What I should use an Interface or a Procedure

Hi all,
Can you please suggest which ODI object can be used to execute this following query.
Procedure or number of interfaces ?
Insert Into travelTop100
Select travel01, CountOD, rank(CountOD, travel01) As Top100
From
(Select travel01, Sum(CountOD) AS CountOD
From
(Select travel02, travel01, count(*) As CountOD
From b
Group By 1,2) tab1
Group By 1) As T1
QUALIFY Top100 <= 100;
currectly we are using Procedure , can it be done through Interfaces ?
and also I would like to know which one is the best approach or kind of best practice
regards,
Palash Chatterjee

Sutirtha,
Thanks for ur reply,
1) Procedure is a kind of option where we can not get the actual cause of error if anything goes wrong.
So for a better proggramming practice we use to have Interfaces instead of procedure, only toughest
one are being done through procedures.
2) DB object is again a mentanance issue because it's going out of scope from ODI. movement of
Code from DEV to QA to PROD is needed an extra effort
Please let me know is this a correct way of doing things in ODI ?
If this is possible using interfaces then how I should proceed ?
regards,
Palash Chatterjee

Similar Messages

  • What is the use of interface in the adobe forms

    Hi friends,
    can any one tell,
    what is the use of interface in the adobe forms for desigining the form.

    The main purpose of the form interface is to send the application data to the form.
    The form interface is created separately from the form, which consists of the form context and layout. When you create a form, you must assign it to a form interface.
    please have a look at the link below for more info:
    http://help.sap.com/saphelp_nw70/helpdata/EN/96/6ee0d5b39640d68fc0078fc575114a/frameset.htm
    http://help.sap.com/saphelp_nw70/helpdata/EN/f2/21021b911f4c0cae11459a4ce0bc62/frameset.htm
    hope this helps,
    harman

  • HT4995 Internationally using Location Services without having data charges.  What settings should use on my iPhone 5?

    I'm traveling to Europe and I want to use Location Services without having data charges.  What settings should use on my iPhone 5?  I want to be able to use Trip Advisor City Guides Application to tour around cities for free.  I have a Verizon International Plan for my trip, but it is still pricey.  I would like to keep my iPhone cell services on for incoming calls, but I want to prevent international data charges.  Thanks for your help!

    You don't "choose" to use th 3g network.
    If you have paid for it in your plan and 3g coverage is available, your phone will automatically use it when necessary.
    3g provides faster internet speeds than 2g, so you can watch video or download stuff faster. Wifi is normally faster than 3g.
    Your iphone gps is "assisted", meaning it uses network data to calculate your position.
    Also, you would still need the network to download maps, directions etc as they are not on your device.

  • What methods should a controller interface contain? (MVC)

    Implementing MVC architecture in hope of achieving good design in OO.
    Using Observer pattern (java,util. Observable/Observer etc...)
    Many people talk about having an Interface for both Controller code and View (GUI) code. I don't see the point really.
    Question is what methods should an interface for a controller contain? surely not event code like "actionperformed"? Because how you know before hand what gui components you'll use? And even so, no need for an interface as interface is mostly suitable for using inheritors in many places..
    any one explain to me the benefits and if really good design, what goes in interface for a controller?
    thanks in advance.

    I deem you dismiss the OP's idea too fast - but maybe I'm of the "second school of thought" :o)
    I agree designing for different client technologies is overkill unless it is a requirement, but the OP specifically mentions changing the UI's widgets while sticking to the same technology (Swing, for that matter).
    In this case, implementing Swing's EventListener interfaces in the controller has 2 drawbacks:
    Did not mean to do so. My thrust was that regardless of #1 or #2, you can solve it with delegation. I believe this is the idea you describe below.
    One has been discussed - namely, that the controller and view have to know intimate details about eachother. As you well described in reply #6, it is natural that they know a bit about eachother, but maybe not so much - otherwise what good is there to have two distinct classes?
    The view needs some way to ask the controller to load the shopping basket, but why force the controller to receive the demand as an ActionEvent? The controller may expose a loadShoppingBasket() method, and leave it up to the view to implement the widget-level event handler that will call this method.
    Similarly, the controller needs some way to ask the view to display the items in the basket, but it doesn't need to know whether it is displayed in a JList or a JTable or a JTextPane or whatever... The view may expose a displayShopingCartItems(List<Items>) method.
    Agreed. That was my point, that you can delegate from the listeners to more meaningful controller methods. Whether one decides to implement an interface or simply use a stateless helper class with package-private methods (or whatever) is a design decision.
    The second drawback with having the Controller class implements the many EventListener interfaces, is that if two different widget in the view trigger the same type of events (say, ActionEvent), the controller know has to disambiguate between the two possible sources (for example by examining the event's actionCommand field).
    Not only does that couple the controller's code to the view's implementation (which should be the only one to know that the "Submit" and "Cancel" buttons have respective action commands of "SUB" and "NONE"), which is only drawback #1 reiterated, but with more than two sources of ACtionEvent, that also makes for wide if-then-else blocks in the actionPerformed() method, which is not elegant nor error-proof.
    I agree. Although another alternative is to use inheritance to overcome this limitation. Again, it's all how much work you think is justified.
    In summary, I find it less coupled, and more maintenable, to have the controller and view classes expose hardly-higher-level methods such as, loadBasket() and displayItems(List<Items>), and have the view implement small (generally anonymous) event-listener that handle the widget-level events and delegate to the appropriate hardly-higher-level controller's method.
    That said, unless it is required that several implementation of a same logical view coexist, there's no real incentive that the hardly-higher-level methods be exposed in interfaces; exposing them in the concrete Controller and View classes is fine.
    Agreed. (Above). :^)
    One last word: actrually there's an incentive that the view's methods be exposed in an interface: it makes it easier to unit-test the controller class, by injecting mocks of the views without depending on a Swing runtime (I posted [a thread|http://forums.sun.com/thread.jspa?forumID=57&threadID=5377751] about difficulties in using Swing components in headless builds).
    Will have to chew on that one. My gut instinct is the view would be the last thing I would bother to have interfaces for (without the need to support multiple views). It's an interesting thought tho. I guess my base position is to unit test everything in the model and integration test the views and controllers. Tho, to your point, failures in the VC are obvious to users and immediately annoying.
    Edited by: jduprez on Aug 23, 2009 9:02 PM - formatting
    Edited by: jduprez on Aug 23, 2009 9:16 PM- had a hard time getting the hold on my old thread- Saish

  • I tried opening a pdf file and I set it to use always and firefox which did not work, I was wondering how to undo that and what I should use to open pdf files in the future?

    I was attempting to open a document from a frequently used site, I had never been on, on my new mac however. I attempted to open the pdf file and was given the option of which program to use to open it, I mistakenly clicked use always and firefox as the program with which to open pdf files. I do not know how to undo this or what I should do in the future to access the pdf files.

    Hi Melfour-
    Here is a Support article detailing how to work with your Firefox PDF preferences:
    [[Opening PDF files within Firefox]]
    Hope that helps.

  • In business object what is the use of Interface

    hi ppl,
             In each business object there is a interface what can we do with that. When i used wizards like dynamic parallel processing it asked for wizards what is the actual use of interfaces.

    Hi Dheepak,
    I have an overview on interfaces. Someone pls correct me if i am wrong here.
    Interfaces are generally used to group a set of attributes and methods that can be used across different business objects. You can create your own interfaces in SWO1 and when you include these interfaces in business objects you get all these attributes and methods in the business objects (Inheritance). Its basically for re-usability of the code(Reusability). Apart from that if required you can implement your own code for the methods thus maintaining the same name with a different logic for your BO (Polymorphism).
    For example assume that you have a "Display" method and a few attributes in an interface. The "Display" method is used to display a particular transaction. Now you can include this interface in any BO and all these attributes and methods will be available in that BO with their respective implementation code. Now if you want the method to form a different action in any particular BO you can go ahead and redefine this code in that BO. This redefinition will not affect other BO's that had implemeted this same interface. All other BOs which had implemented this interface will continue to function as per the implementation code defined in the interface. This makes sure that the same method works in different ways in different BO's (Polymorphism)
    Supertype<-->Subtype delegation will allow us to inherit the supertype/subtype methods/attributes but it does not allow us to change the underlying code in individual BOs. Hence polymorphism cant be acheived here
    Thanks,
    Prasath N
    BO - Business Object

  • What VLAN should the management interface be in on a 4400 controller?

    Hi,
    Some documentations put the management interface on a 4400 controller into a regular tagged VLAN. But some documentations put it in an untagged Native VLAN, the tag=0. What is the difference? Which configuration is optimal?
    Thanks,
    Justin

    The answer is "it depends" :-)
    I would not say any particular config is optimal though. If you have an established VLAN for management interfaces, I would use that. However if you put the management interface in the same VLAN as your AP's, AP's find your controllers easier. Otherwise you can use DHCP to point AP's to controllers.
    I prefer to tag the frame as to which VLAN it belongs to, even if that is the same as the native VLAN.

  • What Resolution to use from Istock for Youtube?

    I'm trying to make my first movie which will be uploaded to Youtube. I will shoot my video in 1080. I am assuming (not always smart) that I should use the standard 4:30 aspect ratio. I want to use include some stock video footage...probably from istock. I have four options with increasing file sizes and costs. Small Web 320X180; big Web 640X360, HD720 1280X720 or HD1080 1920X1080. For use on YouTube does it make a difference? I have no clue what I should use, but obviously I would not buy the largest and most expensive. The video will basically be B-roll and I will do a voice over. Thanks for any assistance.

    This is the iOS forum, so for iPads and iPhones.
    iPad2 & iPhone4s can edit in 1080,
    iPhone 4 and iPod Touch can only edit in 720.
    There is no 4:30 ration that I have heard of.
    All HD formats are 16:9 ratio; thought there is a some odd or letter boxed cinema sizes.
    There is no 4:3 HD format.
    4:3 was a standard for early SD television, but is not an HD standard or even a format sorry.
    You tube can accept various frame sizes.
    You should start by thinking what size you want to deliver, and edit up to that frame size.
    Stock footage should be up to that size too.
    I'm wondering why you want to put B-roll on you tube? And why is there stock footage in your B-roll?
    If you want answers specifically for iMovie for Mac you should as Apple to move this question to the mac forum.

  • The use of interface in abap object

    hi,
    what is the use of interface in class? can have a simple example with explanation? i have read from help but not quite understand its purpose.
    thanks

    Hi El,
    Interfaces are pure abstract classes. The interface methods will have only definitions but no implementations.
    The classes which will implement interfaces has to provide the implementation to the methods.
    Interfaces will provide the common definition and the classes which implements these interfaces will provide them different implementation to the methods as per their requirements. This achieves Polymorphism of Object Orientation.
    REPORT zbc404_hf_events_3 .
    INTERFACE lif_employee.
      METHODS:
        add_employee
           IMPORTING im_no   TYPE i
                     im_name TYPE string
                     im_wage TYPE i.
    ENDINTERFACE.
    CLASS lcl_company_employees DEFINITION.
      PUBLIC SECTION.
        INTERFACES lif_employee.
        TYPES:
          BEGIN OF t_employee,
            no  TYPE i,
            name TYPE string,
            wage TYPE i,
         END OF t_employee.
        METHODS:
          constructor,
         add_employee      "Removed
            IMPORTING im_no   TYPE i
                      im_name TYPE string
                      im_wage TYPE i,
          display_employee_list,
          display_no_of_employees.
      PRIVATE SECTION.
        CLASS-DATA: i_employee_list TYPE TABLE OF t_employee,
                    no_of_employees TYPE i.
    ENDCLASS.
    CLASS lcl_company_employees IMPLEMENTATION.
      METHOD constructor.
        no_of_employees = no_of_employees + 1.
      ENDMETHOD.
      METHOD lif_employee~add_employee.
      Adds a new employee to the list of employees
        DATA: l_employee TYPE t_employee.
        l_employee-no = im_no.
        l_employee-name = im_name.
        l_employee-wage = im_wage.
        APPEND l_employee TO i_employee_list.
      ENDMETHOD.
      METHOD display_employee_list.
      Displays all employees and there wage
        DATA: l_employee TYPE t_employee.
        WRITE: / 'List of Employees'.
        LOOP AT i_employee_list INTO l_employee.
          WRITE: / l_employee-no, l_employee-name, l_employee-wage.
        ENDLOOP.
      ENDMETHOD.
      METHOD display_no_of_employees.
      Displays total number of employees
        SKIP 3.
        WRITE: / 'Total number of employees:', no_of_employees.
      ENDMETHOD.
    ENDCLASS.
    Check this link for some more examples on OO ABAP
    http://www.erpgenie.com/sap/abap/OO/eg1.htm
    Thanks,
    Vinay

  • What is the use of Storage loc.ref.in LE-WM Interface to Inventory Managemt

    Hi Guys
    What is the use of below fields
    Special movement indicator for warehouse management and Storage loc. ref.
    In the WM configaration LE-WM Interface to Inventory Management
    How we can do the below scenario with this configaration
    I have 3 scenarios all scenarios have MIGO and placing stock to WM
    2 scenarios requres Immediate TO creation after MIGO 101 mvt type
    But last scenario does not want Immediate TO ,it is having another Z transaction to create TO
    But problem is for the last scenario also creating Immdiate TO after MIGI 101
    How to avoid this Immdiate TO for this scenario
    And How to allow it for first 2 scenarios
    How we can to with that configaration

    Hello ,
    It is not possible directly in customising as all three cases are using the same Mvt Type.
    Alternate Solution :
    You may try an by creating a new Mvt Type 901 i.e making a copy of 101.
    Thereafter try to link a new Ref Mvt Type to the same .You should use this case for the third scenario.
    This may resolve your problem.
    Regards
    Ramesh Ch

  • Security!.... What program should I use?

    Suddenly we realize that the bad guys are now targeting the more-n-more popular Apple products.... As I always predicted, it's a matter of when, not if, they start attacking us with malicious stuff.
    So what's the best way to protect our Mac?  I've been using the free ClamXav for a couple years now... I don't see I have Java (but I have some Java Scripts), and my Adobe FlashPlayer is uptodate.
    I use Safari and have a WOT plug in that warns me of dubious websites.
    Am I missing anything? Anything else I should be doing?

    Mac users often ask whether they should install "anti-virus" software. The answer usually given on ASC is "no." The answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There  is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is foremost a problem of human behavior, and no technological fix alone is going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're better informed than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software. A genuine alert that Flash is outdated and blocked is shown on this support page. Follow the instructions on the support page in that case. Otherwise, assume that the alert is fake and someone is trying to scam you into installing malware. If you see such alerts on more than one website, ask for instructions.
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Rogue websites such as Softonic, Soft32, and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission. All "YouTube downloaders" are in this category, though not all are necessarily malicious.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a padlock icon in the address bar when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It's as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • What OSX should I use on my 2009 MAC Book Pro? Will Yosemite run

    Hi I have a Mac Book Pro from 2009 and I was wondering what OSX should I use on my 2009 MAC Book Pro? Will Yosemite run properly on this computer?

    Welcome to Apple Support Communities
    Your Mac supports OS X Yosemite. If you need to upgrade your Mac, do it, but if you are happy with the OS X version you are running or you do not like changes (OS X Yosemite has got an interface change), you can keep it always that it is not very old.
    In order to upgrade to OS X Yosemite, it is as simple as opening the Mac App Store and downloading OS X Yosemite. When the download finishes, the installer will show up, so follow its steps. Before upgrading, it is important to make a backup of your files with Time Machine -> Mac Basics: Time Machine backs up your Mac - Apple Support You can also check that your applications are compatible with Yosemite in this website -> http://www.roaringapps.com
    OS X Yosemite should run properly, but I recommend you to run it with at least 4 GB of RAM (you can check how much RAM you have in the Apple menu -> About this Mac). In case Yosemite runs slowly, the backup you made will let you go back to your old version.

  • What method should be used for resizing the particular JTable Column width

    I have a four table. Only one table which are on top have a table header. I want that when user resize the topmost table with a mouse other table colume also be resized automatically. So I want to know that what method should be used for resizing the particular JTable Column width.
    Thanks
    Lalit

    maybe you can implement a interface ComponentListener as well as ComponentAdapter with your topmost Table.
    for example:
    toptable.addComponentListener(
    new ComponentAdapter(){
    public void componentResized(ComponentEvent e){
    table1.setSize(....);
    table2.setSize(....);
    /*Optionally, you must also call function revalidate
    anywhere;*/
    );

  • What backend should be used?

    well i m developing a card game in java.
    i would like to know for saving the game settings like the cards and variables of the game what backend should i use. i want the application to be fully platform independent and also dont want to use any proprietory s/w like ms access.
    should i store it in a txt/dat file or is there any such compatible db; not talking abt full fledged server kinda dbms like oracle or sql server. just a basic dbms s/w for a small need like this.
    thanx

    It really depends on the scope of the game. Will this be played on the web by many people at a time? Or is this more of a single player desktop app?
    For a dbms MySQL is a free, easy to install and light weight solution. This is my usual go-to light weight dbms.
    Outside of a database, one option is to serialize the objects that contain the states in which you want to save such as player info, card in players hand, and cards in the deck. You just need to make sure those classes implement the Serializable Interface. When the player saves or exits the game, the objects will be serialized saving their state. When the player is ready to start the game again you can deserialize those objects back into java objects on the stack with the same state they had when they were serialized.
    Take a look at the "Serializable" class on the documentation page here [url http://download.oracle.com/javase/6/docs/api/index.html]http://download.oracle.com/javase/6/docs/api/index.html. It is in the Java.io package.
    If you want a Java based DB that is super light wait (very little functionality), can be distributed with your game app, and completely platform independent you can take a look at SmallSQL [url http://www.smallsql.de/]http://www.smallsql.de/. I have not used this one myself but it might do the job you are looking for as well.
    Again, choosing between a DB and data file/serialized objects as well as choosing which DB you should use will depend on the scope of the game. If you are hosting the game, a DB like MySQL will work great. If it is a desktop app than serialization of object or distributing the SmallSQL java DB with you app might be the better choice.
    Edited by: JDScoot on May 15, 2011 12:05 PM

  • What time should I use clone method?

    Hi everyone:
    There is a problem puzzled me all the time. You know,If I want to use a object I could use the code:
    Class A=new Class(); I get a object A so I can use it. But there is a method called "clone".It's function is copy a object.But Why jdk have this method.Is there any useful ?
    I mean that what situation should I use the "clone " method?
    Thks!

    a regular clone copies all members of an object by reference. You can implement the Clonable interface to provide a clone which makes a 1:1 copy of your object, so no references are copied over. This ensures that the objects don't share the same objects, but do have the exact same content.

Maybe you are looking for