What is protected by a LabVIEW Semaphore?

I can't seem to find a lot of documentation on LabVIEW Sempahores. I was wondering whether there is any firm guarantee as to what is protected by a semaphore and what is not protected by a semaphore.
The only example I could find seemed to indicate that calls to a SubVI are protected if they are made from within the confines of an acquired semaphore. I was wondering whether attempts to write to a local variable or to a global variable [from within the confines of an acquired semaphore] were also guaranteed to be protected.
I've attached a sample VI which has four threads: Three of them try to write about 100 times per second, and the fourth tries to read what they've written about 1000 times per second.
The three w
riter threads write -1, 0, and 1, respectively, to each of three data structures: a local variable, a global variable, and a "functional global variable" within a SubVI.
I was wondering whether there is any firm guarantee that all three of these kinds of writes are protected by semaphores, or if it's just the write to the SubVI that's protected.
As an aside, the CPU time allotted to the three writer threads doesn't seem to be distributed very evenly; one thread will grab the CPU and hold onto it for much longer than it ought to [given that it should be awake for only about 1/100th of a second at a time]. Is there any way to force the CPU time to be distributed more evenly?
PS: The attached VI does no error checking; I just wanted to throw together something that would demonstrate the questions I'm wondering about.
Thanks!
Attachments:
semaphores.zip ‏62 KB

The help files say that the code between Acquire and Release is protected. In your code you do not verify that the semaphore was actually acquired (no timeout and no error). I changed your VI to use a state machine structure for each "thread" and included error checking. The semaphore is only released if it was acquired (Help says an error may occur otherwise).
I have found that the Synchronization functions and VIs require some experimentation to really understand how they work.
Lynn
Attachments:
Semaphore_test2.vi ‏166 KB

Similar Messages

  • What OS is recommended for LabVIEW to run on a PDA?

    I want to send information from a PDA via RS232 to a lens. I'm wondering if LabVIEW 6.1 will run on a PDA or if its an exe that is loaded onto the PDA. If a new version of LabVIEW for PDA's is available. Finally, what OS is recommended for LabVIEW to run on a the PDA, I've been looking at MS Windows for Pocket PC. Thanks.

    In article <[email protected]>,
    "cmiranda" wrote:
    > I want to send information from a PDA via RS232 to a lens. I'm
    > wondering if LabVIEW 6.1 will run on a PDA or if its an exe that is
    > loaded onto the PDA. If a new version of LabVIEW for PDA's is
    > available. Finally, what OS is recommended for LabVIEW to run on a the
    > PDA, I've been looking at MS Windows for Pocket PC. Thanks.
    Have you looked at the Linux version of the Sharp Zaurus SL-5500 PDA. I
    believe there are several Intel processor based PDAs that can run Linux.
    Since they can run Linux, they can run LabVIEW for Linux. Wow, that's
    awfully simple... perhaps I should get one. A used one on Amazon is
    $380. Tell us how it goes.
    -Kevin

  • What virus protection should i download for my macbook pro

    i just got my macbook pro and want to know what virus protection program should i download for free

    This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an attacker who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files. The recognition database is automatically updated once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders. In most cases, there’s no benefit from any other automated protection against malware.
    Starting with OS X 10.7.5, there is another layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications that are downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Applications certified in this way haven't actually been tested by Apple (unless they come from the Mac App Store), but you can be sure that they haven't been modified by anyone other than the developer, and his identity is known, so he could be held responsible if he knowingly released malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe. Note, however, that there are some caveats concerning Gatekeeper:
    It doesn't apply to software that comes packaged as an installer. Treat all third-party installers with caution.
    It can be disabled or overridden by the user.
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets (see below.)
    It only applies to applications downloaded from the network. Software installed from a CD or other media is not checked.
    For more information about Gatekeeper, see this Apple Support article.
    Notwithstanding the above, the most effective defense against malware attacks is your own intelligence. All known malware on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. If you're smarter than the malware attacker thinks you are, you won't be duped. That means, primarily, that you never install software from an untrustworthy source. How do you know a source is untrustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. [Some reputable websites did legitimately warn users who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.]
    “Cracked” copies of commercial software downloaded from a bittorrent are likely to be infected.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. No intermediary is acceptable.
    Java on the network (not to be confused with JavaScript, to which it's not related) is always a potential weak spot in the security of any operating system. If Java is not installed, don't install it unless you really need it. If it is installed, you should disable it (not JavaScript) in your web browsers. Few websites have Java content nowadays, so you won’t be missing much. This setting is mandatory in OS X 10.5.8 or earlier, because Java in those obsolete versions has known security flaws that make it unsafe to use on the Internet. The flaws will never be fixed. Regardless of version, experience has shown that Java can never be fully trusted, even if no vulnerabilities are publicly known at the moment.
    Follow these guidelines, and you’ll be as safe from malware as you can reasonably be.
    Never install any commercial "anti-virus" products for the Mac, as they all do more harm than good. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.

  • What antivirus protection should I purchase for my MacBook Pro? MacSecurity.app appeared on my desktop, and I downloaded that. Since then, it has said my computer is infected and pop-ups have been appearing.

    What antivirus protection should I purchase for my MacBook Pro? MacSecurity.app appeared on my desktop, and I downloaded that. Since then, it has said my computer is infected and pop-ups have been appearing.

    You've been infected by a scam trojan.  You don't need any anti-virus software on your Mac.  See the following about getting rid of the trojan.
    Trojan War
    If you discover a trojan program is running on your computer then look to the following information for assistance:
    1. A recent discussion on the Apple Support Communities: MacDefender Trojan.
    2. An excellent site devoted to Mac Malware: Macintosh Virus Guide
    3. Another site for removing MacDefende, et.al.: MAC Defender Rogue Anti-Virus analysis and Removal
    4. A new removal utility - MacDefenderKiller
    Removing strange software can be a task.  The following outlines various ways of uninstalling software:
    Uninstalling Software: The Basics
    Most OS X applications are completely self-contained "packages" that can be uninstalled by simply dragging the application to the Trash.  Applications may create preference files that are stored in the /Home/Library/Preferences/ folder.  Although they do nothing once you delete the associated application, they do take up some disk space.  If you want you can look for them in the above location and delete them, too.
    Some applications may install an uninstaller program that can be used to remove the application.  In some cases the uninstaller may be part of the application's installer, and is invoked by clicking on a Customize button that will appear during the install process.
    Some applications may install components in the /Home/Library/Applications Support/ folder.  You can also check there to see if the application has created a folder.  You can also delete the folder that's in the Applications Support folder.  Again, they don't do anything but take up disk space once the application is trashed.
    Some applications may install a Startup item or a Log In item.  Startup items are usually installed in the /Library/StartupItems/ folder and less often in the /Home/Library/StartupItems/ folder.  Log In Items are set in the Accounts preferences.  Open System Preferences, click on the Accounts icon, then click on the LogIn Items tab.  Locate the item in the list for the application you want to remove and click on the Delete [-] button to delete it from the list.
    Some software use startup daemons or agents that are a new feature of the OS.  Look for them in /Library/LaunchAgents/ and /Library/LaunchDaemons/ or in /Home/Library/LaunchAgents/.
    If an application installs any other files the best way to track them down is to do a Finder search using the application name or the developer name as the search term.  Unfortunately Spotlight will not look in certain folders by default.  You can modify Spotlight's behavior or use a third-party search utility, Easy Find, instead.  Download Easy Find at VersionTracker or MacUpdate.
    Some applications install a receipt in the /Library/Receipts/ folder.  Usually with the same name as the program or the developer.  The item generally has a ".pkg" extension.  Be sure you also delete this item as some programs use it to determine if it's already installed.
    There are many utilities that can uninstall applications.  Note that you must have this software installed before you install software you may need to uninstall.  Uninstallers won't work if you install them after the fact.  Here is a selection:
    AppZapper
    Automaton
    Hazel
    CleanApp
    Yank
    SuperPop
    Uninstaller
    Spring Cleaning
    Look for them and others at VersionTracker or MacUpdate.
    For more information visit The XLab FAQs and read the FAQs on removing software and dealing with spyware and malware.
    After removing all the components of the software you may have to restart the computer to fully disable the software.  This will be the case when removing software that has installed a daemon.  After the daemon has been removed you need to restart the computer to stop the daemon.  Alternatively, you can kill the daemon process using the Terminal application or Activity Monitor.

  • I have a macbook pro what virus protection should i install?

    I have a macbook pro, what virus protection should I install?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to evade Apple's controls.         
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. Beyond XProtect, Gatekeeper, and MRT, there’s no evidence of any benefit from other automated protection against malware. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source. How do you know whether a source is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use the free software  ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    9. The greatest harm done by security software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but if they get a false sense of security from it, they may feel free to do things that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    10. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • What is this symbol in labview

    hai every one i have a doubt what is name for file what i attcahed and what is its uses in labview
    Attachments:
    what is.jpg ‏4 KB

    looks like a the convert to DDT from the Expresspalette
    Regards,
    Alex
    ♜♖ LabView 8.6 - LabView 2014 ♖♜

  • What antivirus protection do I need for the iPad?

    I am seeing some unusual activity after receiving an email.  What antivirus protection should we be considering for the ipad2?

    None - there are no viruses for the iPad (or iPhone or iPod Touch), and therefore there are no antivirus apps available in the iTunes App Store

  • What virus protection do you recommend?

    What virus protection do you recommend for MacBook Pro?

    I simply recommend practicing safe browsing habits, such as not opening files or attachments from unverified sources and never provide your user name and password unless you're certain of what you're doing.
    Point in case: There is a malicious application currently floating around which goes by various different names, such as Mac Defender and Mac Security. When this piece of malware is downloaded and run on your computer, it will ask you to install it and you will be asked to provide your user name and password for it to gain access to your computer. By not providing this information, the malware is unable to cause any harm your computer.

  • What communicat​ions protocols does LabView support?

    A customer of mine is using LabView.  He has asked me if I can communicate to it using a PLC.  Either GE Fanuc or Allen-Bradley.  I need to know what methods of communication that LabView has available to talk to these PLC's.

    The short answer is: whatever protocol you want to talk...
    I have developed applications talking to AB stuff, modbus (which will cover most PLCs) and even TI's old proprietry PLC protocol. There are lots of tools for making the connection in lots of ways.
    What are they specifically needing--or do they know yet?
    Mike...
    Certified Professional Instructor
    Certified LabVIEW Architect
    LabVIEW Champion
    "... after all, He's not a tame lion..."
    Be thinking ahead and mark your dance card for NI Week 2015 now: TS 6139 - Object Oriented First Steps

  • What coverage (Protection) do I get on an iphone 5 from apple care+ Please & Thank You  :o)

    What coverage (Protection) do I get on an iphone 5 from apple care+ Please & Thank You  :o)

    http://www.apple.com/support/products/iphone.html

  • What does protect circuit mean?

    Hello all. I've been hearing this terminology used loosely for years. I think I know what it means, but would like to be clear. What does protect circuit mean? What does the term 'switched to protect' mean? Thanks,

    Protected refers to the redundancy of the circuit.
    You can read more about it :
    http://en.wikipedia.org/wiki/Subnetwork_Connection_Protection
    Dan

  • Recommendation for protection of a LabVIEW built application

    Hi all
    I was hoping that someone out there could give me some advice on protecting a LabVIEW built application (the application runs on an operator interface for TestStand and call LabVIEW written modules).
    Any advice on what products work best with TestStand and LabVIEW written applications?
    Would you recommend a hardware or software implementation? (the application is a specialized application and realistically will be sold to a reasonably small number of vendors, should this influence our chose of SW v HW protection implementation.?)
    Do NI provide any software protection products or will we need to work with a 3rd party’s implementation?
    This area is somewhere I have very little experience in so any advice that you could provide would be much appreciated.
    Looking forward to hearing from you.
    T.I.A
    Declan

    Hi Alberto
    Thanks a lot for you response. It looks like we will go for the Sentinel Superpro keys option for protection. I have added another post outlining in more detail my specific application, if you have a chance could you have a quick look (its under labVIEW general titled "software pretection"). In you experiance do you think the Sentinel Superpro keys would work well in our case. Any futher input will help our confidence in forking out the cash for the Sentinel Superpro development kit.
    Thanks again for you input
    Dec

  • What are needed to have labview print report to microsoft word

    i'm building a stand alone application that puts the collected data into Microsoft Word, and it then sends the word report to the printer when click Print from my LabVIEW.  But when click Print it runs and generates error message that says "Error 7 occured at Open VI Reference in Dispose Report.vi ->Word Report.vi ->Main.vi".  I think i'm missing something during building application stage but i'm not sure what it is.  How can i approach this error?

    In the cd with the report generation toolkit you can find the procedure for building an executable.
    You have to add the following vi's dinamically:
    - vi.lib\addons\_office\_exclsub.llb\_excel dynamic vis.vi
    - vi.lib\addons\_office\_wordsub.llb\_word dynamic vis.vi
    Software developer
    www.mcm-electronics.com
    PS: Don't forget to rate a good anwser ; )
    Currently using Labview 2011
    PORTUGAL

  • What can I do about "LabVIEW load error code 38: Failed to uncompress part of the VI."

    While attempting to load an executable LabVIEW application for LabVIEW 2009 SP1 on a Windows-XP machine when the following pop-up message occurs. "LabVIEW: Memory or data structure corrupt. An error occurs in loading VI 'NI_Gmath.lblib: Backward Bracket Search.VI'. LabVIEW load error code 38: Failed to uncompress part of the VI. The VI is most likely corrupt." What seems odd is that the same LabVIEW application loads fine when logged on as a privileged user account, but fails to load on a private user account.
    Attachments:
    2012-07-18 LabVIEW Load error code 38.jpg ‏1314 KB

    Here's a thought:
    So when something is decompressed, a temp folder is often used. 
    I have no idea why LabVIEW would be decompressing anything, but I suspect it is trying to put the decompressed file into a temp folder where the user does not have write permissions.
    In the .ini file for your executable, you can add a line that specified the location of the temp folder to use:
    tmpdir=C:\Temp
    On my Win7 machine, the location is:
    C:\Users\MyUserName\AppData\Local\Temp
    On WinXP, it is probably:
    C:\Documents And Settings\YourUserName\local settings\temp
     Try changing the tmpdir key in your ini file to something to C:\Temp and see if that helps.
    - john

  • The limit to imagination for what we could achieve using Labview

    Hiya
    I would like to create a user interface by customizing front panel so it could be used as an oscilloscope. This oscilloscope allows user to do following selections.
    Analogue or digital signal
    which channel
    raw binary data or scaled measurement
    enter mathematical formula
    and then it displays the signal. There are some knobs which could be used to zoom in or alter display to ficilate analysis. This is just imagination, Is it possible to achieve this on Labview. What are the steps please??
    Your help is much appreciated.
    Ta

    You can download and install the NI-SCOPE driver, which includes the NI-SCOPE Soft Front Panel, an oscilloscope application written entirely in LabVIEW.  This will give you an idea of what is possible (essentially anything even vaguely reasonable, plus a lot more, limited only by your imagination and skill).  Unfortunately, the driver is very large.  If you want a picture, check this out.
    The underlying architecture of this application is virtually identical to the architecture given in this post.  However, you would probably be better off following Ben's suggestion to hone your LabVIEW skills, then dive into the xylophone example.
    <fullDisclosure> I am a National Instruments employee. </fullDisclosure>
    Message Edited by DFGray on 01-28-2010 08:52 AM
    This account is no longer active. Contact ShadesOfGray for current posts and information.

Maybe you are looking for

  • Random Restarts and lock ups

    Hi all, I know there's similar threads on this, but i'm experiencing random lock ups and the phone restarting itself at random. It's the "panic.plist" crash several users have complained about. This issue mostly leads to a hardware problem according

  • Safari wont open any pages?!?

    I just installed safari and it wont open any pages at all. I restarted, reinstalled and nothing. I deleted all files/registry entries for it then installed it again and no changes its just stuck. All other browsers (Chrome, Mozilla Firefox, IE 10 & O

  • ADF:How to use NavigationHandler in Phase-Listener with adfc-config.xml

    Hi, in our application a user should be navigated to the login-page, when he tries to navigate directly to a page where he has no right for or if the session is expired. Our navigation is complete in the adfc-config.xml. So I created a phase-listener

  • Start date is in the past: today scheduling

    Dear all, How can I fix that error: *Start date is in the past: today scheduling* *Message no. C7030* Diagnosis The start date determined in scheduling is in the past. In customizing, you have defined the number of days that the start date is allowed

  • Flash CS5 Greeter.cs HelloWorld.fla text type Dynamic not an option? ActionScript 3

    Learning to program in ActionScript 3 for Flash CS5 Pro, http://help.adobe.com/en_US/as3/learn/WS5b3ccc516d4fbf351e63e3d118a9b90204-7fdf.html The tutorial says that the text box, should be text type Dynamic, but the only choices are TLF and Classic S