What is the upgrade cycle for DW?

I have an older version of DW and would like to get DW CS4, but don't want to if CS5 is coming out soon. Can someone tell me when to expect this to happen?
Thanks.

Well just remember Adobe's policy is that you can only upgrade from the previous 3 versions.  So if you have a version prior to MX 2004 you will not be able to upgrade to even CS4.  If you have MX2004 though, CS4 is the last version you will be able to buy at the upgrade rates.  After that you must buy another full license.  If you have 8 or CS3 you can hold off.  It will be released this year and betas for other applications like Flash were stopped to push the public release out sooner, but no definitive date(s) have been announced yet.

Similar Messages

  • What is the implementation cycle for Pharmaceuticals & Chemicals industry

    i am preparing for the interview. could anybody help me by telling the implementation cycle for Pharmaceuticals & Chemicals industry.
    i know the cycle of manufacturing company.
    thank you.

    ASAP Methodology:
    Project Preparation:
    The first step in ASAP is Project Preparation. In this step the Functional Consultant will analyse the business process and define the system for SAP and will give the time line for the project. The Manpower required and the budgets are also considered in this step.
    Blue Print Preparation:
    This is second step in ASAP Methodology. In this step the Project Preparation scenarios are finalised. A out line of the Project is given in this step.
    Realisation:
    In this step actual development is taken place. The ABAPer is responsible for this step.
    Testing:
    In this step the development done by the abaper is being tested. This is the area where the Unit Test Document is prepared (i.e. Positive Testing and Negative Testing).
    GO live and Support:
    This is the final stage where the project is running in the live environment. In this step the bugs if any that are found in the go live procedure are fixed and the project will be considered as support project.
    Rewards if useful.

  • What is the upgrade path for osx ver 10.4.11 on a power pc g4 mac mini?

    We recently set our old Mac Mini back up.  It has a 1.24 ghz PowerPC G4 with 1 gb of ddr sdram.  How do we upgrade the os on this system?  We have applied all security updates available in the Apple Update.

    I believe that the best you can do is to upgrade to Leopard. You would have to look around to find an upgrade disk.
    Snow Leopard requires an intel processor.

  • What are the upgrade options for 2008 MacBook Pro A1260

    I am curious to see what my options are to upgrade my hard drive compared to upgrading completely to an entirely new computer.
    Any suggestions?

    Reliable ram: http://eshop.macsales.com/shop/memory/Apple_MacBook_MacBook_Pro/Upgrade.  Very well known vendor, very reasonable prices, and ram comes with a lifetime guarantee.  As far as reliable hard drives, I can give you brands that I have had no problems with.  Hitachi (still running strong 5 years + in a pc laptop), Samsung, and Western Digital.  Here are some reviews on hard drives: http://www.storagereview.com/best_drives

  • I currently am using ML 10.8.5, what's the best way for me to upgrade to Yosemite 10?

    Hi Folks,
    I am currently using ML 10.8.5. What is the best procedure for me to follow to upgrade to Yosemite 10.0?
    Is Yosemite stable enough to upgrade to?
    I currently am running MAC OSX on an Apple iMac 27 late 2012 with 24GB of system ram, and 1TB Fusion HDD
    I have as a back up drive an external 1TB FW800 using Super Duper as cloning of my current 10.8.5
    I also use another external FW800 3TB HDD running TM
    Many thanks for any helpful suggestions

    you can no longer send to a group and now have to look for a + in the right corner and click on each addressee
    I welcome that.  Mass e-mails have a downside:
    You get implicated in them when you least want to.
    You get blocked by internet providers preventing you from sending to your contacts who are on those internet providers even when you haven't sent any, because someone else has you on their address list who does send mass e-mails, and you get "blacklisted."
    You get summarily ignored by others if you are believed to be a sender of them, as they will probably use the fact you mass e-mailed as a means of blocking you.
    Use BCC when mass e-mailing.
    You can always make your list of e-mails in a comma delimited fashion, and copy/paste it to the field you want.   

  • What is the Smartnet service for the 2504 license upgrade LIC-CT2504-UPG ?

    Hi guys,
    Can some one explain me what is this service for ? I have the LIC-CT2504-UPG, with the LIC-CT2504-5A (5 AP licenses adder) and I don't understeand what are the SMARTNet services for this licenses ?
    Are they needed if I already have the SMARTNet service for the hardware controller ?
    Do these services provide something additional on top of the hardware service ?
    Thank you.

    HI,
    Smartnet Service Contract:
    Reduce downtime with fast, expert technical support, flexible hardware coverage, and smart, proactive device diagnostics with SMARTnet Service. Your IT staff has anytime access to Cisco engineers in the Technical Assistance Center (TAC) and an extensive range of resources, tools and training.
    What You Get by having this contract :
    Global 24-hour access to experts in the Cisco Technical Assistance Center (TAC)
    Self-help support through online communities, resources, and tools
    Hardware replacement options, including 2-hour, 4-hour and next business day
    software updates and download from cisco website fro your controller.
    Hope you got the point :)
    Regards
    Dont forget to rate helpful posts

  • End of Upgrade Cycle for CS3 and CS4... Really Adobe?

    As if business wasn't bad enough now I see there will be no upgrade paths past december for CS3 and 4 users. Is this how Adobe plans to keep users away from stopping their upgrades and reducing the number of machines they run Adobe products on? I understand Adobe is not a non-profit and has has to turn a revenue, but the geniuses at Marketing here have made a huge mistake by basically telling their customers that what they have so far will be worth zilch in comes 2013. That arbitrary deadline, is not consider some people who on the east coast are now cash strapped as anyone having to choose between home repairs and other such marvelous stuff and upgrading to CS6 guess what they'll choose. And for the lucky ones not heavily affected by the storms, they will donate to help their community before they will spend money to upgrade perfectly good software.
    It wasn't enough that the upgrade path wasn't much of a discount, but in the current economy every penny counts! The choice of stopping support for CS3 and CS4 in my personal opinion an ill-advised move. I personally went from 3 to 4 within a short amount of time... then when 5 came out my budget didn't allow so I needed to wait. The new CS6 isn't direly needed so I decided I'd have to loose some additional "upgrade power" because money need to be directed elsewhere now... but the news that I'd loose all the upgrade power and would have kept on upgrading for nothing it's just ridiculous... and if that's the treatment a customer will have to expect from now on I think I'll use what I have and move to alternatives stopping to personally support Adobe products an rely on licensed copies at work instead. Perhaps Adobe hasn't notices we aren't exactly doing that great in US between the current economical situation, the various setbacks experienced across the country and for the fact that in this particular business most work is often being outsourced out of US these days... I am sure you will have a huge market on the countries where the outsourced work is being sent... as far as I am concerned comes 12/31/2013 I will no longer be an Adobe customer as Adobe is forcing me out of the upgrade cycle and I won't plan to re-enter anytime soon in the coming future... lesson learnt.
    Thank you for your time (if any of the marketing gurus will have cared to read this far without laughing and discounting with a "screw those old customers, they should've upgraded earlier" which was basically the content of the email I got this week... pasted below)
    Cheers,
    tfbkny
    Content of email received from Adobe saying last chance to upgrade now or what you got will be worthless in less than a couple months.
    Dear Creative Suite customer:
    We want to make sure you're aware of an important change to Adobe's upgrade policy that may affect you.
    Beginning January 1, 2013, only Creative Suite customers with licenses for CS5 or CS5.5 versions will qualify for upgrade pricing to CS6.
    Due to this change, we will only continue offering CS3 and CS4 customers like you special upgrade pricing through December 31, 2012.*
    * Owners of CS3 and CS4 individual products and suite editions will be eligible to receive upgrade pricing to CS6 until December 31, 2012. After that date, only customers on CS5 or CS5.5 will qualify for upgrade pricing to CS6.

    Adobe doesn't care, they don't have to. I like Phsotoshop and have been using it professionally for 20 years, but lets face it, I wouldnt mind some really good competition from another source. It didnt use to be the only game in town, and doesnt have to remain so.
    I could brainstorm how I would want competing software to look like. Pshop is not the easiest workflow possible. Illustrator is clearly deficient to even CorelDraw, and certainly Freehand. I've been meaning to reconnect with CorelDraw. It did some cool things.
    Google Chrome is pulling a lot of manoevers software wise and I hope they try to go a little deeper and give Adobe a run for their money on the one program they feel justifies unbelievable gouging. Go investigate Ableton Live if you want to see what a company that cares about its customers is doing, ADOBE. Audition is a JOKE compared to Ableton Live. Thank God we're not powned on the audio side by these suits.
    The idea that a company would peddle buggy software, which CS4 was..., although some of that was Apple's fault, is bad, the upgrade prices were ridiculous, and this is the end of the road for me currently. The idea that a company would actively
    push away customers is pretty incredible. "But I sent you an email!" Whoops, you gotta pay $1900 for production premium CS6! HAHAHAHAHA. Time for a YT video with my old hard copy box. Sounds like a good idea.
    There are too many options on the motion graphics side, and I'll keep a static machine to run Pshop and AE CS4.
    The masters of the universe will have theit way, and the rest must bow to their ambivalent greed. At least that's the way they think. It would seem that Adobe and Apple really, really want some upstarts to come up. Maybe $360 for a year to figure out an exit might work. It will be interesting to see if this hits earnings. VERY interesting.

  • What's the proper protocol for a reset on my ipod touch 4g?  iOS 6 has totally jacked it up and it will no longer do anything but crash, and won't sync with itunes wirelessly or by cable.

    What's the proper protocol for a reset on my ipod touch 4g?  iOS 6 has totally jacked it up and it will no longer do anything but crash, and won't sync with itunes wirelessly or by cable.
    It's a 64G ipod touch and was fine till Apple told me to upgrade to ios 6.  Now most of my apps crash, my music won't play and I just get a white screen when I hit Music.
    When I try to sync to itunes it acts like it's going to sync and appears to recognize the ipod, but it's grayed out and has an update circle by it that spins for a while until itunes eventually freezes alltogether.  Is there a  way to go back to ios 5 after a erase and reset?

    iOS: Unable to update or restore

  • What are the Things required for BI 7.0 Implementation project

    Hi Friends,
                      Can any one suggest me
    1.What are the Things required for BI 7.0 Implementation project?
    2.System Configurations & Hardware Components?
    3. Any additional steps...
    plz suggest me.
    Regards

    Hi lakshmi,
    http://csc-studentweb.lrc.edu/swp/Berg/articles/PM_2006_upgrade_NW2004s_Bjarne_Berg_v12.ppt#426,3,Why Upgrade u2013 end of supportu2026
    https://www.sdn.sap.com/irj/sdn/go/portal/prtroot/docs/library/uuid/b8d163a7-0301-0010-d9b0-98f692ea3c60
    https://www.sdn.sap.com/irj/sdn/go/portal/prtroot/docs/library/uuid/2e8e5288-0b01-0010-2ea8-bcd4df5084a7
    https://www.sdn.sap.com/irj/servlet/prt/portal/prtroot/docs/library/uuid/472443f2-0c01-0010-20ab-fbd380d45881
    https://wiki.sdn.sap.com/wiki/x/JYk
    Check the following links.
    https://www.sdn.sap.com/irj/servlet/prt/portal/prtroot/docs/library/uuid/84bf4d68-0601-0010-13b5-b062adbb3e33
    check the following
    http://help.sap.com/bp_biv235/BI_EN/html/bw.htm
    business content
    https://www.sdn.sap.com/irj/servlet/prt/portal/prtroot/com.sap.km.cm.docs/library/biw/g-i/how%20to%20co-pa%20extraction%203.0x
    https://websmp203.sap-ag.de/co
    http://help.sap.com/saphelp_nw04/helpdata/en/37/5fb13cd0500255e10000000a114084/frameset.htm

  • What's the best SSD for a Macbook Pro 13" Mid 2010?

    Hello.
    I will upgrade my 2010 Macbook Pro. I need to know what's the best SSD for my Macbook Pro. I was thinking about those:
    - Kingston SSDNow V+200 (SVP200S37A/120G) - 120 GB
    - CRUCIAL SSD M4 128 GB
    - CORSAIR SSD  Force Series GS 128 GB
    - SAMSUNG SSD 840 Series Basic 2.5" - 120 GB (MZ-7TD120BW)
    - CRUCIAL SSD interno Crucial v4 - 128 GB
    Those are the easiest to find on Portugal.

    It is my understanding that SATA III is backwards compatible to SATA II so that should not be an issue for your selection process.
    As an aside, you might be interested to know that your MBP can now have 16 GB RAM installed.
    http://blog.macsales.com/16353-owc-announces-maxram-memory-upgrades-to-16gb-for- 2010-mac-mini-macbook-and-macbook-pro
    Ciao.

  • What is the best antivirus for MacBook Pro?

    What is the best antivirus for MacBook Pro?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use one of the free anti-virus products in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use the software unless a network administrator requires you to do it.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • What are the best approaches for mapping re-start in OWB?

    What are the best approaches for mapping re-start in OWB?
    We are using OWB repository 10.2.0.1.0 and OWB client 10.2.0.1.31. The Oracle version is 10 G (10.2.0.3.0). OWB is installed on Linux.
    We have number of mappings. We built process flows for mappings as well.
    I like to know, what are the best approches to incorportate re-start options in our process. ie a failure of mapping in process flow.
    How do we re-cycle failed rows?
    Are there any builtin features/best approaches in OWB to implement the above?
    Does runtime audit tables help us to build re-start process?
    If not, do we need to maintain our own tables (custom) to maintain such data?
    How did our forum members handled above situations?
    Any idea ?
    Thanks in advance.
    RI

    Hi RI,
    How many mappings (range) do you have in a process flows?Several hundreds (100-300 mappings).
    If we have three mappings (eg m1, m2, m3) in process flow. What will happen if m2 fails?Suppose mappings connected sequentially (m1 -> m2 -> m3). When m2 fails then processflow is suspended (transition to m3 will not be performed). You should obviate cause of error (modify mapping and redeploy, correct data, etc) and then repeat m2 mapping execution from Workflow monitor - open diagram with processflow, select mapping m2 and click button Expedite, choose option Repeat.
    In re-start, will it run m1 again and m2 son on, or will it re-start at row1 of m2?You can specify restart point. "at row1 of m2" - I don't understand what you mean (all mappings run in Set based mode, so in case of error all table updates will rollback,
    but there are several exception - for example multiple target tables in mapping without corelated commit, or error in post-mapping - you must carefully analyze results of error).
    What will happen if m3 fails?Process is suspended and you can restart execution from m3.
    By having without failover and with max.number of errors=0, you achieve re-cycle failed rows to zero (0).This settings guarantee existence only two return result of mapping - SUCCSES or ERROR.
    What is the impact, if we have large volume of data?In my opinion for large volume Set based mode is the prefered processing mode of data processing.
    With this mode you have full range enterprise features of Oracle database - parallel query, parallel DML, nologging, etc.
    Oleg

  • WHat is the best platform for SAP EP ?

    Experts
    Can any one help to share some information about what is the best platform for portal ?
    Windows or UNIX
    I have personally seen most of the customers are using windows as thier OS for Portal. When it comes to R3 BW SRM CRM and other application,its UNIX.
    Interms of Performance , Windows is not right choice . I am not sure about life cycle management for the Windows.
    A big advantage of using Windows hosting is that.NET technologies: ASP. NET, VB.NET easily works on these Hosts. If, the website is built using these technologies then opting a Windows server is most suitable
    Microsoft Sharepoint is yet another application, which needs exclusive, Windows hosting. The only option available for users using this application is Windows server
    Appreciate your inputs
    Regards
    Karthi

    Do not double post!
    Markus

  • What are the best practices for the RCU's schemas

    Hi,
    I was wondering if there is some best practices about the RCU's schemas created with BIEE.
    I already have discoverer (and application server), so I have a metadata repository for the Application Server. I will upgrade Discoverer 10g to 11, so I will create new schema with RCU in my metada repository (MR) of the Application Server. I'm wondering if I can put the BIEE's RCU schemas in the same database.
    Basically,
    1. is there a standard for the PREFIX ?
    2. If I have multiple components of Fusion in the same Database, I will have multiples PREFIX_MDS schema ? Can they have the same PREFIX ? Or They all need to have a different prefix ?
    For exemple: DISCO_MDS and BIEE_MDS or I can have DEV_MDS and this schema is valid for both Discoverer and BIEE.
    Thank you !

    What are the best practices for exception handling in n-tier applications?
    The application is a fat client based on MVVM pattern with
    .NET framework.
    That would be to catch all exceptions at a single point in the n-tier solution, log it and create user friendly messages displayed to the user. 

  • What is the activation code for InDesign CS5?

    What is the activation code for InDesign CS5?

    We've recently upgraded to CS5 and they are requiring an activation/authorization to continue using the program.

Maybe you are looking for