Webdispatcher Sizing - Interesting question

Hi ,
I have few queries on sizing the webdispatcher . I was actually refering to the sizing guide for web dispatcher in service.sap.com/sizing . It says that average size of a message is 16 KB .How do we measure the message size or in other words for portal connected with a webdispatcher having a 1000 users , how much messsage with be flowing back and forth ?
Any clue abt this
Aneez

Hi,
I would say - nearly each click of a user in the portal will end up in a request to the portal server which means a request to the SAP WebDispatcher.
Depending on the content of you portal users will click lets say every 30 seconds... Having 100 of the 1000 users on the portal at the same time leads to 200 clicks per minute. Meaning 3200 KB of message size per minute... Multiplied by 2 = 6400KB because the portal server is sending its answer back through the WebDispatcher, right?
But this is really heavily depending on the number of concurrent users and the type of content...
Hth,
Michael

Similar Messages

  • Trust Key Store - Interesting question ....

    Hi,
    Currently, using one way SSL, we get a 200 millisecond overhead from the client perspective. I have a gut feel that the trust key store check adds a lot of overhead (since it does an I/O check)
    if my gut is right ...
    IS there anyway to cache the trust keys store (I am using a stand alone java client running it on Junit)
    Thanks

    what this means to an end user ?I have no idea, but what it means to me is that JBoss don't understand the difference between them any more than you did when you asked the question.
    A keystore is a high-security item that needs to be kept under lock and key as it contains credentials sufficient to identify that peer legally, and I mean in a courtroom in a dispute over millions of dollars. A truststore on the other hand is a collection of public certificates whose security requirement is to prevent people adding untrustworthy certificates to it. A completely different matter. In any large organization, the personnel with the authority over the keystore would never be the same as the personnel with authority over the truststore. Putting both in the same file compromises the security of both. It makes no sense whatsoever.

  • Java reflection (interesting question)

    hi folks,
    class A {
    void foo() {
    Class B overrides method foo() in A
    class B extends A {
    void foo() {
    Now i create a object of class B and assign to A
    A aref = new B();
    aref.foo() will call method foo()of class B. //polymorphism
    Using reflection, is it possible to call method foo() of class A using the handle aref.
    thanks
    venkat

    hi bondvenky,
    What abt the answer for my original question. How to
    access the base class methods using the handle for
    child class object using reflection ?as far as i know, this isn't possible - your next question is probably going to be "why". It certainly seems slightly surprising that you can't do this, but you can access private methods. Unless you consider the latter a weaker way of breaking encapsulation (!?).
    what was the sun's purpose behind allowing access to
    the private methods of an object using Java
    Reflection? good question.. its very useful but on the other hand i can't think of a time i've used it that couldn't be classed as a hack.
    Is it not a security threat to java security model?it doesn't break anything - ie its not a security loophole. It links in with your question above though - would it have been possible/useful to not allow it period?
    sorry for the vague answers :(
    asjf

  • OK - I got a really interesting question down in ABAP General and NW AppSer

    This one is so interesting that I thought I'd draw a little extra attention to it here.
    See:
    Hang on to your hats! (shared buffer in multi-WAS/multi-update process env)
    or:
    Hang on to your hats! (shared buffer in multi-WAS/multi-update process env)
    Any and all <i><b>informed</b></i> opinion welcome.

    This is really cool: the <b>export to database</b> statement with a given key value for ID <i><b>replaces</b></i> what's already in the table for the same key value.
    To see that this is true, copy the system table INDX to a custom table called ZINDX_QM (so you won't have to change the code below.)  Activate this custom table.
    Then run the following code twice as follows:
    1) the first time, leave the value of wa_stuff as it is declared, i.e.:
    "This is some stuff"
    2) the second time, change the value of wa_stuff to:
    "This is some stuff - pass 2."
    You'll see that the second value has replaced the first value in the custom table.
    So the export to database statement actually does <b>a "replace", not an "append"</b>,  if the key value is already in the table.
    REPORT  ZFOO.
    type-pools: thfb.
    TABLES:
      zindx_qm.
    DATA:
      context_id             TYPE thfb_context_id,
      cntxt_user_dt(60)      TYPE c,
      cntxtud_s              TYPE string,
      rtrnd_hash             TYPE i,
      rtrnd_hash_n(22)       TYPE n,
      rtrnd_hash_c(22)       TYPE c,
      wa_zindx_qm            TYPE zindx_qm,
      v_chk_cnt              TYPE i,
      wa_stuff(40)           TYPE c VALUE 'This is some stuff - pass 1'.
    CALL FUNCTION 'TH_GET_CONTEXT_ID'
      IMPORTING
        CONTEXT_ID       = context_id.
    CONCATENATE context_id
                sy-datum
                sy-uname
           INTO cntxt_user_dt.
    cntxtud_s = cntxt_user_dt.
    CALL FUNCTION 'LCRDB_STRING_HASH'
      EXPORTING
        TEXT =  cntxtud_s
      IMPORTING
        HASH =  rtrnd_hash.
    rtrnd_hash_n = rtrnd_hash.
    rtrnd_hash_c = rtrnd_hash_n.
    wa_zindx_qm-aedat = sy-datum.
    wa_zindx_qm-usera = sy-uname.
    wa_zindx_qm-pgmid = sy-repid.
    EXPORT wa_stuff
      TO DATABASE zindx_qm(mo)
      ID rtrnd_hash_c
      FROM wa_zindx_qm.
    CLEAR wa_stuff.
    IMPORT wa_stuff TO wa_stuff
      FROM DATABASE zindx_qm(mo)
      ID rtrnd_hash_c.
    WRITE: / wa_stuff.
    Also, the second cool thing is that the "relid" (area) field of the custom table actually makes coding multiple storage statements much easier.  To see why this is so, just compare what's been commented out in the following BAdI method with what's replaced it:
    method IF_EX_INSPECTIONLOT_UPDATE~CREATE_IN_UPDATE.
    * 11/10: new export statements from XSQM exit
    *EXPORT gt_outtab        TO DATABASE zindx_qm(tb) ID rtrnd_hash_c.
    *EXPORT s7_tab_mseg      TO DATABASE zindx_qm(ms) ID rtrnd_hash_c.
    *EXPORT v_cntr_recursion TO DATABASE zindx_qm(rc) ID rtrnd_hash_c.
    * 11/10 - original decs/imports before switch to database exports from shared buffer exports
    *v_memkey(60)      TYPE c,
    *v_memkey2(64)     TYPE c,
    *v_memkey3(65)     TYPE c,
    *v_memkey4(65)     TYPE c,
    *v_memkey5(65)     TYPE c,
    *v_memkey6(65)     TYPE c,
    *IMPORT gt_outtab        TO gt_outtab        FROM SHARED BUFFER indx(st) ID v_memkey.  now tb
    *IMPORT s7_tab_mseg      TO s7_tab_mseg      FROM SHARED BUFFER indx(st) ID v_memkey2. now ms
    *IMPORT v_cntr_recursion TO v_cntr_recursion FROM SHARED BUFFER indx(st) ID v_memkey3. now rc
    *IMPORT v_do_exit        TO v_do_exit        FROM SHARED BUFFER indx(st) ID v_memkey4. now de
    *IMPORT wa_zzqa02        TO wa_zzqa02        FROM SHARED BUFFER indx(st) ID v_memkey5. now wz
    *IMPORT i_zzqa02         TO i_zzqa02         FROM SHARED BUFFER indx(st) ID v_memkey6. now iz
    * for context id typing
    TYPE-POOLS:
      thfb.
    DATA:
      context_id             TYPE thfb_context_id,
      cntxt_user_dt(60)      TYPE c,
      cntxtud_s              TYPE string,
      rtrnd_hash             TYPE i,
      rtrnd_hash_n(22)       TYPE n,
      rtrnd_hash_c(22)       TYPE c,
      wa_zindx_qm            TYPE zindx_qm,
      v_chk_cnt              TYPE i.
    DATA:
      v_do_exit         TYPE c,
      v_cntr_recursion  TYPE i,
      v_itab_cnt        TYPE i,
      v_index           TYPE i,
      v_mapl_cnt        TYPe i.
    DATA:
      s_qals            TYPE qals,
      s7_tab_mseg       TYPE STANDARD TABLE OF mseg,
      wa_mseg           TYPE mseg,
      gt_outtab         TYPE STANDARD TABLE OF zzmseg_qm_2007,
      wa_zzqm           TYPE zzmseg_qm_2007,
      wa_zzqa02         TYPE zzqa02_prueflos,
      i_zzqa02          TYPE STANDARD TABLE of zzqa02_prueflos,
      wa_zqm_lottrck    TYPE zqm_lottrck,
      wa_mapl TYPE mapl,
      v_mtart           TYPE mtart,
      v_qmatv           TYPE qmatv.
    DATA:
      v_cnt_wyt3        TYPE i,
      v_debug           TYPE i.
      CALL FUNCTION 'TH_GET_CONTEXT_ID'
        IMPORTING
        CONTEXT_ID       = context_id.
      CONCATENATE context_id
                  sy-datum
                  sy-uname
             INTO cntxt_user_dt.
      cntxtud_s = cntxt_user_dt.
      CALL FUNCTION 'LCRDB_STRING_HASH'
        EXPORTING
          TEXT =  cntxtud_s
        IMPORTING
          HASH =  rtrnd_hash.
      rtrnd_hash_n = rtrnd_hash.
      rtrnd_hash_c = rtrnd_hash_n.
    *  CONCATENATE 'DEXIT'
    *               sy-uname
    *               sy-datum
    *               context_id
    *          INTO v_memkey4.
    *  IMPORT v_do_exit TO v_do_exit FROM SHARED BUFFER indx(st) ID v_memkey4.
      IMPORT v_do_exit TO v_do_exit
        FROM DATABASE zindx_qm(de)
        ID rtrnd_hash_c.
    *  CONCATENATE 'CRCSN'
    *              sy-uname
    *              sy-datum
    *              context_id
    *         INTO v_memkey3.
    *  IMPORT v_cntr_recursion TO v_cntr_recursion FROM SHARED BUFFER indx(st) ID v_memkey3.
      IMPORT v_cntr_recursion TO v_cntr_recursion
        FROM DATABASE zindx_qm(rc)
        ID rtrnd_hash_c.
    *  CONCATENATE sy-uname
    *              sy-datum
    *              context_id
    *         INTO v_memkey.
    *  IMPORT gt_outtab TO gt_outtab FROM SHARED BUFFER indx(st) ID v_memkey.
      IMPORT gt_outtab TO gt_outtab
        FROM DATABASE zindx_qm(tb)
        ID rtrnd_hash_c.
      DESCRIBE TABLE gt_outtab LINES v_itab_cnt.
      IF v_do_exit = 'N'.
        v_do_exit = 'Y'.
    *    EXPORT v_do_exit FROM v_do_exit TO SHARED BUFFER indx(st) ID v_memkey4.
        EXPORT v_do_exit FROM v_do_exit TO DATABASE zindx_qm(de) ID rtrnd_hash_c.
    *    CONCATENATE 'SQALS'
    *                sy-uname
    *                sy-datum
    *                context_id
    *           INTO v_memkey5.
    *    IMPORT wa_zzqa02 TO wa_zzqa02 FROM SHARED BUFFER indx(st) ID v_memkey5.
        IMPORT wa_zzqa02 TO wa_zzqa02
          FROM DATABASE zindx_qm(wz)
          ID rtrnd_hash_c.
        IF v_cntr_recursion < v_itab_cnt.
    *    CONCATENATE 'TQALS'
    *                sy-uname
    *                sy-datum
    *                context_id
    *           INTO v_memkey6.
    *      IMPORT i_zzqa02 TO i_zzqa02 FROM SHARED BUFFER indx(st) ID v_memkey6.
          IMPORT i_zzqa02 TO i_zzqa02
            FROM DATABASE zindx_qm(iz)
            ID rtrnd_hash_c.
        ENDIF.
        APPEND wa_zzqa02 TO i_zzqa02.
    *    EXPORT i_zzqa02 FROM i_zzqa02 TO SHARED BUFFER indx(st) ID v_memkey6.
        EXPORT i_zzqa02 FROM i_zzqa02 TO DATABASE zindx_qm(iz) ID rtrnd_hash_c.
        IF v_cntr_recursion = 0.
          CALL FUNCTION 'ZZQA02_ASSIGN_BDC' IN BACKGROUND TASK.
        ENDIF.
        EXIT.
      ENDIF.
    *  CONCATENATE 'MSEG'
    *              sy-uname
    *              sy-datum
    *              context_id
    *         INTO v_memkey2.
    *  IMPORT s7_tab_mseg TO s7_tab_mseg FROM SHARED BUFFER indx(st) ID v_memkey2.
      IMPORT s7_tab_mseg TO s7_tab_mseg
        FROM DATABASE zindx_qm(ms)
        ID rtrnd_hash_c.
      v_index = v_itab_cnt - v_cntr_recursion + 1.
      READ TABLE gt_outtab INTO wa_zzqm INDEX v_index.
      READ TABLE s7_tab_mseg INTO wa_mseg INDEX v_index.
      IF    wa_mseg-bwart <> '101'
        AND wa_mseg-bwart <> '103'.
        EXIT.
      ENDIF.
      IF  wa_mseg-werks <> '2000'.
        EXIT.
      ENDIF.
      SELECT
      SINGLE mtart
        FROM mara
        INTO v_mtart
       WHERE matnr = wa_mseg-matnr.
      SELECT
      SINGLE qmatv
       FROM  marc
       INTO  v_qmatv
      WHERE  matnr = wa_mseg-matnr
        AND  werks = wa_mseg-werks.
      IF    v_mtart <> 'ROH'
        AND v_qmatv <> 'X'.
        EXIT.
      ENDIF.
      s_qals = insplot.
    *  v_lifnr_save = s_qals-lifnr.
      CALL FUNCTION 'QPBU_LOT_DELETE'
         EXPORTING
         I_QALS        = s_qals.
       s_qals-lifnr   = wa_zzqm-zzlifnr.
       s_qals-pplverw = '5'.
       s_qals-stat19  = 'X'.
      SELECT
      SINGLE plnty
             plnnr
             plnal
             zkriz
             zaehl
        FROM mapl
        INTO (s_qals-plnty,
              s_qals-plnnr,
              s_qals-plnal,
              s_qals-zkriz,
              s_qals-zaehl)
       WHERE matnr = wa_mseg-matnr
         AND werks = wa_mseg-werks
         AND lifnr = wa_zzqm-zzlifnr.
      v_do_exit = 'N'.
    *  EXPORT v_do_exit FROM v_do_exit TO SHARED BUFFER indx(st) ID v_memkey4.
      EXPORT v_do_exit FROM v_do_exit TO DATABASE zindx_qm(de) ID rtrnd_hash_c.
      v_cntr_recursion = v_cntr_recursion - 1.
    *  EXPORT v_cntr_recursion FROM v_cntr_recursion TO SHARED BUFFER indx(st) ID v_memkey3.
      EXPORT v_cntr_recursion FROM v_cntr_recursion TO DATABASE zindx_qm(rc) ID rtrnd_hash_c.
      wa_zzqa02-prueflos = s_qals-prueflos.
    *  CONCATENATE 'SQALS'
    *              sy-uname
    *              sy-datum
    *              context_id
    *         INTO v_memkey5.
    *  EXPORT wa_zzqa02 FROM wa_zzqa02 TO SHARED BUFFER indx(st) ID v_memkey5.
      EXPORT wa_zzqa02 FROM wa_zzqa02 TO DATABASE zindx_qm(wz) ID rtrnd_hash_c.
      SELECT COUNT( * )
        FROM mapl
        INTO v_mapl_cnt
       WHERE matnr = wa_mseg-matnr
         AND werks = wa_mseg-werks
         AND plnty = 'Q'
         AND plnnr <> '99999999'.
      IF v_mapl_cnt = 1.
        wa_mapl-matnr = wa_mseg-matnr.
        wa_mapl-werks = wa_mseg-werks.
        wa_mapl-plnty = 'Q'.
        wa_mapl-plnnr = '99999999'.
        wa_mapl-plnal = '01'.
        wa_mapl-zkriz = '0000001'.
        wa_mapl-zaehl = '00000001'.
        wa_mapl-lifnr = 'ZZZZZZZZZZ'.
        wa_mapl-datuv = sy-datum.
        INSERT INTO mapl VALUES wa_mapl.
      ENDIF.
      CALL FUNCTION 'QPBU_LOT_INSERT'
         EXPORTING
           QALS_NEW       = s_qals.
      IF wa_zzqm-zzltno IS INITIAL.
        EXIT.
      ENDIF.
      wa_zqm_lottrck-zzltno   = wa_zzqm-zzltno.
      wa_zqm_lottrck-werk     = wa_mseg-werks.
      wa_zqm_lottrck-prueflos = s_qals-prueflos.
      wa_zqm_lottrck-mblnr    = s_qals-mblnr.
      wa_zqm_lottrck-mjahr    = s_qals-mjahr.
      wa_zqm_lottrck-zeile    = s_qals-zeile.
      INSERT
        INTO zqm_lottrck
      VALUES wa_zqm_lottrck.
    ENDMETHOD.

  • Interesting question about AppXRay

    I am sometimes working on the
    http://www.itracker.org
    Open Source project.
    Interestingly sometimes AppXRay does not see the errors. I can't exactly say, when. It seems to have to do with Struts forwards (Global Forwards, Multi-Modul-Forwarding, Dynamic Forwards).
    For example I had the code:
    return mapping.getInputForward();
    which I had to replace with
    return mapping.findForward("edituserform");
    What do you know about the Struts limitations of AppXRay?

    Yes, I think I can confirm this, although I am not absolutely sure what AppXRay can trace, and what not.
    If you (now) checkout the itracker source, and if you then (now) compare the source to the SourceForge bug list, then you will see that there are bugs in the application, that the Workshop does not see. And some of the not seen bugs seem to be related to AppXRay limitations and / or the way the itracker is currently programmed.

  • Numbers Loan Calculator Template interesting question

    Hi all,
    if you note the Loan Calculator program has a Form for inputting data.
    However you can only change a few values and the other fields are 'locked'.
    How can you unlock those fields?
    How can I add another field into the form without it being visible in the corresponding sheet?
    Thank you for your advice

    Welcome to Apple Discussions
    And if you are asking about the desktop version of Numbers, please post your question in the appropriate sub-forum in the Numbers forum category.

  • Strange But Interesting Question!!!!

    Hi,
    I am wondering is that is there any way to track the DML statements forms issues implicitly whenever a commit operation happens.Is there any system variable similar to :system.last_query for this??..... "
    Any inputs???
    Alfred

    hi, Murali
    thanks.
    I have another confusion that, we can configure the valuation document type in valuation method, and also we can configure the reversal document type in generic document type setting, which should be the default reversal document type.
    but during the valuation, the valuation and reversal document types are the same, has not taken the reversal document type, is that right? I think that is an old question, is there any solution or explanation for that?
    best regards, Lawrence

  • Interesting question in Java!!!!!!!!

    Hi,
    I am in need of getting some help on the following Java problem,
    I have a String variable with a value of,
    "if (flag) i=i+1 else i=i-1;" or "...some other arthmetic operation.."
    and at one poing of time i need to execute the code inside this String. Is there anyway? Pls do help me. Thanks in advance.
    Crao

    I don't know of anything that will handle both expression evaluation and program logic...
    http://www.beanshell.org/intro.html
    http://jep.sourceforge.net/

  • ******* INTERESTING QUESTION *********

    hi
    I have to find out ascii value of all the characters in a String.
    The String which i get in my program are dynamic .
    i get it from a remote place.
    if i receive a String say "Welcome\2002";
    i should convert each character to ascii value irrespective of having escape characters.
    when i printout this string it is printing "Welcome?2"
    The problem is if i have escape characters the ascii value is different.it is giving me the ascii value of '?'
    how to get the ascii value of escape characters??
    Thanks

    you don't need to convert an occurrence of "\" into "\\". The previous posters are forgetting that you receive the String at run time, where the String instance wraps the proper character codes. Escape sequences like the patterns described above are only necessary for compilation. Any way, I really don't understand why you would break apart a String into its ASCII patterns, only to rebuild it, but getting the ASCII codes is easy:
    for (int i = 0; i < args[0].length(); i++) {
      char current = args[0].charAt(i);
      System.out.println("ASCII code for " + current + " is " + ((int)current));
    }...that above code will return an ASCII value of 92 for the slash character.

  • Can ne 1 answer this interesting question!!! ?

    Hi,
    I have the name of the method in a String format. I want this information to get evaluated as a method/function. How can I do that?
    For example, I have a string named "setName" and another string "str". I want this information to get evaluated as :- setName(str), ie. string 'setName' should get interpreted as a method name 'setName( )'. 'setName(String str)' is a method in the same class.
    Thanks!
    -Vaibhav.

    Hi...
    import java.lang.reflect.*;
    public class Test {
         public Test (String setName, String str) {
              try {
                   Method m = this.getClass ().getMethod (setName, new Class [] {str.getClass ()});
                   m.invoke (this, new Object [] {str});
              catch (Exception e) {}
         public static void main (String [] args) {
              Test t = new Test ("setName", "Rick");
              System.out.println (t.getName ());
         public void setName (String name) {
              _name = name;
         public String getName () {
              return _name;
         String _name = "Boab";
    [\code]                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                               

  • Interesting question for original iPhone owners

    Hi,
    I was looking at the back of my device today while it was out of the case (more then usual) and when looking at the two lines of text (below the word "iPhone" but above the memory size icon...in my case mine says "8GB" with a square around it, if you look at the two lines really closely it looks like the lines of text are not straight (more on the right part of the two lines verses the left part of the two lines.
    When I turn the phone sideways looking at the text, then it pretty much looks aligned. I'm wondering if what I'm seeing is just an optical illusion when looking at it right side up or are the two lines really not imprinted on the device in a straight line?
    Intersted to hear other owners in their findings. It's kinda bugging me now so I wanted to ask other people if they see the same thing as I do.

    Are you referring to the second line, beginning roughly with the IMEI number? Using a Schaedler Precision rule, magnification glasses, and a lot of squinting under a halogen lamp, it appears the capital letter height of IMEI is approx. 1/64th of an inch taller than the capital letters ~ FCC ID ~ on the far left of that line. 1/64th is the smallest unit on this ruler. The IMEI on my phone is aligned on the upper portions of the FCC letters, but not along the IMEI baseline of that second line. It's optically insignificant to me, especially since it's on the back and in a case. Hope this helps.

  • An interesting question.

    Ok, let me explain my problem. I am making a program which writes a program in a .txt file. It is run by a GUI. For example if the user wants to add a button or a label they click the "add button" or "add jlabel" buttons and it will add it too an array and then you can finish the program, and in the text file it will be writen in java. One of the functions that you can choose for the button is too dispose of the jframe (f1.dispose();) Just check out the following code, this is a very unique assignment and its hard to explain.
    this creates an array with all the stuff thats gunna be written to the txt file
    there are 2 check boxes that you can select if you want to change text and/or dispose of the frame. i need a way to where if the user selects only one of the 2 choices in the code writen to the txt file it will ONLY be the choice that was selected, but with the code i have now it just writes them all. this is extreamly hard to explain, but thanks for checking this out.
    listener.add("public void actionPerformed(ActionEvent event); \n  {");
                for(int i = 0;  i< button.size(); i++){  
                listener.add("if (event.getSource() == b"+i+")");
                listener.add("{");
                    //action events text:a dispose:f
                for(int a = 0;  a< textcheckarray.size(); a++){
                   ts = textcheckarray.get(a);
                       if (ts.equals("selected"))   //check box
                          listener.add("textbox.setText(changetext)");
                for(int f = 0;  f< disposecheckarray.size(); f++){
                   ds = disposecheckarray.get(f);
                    if (ds.equals("selected"));   //checkbox
                        listener.add("f1.dispose()");
                listener.add("");
                listener.add("}");
                this is the part that writes the file.
    try{
            FileWriter outfile = new FileWriter("program.txt");
            PrintWriter out = new PrintWriter(outfile);
            for(int i = 0;  i< importstatements.size(); i++)
                   out.println(importstatements.get(i));
            out.println(classname);
            out.println("{");
                for(int i = 0;  i< variables.size(); i++)
                   out.println(variables.get(i));
            out.println(constructor);
                for(int i = 0;  i< const_statements.size(); i++)
                   out.println(const_statements.get(i));
            out.println("}");
                 for(int i = 0;  i< listener.size(); i++)
                   out.println(listener.get(i));
            out.println("}");
            out.println("}");
            out.close();

    example:
    if i make 3 buttons and each of them has different choices of weather they dispose or change text this happens.
    import javax.swing.*;
    import java.awt.*;
    import java.awt.event.*;
    public class fddffd implements ActionListener
    JFrame f1;
    Container c1;
    JPanel p1;
    JButton b0;
    JButton b1;
    JButton b2;
    JButton b3;
    public fddffd()
    f1 = new JFrame();
    f1.setSize(3443,3434)
    c1 = f1.getContentPane();
    p1 = new JPanel();
    b0 = new JButton(" dfdf ")
    b1 = new JButton(" fdfd ")
    b2 = new JButton(" fd ")
    b3 = new JButton(" ffdf ")
    b0.addActionListener(this);
    b1.addActionListener(this);
    b2.addActionListener(this);
    b3.addActionListener(this);
    p1.add(b0);
    p1.add(b1);
    p1.add(b2);
    p1.add(b3);
    c1.add(p1);
    f1.show();
    public void actionPerformed(ActionEvent event);
    if (event.getSource() == b0)
    textbox.setText(changetext) // this one was spose to only have "f1.dispose"
    textbox.setText(changetext)
    textbox.setText(changetext)
    f1.dispose()
    f1.dispose()
    if (event.getSource() == b1)  // this one was only spose to change text
    textbox.setText(changetext)
    textbox.setText(changetext)
    textbox.setText(changetext)
    f1.dispose()
    f1.dispose()
    if (event.getSource() == b2) // this one was spose to do nothing
    textbox.setText(changetext)
    textbox.setText(changetext)
    textbox.setText(changetext)
    f1.dispose()
    f1.dispose()
    if (event.getSource() == b3)
    textbox.setText(changetext)
    textbox.setText(changetext)
    textbox.setText(changetext)
    f1.dispose()
    f1.dispose()
    }

  • Which brings up an interesting question...

    How far does intellectual property span on a film, commercial, music video etc...
    If I wrote a script but shot it shot for shot the way Psycho was shot (not a Psycho film... a loving film about 3 brothers) but SHOT FOR SHOT editing was exactly the same frames for frames...
    I mean, we spend a lot of time figuring out effects and editing techniques here that -- well -- if I took the chord structure of the Ghostbusters theme and made a song of well... Axel F - I'd get thrown in jail!
    Can poor Shane/Danny put a little circle-c next to each cut in Blood Diamonds?
    CaptM

    Can poor Shane/Danny put a little circle-c next to each cut in Blood Diamonds?
    Why would we do that? Sure, we worked hard to find the right footage and cut it to the music, but how can you copywrite a cut? I mean...it is a simple cut. If you throw differen footage in there, but cut at the same time, it wouldn't remotely be the same, because the footage is different.
    How can a film be different from Psycho, but shot and edited shot for shot? If you have different footage and different characters and different plot, it couldn't POSSIBLY be the same.
    And editing techniques can't be copywritten. THANK GOODNESS. God, that would suck. How would anyone be able to edit anything? I copy other editing styles I see, and hopefuly people will copy mine. If they did, i'd be flattered. I mean, people are going too far with this "intellectual property" thing. There are a few basic storylines (like 26 I beleive), and everything is a variation of those. If someone had copywritten them, then what would happen?
    Sorry, I have strayed. I am just saying that I wouldn't want to copywright editing techniques. If we did, then innovation and adaptation would be stifled. If someone copied a film or music video shot for shot, then they would look dumb and unimaginative. But if they took what they saw and adapted it to what they were doing, it would be different.
    Shane

  • Very very interesting question

    how to return the value from the procedure with out using the out paramter in java?
    generally we use the out parameter while using the callablestatment,but i dont watn to use the out parameter to retrurn value
    please give me answer clearly

    how to return the value from the procedure with out
    using the out paramter in java?We don't use out parameter in Java. We register the output parameters in CallableStatement.
    generally we use the out parameter while using the
    callablestatment,but i dont watn to use the out
    parameter to retrurn valueGet that value from a resultset.
    You should reconsider your requirement IMO.
    please give me answer clearlyRead the docs.

  • Interesting question in inheritence

    What will the output when i do " java inh" ???? Can anyone explain the output???
    class inh extends inh1 {
    inh() {
    super();
    public static void main(String a[]) {
    inh o1 = new inh();
    void getme() {
    System.out.println(" in inh");
    class inh1 {
    inh1() {
    getme();
    void getme() {
    System.out.println(" in inh1");
    }

    How can a super class looks down and execute the
    child getme() method?Every object contains one little pointer to its Class object. The Class
    object itself stores a 'vtab' i.e. a list of pointers to methods. When a
    class is loaded, its Class object is constructed together with that vtab.
    When a subclass is loaded, first its parent class is loaded and the
    entries present in the parents vtab are copied to the subclass vtab.
    Then the entries for the methods present in the subclass itself are
    writen over the entries copied from the parent's vtab. The jargon is
    that the subclass method 'overrides' the super class method.
    The constructor of the superclass executes in the context of the subclass'
    vtab hence the behaviour you've noticed. iow, the superclass doesn't
    'search for' methods in a possible subclass.
    kind regards,
    Jos

Maybe you are looking for

  • New 5. version and Ipod Service Error

    I downloaded the newest version of itunes and updater 9-23-05, and now my ipod won't sync with my windows xp itunes. I have reinstalled both itunes and ipod updater, I have deleted everything in the temp file, I have disabled all programs, and I have

  • Convert non-english EDD to english

    In older FM versions, if you installed the program in another language then the EDD was also structured with localized element names. That makes it impossibe to copy elements into a different EDD. Is there a way to convert the EDD without creating ea

  • Errors with 10g Migration: WUC-24 and FileFunctions bean

    I'm experiencing a couple issues with my Migration to 10g (9.0.4) from 6i Forms. Through much searching to find resolutions, I have been unsuccessful. I have two errors that I am unable to get rid of. 1) oracle.forms.webutil.file.FileFunctions bean n

  • SQL Server 2012 save SSIS package in MSDB

    I am trying to save my package in MSDB database from SQL Server Data Tools 2012 (used to be called BIDS as you know). However, when I go to File --> Save mypackage.dtsx As, it only allows me to save it as File System, not in a SQL Server MSDB databas

  • Sound output with sound and vibration toolkit

    Hi! Wants to setup a system with two microphones that are connected to DAQ NI USB-9162 and perform a Frequency Response between them where one of them has the undisturbed signal (close in space) and the other the respons (further away). My problem is