The cost of developing an MHP application

I have had for some years an ambition that an MHP application can become written in Java and put into use, an MHP application which implements some of my ideas about a generic application.
The generic application which would be produced would accept as input data a Unicode text file produced on a PC using Microsoft WordPad.
The generic application would respond to user keypad presses.
The effect would be to produce text and maybe vector graphics displays on the screen.
The ideas of my own which the program would implement would be to use various Unicode Private Use Area characters to have meanings, within the application, such as changing text colour, waiting for a keypad button to be pressed, clearing the screen and so on. There are various things which I have thought would be good ideas, including vector graphics and a system for preparing programmed learning texts, though all of them do not need to be implemented in a first application.
The particular generic application would be a specialised sandbox with solid security. If it were implemented it would mean that people could produce safe interactive television applications using a text editor on a PC.
This particular generic program would be for a one-way broadcast system only.
My Quest text font, which is available as a free download from the following web page, has visible glyphs for many Unicode Private Use Area characters, though some are for things other than my ideas about broadacsting technology, being for such things as simple percussion music, chess and stylish typography using ligatures and so on.
http://www.users.globalnet.co.uk/~ngo/fonts.htm
The glyphs relating to this idea would be used at authoring-time, not at run-time, so the font would not be broadcast with the application. At run-time the particular Unicode Private Use Area codes would be interpreted as commands, glyphs would not be needed for them.
I am unlikely ever to be in a situation where I can produce that application myself. I can program a little in Java, but not very much, and I have all but no knowledge of the special MHP classes. I am not representing any organization.
I have no idea of how much effort the writing, testing and deploying of such an MHP application would need and, following on from that, I have no idea of how much a contractor would charge to implement the generic application and arrange for it to be broadcast. Please bear in mind that I also do not know at the time of writing this post what would be required in terms of getting the application certified for broadcasting.
So, my question is to ask what would be the sort of price level for implementing such a program as an MHP application please?
Once such a figure is obtained then maybe I can try to think of a method to raise it. One idea is that perhaps the development of the MHP application could be used as a case study in a television series about the development of interactive television technology as it would be an open project so there would be no commercial secrets constraints about the program being used.
William Overington
12 November 2007

Thank you for replying.
* XML provides a much better way of adding structure to documents. It is clear what is markup and what is data.The system is not seeking to add structure to documents. It is seeking to add a few control codes here and there into text without needing to restructure the whole document into a format which differs greatly from a plain-text format.
* There are thousands of XML tools out there to help programmers, but there are none for your system - even text editors will have problems displaying the correct codes.Well, WordPad and Word 97 can display the authoring-time glyphs easily if the Quest text font is being used.
* There is a limitation on the number of commands that can be added to your system, with XML there are none.Well, I have not come up against a limitation on adding commands into the system. There may well be a theoretical limitation yet that may be far beyond what I am seeking to use. What limitation are you suggesting exists please?
* The Unicode Private Use Area is there for a reason (to allow character set designers to add unusual glyphs into text. e.g. the characters that represent the film ratings). If you subvert if for other purposes then it will not be available for it's intended purpose.My understanding is that it is entirely proper to use the Unicode Private Use Area in the manner that I am using it. It is not a matter of "subvert it". One can define control codes within the Unicode Private Use Area if one wishes and one may publish those assignments if one wishes. I am not seeking an exclusive assignment at all.
* Software engineers tried this system in the early days of PC computing with the ANSI.sys driver. This was removed and for good reason - it's a pain to use and is limited in scope. It is a tried tested and failed solutionThank you for the mention of the ANSI.sys driver. I looked it up on the web.
* The use of such a system will have limited scope (you are proposing just MHP boxes). This increases the learning curve of potential users, which is going to be hard enough as there is no logical structure to your codes. (This was one of the bigger problems with the ANSI driver).I was only proposing using MHP as I thought that that might be a way to try to get things started in Europe as I am in England. If people wish to use the same codes for JavaTV more generally then they are welcome to do so. I suggested MHP so that I am trying to implement something specific rather than just talk about implementing on various systems.
* Separating out data from control is one of the fundamental principals of good software design (even the weaving machines of the mid 19th century worked by this principal). You are deliberately mixing data with controlYes I am deliberately mixing text with control. I happen to think that it would be a very useful thing to do in the context of adding these control codes into text so as to enable people who are not programmers to produce an interactive television application for, say, a programmed learning sequence which they have devised. People could use a plain-text editor to produce the text file.
* By deliberately mixing data with control you increase the complexity of the code used to interpret the display string, and thus slow down the text output algorithms.Yes, I am increasing the complexity of the Java code which would be needed to interpret the display string in the television set. So, that slows down the text output algorithms. I feel that that slowing down will not be significant bearing in mind that most of the time the software will be waiting for an end user response to what is on the screen.
I'm sure there are other good reasons for not doing this.Well, I am happy to read, think about and to try to respond to any reasons that are put forward.
Simply waiting a few years and suggesting it again is not going to make this a good idea - it is an idea who's time has thankfully long since passed.I am not suggesting that people take it up. That is up to them. Unless other people try it, it will not get tried. I am not representing an organization and I do not own a broadcasting station. I cannot write the Java application myself. I am trying to find out how much it would cost to implement the idea in an application program so that the system can be tried in practice and used by those people who would like to do so.
William Overington
13 November 2007

Similar Messages

  • Doubts over the Performance in Developing a Chat application

    We are developing a chat application which needs to update the chat content in the database for the duration of the chat (ie.,For the duration of a session).At the same time the page should refresh and show the current content on both ends.In addition to both these, the database tables has to be checked to detect the occurence of a Network error on both sides.
    We have developed it as a Browser based chat and we have used PHP with MySQL. The performance is slow.
    Can anyone give a suggestion as to whether we can develop the chat application completely from the scratch and if we do that which technology should we choose to boost the performance.
    If anyone is not clear about my problem just mail me.I'll explain it in more detail.
    Thanks in Advance

    Hi,
    I just wanted to know these following answers.
    2) Network failure -- Means (either browswer got killed or data did not arrived/Page Not refreshed)
    3) which WebSErver are U using?
    From java, it is very easy to develop chatting application for which you can use applet and servlets for the same (if you consider the performance is the utmost importance)
    Updating to the database should not be done for the duration levels rather should be done at the event levels(data change/keyboards/session -inf changes).
    Im not sure about PHPs running at client but I can suggest you to use two frames .One is for typing and other one is for displaying information which basically gets the staus from the server abt other users in the chat either from the session, which would be driven by other component which is static) .
    Any how, I just put my ideas (Im sure , you know all these things)
    with regards
    Lokesh T.c

  • T's possible to use the jsp to develop stand-alone application?????

    Hello everybody, I would like to know your considerations about this topics: It's possible to use jsp to develop stand-alone application that will be not run on the server but on the local machine?There are some negative aspects on make this? Thank you for your reply

    i don't think you could ever protect the jsp code and it wouldn't do you much good to bother anyway, since anyone with a browser can just "View Source" and see all the HTML on the page anyway.
    the only thing you would want to protect is your java source. you don't have to distribute the .java files with your application, just the .class's. you could try and obfuscate the .class files, but a determined person will always be able to reverse it back to a .java program and read it. it would take a bit of work and knowhow though, so figure out how smart the consumer is going to be and if they will be able to figure out how to reverse .class files back to .java

  • Capture Screen from Video Layer with MHP application

    Hi MHP folks!
    Does anybody know how to capture a image / frame from the video layer with a MHP application?
    I am happy about every answer!
    THX a lot
    Bernhard

    There's no standard way to do this in MHP.

  • There is Windows 8.1 enough to develop Windows Phone Application ?

    <p>Hello,</p><p style="margin-bottom:0in;margin-bottom:.0001pt;line-height:normal;">I want to buy a Windows 8.1 (NOT PRO) license for home use (for my own, not for a company). After that, I will get the Visual Studio Express
    for Windows.&nbsp; <a href="http://http://www.visualstudio.com/en-us/products/visual-studio-express-vs.aspx">visual studio</a><br /></p><p style="margin-bottom:0in;margin-bottom:.0001pt;line-height:normal;"><a
    href="http://www.visualstudio.com/en-us/products/visual-studio-express-vs.aspx"><br /></a></p><p style="margin-bottom:0in;margin-bottom:.0001pt;line-height:normal;">What I want to do in fact is to develop windows
    mobile application, for Windows Phone 8.1.</p><p style="margin-bottom:0in;margin-bottom:.0001pt;line-height:normal;">If I read from site above, it says that for the Windows Phone Emulator I have to have Windows 8.1 (x64) Professional
    edition. Otherwise, I have to use a device to deploy or to test Windows Phone apps.</p><p style="margin-bottom:0in;margin-bottom:.0001pt;line-height:normal;">For me is the best, because I already have a smartphone Windows Phone 8.1 (Nokia
    Lumia 630).</p><p style="margin-bottom:0in;margin-bottom:.0001pt;line-height:normal;">&nbsp;</p><p style="margin-bottom:0in;margin-bottom:.0001pt;line-height:normal;">So, my question is : can I buy Windows 8.1
    (NOT PRO) and still have the possibility to develop windows mobile application for Windows Phone 8.1, using my phone as testing and deploying device (again, I don’t need an emulator). With Windows 8.1 (NOT PRO) system operation installed on my PC, will I have
    all the functionality of windows mobile developing, EXCEPT the emulator ?</p><p></p><p>Thx</p><br />

    Hello Ion Vlad,
    You can find the system requirements for windows phone development at
    [1].
    According to this link, development for Windows Phone 8.1 requires a computer with one of the following operating systems,
    -Windows 8.1 32-bit (x86) or 64-bit (x64)
    -Windows 8 32-bit (x86) or 64-bit (x64)
    -Windows 7 32-bit (x86) or 64-bit (x64) - requires Internet Explorer 10 or higher
    If you need the windows phone emulator, then you will need windows 8 64-bit pro or higher.You can find the system requirements for windows phone emulator at
    [2].
    [1]
    https://dev.windowsphone.com/en-US/OEM/docs/Getting_Started/Preparing_for_Windows_Phone_development
    [2]
    https://msdn.microsoft.com/en-us/library/windows/apps/ff626524(v=vs.105).aspx
    Regards,
    Bo Liu
    Developer-Hotline for MSDN Online Germany
    Disclaimer:
    Please take into consideration, that further inquiries cannot or will be answered with delay.
    For further information please contact us per telephone through the MSDN-Entwickler-Hotline:
    http://www.msdn-online.de/Hotline
    For this post by the MSDN-Entwickler-Hotline the following terms and conditions
    apply: Trademarks,
    Privacy
    as well as the separate
    terms of use for the MSDN-Entwickler-Hotline .

  • We have developed a desktop application using Flash software and published the same for MAC environment. When we double click on the index.app file, the application is working perfectly in Mac 10.6.7 at our office. But if the same index.app file is double

    We have developed a desktop application using Flash software and published the same for MAC environment. When we double click on the index.app file, the application is working perfectly in Mac 10.6.7 at our office. But if the same index.app file is double clicked in Mac 10.6.7 at out clients location, its not opening. For your information the client is able to open this same application by double clicking on index.swf file. The main problem is that client is not able to open the application using index.app file at their office whereas we are able to do so at our office. Can anyone give some suggestions to sort this problem?

    The most common reason is different versions of Flash, or different versions of web browsers used.  Some users may elect to not have Flash installed at all because of the processor overhead of Flash.  If you are going to make an application for a client, check what operating system and browser versions they are using first.  Then determine if a stand alone application is required, or if they have the necessary plugins to run specific browser enhanced code.
    P.S. MAC is an acronym for Media Access Control.  Mac is the shorthand for Macintosh, the operating system and computers made by Apple Inc.

  • How can I turn off the WLS 6.1 security in order to develop my own application-based security module?

    Dear Colleagues,
    I am currently developing a J2EE application using WLS 6.1.
    My team and I have to implement a security requirement to suit our company's needs.
    The security requirements are that, users' password need to be aged (30 days maximum) and we need to provided a GUI front-end (JSP) to allow users to change their password when these expire after 30 days.
    Our internal contacts in the company, have already taken the lead to find out about whether we will be able to use the WLS 6.1 platform to do this and the answer we got back, was.
    Now we need to develop our own security module.
    I have 2 questions:
    1. How can we turn off the WLS security in order develop our own application-based security module?
    2. How can we develop a security module that allows us to age users' password and provide them with facilities to change their passwords when these expire?
    At the moment, we are using the default BEA WebLogic login.jsp page and there some configuration in the web.xml for this. I will be grateful if you could advise me on how to turn this default security off so that we can write our own security module.

    hi,
    1.You can write your own realm in 61 which can plugged for your security
    calls.
    2. once you write your ownrealm.. you can access it through weblogic
    api/ur api..
    thanks
    kiran
    "Richard Koudry" <[email protected]> wrote in message
    news:3dd0d081$[email protected]..
    Dear Colleagues,
    I am currently developing a J2EE application using WLS 6.1.
    My team and I have to implement a security requirement to suit ourcompany's needs.
    >
    The security requirements are that, users' password need to be aged (30days maximum) and we need to provided a GUI front-end (JSP) to allow users
    to change their password when these expire after 30 days.
    >
    Our internal contacts in the company, have already taken the lead to findout about whether we will be able to use the WLS 6.1 platform to do this and
    the answer we got back, was.
    >
    Now we need to develop our own security module.
    I have 2 questions:
    1. How can we turn off the WLS security in order develop our ownapplication-based security module?
    >
    2. How can we develop a security module that allows us to age users'password and provide them with facilities to change their passwords when
    these expire?
    >
    At the moment, we are using the default BEA WebLogic login.jsp page andthere some configuration in the web.xml for this. I will be grateful if you
    could advise me on how to turn this default security off so that we can
    write our own security module.

  • Hi, I developed a web application using HTML5-Offline Application Cache mechanism. Inspite of deleting the cache as mentioned in the above steps, Firefox still maintains a copy of the page in it's cache. Also, a serious bug is, even though we delete all

    == Issue
    ==
    I have a problem with my bookmarks, cookies, history or settings
    == Description
    ==
    Hi,
    I developed a web application using HTML5-Offline Application Cache mechanism. Inspite of deleting the cache as mentioned in the above steps, Firefox still maintains a copy of the page in it's cache. Also, a serious bug is, even though we delete all temp files used by Firefox, and open the previously cached page, it displays it correctly, but upon refreshing/reloading it again shows the previous version of the page maintained in the cache.
    == Troubleshooting information
    ==
    HTML5: Application Caching
    .style1 {
    font-family: Consolas;
    font-size: small;
    text-align: left;
    margin-left: 80px;
    function onCacheChecking(e)
    printOutput("CHECKINGContents of the manifest are being checked.", 0);
    function onCacheCached(e) {
    printOutput("CACHEDAll the resources mentioned in the manifest have been downloaded", 0);
    function onCacheNoUpdate(e)
    printOutput("NOUPDATEManifest file has not been changed. No updates took place.", 0);
    function onCacheUpdateReady(e)
    printOutput("UPDATEREADYChanges have been made to manifest file, and were downloaded.", 0);
    function onCacheError(e) {
    printOutput("ERRORAn error occured while trying to process manifest file.", 0);
    function onCacheObselete(e)
    printOutput("OBSOLETEEither the manifest file has been deleted or renamed at the source", 0);
    function onCacheDownloading(e) {
    printOutput("DOWNLOADINGDownloading resources into local cache.", 0);
    function onCacheProgress(e) {
    printOutput("PROGRESSDownload in process.", 0);
    function printOutput(statusMessages, howToTell)
    * Outputs information about an event with its description
    * @param statusMessages The message string to be displayed that describes the event
    * @param howToTell Specifies if the output is to be written onto document(0) or alert(1) or both(2)
    try {
    if (howToTell == 2) {
    document.getElementById("stat").innerHTML += statusMessages;
    window.alert(statusMessages);
    else if (howToTell == 0) {
    document.getElementById("stat").innerHTML += statusMessages;
    else if (howToTell == 1) {
    window.alert(statusMessages);
    catch (IOExceptionOutput) {
    window.alert(IOExceptionOutput);
    function initiateCaching()
    var ONLY_DOC = 0;
    var ONLY_ALERT = 1;
    var BOTH_DOC_ALERT = 2;
    try
    if (window.applicationCache)
    var appcache = window.applicationCache;
    printOutput("BROWSER COMPATIBILITYSUCCESS!! AppCache works on this browser.", 0);
    appcache.addEventListener('checking', onCacheChecking, false);
    appcache.addEventListener('cached', onCacheCached, false);
    appcache.addEventListener('noupdate', onCacheNoUpdate, false);
    appcache.addEventListener('downloading', onCacheDownloading, false);
    appcache.addEventListener('progress', onCacheProgress, false);
    appcache.addEventListener('updateready', onCacheUpdateReady, false);
    appcache.addEventListener('error', onCacheError, false);
    appcache.addEventListener('obsolete', onCacheObselete, false);
    else
    document.getElementById("stat").innerHTML = "Failure! I cant work.";
    catch (UnknownError)
    window.alert('Internet Explorer does not support Application Caching yet.\nPlease run me on Safari or Firefox browsers\n\n');
    stat.innerHTML = "Failure! I cant work.";
    == Firefox version
    ==
    3.6.3
    == Operating system
    ==
    Windows XP
    == User Agent
    ==
    Mozilla/5.0 (Windows; U; Windows NT 5.1; en-GB; rv:1.9.2.3) Gecko/20100401 Firefox/3.6.3 ( .NET CLR 3.5.30729; .NET4.0E)
    == Plugins installed
    ==
    *-Shockwave Flash 10.0 r45
    *Default Plug-in
    *Adobe PDF Plug-In For Firefox and Netscape "9.3.2"
    *NPRuntime Script Plug-in Library for Java(TM) Deploy
    *The QuickTime Plugin allows you to view a wide variety of multimedia content in Web pages. For more information, visit the QuickTime Web site.
    *Google Update
    *4.0.50524.0
    *Office Live Update v1.4
    *NPWLPG
    *Windows Presentation Foundation (WPF) plug-in for Mozilla browsers
    *Next Generation Java Plug-in 1.6.0_20 for Mozilla browsers
    *Npdsplay dll
    *DRM Store Netscape Plugin
    *DRM Netscape Network Object
    Thanks & Regards,
    Kandarpa Chandrasekhar Omkar
    Software Engineer
    Wipro Technologies
    Bangalore.
    [email protected]
    [email protected]

    We have had this issue many, many times before including on the latest 3.6 rev. It appears that when the applicationCache has an update triggered by a new manifest file, the browser may still use only its local network cache to check for updates to the files in the manifest, instead of forcing an HTTP request and revalidating both the browser cache and the applicationCache versions of the cached file (seems there is more than one). I have to assume this is a browser bug, as one should not have to frig with server Cache-Control headers and such to get this to work as expected (and even then it still doesn't sometimes).
    The only thing that seems to fix the problem is setting network.http.use-cache to false (default is true) in about:config . This helps my case because we only ever run offline (applicationCache driven) apps in the affected browser (our managed mobile apps platform), but it will otherwise slow down your browser experience considerably.

  • Deploying application to the web with Developer Server

    Hi everyone,
    Does anyone out there has any notes or step-by-step configuration
    guide on deploying application on the web with Developer Server
    only (not with OAS)? I know that you can use it with Microsoft
    IIS 3.0 or 4.0 (as the web server) but don't know how to set it
    up. Appreciate if someone out there could help. Thanks.
    null

    <BLOCKQUOTE><font size="1" face="Verdana, Arial">quote:</font><HR>Originally posted by Pedro Diaz Robles ([email protected]):
    I need exeperience comments and guidelines experience for deploying Forms in the WEB.<HR></BLOCKQUOTE>
    Be more specific !!

  • Need support to develop a Web Application-T Shirt Designer

    Hello Everyone
    I am new here. So a big hello to all of you.
    Well, I am writing here because I urgently need an expert opinion on the matter mentioned below. And I would be glad if I could receieve some professional advice on this forum.
    I have to create  an online T shirt Designer (a Visual Configurator), i.e.a web based application where the user will be able to select the various elements of a T shirt such as color, text, graphics etc and visualize the same in real time and then place the order for the product. Here the cost will be automatically added at diferent stages i.e. when a text/graphic is selected while the shipping cost is added at the stage of check out . Finally as per the total cost, the final payment is made through the payment gateway.
    Now my question is which adobe product would be best for designing this visual configurator considering the following points.
    1. This visual configuartor has to be first designed and then embedded on an E commerce website as a web application.
    2. Like any other T shirt designer, the images will be swapped/changed. So mainly the development would involve creating a layout/structure wherein a certain process or series can be systematically organized to help a user configure the product.
    3. This configurator application would involve mathematical calculation i.e. adding costs at different  stages. So business rules will have to be applied and a payment gateway has to be integrated with the application.
    Mostly the online T shirt designer softwares I have seen are based on Flash. But I am not sure if this is the best product for my requirement.
    Would greatly appreciate support.
    Thanks
    Mini

    Go to CustomInk.com.  Their T-shirt Design App is not Flash based which is refreshing. Instead, they're using a sophisticated combination of CSS, JavaScript and PHP/MySql.
    Digging a little deeper into the source code, it looks like the company that developed their T-shirt Design App is located in India and called No-Fresh.com
    No-Fresh licenses their T-shirt Design App.  You might want to contact them directly.
    http://www.no-refresh.com/online-t-shirt-design-tool.php
    Nancy O.

  • I would like to known the cost of monitoring on-line system

    I have a monitoring on-line system with the following features:
    aquisition of 8 temperature channels and 6 vibration channels, storing data in databases,transmission on protocol TCP/IP, alarms etc...
    But I do not known the cost of that systems in the market. I would like know which be the cost of a system like this?

    There are specifics to your system features which will make the cost vary. One thing is, is this a system you want to build yourself or have developed for you by an Alliance Member. The costs of course being the time and resources and depending on the complexity of your application and in house resources you may be better served by an Alliance Member.
    On your system cost from the standpoint of the hardware or software a number of factors may come into play. These include, your sampling rate requirements and accuracy requirement, if you have any special environmental needs (chambers, signal conditioning and so on).
    On storing to databases, and using TCP/IP, and setting up alarms with pager or e-mail notifications these should be relatively inexpensive ... al
    l depending on the specifics of your application (security, scalability).
    Your best bet is to call an engineer at NI (http://www.ni.com/contact) that can get a clearer understanding of your needs and present you with different options.
    Best of luck,
    Kamran

  • Cost of Development/Production Web Server?

    What Is the cost for the Sun Java System Web Server 6x/7x
    Development License?
    Production License?
    per CPU??
    Hosted on Solaris 9/10?
    Windows Server/XP ??
    What Is the cost for the Sun Java System Application Server <current version>
    Development License?
    Production License?
    per CPU??
    Hosted on Solaris 9/10?
    Windows Server/XP ??
    Thanks

    Hello Farmboy -
    The software is completely free to use on all platforms. Sun can also help you with indemnification via Right To Use (RTU) contracts and technical support with attaches Service Level Agreements (SLAs) via support contracts.
    Spread the word, and enjoy!

  • What is BI ? How we implement & what is the cost to implement ?

    What is BI ? How we implement & what is the cost to implement ?
    Thanks,
    Sumit.

    Hi Sumit,
                        Below is the description according to ur query
    Business Intelligence is a process for increasing the competitive advantage of a business by intelligent use of available data in decision making. This process is pictured below.
    The five key stages of Business Intelligence:
    1.     Data Sourcing
    2.     Data Analysis
    3.     Situation Awareness
    4.     Risk Assessment
    5.     Decision Support
    Data sourcing
    Business Intelligence is about extracting information from multiple sources of data. The data might be: text documents - e.g. memos or reports or email messages; photographs and images; sounds; formatted tables; web pages and URL lists. The key to data sourcing is to obtain the information in electronic form. So typical sources of data might include: scanners; digital cameras; database queries; web searches; computer file access; etcetera.
    Data analysis
    Business Intelligence is about synthesizing useful knowledge from collections of data. It is about estimating current trends, integrating and summarising disparate information, validating models of understanding, and predicting missing information or future trends. This process of data analysis is also called data mining or knowledge discovery. Typical analysis tools might use:-
    u2022     probability theory - e.g. classification, clustering and Bayesian networks; 
    u2022     statistical methods - e.g. regression; 
    u2022     operations research - e.g. queuing and scheduling; 
    u2022     artificial intelligence - e.g. neural networks and fuzzy logic.
    Situation awareness
    Business Intelligence is about filtering out irrelevant information, and setting the remaining information in the context of the business and its environment. The user needs the key items of information relevant to his or her needs, and summaries that are syntheses of all the relevant data (market forces, government policy etc.).  Situation awareness is the grasp of  the context in which to understand and make decisions.  Algorithms for situation assessment provide such syntheses automatically.
    Risk assessment
    Business Intelligence is about discovering what plausible actions might be taken, or decisions made, at different times. It is about helping you weigh up the current and future risk, cost or benefit of taking one action over another, or making one decision versus another. It is about inferring and summarising your best options or choices.
    Decision support
    Business Intelligence is about using information wisely.  It aims to provide warning you of important events, such as takeovers, market changes, and poor staff performance, so that you can take preventative steps. It seeks to help you analyse and make better business decisions, to improve sales or customer satisfaction or staff morale. It presents the information you need, when you need it.
    This section describes how we are using extraction, transformation and loading (ETL) processes and a data warehouse architecture to build our enterprise-wide data warehouse in incremental project steps. Before an enterprise-wide data warehouse could be delivered, an integrated architecture and a companion implementation methodology needed to be adopted. A productive and flexible tool set was also required to support ETL processes and the data warehouse architecture in a production service environment. The resulting data warehouse architecture has the following four principal components:
    u2022 Data Sources
    u2022 Data Warehouses
    u2022 Data Marts
    u2022 Publication Services
    ETL processing occurs between data sources and the data warehouse, between the data warehouse and data marts and may also be used within the data warehouse and data marts.
    Data Sources
    The university has a multitude of data sources residing in different Data Base Management System (DBMS) tables and non-DBMS data sets. To ensure that all relevant data source candidates were identified, a physical inventory and logical inventory was conducted. The compilation of these inventories ensures that we have an enterprise-wide view of the university data resource.
    The physical inventory was comprised of a review of DBMS cataloged tables as well as data sets used by business processes. These data sets had been identified through developing the enterprise-wide information needs model.
    3
    SUGI 30 Focus Session
    The logical inventory was constructed from u201Cbrain-stormingu201D sessions which focused on common key business terms which must be referenced when articulating the institutionu2019s vision and mission (strategic direction, goals, strategies, objectives and activities). Once the primary terms were identified, they were organized into directories such as u201CProjectu201D, u201CLocationu201D, u201CAcademic Entityu201D, u201CUniversity Personu201D, u201CBudget Envelopeu201D etc. Relationships were identified by recognizing u201Cnatural linkagesu201D within and among directories, and the u201Cdrill-downsu201D and u201Croll-upsu201D that were required to support u201Creport byu201D and u201Creport onu201D information hierarchies. This exercise allowed the directories to be sub-divided into hierarchies of business terms which were useful for presentation and validation purposes.
    We called this important deliverable the u201CConceptual Data Modelu201D (CDM) and it was used as the consolidated conceptual (paper) view of all of the Universityu2019s diverse data sources. The CDM was then subjected to a university-wide consultative process to solicit feedback and communicate to the university community that this model would be adopted by the Business Intelligence (BI) project as a governance model in managing the incremental development of its enterprise-wide data warehousing project.
    Data Warehouse
    This component of our data warehouse architecture (DWA) is used to supply quality data to the many different data marts in a flexible, consistent and cohesive manner. It is a u2018landing zoneu2019 for inbound data sources and an organizational and re-structuring area for implementing data, information and statistical modeling. This is where business rules which measure and enforce data quality standards for data collection in the source systems are tested and evaluated against appropriate data quality business rules/standards which are required to perform the data, information and statistical modeling described previously.
    Inbound data that does not meet data warehouse data quality business rules is not loaded into the data warehouse (for example, if a hierarchy is incomplete). While it is desirable for rejected and corrected records to occur in the operational system, if this is not possible then start dates for when the data can begin to be collected into the data warehouse may need to be adjusted in order to accommodate necessary source systems data entry u201Cre-worku201D. Existing systems and procedures may need modification in order to permanently accommodate required data warehouse data quality measures. Severe situations may occur in which new data entry collection transactions or entire systems will need to be either built or acquired.
    We have found that a powerful and flexible extraction, transformation and loading (ETL) process is to use Structured Query Language (SQL) views on host database management systems (DBMS) in conjunction with a good ETL tool such as SAS® ETL Studio. This tool enables you to perform the following tasks:
    u2022 The extraction of data from operational data stores
    u2022 The transformation of this data
    u2022 The loading of the extracted data into your data warehouse or data mart
    When the data source is a u201Cnon-DBMSu201D data set it may be advantageous to pre-convert this into a SAS® data set to standardize data warehouse metadata definitions. Then it may be captured by SAS® ETL Studio and included in the data warehouse along with any DBMS source tables using consistent metadata terms. SAS® data sets, non-SAS® data sets, and any DBMS table will provide the SAS® ETL tool with all of the necessary metadata required to facilitate productive extraction, transformation and loading (ETL) work.
    Having the ability to utilize standard structured query language (SQL) views on host DBMS systems and within SAS® is a great advantage for ETL processing. The views can serve as data quality filters without having to write any procedural code. The option exists to u201Cmaterializeu201D these views on the host systems or leave them u201Cun-materializedu201D on the hosts and u201Cmaterializeu201D them on the target data structure defined in the SAS® ETL process. These choices may be applied differentially depending upon whether you are working with u201Ccurrent onlyu201D or u201Ctime seriesu201D data. Different deployment configurations may be chosen based upon performance issues or cost considerations. The flexibility of choosing different deployment options based upon these factors is a considerable advantage.
    4
    SUGI 30 Focus Session
    Data Marts
    This component of the data warehouse architecture may manifest as the following:
    u2022 Customer u201Cvisibleu201D relational tables
    u2022 OLAP cubes
    u2022 Pre-determined parameterized and non-parameterized reports
    u2022 Ad-hoc reports
    u2022 Spreadsheet applications with pre-populated work sheets and pivot tables
    u2022 Data visualization graphics
    u2022 Dashboard/scorecards for performance indicator applications
    Typically a business intelligence (BI) project may be scoped to deliver an agreed upon set of data marts in a project. Once these have been well specified, the conceptual data model (CDM) is used to determine what parts need to be built or used as a reference to conform the inbound data from any new project. After the detailed data mart specifications (DDMS) have been verified and the conceptual data model (CDM) components determined, a source and target logical data model (LDM) can be designed to integrate the detailed data mart specification (DDMS) and conceptual data model (CMD). An extraction, transformation and loading (ETL) process can then be set up and scheduled to populate the logical data models (LDM) from the required data sources and assist with any time series and data audit change control requirements.
    Over time as more and more data marts and logical data models (LDMu2019s) are built the conceptual data model (CDM) becomes more complete. One very important advantage to this implementation methodology is that the order of the data marts and logical data models can be entirely driven by project priority, project budget allocation and time-to-completion constraints/requirements. This data warehouse architecture implementation methodology does not need to dictate project priorities or project scope as long as the conceptual data model (CDM) exercise has been successfully completed before the first project request is initiated.
    McMasteru2019s Data Warehouse design
    DevelopmentTestProductionWarehouseWarehouseWarehouseOtherDB2 OperationalOracle OperationalETLETLETLETLETLETLETLETLETLDataMartsETLETLETLDataMartsDataMartsDB2/Oracle BIToolBIToolBIToolNoNoUserUserAccessAccessUserUserAccessAccess(SAS (SAS Data sets)Data sets)Staging Area 5
    SUGI 30 Focus Session
    Publication Services
    This is the visible presentation environment that business intelligence (BI) customers will use to interact with the published data mart deliverables. The SAS® Information Delivery Portal will be utilized as a web delivery channel to deliver a u201Cone-stop information shoppingu201D solution. This software solution provides an interface to access enterprise data, applications and information. It is built on top of the SAS Business Intelligence Architecture, provides a single point of entry and provides a Portal API for application development. All of our canned reports generated through SAS® Enterprise Guide, along with a web-based query and reporting tool (SAS® Web Report Studio) will be accessed through this publication channel.
    Using the portalu2019s personalization features we have customized it for a McMaster u201Clook and feelu201D. Information is organized using pages and portlets and our stakeholders will have access to public pages along with private portlets based on role authorization rules. Stakeholders will also be able to access SAS® data sets from within Microsoft Word and Microsoft Excel using the SAS® Add-In for Microsoft Office. This tool will enable our stakeholders to execute stored processes (a SAS® program which is hosted on a server) and embed the results in their documents and spreadsheets. Within Excel, the SAS® Add-In can:
    u2022 Access and view SAS® data sources
    u2022 Access and view any other data source that is available from a SAS® server
    u2022 Analyze SAS® or Excel data using analytic tasks
    The SAS® Add-In for Microsoft Office will not be accessed through the SAS® Information Delivery Portal as this is a client component which will be installed on individual personal computers by members of our Client Services group. Future stages of the project will include interactive reports (drill-down through OLAP cubes) as well as balanced scorecards to measure performance indicators (through SAS® Strategic Performance Management software). This, along with event notification messages, will all be delivered through the SAS® Information Delivery Portal.
    Publication is also channeled according to audience with appropriate security and privacy rules.
    SECURITY u2013 AUTHENTICATION AND AUTHORIZATION
    The business value derived from using the SAS® Value Chain Analytics includes an authoritative and secure environment for data management and reporting. A data warehouse may be categorized as a u201Ccollection of integrated databases designed to support managerial decision making and problem solving functionsu201D and u201Ccontains both highly detailed and summarized historical data relating to various categories, subjects, or areasu201D. Implementation of the research funding data mart at McMaster has meant that our stakeholders now have electronic access to data which previously was not widely disseminated. Stakeholders are now able to gain timely access to this data in the form that best matches their current information needs. Security requirements are being addressed taking into consideration the following:
    u2022 Data identification
    u2022 Data classification
    u2022 Value of the data
    u2022 Identifying any data security vulnerabilities
    u2022 Identifying data protection measures and associated costs
    u2022 Selection of cost-effective security measures
    u2022 Evaluation of effectiveness of security measures
    At McMaster access to data involves both authentication and authorization. Authentication may be defined as the process of verifying the identity of a person or process within the guidelines of a specific
    6
    SUGI 30 Focus Session
    security policy (who you are). Authorization is the process of determining which permissions the user has for which resources (permissions). Authentication is also a prerequisite for authorization. At McMaster business intelligence (BI) services that are not public require a sign on with a single university-wide login identifier which is currently authenticated using the Microsoft Active Directory. After a successful authentication the SAS® university login identifier can be used by the SAS® Meta data server. No passwords are ever stored in SAS®. Future plans at the university call for this authentication to be done using Kerberos.
    At McMaster aggregate information will be open to all. Granular security is being implemented as required through a combination of SAS® Information Maps and stored processes. SAS® Information Maps consist of metadata that describe a data warehouse in business terms. Through using SAS® Information Map Studio which is an application used to create, edit and manage SAS® Information Maps, we will determine what data our stakeholders will be accessing through either SAS® Web Report Studio (ability to create reports) or SAS® Information Delivery Portal (ability to view only). Previously access to data residing in DB-2 tables was granted by creating views using structured query language (SQL). Information maps are much more powerful as they capture metadata about allowable usage and query generation rules. They also describe what can be done, are database independent and can cross databases and they hide the physical structure of the data from the business user. Since query code is generated in the background, the business user does not need to know structured query language (SQL). As well as using Information Maps, we will also be using SAS® stored processes to implement role based granular security.
    At the university some business intelligence (BI) services are targeted for particular roles such as researchers. The primary investigator role of a research project needs access to current and past research funding data at both the summary and detail levels for their research project. A SAS® stored process (a SAS® program which is hosted on a server) is used to determine the employee number of the login by checking a common university directory and then filtering the research data mart to selectively provide only the data that is relevant for the researcher who has signed onto the decision support portal.
    Other business intelligence (BI) services are targeted for particular roles such as Vice-Presidents, Deans, Chairs, Directors, Managers and their Staff. SAS® stored processes are used as described above with the exception that they filter data on the basis of positions and organizational affiliations. When individuals change jobs or new appointments occur the authorized business intelligence (BI) data will always be correctly presented.
    As the SAS® stored process can be executed from many environments (for example, SAS® Web Report Studio, SAS® Add-In for Microsoft Office, SAS® Enterprise Guide) authorization rules are consistently applied across all environments on a timely basis. There is also potential in the future to automatically customize web portals and event notifications based upon the particular role of the person who has signed onto the SAS® Information Delivery Portal.
    ARCHITECTURE (PRODUCTION ENVIRONMENT)
    We are currently in the planning stages for building a scalable, sustainable infrastructure which will support a scaled deployment of the SAS® Value Chain Analytics. We are considering implementing the following three-tier platform which will allow us to scale horizontally in the future:
    Our development environment consists of a server with 2 x Intel Xeon 2.8GHz Processors, 2GB of RAM and is running Windows 2000 u2013 Service Pack 4.
    We are considering the following for the scaled roll-out of our production environment.
    A. Hardware
    1. Server 1 - SAS® Data Server
    - 4 way 64 bit 1.5Ghz Itanium2 server
    7
    SUGI 30 Focus Session
    - 16 Gb RAM
    - 2 73 Gb Drives (RAID 1) for the OS
    - 1 10/100/1Gb Cu Ethernet card
    - 1 Windows 2003 Enterprise Edition for Itanium
    2 Mid-Tier (Web) Server
    - 2 way 32 bit 3Ghz Xeon Server
    - 4 Gb RAM
    - 1 10/100/1Gb Cu Ethernet card
    - 1 Windows 2003 Enterprise Edition for x86
    3. SAN Drive Array (modular and can grow with the warehouse)
    - 6 u2013 72GB Drives (RAID 5) total 360GB for SAS® and Data
    B. Software
    1. Server 1 - SAS® Data Server
    - SAS® 9.1.3
    - SAS® Metadata Server
    - SAS® WorkSpace Server
    - SAS® Stored Process Server
    - Platform JobScheduler
    2. Mid -Tier Server
    - SAS® Web Report Studio
    - SAS® Information Delivery Portal
    - BEA Web Logic for future SAS® SPM Platform
    - Xythos Web File System (WFS)
    3. Client u2013Tier Server
    - SAS® Enterprise Guide
    - SAS® Add-In for Microsoft Office
    REPORTING
    We have created a number of parameterized stored processes using SAS® Enterprise Guide, which our stakeholders will access as both static (HTML as well as PDF documents) and interactive reports (drill-down) through SAS® Web Report Studio and the SAS® Add-In for Microsoft Office. All canned reports along with SAS® Web Report Studio will be accessed through the SAS® Information Delivery Portal.
    NEXT STEPS
    Next steps of the project include development of a financial data mart along with appropriate data quality standards, monthly frozen snapshots and implementation of university-wide financial reporting standards. This will facilitate electronic access to integrated financial information necessary for the development and maintenance of an integrated, multi-year financial planning framework. Canned reports to include monthly web-based financial statements, with drill-down capability along with budget templates automatically populated with data values and saved in different workbooks for different subgroups (for example by Department). The later will be accomplished using Microsoft Direct Data Exchange (DDE).
    8
    SUGI 30 Focus Session
    As well, we will begin the implementation of SAS® Strategic Performance Management Software to support the performance measurement and monitoring initiative that is a fundamental component of McMasteru2019s strategic plan. This tool will assist in critically assessing and identifying meaningful and statistically relevant measures and indicators. This software can perform causal analyses among various measures within and across areas providing useful information on inter-relationships between factors and measures. As well as demonstrating how decisions in one area affect other areas, these cause-and-effect analyses can reveal both good performance drivers and also possible detractors and enable u2018evidenced-basedu2019 decision-making. Finally, the tool provides a balanced scorecard reporting format, designed to identify statistically significant trends and results that can be tailored to the specific goals, objectives and measures of the various operational areas of the University.
    LESSONS LEARNED
    Lessons learned include the importance of taking a consultative approach not only in assessing information needs, but also in building data hierarchies, understanding subject matter, and in prioritizing tasks to best support decision making and inform senior management. We found that a combination of training and mentoring (knowledge transfer) helped us accelerate learning the new tools. It was very important to ensure that time and resources were committed to complete the necessary planning and data quality initiatives prior to initiating the first project. When developing a project plan, it is important to

  • Error while building sample application "Developing an Order Application"

    hi ,
    I tried to create a simple Mobile application using the instructions for "Tutorial: Developing an Order Application for Handhelds" given at :-
    http://help.sap.com/saphelp_nwmobile71/helpdata/en/46/7294498d870ad3e10000000a11466f/frameset.htm
    For the same , by using TCdoe SDOE_WB i created a new SWCV named ORDER_TAKER,
    with a Data Object - > ORDER
    added Data Object header node -> ORDERHEADER
    The ORDERHEADER contains the following fields:
    ORDERID          CHAR8
    CUSTID             CHAR4
    LONGTEXT       CHAR32
    SERVICEUNIT   CHAR32
    CREATED_ON  DATS
    CREATED_AT  TIMS
    As per the tutorial I created  Mobile Service Component as "order_sv". under which created Data Objects , and a service name orderService . Now when I copied the code of Defining the Custom Methods , I am getting following error while building the MSC........
    Line: -----
    * [javac] Compiling 8 source files to C:\workspace.jdi\LocalDevelopment\t\13A34929B4F509E8F4914E0DFB74D38E\classes
         [javac] ERROR: C:\workspace.jdi\LocalDevelopment\t\13A34929B4F509E8F4914E0DFB74D38E\gen_oca\com\sap\demo\order_sv\service\impl\OrderService.java:43: cannot find symbol
         [javac] ERROR: symbol  : class Order_svModel
         [javac] ERROR: location: class com.sap.demo.order_sv.service.impl.OrderService
         [javac] ERROR:           if( !(((Order_svModel)OcaRoot.getInstance().getModel(Order_svModel.class)).getOrderOrderheaders().size() > 0))
         [javac] ERROR:                   ^
         [javac] ERROR: C:\workspace.jdi\LocalDevelopment\t\13A34929B4F509E8F4914E0DFB74D38E\gen_oca\com\sap\demo\order_sv\service\impl\OrderService.java:43: cannot find symbol
         [javac] ERROR: symbol  : class Order_svModel
         [javac] ERROR: location: class com.sap.demo.order_sv.service.impl.OrderService
         [javac] ERROR:           if( !(((Order_svModel)OcaRoot.getInstance().getModel(Order_svModel.class)).getOrderOrderheaders().size() > 0))
         [javac] ERROR:                                                                ^
         [javac] ERROR: C:\workspace.jdi\LocalDevelopment\t\13A34929B4F509E8F4914E0DFB74D38E\gen_oca\com\sap\demo\order_sv\service\impl\OrderService.java:43: cannot find symbol
         [javac] ERROR: symbol  : variable OcaRoot
         [javac] ERROR: location: class com.sap.demo.order_sv.service.impl.OrderService
         [javac] ERROR:           if( !(((Order_svModel)OcaRoot.getInstance().getModel(Order_svModel.class)).getOrderOrderheaders().size() > 0))
         [javac] ERROR:                                 ^
         [javac] ERROR: C:\workspace.jdi\LocalDevelopment\t\13A34929B4F509E8F4914E0DFB74D38E\gen_oca\com\sap\demo\order_sv\service\impl\OrderService.java:45: cannot find symbol
         [javac] ERROR: symbol  : class OrderOrderheader
         [javac] ERROR: location: class com.sap.demo.order_sv.service.impl.OrderService
         [javac] ERROR:               OrderOrderheader order = ((Order_svModel)OcaRoot.getInstance().getModel(Order_svModel.class)).createOrderOrderheader();
         [javac] ERROR:               ^
         [javac] ERROR: C:\workspace.jdi\LocalDevelopment\t\13A34929B4F509E8F4914E0DFB74D38E\gen_oca\com\sap\demo\order_sv\service\impl\OrderService.java:45: cannot find symbol
         [javac] ERROR: symbol  : class Order_svModel
         [javac] ERROR: location: class com.sap.demo.order_sv.service.impl.OrderService
         [javac] ERROR:               OrderOrderheader order = ((Order_svModel)OcaRoot.getInstance().getModel(Order_svModel.class)).createOrderOrderheader();
         [javac] ERROR:                                          ^
         [javac] ERROR: C:\workspace.jdi\LocalDevelopment\t\13A34929B4F509E8F4914E0DFB74D38E\gen_oca\com\sap\demo\order_sv\service\impl\OrderService.java:45: cannot find symbol
         [javac] ERROR: symbol  : class Order_svModel
         [javac] ERROR: location: class com.sap.demo.order_sv.service.impl.OrderService
         [javac] ERROR:               OrderOrderheader order = ((Order_svModel)OcaRoot.getInstance().getModel(Order_svModel.class)).createOrderOrderheader();
         [javac] ERROR:                                                                                ^
         [javac] ERROR: C:\workspace.jdi\LocalDevelopment\t\13A34929B4F509E8F4914E0DFB74D38E\gen_oca\com\sap\demo\order_sv\service\impl\OrderService.java:45: cannot find symbol
         [javac] ERROR: symbol  : variable OcaRoot
         [javac] ERROR: location: class com.sap.demo.order_sv.service.impl.OrderService
         [javac] ERROR:               OrderOrderheader order = ((Order_svModel)OcaRoot.getInstance().getModel(Order_svModel.class)).createOrderOrderheader();
         [javac] ERROR:                                                        ^
         [javac] ERROR: C:\workspace.jdi\LocalDevelopment\t\13A34929B4F509E8F4914E0DFB74D38E\gen_oca\com\sap\demo\order_sv\service\impl\OrderService.java:49: cannot find symbol
         [javac] ERROR: symbol  : method valueOf(java.lang.String)
         [javac] ERROR: location: class java.util.Date
         [javac] ERROR:               order.setCreatedOn(Date.valueOf("2007-06-30"));
         [javac] ERROR:                                      ^
         [javac] ERROR: C:\workspace.jdi\LocalDevelopment\t\13A34929B4F509E8F4914E0DFB74D38E\gen_oca\com\sap\demo\order_sv\service\impl\OrderService.java:50: cannot find symbol
         [javac] ERROR: symbol  : variable Time
         [javac] ERROR: location: class com.sap.demo.order_sv.service.impl.OrderService
         [javac] ERROR:               order.setCreatedAt(Time.valueOf("08:45:00"));
         [javac] ERROR:                                  ^
         [javac] ERROR: C:\workspace.jdi\LocalDevelopment\t\13A34929B4F509E8F4914E0DFB74D38E\gen_oca\com\sap\demo\order_sv\service\impl\OrderService.java:73: cannot find symbol
         [javac] ERROR: symbol  : class Order_svModel
         [javac] ERROR: location: class com.sap.demo.order_sv.service.impl.OrderService
         [javac] ERROR:               order = ((Order_svModel)OcaRoot.getInstance().getModel(Order_svModel.class)).createOrderOrderheader();
         [javac] ERROR:                         ^
         [javac] ERROR: C:\workspace.jdi\LocalDevelopment\t\13A34929B4F509E8F4914E0DFB74D38E\gen_oca\com\sap\demo\order_sv\service\impl\OrderService.java:73: cannot find symbol
         [javac] ERROR: symbol  : class Order_svModel
         [javac] ERROR: location: class com.sap.demo.order_sv.service.impl.OrderService
         [javac] ERROR:               order = ((Order_svModel)OcaRoot.getInstance().getModel(Order_svModel.class)).createOrderOrderheader();
         [javac] ERROR:                                                                      ^
         [javac] ERROR: C:\workspace.jdi\LocalDevelopment\t\13A34929B4F509E8F4914E0DFB74D38E\gen_oca\com\sap\demo\order_sv\service\impl\OrderService.java:73: cannot find symbol
         [javac] ERROR: symbol  : variable OcaRoot
         [javac] ERROR: location: class com.sap.demo.order_sv.service.impl.OrderService
         [javac] ERROR:               order = ((Order_svModel)OcaRoot.getInstance().getModel(Order_svModel.class)).createOrderOrderheader();
         [javac] ERROR:                                       ^
         [javac] ERROR: C:\workspace.jdi\LocalDevelopment\t\13A34929B4F509E8F4914E0DFB74D38E\gen_oca\com\sap\demo\order_sv\service\impl\OrderService.java:77: cannot find symbol
         [javac] ERROR: symbol  : method valueOf(java.lang.String)
         [javac] ERROR: location: class java.util.Date
         [javac] ERROR:               order.setCreatedOn(Date.valueOf("2007-07-05"));
         [javac] ERROR:                                      ^
         [javac] ERROR: C:\workspace.jdi\LocalDevelopment\t\13A34929B4F509E8F4914E0DFB74D38E\gen_oca\com\sap\demo\order_sv\service\impl\OrderService.java:78: cannot find symbol
         [javac] ERROR: symbol  : variable Time
         [javac] ERROR: location: class com.sap.demo.order_sv.service.impl.OrderService
         [javac] ERROR:               order.setCreatedAt(Time.valueOf("10:00:00"));
         [javac] ERROR:                                  ^
         [javac] ERROR: C:\workspace.jdi\LocalDevelopment\t\13A34929B4F509E8F4914E0DFB74D38E\gen_oca\com\sap\demo\order_sv\service\impl\OrderService.java:80: cannot find symbol
         [javac] ERROR: symbol  : variable OcaRoot
         [javac] ERROR: location: class com.sap.demo.order_sv.service.impl.OrderService
         [javac] ERROR:               OcaRoot.getInstance().commit();
         [javac] ERROR:               ^
         [javac] 30 errors *
    Line: -----
    Please help...........
    Ekam
    Edited by: Ekam Preet Singh on Sep 29, 2011 10:32 AM

    Hi,
    Please have a look at this thread,
    Re: Error in CompatibilityMode
    Regards,
    Saravanan K

  • All of a sudden my desktop apps and files went missing.what is the cost of the problem

    all of a sudden, my desktop applications, (i mean the whole applications and files,document in my desktop), went missing .what could be the cost of the problem?

    all of a sudden, my desktop applications, (i mean the whole applications and files,document in my desktop), went missing .what could be the cost of the problem?

Maybe you are looking for

  • File adapter to pick a single file

    The scenario is PI File adapter would pick files from a 3rd party FTP location. The 3rd party is placing files with file names using date time stamp. The requirement is to process one file at a a time - I have mentioned the Processing Sequence as 'By

  • Cover flow mismatch

    I'm having a bit of trouble sorting out my coverflow and I hope someone can help. I was able to get most of my covers from itunes, the ones I didn't, I got from allmusic,etc and applied them by highlighting the album in itunes and dragging the artwor

  • After installing the update to Adobe Reader 11.0.09 can't print PDF's anymore

    After installing Adobe Reader 11.0.09 I can't print PDF's anymore. After click on 'Print' I get the message 'can't print the document', after click 'OK' I get the message 'there are not pages selected'. What's the solving for this problem? Thanks for

  • I am new to Macs or Mac books can anyone help with

    i have bought a Mac book, its not new but its been fully refurbished But as I am completely new to the operating system, can anyone help with book marks, downloading pictures from a camera, using MS word I am hoping to use this mac book on my travels

  • While building Aggregates on IC_C03, any precautions? Urgentttt

    Hi All, I got a requirement that i need to build aggregates on an Inventory cube. While building Aggregates on IC_C03, do we need to take any precautions. System will also propose, thats ok. And when it comes to compression, Roll up... Compression in