insert the OS X CD.
    With the CD in the CD-ROM drive, reboot the machine. Hold the C key while the machine reboots.
    Wait for the Installer to appear and then select the Reset Password option under the Installer menu.
    Select the OS X disk that contains the root account you want to enable. If you notice a spinning CD icon appear after you have chosen the Reset Password option, don't wait for the spinning to end to select your OS X disk. The System Administrator (root) user appears as the default user.
    Enter a new password and then re-enter the password for verification. Click Save. Click OK when the Password Saved box appears.
    Quit the Password Reset application, quit the Installer, and click Restart.
    Using sudo at the Command Line
    Although we won't start looking at the command-line utilities in depth until Chapter 15, "Command-Line Applications," we take this opportunity to demonstrate some ways to accomplish tasks that root might do by using the sudo command-line utility. It is all right if you do not feel comfortable with trying anything you see in this section at this time. When you are more familiar with working with the command line, you can return to this section. If you do want to try anything in this section, you can run the commands in a terminal window. Just open the Terminal application in the Utilities folder in the Applications folder.
    Using sudo to Run Commands as root
    sudo is a command-line utility that allows use of the root account without necessarily enabling root.
    For example, in a terminal window, you could use sudo to reboot the machine now:
    [localhost:~] joray% sudo shutdown -r now
    The most common way to use sudo is to preface each command that you want root to do with the sudo utility. If you are asked for a password, use the password of the user who is executing the sudo command. If the user is not eligible to execute sudo, the command is not executed.
    If you need to execute a few commands in a row as root, you could try a couple alternative uses of sudo. When you are done with the tasks for root, type exit at the end of your session.
    In this example, your shell is elevated to that of root until you exit the session:
    [localhost:~] joray% sudo -s
    We trust you have received the usual lecture from the local System
    Administrator. It usually boils down to these two things:
    #1) Respect the privacy of others.
    #2) Think before you type.
    Password:
    [localhost:~] root#
    Notice that the prompt changes to include root#, as a reminder that you now have the power of root.
    In this example, sudo is used to run su to become root until you exit the session. When root is enabled, su can be used to switch to the root user. When using su by itself, the password you enter to become root is that of root, rather than yours, as you do with sudo.
    [localhost:~] joray% sudo su
    Password:
    [localhost:/Users/joray] root#
    Notice that in this example, the prompt also includes root# as a reminder of your power as root. Remember, to return to the status of a regular user, type exit when you are done with your root session.
    Using sudo to Enable the root Account
    Recall that the sudo command is used to execute a command that root might execute. A way to enable the root account is to use sudo to execute passwd, which is a command used to change passwords.
    Here is an example:
    [localhost:~] joray% sudo passwd root
    Password:
    Changing password for root.
    New password:
    Retype new password:
    [localhost:~] joray%
    The password that you initially enter is your password. Then you supply a password for root, and re-enter it for verification. If you mistype the password, you will be prompted again, as shown in this example:
    [localhost:~] joray% sudo passwd root
    Password:
    Changing password for root.
    New password:
    Retype new password:
    Mismatch; try again, EOF to quit.
    New password:
    Retype new password:
    [localhost:~] joray%

  • I have just brought 2 mini's for my boys for xmas.  1. can I connect them both to my existing Itunes account or do I need to set up something different. and 2. can they be used on their dads account as well as mine, or only one?

    I have just brought 2 mini's for my boys for xmas.  1. can I connect them both to my existing Itunes account or do I need to set up something different. and 2. can they be used on their dads account as well as mine, or only one?

    You can set them up with your Apple ID if you want to. You can also set them up with their dad's Apple ID. Depending on how old the boys are, you can even let then have their own Apple ID's. The one thing that you don't want to do is have them use more than one Apple ID on their iPads.
    If you want to be able to share purchased content, then setting them up with either your ID or your husband's (?) ID would be the way to go. If the boys share an ID with one of you, they can download content that you have already purchased without having to pay for it again.
    If you and have the financial wherewithal to allow them to purchase their own individual content, I would recommend letting them have their own Apple ID. This way, as they grow older and eventually move on, they will have their own accounts, their own purchases .... No ties needed to your ID or to dad's ID. FaceTime and Messages will be a little easier to set up if they have their own ID's and they can have their own iCloud accounts as well. However, they must be 13 years old in order to have an Apple ID and iTunes account. If they are under 13, then it's a no brainer you will have to use yours or their father's ID.
    Whatever you decide to do, just don't switch from one ID to another ID on the iPads. That gets confusing and they could end up locking themselves out of one of the ID's for 90 days if they download a past purchase using a different ID.

  • Yahoo states that I cannot utilize email chat or messenger unless I have Firefox 8. How can I get Firefox 8? I downloaded 9 and now can't chat with friends and family in Yahoo...**sigh**

    yahoo states that I cannot utilize email chat or messenger unless I have Firefox 8. How can I get Firefox 8? I downloaded 9 and now can't chat with friends and family in Yahoo...**sigh**

    Hi Tgordineer,
    This sounds like a known issue reported here:
    https://bugzilla.mozilla.org/show_bug.cgi?id=713014
    There was a workaround posted, but I've not tested it myself. Here are the steps.
    # Go into Yahoo Messenger Options - Change the Window in the dropdown to Tab and press OK.
    # Then go back and switch it to small window and press OK.
    Once the bug is officially resolved, you could try running a Nightly or Aurora build to use the fix early.
    Hopefully this helps!

  • Sound vs. NetStream: mp3 and m4A - can they both be played the same way?

    I have an audio player that works just fine with mp3's.
    now my client wants it to accept m4a files also.
    I see that they are handled differently, using the netstream class.
    But mp3's can't be handled this way.(or can they)
    Is there a method that will work for both?
    or do I have to program for each, and detect what file type is to be played?
    Also, whatis the easiest way to get the equivilent of sound.position for a streaming m4a?

    There were previous issues I've had with latency using NS to play MP3. For example my videos would sometimes become slightly desynced, especially over a long duration. This may have been resolved in the latest FPs but I tend to target the lowest version necessary.
    The Sound class was designed specifically to use mp3s more efficiently as well as access information NetStream can't. If I were you I'd do a simple file extension detection and use Sound for MP3 and NetStream for M4A separately. The difference between them is a short handful of code that can easily be wrapped by a class with a similar implementation so you can re-use it.

  • If WDA will be able to call a Flash island, and Flash can call javascript

    In this thread here:
    How would/should you invoke a javascriptable applet from WDA or WDJ?
    Thomas said that an upcoming release of WDA will let WDA call Flash "islands".
    Since this link:
    http://www.adobe.com/devnet/flash/articles/external_interface.html
    says that Flash can invoke javascript,  won't it be possible for WDA to call an applet indirectly by calling Flash and letting Flash call the applet ?
    djh

    Anton -
    I asked Thomas Stout to describe exactly what he's doing with Flex and JMol, and I'm posting his response just to be sure that there is no way (other than the portal) of duplicating what he is doing using WDA.
    Here's his response:
    Backend (linux):
    - we have a "database" of crystal structures in flat-file directories (for example,
    weekly rsync's from the PDB)
    - we parse those with perl scripts into an XML table with tagged data that we
    feel is relevant
    Flex:
    - the Flex app is constructed to load that XML file and display the data in a
    table.  We exported that code from Flex into an HTML table, which provided
    the basic page with a Flash movie of the Flex app embedded (See the attached
    screenshot from a development version of our web page: it's the horizontal
    rectangle at the top of the page).
    webpage:
    - we then built of the Jmol functionality into the lower half of this web page.  The
    table entries at the top are sortable on any column and filterable via the text
    box.  Once a line in the table is selected, the "Load" button passes the
    accompanying structure to the Jmol applet and all of the Jmol "tools" become
    active in the lower half of the page.   There is no communication in the reverse
    direction (can't think of why you would want to!).
    - BTW, the web page does not use "frames" -- I'm personally opposed to them --
    but it is all constructed within a table.  The Flash movie is in a table cell that
    spans two columns, the Jmol app is down a row and in the left hand (wider) cell,
    while the selectable links on the right are all in the right-hand cell.  The page is
    an amusing gmisch of HTML, javascript and JmolScript all fighting it out
    together.....    :)

  • What values are stored in the alignment region of an image and how can they be set?

    I am calling a number of C++ functions with different variable sized LabView images at rates in excess of 20 images per second. I need to tell the C++ code developer what values to expect in the alignment region of the image. Right now I am creating an image with a zero border that is 32 byte aligned, so there is no alignment region and everything works fine.
    I would like to move to using normal LabView images, as it saves sereval steps and allows me to use a combination of LabView and C++ operations. I do not want to re-write all the C++ functions to be aware of the LabView alignment and border areas. I just want the alignment area and border area to be zero and process them like they were part of the image.
    I can set the border region to zero using Fill Image but I am not clear as to what the values will be in the alignment region, or if I can set them. Does Fill Image also fill the alignment region? Since the C++ code is being developed on a system without LabView, and I do not have the means to debug it on my LabView system, it is tricky to know what is in this region.
    In the ideal world, I would like it to be zero or to be able to set it to zero.
    Thanks in advance.
    Andrew

    Hi Andrew,
    The function IMAQ Fill Image allows you to set the border and all or part of your image to a certain pixel value that you define. One of the inputs to Fill Image is "Image Mask" which you can use to specify which pixels in your original image will be modified. This help document describes the Fill Image VI in detail and can provide some good information for you.
    Essentially, the locations of any non-zero pixels in your Image Mask are where the new pixel value will be set in your original Image. Does that make sense? So if you know where your alignment region is then you can use an image mask with Fill Image to set the alignment region and the border to zero. If you don't use an Image Mask, the Fill Image VI will assign the new pixel value to the entire original image. 
    Regards,
    Daniel H.
    Customer Education Product Support Engineer
    National Instruments
    Certified LabVIEW Developer

  • SMART FORMS: How are they used and how can they be configured/enhanced?

    Hi Experts,
    I would like to know how are the smart forms used in crm.I know that by using t-code SMARTFORMS we can view/edit standard smart forms . But I am confused about the fact that how are they used.If some one can list me the steps to be followed in simple language that would be of great help.
    Any pointers would also be appreciated.
    Regards,
    Aneesh

    Hi Aneesh,
      In CRm we use smartforms to send mail to Business partners based on the client requirement. This sending process will be defined using Actions. Through actions we will trigger the smartform and send to the concerned busines partner mail id.
    Hope this helps you.
    Regads,
    Lakshmi.Y

  • AppleTV and iChat: can they work together?

    Right now when I use iChat, I hook my the video out of my laptop up to my HDTV and the audio to my stereo. So far it's worked great.
    I was hoping that AppleTV would let me do that a bit more easily. Does anyone know if that will be possible with AppleTV

    Hi James,
    It will depend on whether it is software on the TV that calls the Computers iTunes and iPhoto libraries or whether it is just a point to plug the Computer to something that can display on a TV screen.
    I am reading it as the latter.
    11:23 PM Sunday; January 14, 2007

  • What are the "bookmarkTools.dupBm160" (many entries) in about:config and how can they be removed if not needed?

    In about:config I noted MANY entries that start with: bookmarkTools.dupBm
    What are they? What purpose do they serve? How to get rid of them if they serve no purpose?

    Probably added by an extension.
    Help > Troubleshooting Information...
    Copy and paste that info into the reply box.

  • OLAP Services and Infobus -- can they work to interface with 3rd party tools?

    I would like to link 9i OLAP data to 3rd party tools like Formula One or other Java Report Writers. Can this be done using infobus or other technologies? Does 9i OLAP services act as an infobus data provider?
    Has anyone done this? If so can an example be provided?
    Thanks

    I would like to link 9i OLAP data to 3rd party tools like Formula One or other Java Report Writers. Can this be done using infobus or other technologies? Does 9i OLAP services act as an infobus data provider?
    Has anyone done this? If so can an example be provided?
    Thanks InfoBus is a Java standard for dynamic data interchange. The Oracle9i OLAP API does not act as an InfoBusDataProvider. It's compatible but not supported. Also, InfoBus has been determined not well suited for multidimensionality.
    BI Beans actually has some code in its Query object to act as an InfoBusDataProvider, but it is hidden due to inadequate testing and review, plus there is a perception that there is a lack of strong interest in this feature.
    So the short answer is that OLAP API and BI Beans do not provide InfoBus support. If there is a public outcry for InfoBus support, Oracle OLAP would consider it as a feature for a future release.
    As for another technology to link Oracle9i OLAP data to 3rd party tools like Formula One or other Java Report Writers, I'll look into it and report back.

  • IPhoto and iDisk Can They Play Together?

    Hey All,
    I want to start backing up my iPhoto library using iDisk.
    I can not find a way to create a shortcut in the iDisk folder to my Pictures folder.
    What is the easiest way to backup my iPhoto library in iDisk without doing it manually.
    Thanks!

    About the only way I can think of doing it is to make an Automator workflow. On the other hand, you could just backup the Originals folder from you library to the iDisk and for that you can use an application like Transmit which will mount the iDisk (enter password, etc.) and then, when you click on run it will compare the Original file in your library to the one on the iDisk and copy only those new files. Transmit will copy files to the iDisk faster than you can in the Finder. There are other backup applications that can do incremental backups.
    TIP: For insurance against the iPhoto database corruption that many users have experienced I recommend making a backup copy of the Library6.iPhoto (iPhoto.Library for iPhoto 5 and earlier) database file and keep it current. If problems crop up where iPhoto suddenly can't see any photos or thinks there are no photos in the library, replacing the working Library6.iPhoto file with the backup will often get the library back. By keeping it current I mean backup after each import and/or any serious editing or work on books, slideshows, calendars, cards, etc. That insures that if a problem pops up and you do need to replace the database file, you'll retain all those efforts. It doesn't take long to make the backup and it's good insurance.
    I've created an Automator workflow application (requires Tiger or later), iPhoto dB File Backup, that will copy the selected Library6.iPhoto file from your iPhoto Library folder to the Pictures folder, replacing any previous version of it. It's compatible with iPhoto 6 and 7 libraries and Tiger and Leopard. Just put the application in the Dock and click on it whenever you want to backup the dB file. iPhoto does not have to be closed to run the application, just idle. You can download it at Toad's Cellar. Be sure to read the Read Me pdf file.
    Note: There's now an Automator backup application for iPhoto 5 that will work with Tiger or Leopard.

  • Outlook 2010 and Ipad2 Can they be synced?

    Can Outlook Calander, Notes, Contacts, be synced with an Ipad2?

    Thanks folks, everything synced just fine (to my amazement) and really looks nice in all areas, Calander looks better than Outlooks, Notes was in a notepad cursive look, Contacts even had a fresh look and Mail synced. All my data transfered over and I now feel I can go to meetings with only the IP2.

  • Chart Legend and Title - Can they be Different?

    Hi,
    Pie chart I am displaying has titles as big names like
    Oracle Applications
    Oracle content management etc
    So the space occupied is more. Is there a way to display the titles as abbreviations and the legend as full name?
    Eg:
    Title
    OA
    OCM
    Legend
    OA -Oracle Applications
    OCM - Oracle Content Mgmt

    Hi,
    I don't think that's possible as there is only one label for each slice and that is used in the legend.
    The only alternative would be to provide your own legend underneath the chart region?
    Andy

  • Cells size and position; Can they have parameters ?

    Hello,
    Currently I have an Object
    Start Date: 1 Jan 2008
    End Date: 30 feb 2008
    I want to set-up:
    - the position of the cell depending the start date
    - the wide of the cell depending the duration
    I'm working on Crystal Report XI R2
    Thanks in advance.
    Alex

    HI Alex
    Mentioned below are the stepsto conditionally change the X position of an object
    1. Right-click the field that you want to move conditionally, and select Size
    and Position.
    2. Click the Conditional Formula button next to the X position value field.
    3. In the Formula Workshop, enter your conditional X position formula text.
    For example, to move orders that were shipped late to a second column,
    enter formula text such as this:
    If (Orders.Ship Date) < CDateTime (2004, 01, 01, 02, 10,
    11) then 4320
    Note: The number 4320 represents the new position that you want to
    define as the second column. The position is measured in twips; there
    are 1440 twips in an inch.
    4. Click Save and close to return to your report.
    5. Click OK to save your position setting.
    Crystal Reports moves objects that meet your condition to a new position, but
    leaves those objects that donu2019t meet the condition where you originally placed
    them.
    Hope it will be helpful to you.
    Regards
    Asha

Maybe you are looking for

  • How can I keep my iMac on the wireless network when it goes to sleep?

    I have a new iMac (from Santa) and when it goes to sleep, so does its wifi connection.  I use it for work and need to keep my instant messaging app open and running at all times, even when it's asleep. I also like to have all of my email waiting in t

  • Problem when migrate from WLI2.1 to WLI7

    I met this problem when migrating my program from WLI2.1 to WLI7. It report the following exception in WLI7: <2002-10-21 下午05时05分15秒> <Error> <HTTP> <101019> <[ServletContext(id=5904188,name=dkh ,context-path=/dkh)] Servlet failed with IOException ja

  • I am upgrading to win7 custom instal and want to save my bookmark in a file to use in a new ff instal

    doing a custom instal upgrade to win7 and i want to know how to save my bookmarks on a flash drive to reaply to the new firefox browser when i am done

  • EJBs and web services  in Application server  ??

    Hi all, I just wanted to ask for a help in a scenario that i am facing: I have a Application that relies on EJBs for Business Logic I basically use the Jboss A/s[4.2.2 GA] server for the same and now there is a need to Expose these bean methods throu

  • Help updating jTable (model?)

    I've got a jTable, which stores information that I retrieve from game servers (player's name, frag count, and time connected to the server). I'll admit first off that I'm very, very new to Swing and still new to Java as a whole. I've searched the for