Someone know about Filenet ?

I would like know more about Filenet, and know if it's is similar with Portal of Oracle.

Hi, thanks for your answer... but I already try and didnt work.... f2? with ctrl.. o cm..? I have a macbook air...

Similar Messages

  • Hi! Someone know about how I can turn on the light of my keyboard?

    Hi! Someone know about how I can turn on the light of my keyboard?

    Hi, thanks for your answer... but I already try and didnt work.... f2? with ctrl.. o cm..? I have a macbook air...

  • Do someone know about print errors with kodak1400??

    Hello everyone, I have since a couple years a Kodak 1400 printer, I've been using it with my older  MacBook Pro and never had a problem, now since I've changed to last MacBook Pro i7 then start having some problems....until I can't get it working well over at least 2 prints...
    I've downloaded the latest driver, and updated the latest firmware but any luck
    The printing app says the comunication broke down, or a system problem occured error so -536870163 -
    So it would take the paper in, sometimes start printing the first labels of the ribbon until this messege pop out from the printer app, and there it will stop printing...
    Do someone knows about this error? some idea what can it be? any solutions for that?
    Thanks!!!!
    Isaias_.

    good point!!!
    the thing is as I live in Argentina I'm not  sure the customer support here have some representation, but I'll contact Kodak®...
    thanks for the help!
    Bests!
    Isaias_.

  • Does someone knows about this tool on LMS 3.2?

    I am quoting from the LMS 3.2 Deployment Guide:
    What’s New: Generic Device Support in RME
    Day one device support for network management applications is a continuing challenge. As new hardware platforms
    come to market, device support may be lagging. The CiscoWorks Incremental Device Update team announces
    availability of a new "automated" update tool, providing device support for inventory and configuration functionality
    within Resource Manager Essentials. This tool allows customers to quickly get support for new hardware platforms
    where complete device package support through the Incremental Device Update program has not yet been
    delivered. This new tool can be downloaded from
    http://www.cisco.com/cgi-bin/tablebuild.pl/cw2000-rme andinstalled on the LMS 3.01, 3.1, and 3.2 code base. The following features are enabled for devices using the
    automated update tool:
    Device Management in RME:The Device Manageability Status Report provides details as to whether the device is officially supported or
    managed using automatic IDU.
    Inventory Management in RME:
    ◦System-, port-, memory-, Flash-, and bridge-related information will be queried using Entity or the OCCM
    MIB.
    ◦Support for CDA will be provided.

    Config Management in RME:
    ◦Sync archive using CLI and TFTP protocols
    ◦Ad-hoc template in NetConfig deployment
    ◦Partial NetShow if MDF association is available
    ◦Raw mode in version summary and version tree
    ◦Partial out-of-sync summary and compare configuration
    ◦Config Editor support for editing in raw mode only
    An announcement regarding similar support capability in Campus Manager and Device Fault Manager will be sent
    when it becomes available.

    You can go to Common Services > Software Center > Device Update, click the the RME link, and search for GenericDev.  If you find it, then you have the package installed.  For any device which has a sysObjectID which RME doesn't recognize with a specific package, this package will be tried instead.
    If you find that the package is not already installed, perform a device update for RME, and download and install all available device packages.

  • Someone knows about xenrex?

    mmessage in my iPhone-xenrex.com critical security warning! Your iOS is crashed due to a third party installation in your device. Contact support at 1-855-228-2538.I think is a scam,I will not call,how can I fix it?

    It is a scam. In order to stop the message in safari go into your iphone settings and then to safari. Once there clear all cookies and data. The next step make sure your phone is not connected to WIFI and turn off the use cellular dat portion of safari. Close the settings and go to safari it should be blank, if not clear the existing web pages. Then just go back to your original settings.
    I have done this and have not had trouble sense.

  • Does someone know information about Company name:TianMei Electronic Trade Co., Ltd Address:Anbao Building No.28 street, quanzhou , FUJian, China.Is it Legit to buy there or not? or what information you have???please answer

    Does someone know information about
    Company name:TianMei Electronic Trade Co., Ltd
    Address:Anbao Building No.28 street, quanzhou , FUJian, China
    Pleas abswer is it legit or not?
    Does someone have got any experience with that company?
    Any information is welcome?
    Or is it somekind on cheating ?`?
    Do i get there a legit iphone or somekind of Chinese knock offs?
    <Email Edited By Host>

    You can look for authorized Apple resellers here:
    https://locate.apple.com/cn/zh/
    If you have any doubts about any reseller, I strongly advise that you not purchase from them. Buy your iPhone directly from Apple and you will then have no worries.
    Regards.

  • I had ipod touch 4g i want another one but im doubt if theres upcoming a new ipod or not?? someone knows something about it ???

    i had ipod touch 4g i want another one but im doubt if theres upcoming a new ipod or not?? someone knows something about it ???

    There may be a new iPod coming up or there might not be.  Apple has not made any announcment so we do not know.

  • Did you know about Flash Cookies?

    I know about regular cookies, and delete them... but had no idea there was such a thing as a Flash Cookie
    Read about 1/2 way down here http://windowssecrets.com/comp/100805

    Rod,
    Since you're a confessed geek with some actual coding chops, I'm sure you'll understand the hair I'm about to split here. Hang on a moment while I grab my axe...
    Even with your page jumps, the cookie isn't doing anything. It's just a text file named after a snack. What's causing your page to jump, browsers to redirect, and the moon to shift its gravitational field three degrees to the north is the code in the web page that's being loaded. True, it may look in the text file to see what IP address to report to, but the connection, handshaking, transfer of data and powering up of lasers are all on your web page (or the server side code being executed on its behalf). The cookie is little more than a poorly dressed informant hanging out on the street corner waiting to pass along tidbits of information when the right person asks. Doesn't exactly make it a savory character (name notwithstanding), but it's a harmless one nonetheless. If it's evil you seek, you'll find it in the web site, not the cookie. And that's why I never understood the religious fervor against cookies.
    Now, if you want a truly dangerous leave behind, at least on Windows, ActiveX controls are your guys. They're really just glorified COM objects, and thus have complete access to the entire Windows API. Give me permission to install an ActiveX control on your machine and I can rewrite your file system, start and stop services, reboot your computer, or just turn the screen a hyperintelligent shade of the color blue because it amuses me. Anything that can be done in Windows programming is essentially available to the ActiveX control.
    Of course, browsers got hip to this years ago, and now the default security settings for ActiveX are to not install automatically, or at least to query the user first. Or, as it's configured on my machine, feel free to install if you can make it past this shotgun pointed at your head. Maybe that's why there's not as much of a flap about ActiveX as there is about cookies. Because they're truly dangerous, the browser community took it seriously.and now only someone with a death wish allows a web page to install an ActiveX component.
    And overall, this is kinda my point. The much maligned cookie gets a bad rap while in truth it's the web page staring you right in the face that's preparing to rob, rape and pillage. But then, misdirection has always been a classic tactic in warfare.

  • What every developer should know about character encoding

    This was originally posted (with better formatting) at Moderator edit: link removed/what-every-developer-should-know-about-character-encoding.html. I'm posting because lots of people trip over this.
    If you write code that touches a text file, you probably need this.
    Lets start off with two key items
    1.Unicode does not solve this issue for us (yet).
    2.Every text file is encoded. There is no such thing as an unencoded file or a "general" encoding.
    And lets add a codacil to this – most Americans can get by without having to take this in to account – most of the time. Because the characters for the first 127 bytes in the vast majority of encoding schemes map to the same set of characters (more accurately called glyphs). And because we only use A-Z without any other characters, accents, etc. – we're good to go. But the second you use those same assumptions in an HTML or XML file that has characters outside the first 127 – then the trouble starts.
    The computer industry started with diskspace and memory at a premium. Anyone who suggested using 2 bytes for each character instead of one would have been laughed at. In fact we're lucky that the byte worked best as 8 bits or we might have had fewer than 256 bits for each character. There of course were numerous charactersets (or codepages) developed early on. But we ended up with most everyone using a standard set of codepages where the first 127 bytes were identical on all and the second were unique to each set. There were sets for America/Western Europe, Central Europe, Russia, etc.
    And then for Asia, because 256 characters were not enough, some of the range 128 – 255 had what was called DBCS (double byte character sets). For each value of a first byte (in these higher ranges), the second byte then identified one of 256 characters. This gave a total of 128 * 256 additional characters. It was a hack, but it kept memory use to a minimum. Chinese, Japanese, and Korean each have their own DBCS codepage.
    And for awhile this worked well. Operating systems, applications, etc. mostly were set to use a specified code page. But then the internet came along. A website in America using an XML file from Greece to display data to a user browsing in Russia, where each is entering data based on their country – that broke the paradigm.
    Fast forward to today. The two file formats where we can explain this the best, and where everyone trips over it, is HTML and XML. Every HTML and XML file can optionally have the character encoding set in it's header metadata. If it's not set, then most programs assume it is UTF-8, but that is not a standard and not universally followed. If the encoding is not specified and the program reading the file guess wrong – the file will be misread.
    Point 1 – Never treat specifying the encoding as optional when writing a file. Always write it to the file. Always. Even if you are willing to swear that the file will never have characters out of the range 1 – 127.
    Now lets' look at UTF-8 because as the standard and the way it works, it gets people into a lot of trouble. UTF-8 was popular for two reasons. First it matched the standard codepages for the first 127 characters and so most existing HTML and XML would match it. Second, it was designed to use as few bytes as possible which mattered a lot back when it was designed and many people were still using dial-up modems.
    UTF-8 borrowed from the DBCS designs from the Asian codepages. The first 128 bytes are all single byte representations of characters. Then for the next most common set, it uses a block in the second 128 bytes to be a double byte sequence giving us more characters. But wait, there's more. For the less common there's a first byte which leads to a sersies of second bytes. Those then each lead to a third byte and those three bytes define the character. This goes up to 6 byte sequences. Using the MBCS (multi-byte character set) you can write the equivilent of every unicode character. And assuming what you are writing is not a list of seldom used Chinese characters, do it in fewer bytes.
    But here is what everyone trips over – they have an HTML or XML file, it works fine, and they open it up in a text editor. They then add a character that in their text editor, using the codepage for their region, insert a character like ß and save the file. Of course it must be correct – their text editor shows it correctly. But feed it to any program that reads according to the encoding and that is now the first character fo a 2 byte sequence. You either get a different character or if the second byte is not a legal value for that first byte – an error.
    Point 2 – Always create HTML and XML in a program that writes it out correctly using the encode. If you must create with a text editor, then view the final file in a browser.
    Now, what about when the code you are writing will read or write a file? We are not talking binary/data files where you write it out in your own format, but files that are considered text files. Java, .NET, etc all have character encoders. The purpose of these encoders is to translate between a sequence of bytes (the file) and the characters they represent. Lets take what is actually a very difficlut example – your source code, be it C#, Java, etc. These are still by and large "plain old text files" with no encoding hints. So how do programs handle them? Many assume they use the local code page. Many others assume that all characters will be in the range 0 – 127 and will choke on anything else.
    Here's a key point about these text files – every program is still using an encoding. It may not be setting it in code, but by definition an encoding is being used.
    Point 3 – Always set the encoding when you read and write text files. Not just for HTML & XML, but even for files like source code. It's fine if you set it to use the default codepage, but set the encoding.
    Point 4 – Use the most complete encoder possible. You can write your own XML as a text file encoded for UTF-8. But if you write it using an XML encoder, then it will include the encoding in the meta data and you can't get it wrong. (it also adds the endian preamble to the file.)
    Ok, you're reading & writing files correctly but what about inside your code. What there? This is where it's easy – unicode. That's what those encoders created in the Java & .NET runtime are designed to do. You read in and get unicode. You write unicode and get an encoded file. That's why the char type is 16 bits and is a unique core type that is for characters. This you probably have right because languages today don't give you much choice in the matter.
    Point 5 – (For developers on languages that have been around awhile) – Always use unicode internally. In C++ this is called wide chars (or something similar). Don't get clever to save a couple of bytes, memory is cheap and you have more important things to do.
    Wrapping it up
    I think there are two key items to keep in mind here. First, make sure you are taking the encoding in to account on text files. Second, this is actually all very easy and straightforward. People rarely screw up how to use an encoding, it's when they ignore the issue that they get in to trouble.
    Edited by: Darryl Burke -- link removed

    DavidThi808 wrote:
    This was originally posted (with better formatting) at Moderator edit: link removed/what-every-developer-should-know-about-character-encoding.html. I'm posting because lots of people trip over this.
    If you write code that touches a text file, you probably need this.
    Lets start off with two key items
    1.Unicode does not solve this issue for us (yet).
    2.Every text file is encoded. There is no such thing as an unencoded file or a "general" encoding.
    And lets add a codacil to this – most Americans can get by without having to take this in to account – most of the time. Because the characters for the first 127 bytes in the vast majority of encoding schemes map to the same set of characters (more accurately called glyphs). And because we only use A-Z without any other characters, accents, etc. – we're good to go. But the second you use those same assumptions in an HTML or XML file that has characters outside the first 127 – then the trouble starts. Pretty sure most Americans do not use character sets that only have a range of 0-127. I don't think I have every used a desktop OS that did. I might have used some big iron boxes before that but at that time I wasn't even aware that character sets existed.
    They might only use that range but that is a different issue, especially since that range is exactly the same as the UTF8 character set anyways.
    >
    The computer industry started with diskspace and memory at a premium. Anyone who suggested using 2 bytes for each character instead of one would have been laughed at. In fact we're lucky that the byte worked best as 8 bits or we might have had fewer than 256 bits for each character. There of course were numerous charactersets (or codepages) developed early on. But we ended up with most everyone using a standard set of codepages where the first 127 bytes were identical on all and the second were unique to each set. There were sets for America/Western Europe, Central Europe, Russia, etc.
    And then for Asia, because 256 characters were not enough, some of the range 128 – 255 had what was called DBCS (double byte character sets). For each value of a first byte (in these higher ranges), the second byte then identified one of 256 characters. This gave a total of 128 * 256 additional characters. It was a hack, but it kept memory use to a minimum. Chinese, Japanese, and Korean each have their own DBCS codepage.
    And for awhile this worked well. Operating systems, applications, etc. mostly were set to use a specified code page. But then the internet came along. A website in America using an XML file from Greece to display data to a user browsing in Russia, where each is entering data based on their country – that broke the paradigm.
    The above is only true for small volume sets. If I am targeting a processing rate of 2000 txns/sec with a requirement to hold data active for seven years then a column with a size of 8 bytes is significantly different than one with 16 bytes.
    Fast forward to today. The two file formats where we can explain this the best, and where everyone trips over it, is HTML and XML. Every HTML and XML file can optionally have the character encoding set in it's header metadata. If it's not set, then most programs assume it is UTF-8, but that is not a standard and not universally followed. If the encoding is not specified and the program reading the file guess wrong – the file will be misread.
    The above is out of place. It would be best to address this as part of Point 1.
    Point 1 – Never treat specifying the encoding as optional when writing a file. Always write it to the file. Always. Even if you are willing to swear that the file will never have characters out of the range 1 – 127.
    Now lets' look at UTF-8 because as the standard and the way it works, it gets people into a lot of trouble. UTF-8 was popular for two reasons. First it matched the standard codepages for the first 127 characters and so most existing HTML and XML would match it. Second, it was designed to use as few bytes as possible which mattered a lot back when it was designed and many people were still using dial-up modems.
    UTF-8 borrowed from the DBCS designs from the Asian codepages. The first 128 bytes are all single byte representations of characters. Then for the next most common set, it uses a block in the second 128 bytes to be a double byte sequence giving us more characters. But wait, there's more. For the less common there's a first byte which leads to a sersies of second bytes. Those then each lead to a third byte and those three bytes define the character. This goes up to 6 byte sequences. Using the MBCS (multi-byte character set) you can write the equivilent of every unicode character. And assuming what you are writing is not a list of seldom used Chinese characters, do it in fewer bytes.
    The first part of that paragraph is odd. The first 128 characters of unicode, all unicode, is based on ASCII. The representational format of UTF8 is required to implement unicode, thus it must represent those characters. It uses the idiom supported by variable width encodings to do that.
    But here is what everyone trips over – they have an HTML or XML file, it works fine, and they open it up in a text editor. They then add a character that in their text editor, using the codepage for their region, insert a character like ß and save the file. Of course it must be correct – their text editor shows it correctly. But feed it to any program that reads according to the encoding and that is now the first character fo a 2 byte sequence. You either get a different character or if the second byte is not a legal value for that first byte – an error.
    Not sure what you are saying here. If a file is supposed to be in one encoding and you insert invalid characters into it then it invalid. End of story. It has nothing to do with html/xml.
    Point 2 – Always create HTML and XML in a program that writes it out correctly using the encode. If you must create with a text editor, then view the final file in a browser.
    The browser still needs to support the encoding.
    Now, what about when the code you are writing will read or write a file? We are not talking binary/data files where you write it out in your own format, but files that are considered text files. Java, .NET, etc all have character encoders. The purpose of these encoders is to translate between a sequence of bytes (the file) and the characters they represent. Lets take what is actually a very difficlut example – your source code, be it C#, Java, etc. These are still by and large "plain old text files" with no encoding hints. So how do programs handle them? Many assume they use the local code page. Many others assume that all characters will be in the range 0 – 127 and will choke on anything else.
    I know java files have a default encoding - the specification defines it. And I am certain C# does as well.
    Point 3 – Always set the encoding when you read and write text files. Not just for HTML & XML, but even for files like source code. It's fine if you set it to use the default codepage, but set the encoding.
    It is important to define it. Whether you set it is another matter.
    Point 4 – Use the most complete encoder possible. You can write your own XML as a text file encoded for UTF-8. But if you write it using an XML encoder, then it will include the encoding in the meta data and you can't get it wrong. (it also adds the endian preamble to the file.)
    Ok, you're reading & writing files correctly but what about inside your code. What there? This is where it's easy – unicode. That's what those encoders created in the Java & .NET runtime are designed to do. You read in and get unicode. You write unicode and get an encoded file. That's why the char type is 16 bits and is a unique core type that is for characters. This you probably have right because languages today don't give you much choice in the matter.
    Unicode character escapes are replaced prior to actual code compilation. Thus it is possible to create strings in java with escaped unicode characters which will fail to compile.
    Point 5 – (For developers on languages that have been around awhile) – Always use unicode internally. In C++ this is called wide chars (or something similar). Don't get clever to save a couple of bytes, memory is cheap and you have more important things to do.
    No. A developer should understand the problem domain represented by the requirements and the business and create solutions that appropriate to that. Thus there is absolutely no point for someone that is creating an inventory system for a stand alone store to craft a solution that supports multiple languages.
    And another example is with high volume systems moving/storing bytes is relevant. As such one must carefully consider each text element as to whether it is customer consumable or internally consumable. Saving bytes in such cases will impact the total load of the system. In such systems incremental savings impact operating costs and marketing advantage with speed.

  • Where's can i Buy any Professional Authoring DVD for IMAC, did you know about Studio DVD pro ?

    I need help, i need buy or dowload some Professional Authoring DVD for IMAC, I editing in my Final Cut Pro X and need a DVD authoring
    after installing the Mavericks, my IDVD don't work, can someone help about this ?
    also, did you know if DVD studio pro its available for sale ? if yes, where's can I buy  ?
    thanks

    Apple discontinued DVD Studio Pro three/four years ago. You can probably find copies from private sellers, but whether it will work without problems on OS X 10.9 I don't know. I don't know of any "professional" alternative to DVDSP for Mac, but someone else here may be able to offer suggestions.
    As to iDVD, it should work under Mavericks, depending on what version of iDVD you're running. You might ask for assitance in the iDVD forum. For alternatives to iDVD, see this page for suggestions:
    http://alternativeto.net/software/idvd/?platform=mac
    Regards.

  • 7 Things every Adobe AIR Developer should know about Security

    7 Things every Adobe AIR Developer should know about Security
    1. Your AIR files are really just zip files.
    Don't believe me? Change the .air extension to zip and unzip
    it with your favorite compression program.
    What does this mean for you the developer? What this means is
    that if you thought AIR was a compiled protected format, alas it is
    not.
    2. All your content is easily accessible in the AIR file.
    Since we now that the AIR file is really just a zip file,
    unzip it and see what's inside. If you have added any content
    references when you published the AIR file, voila, there it all is.
    What does this mean for you the developer? Well, you content
    is sitting there ripe for the picking, and so is everything else
    including you Application descriptor file, images etc.
    3. Code signing your Air app does nothing as far as security
    for you.
    All code signing your app does is verify to the end user that
    someone published the app. I does nothing as far as encryption and
    does nothing to project your content.
    What does this mean for you the developer? We'll you should
    still do it, because getting publisher "unknown" is worse. It also
    means that joe hacker would not be able decompile your entire app
    and republish it with the same certificate, unless they
    somehow got a hold of that too.
    4. All your AIR SWF content is easily decompilable.
    Nothing new here, it's always been this way. Type flash
    decompiler into google and you'll find a variety of decompilers for
    under $100 that will take your AIR content swf and expose all your
    source code and content in no time.
    What does this mean for you the developer? All you content,
    code, urls and intellectual property is publicly available to
    anyone with a decompiler, unless you do some extra work and encrypt
    your swf content files, which is not currently a feature of AIR,
    but can be done if you do your homework.
    5. Your SQLite databases are easy to get at.
    SQLite datatbases can be accessed from AIR or any other
    program on you computer that knows how to work with it. Unless you
    put your database in the local encrypted datastore, or encrypt your
    entire database it's pretty easy to get at, especially if you
    create it with a .db extension.
    What does this mean for you the developer? We'll SQLite is
    very useful, but just keep in mind that your data can be viewed and
    altered if you're not careful.
    6. The local encrypted datastore is useful, but....
    The local encrypted datastore is useful, but developers need
    a secure way of getting information into it. Storing usernames,
    passwords and urls in clear text is a bad idea, since as we
    discussed, you code is easy to decompile an read. By putting info
    into the local encrypted datastore, the data is encrypted and very
    difficult to get at. The problem is, how do you get it into there,
    without have to store any info that can be read in the air file and
    without the necessity of communicating with a web server? Even if
    you called a web service and pushed the returned values into the
    datastore, this is not ideal, since you may have encoded the urls
    to you web service into your code, or they intercept the results
    from the web service call.
    What does this mean for you the developer? Use the local
    datastore, and hope that we get some new ways of protecting content
    and data form Adobe in the next release of AIR.
    7. There are some things missing form the current version of
    AIR (1.1) that could really help ease the concerns of people trying
    to develop serious applications with AIR.
    Developers want more alternatives for the protection of local
    content and data. Some of us might want to protect our content and
    intellectual property, remember not all of us are building toys
    with AIR. Other than the local encrypted datastore there are not
    currently any built in options I'm aware of for encrypting other
    content in the AIR file, unless you roll your own.
    What does this mean for you the developer? We'll I've been
    told that Adobe takes security very seriously, so I'm optimistic
    that we'll see some improvements in this area soon. If security is
    a concern for you as much as it is for me, let them know.

    Putting "secret data" as a clear text directly in your code
    is a broken concept in every environment, programing language.
    Every compiled code is reversible, especially strings are really
    easy to extract.
    There is no simple, straightforward way to include secret
    data directly with your app. This is a complicated subject, and if
    you really need to do this, you'll need to read up on it a bit.
    But in most cases this can be avoided or worked around
    without compromising security. One of the best ways is to provide
    the user with a simple "secret key" alongside the app (best way is
    the good old login/password). The user installs the app, and
    provides his "secret key", that goes directly into
    EncryptedLocalStore, and then you use this "secret key" to access
    the "secret data" that's stored on your server. Then you can
    transfer the "secret data" directly into EncryptedLocalStore.
    As for the whole thread:
    Points 1-5 -> Those points do not concern AIR apps only.
    If you are developing an application in any language, you should
    follow those rules, meaning:
    - Code installed on users computer is easy accessible
    - Data stored locally is easy accessible, even if it
    encrypted using any symmetric-key encryption, because the
    encrypting algorithm and encryption key is in your source code (you
    could probably write a book on using public-key encryption so let's
    just leave it for now ;)
    Point 6 -> Is a valid one. All your app security should
    relay on the EncryptedLocalStore. But it is your job to get the
    data securely into the ELS, because there is no point to encrypt
    data that can be intercepted.

  • M from india, i purchase iphone 4s around 18 mnths ago. I was having 1 year warranty of 1 year that has been expired 6 months ago. Now how can i extend my iphone warranty. Please let me know about this. Thanks in advance..

    M from india, i purchase iphone 4s around 18 mnths ago. I was having 1 year warranty of 1 year that has been expired 6 months ago. Now how can i extend my iphone warranty. Please let me know about this. Thanks in advance..

    If you don't know the sender, then it is most likely a scam or spam email. I get them every day - I just delete them. I also get daily notices from Facebook or someone called Adriana at Facebook even though i do not have an account there. Can't do anything about it - just delete it.

  • What do I need to know about fonts?

    Can anyone explain what I need to know about using fonts on a MacBook Pro running Leopard, or point me to a good reference or tutorial? I've never paid much attention to fonts in the past, as I only use a few in print (Arial, Verdana, Times New Roman, etc.), and I never did much with fonts in my graphics work. But I want to take a closer look at fonts and start experimenting with them. Looks like a surprisingly big topic.
    On my PC, I was limited to how many fonts I could display by memory. As I understand it, there's no such limit on a Mac running Leopard.
    I encountered references to fonts when I installed Adobe Creative Suite and Microsoft Office for Mac, so I need to figure out how to manage fonts, then go back and check the installation disks again.
    Right now I have three font folders in username > Library: FontCollections, Fonts (empty) and Fonts Disabled (empty).
    I also need to learn about the different kinds of fonts (e.g. True Type, etc.) and how/where people obtain them, though that's probably beyond the scope of this thread.
    But before I do any more research via Google, I'd like to narrow the field a bit. I was hoping someone could give me a basic overview or point me to a good reference. What software do you use to manage fonts on a Mac, and do you have any basic tips to offer?
    Thanks.

    Also, see:
    Font Management in OS X
    http://images.apple.com/pro/pdf/L311277AFontTTv4.pdf
    http://www.creativetechs.com/tips/SVC-fonts/Fonts-2007-SVC.pdf
    http://dl.extensis.com/downloads/SC/EN/P/FontsBest_Practices_inOSX.pdf
    http://www.macworld.com/article/44942/2005/05/julyworkingmac.html

  • I wnat know about REP,RSTP

    Hi my name is Jo~
    I wnat know about REP,RSTP 
    Qeustion
    1. REP
    I wnat to make ring topology that i use"ie-3000" switch.
    How many switch can connected ring topology.
    I consider REP protocol.
    I know STP can connect 7 device in this topology.
    2. REP Configuration example.
    I find configuration example about REP.
    3. How many switch can make ring topology?

    use step in http://www.oracle.com/technetwork/articles/datawarehouse/oracle-sqlserver-goldengate-460262.html
    sourceistable
    sourcedb Northwind,userid someone,password someone
    rmthost example, mgrport 7809
    rmtfile /u02/DGolden/dirdat/ex
    table dbo.Categories;
    table dbo.CustomerCustomerDemo;
    table dbo.CustomerDemographics;
    table dbo.Customers;
    table dbo.Employees;
    table dbo.EmployeeTerritories;
    table dbo.Order Details;
    table dbo.Orders;
    table dbo.Products;
    table dbo.Region;
    table dbo.Shippers;
    table dbo.Suppliers;
    table dbo.Territories;
    Edited by: 891982 on 28 มี.ค. 2555, 0:05 น.

Maybe you are looking for

  • QUESTION ON IPOD NANO 2ND GENERATION

    Greatings i currently have a problenin putting music in my ipod nano 2nd generation, how can i do this since i don`t have access to internet therfore failing to connect to I TUNES

  • How do I get out of the restore loop in Nano gen 7

    I have a 7th generation iPod Nano which I proceeded to restore to factory setting. It is now in an endless loop of recovery mode and needing restoring. Software Version 1.0.3 Does anyone have the solution?

  • IT Seems like we are all having so many problems but looking thru all the p

    all the posts in everyone one fines garageband so easy me too! now if apple made both programs why so many issues in logic the program we all shelled out at least 2 bills for, I know one (logic) is more pro, but does that mean it has to be so hard to

  • A little aid on finding Component by Id needed

    Hi, in javascript resource i have a function below which is meant to set focus to another Textitem (function is invoked by a textitem's key press event ) the problem is AdfPage.PAGE.findComponentByAbsoluteId('form:pgl1:pgl2:ph1:form2:password') retur

  • Update 10.4.3

    Afther th update 10.4.3 i can't open Safari, open software update in apple menu and I-tunes doesn't work. I'l cat this message: Fout: 'POSIX error: Cannot allocate memory' (NSPOSIXErrorDomain:12). I want same tips to solve this problem. ibook g4   Ma