WSSIG - Call for panel members
The Web Services Special Interest Group (WSSIG) will be meeting on September 18, 2005 during the Oracle OpenWorld 2005 at the Moscone Center, San Francisco, California.
The highlight of our meeting is an educative discussion on Web Services by
a panel of industry experts who will share their knowledge, best practices, tips and tricks. Oracle Corporation will be represented on the panel as well to discuss future directions, Fusion Middleware and Project Fusion.
If you have considerable experience with Web Services and interested in
filling the two remaining slots on this panel, please email [email protected] latest by September 2, 2005. Please include a brief bio, highlighting your Web Services expertise and your contact phonenumber.
We encourage everyone who is attending OpenWorld 2005 to join us at 3:25PM
in Room 3005 to attend this exciting session to learn about Web Services,
how to leverage them in your business today and get your questions
answered.
Please visit our website (http://wssig.oaug.org) for more details and information on how to join the WSSIG.
Look forward to seeing you in San Francisco!
WSSIG Board of Directors
the problem is the null layout.
the background paints itself on top of buttons and the such.
i had the same problem and fix it using the layeredPane, in which you set a certain depth for each component.
the background can then be set at level zero and the butrtons at a higher depth ... then the repain does not cover the buttons.
to learn how to use the layered panes go to ..
http://java.sun.com/docs/books/tutorial/uiswing/components/layeredpane.html
Similar Messages
-
Multiple back bean calls for rendered panels
Hello,
We have experienced some strange behaviours, when rendering a panel based on some back bean paramater the backing bean method is called multiple times. It seems that the backing bean is called for each child element is the panel.
For instance in the following example the backing bean will be called 6 times.
<t:div id="test" rendered="#{! empty UCB.attribut}" >
<t:outputText value="text1" />
<t:outputText value="text2" />
<t:outputText value="text3" />
<t:outputText value="text4" />
<t:outputText value="text5" />
</t:div>Is this a configuration issue or just how jsf is implemented?
//ChrisCalled sequentially (from my original post):
wsCodeList["GetTupleList"].arguments.TupleName = "BUSTYPE";
var call:Object = wsCodeList["GetTupleList"].send();
call.destination = "busType";
wsCodeList["GetTupleList"].arguments.TupleName = "ENTTYPE";
call = wsCodeList["GetTupleList"].send();
call.destination = "entityType";
The docs seem to say this is allow and example found online
do similar, except the arguments are passed as a parameter to send.
This doesn't work for me though. The web service I'm using will
only take the arguments using the arguments object. -
IPTComm 2010 Call for Papers: Deadline Extended
CALL FOR PAPERS: DEADLINE EXTENDED
4th ACM Conference on Principles, Systems and Applications of IP Telecommunications
IPTComm 2010
http://www.iptcomm.org
August 2-3, 2010
Leibniz Supercomputing Center
Munich, Germany
IMPORTANT DATES
================
Paper registration: Midnight, March 5, 2010.
Paper submission: Midnight March 19th, 2010 (Firm deadline).
Notification of acceptance: May 21st, 2010.
Final camera-ready submission: June 30th, 2010.
Conference dates: August 2-3, 2010.
The paper submission deadline has been extended to March 19, 2010.
However, authors are required to register with EDAS and submit
their paper abstract by the original deadline of Midnight March 5,
2010.
The IP communications domain has matured beyond providing VoIP only
services. Universities, enterprises, businesses and individual
consumers routinely use VoIP. The focus of IP communications is now on
the operations, management, administration and provisioning aspects of
large-scale, reliable and secure communication systems. To this extent,
the research and standardization work now includes log file analysis,
session tracing across proxy meshes and overload control. As IP
communications grapples with these issues, newer technologies in the
form of cloud-based IP communication systems; peer-to-peer VoIP
networks; use of IP communications in virtual worlds; social
networks and IP communications are starting to assert a strong
presence in the IP communications domain.
The aim of the IPTComm conference is to serve as a platform for
researchers from academia, research labs, industry and government to
share their ideas, views, results and experiences in the field of
IP-based telecommunication. IPTComm will include presentations of
theoretical and experimental achievements, innovative systems,
prototyping efforts, case studies, and advancements in technology.
We invite authors to submit papers in the following and related areas:
New services and service models
* Over-the-top services.
* Social networking and IP communications.
* IP telecommunications in virtual worlds.
* Compositional services and model checking.
* Cloud-based IP communications infrastructure.
* Rapid application development frameworks.
* APIs and enablers for IP communication services.
* Browser-based IP communication services.
* Context-aware communication services.
* IMS and NGN services.
Management and Resilience
* Advantages and disadvantages of IP communications as a P2P
application.
* Advances in P2P overlays for IP communications systems.
* Management of IP communications systems and networks.
* Overload management schemes for IP communications.
* Log files and log file analysis for IP communication systems.
* Scalability of large-scale IP communication systems.
* Traffic and QoS measurement of VoIP traffic.
* Self-tuning and self-monitoring IP communications systems.
* Service discovery.
* Energy consumption and energy management in IP communication
systems.
* Incentives in P2P IP communication systems.
* Resilience in P2P IP communication system.
Security
* Identity management for IP communications systems.
* Anonymity and privacy in IP communications.
* Forensics and diagnostics in IP communication systems.
* Techniques to detect, mitigate and prevent SPIT, phreaking
and vishing.
* Denial of service detection and prevention.
Mobile IP Communications
* Mobile IP communication services.
* Mobility in cloud-based IP communications infrastructure.
* Mobile P2P IP communication systems.
Miscellaneous
* The role of IP communications in the power grid.
* Open source development in IP communications.
* Research issues in vertical IP communication markets (e.g.,
privacy in the medical field, location in logistical
field, etc.)
* Regulatory issues in IP communications.
AUTHOR INFORMATION
==================
Papers submission is handled by EDAS (http://edas.info/N8459).
IPTComm solicits full papers up to 12 pages in length, in two-column
ACM conference format
(see http://www.acm.org/sigs/publications/proceedings-templates). All
submissions must describe original research, not published nor
currently under review for another conference or journal. The program
committee will referee all papers, and accepted papers will be
published in the conference proceedings. Papers will also be published in
the ACM Digital Library.
In 2010, IPTComm will be accepting short papers of at least 5 pages and
no more than 6 pages. The aim of the short paper category is to help
maintain a published record of work carried out as well as facilitate
future affiliations and foster collaborative work. Short papers are
subject to the same rigorous review process as full papers and follow
the same submission process, schedule and expectation of presentation as
the full papers.
IMPORTANT DATES
================
Paper registration: Midnight, March 5, 2010.
Paper submission: Midnight March 19th, 2010 (Firm deadline).
Notification of acceptance: May 21st, 2010.
Final camera-ready submission: June 30th, 2010.
Conference dates: August 2-3, 2010.
Conference Location: Leibniz Supercomputing Center, Munich, Germany.
CONFERENCE CO-CHAIRS
====================
Georg Carle (Technical University of Munich)
Helmut Reiser (Leibniz Supercomputing Center)
TPC CO-CHAIRS
=============
Gonzalo Camarillo (Ericsson Research)
Vijay K. Gurbani (Bell Laboratories/Alcatel-Lucent)
DEMONSTRATION AND INDUSTRY TALKS CO-CHAIRS
==========================================
Carol Davids (Illinois Institute of Technology)
Saverio Niccolini (NEC Laboratories Europe)
PUBLICITY CHAIR
===============
Gregory Bond (AT&T Research)
Steering Committee
==================
Gregory Bond (AT&T Research)
Saverio Niccolini (NEC Laboratories Europe)
Henning Schulzrinne (Columbia University)
Dorgham Sisalem (Tekelec)
Radu State (University of Luxembourg)
TPC MEMBERS
===========
John Buford Avaya Labs Research
Eric Chen NTT Corporation
Eric Cheung AT&T Labs - Research
Tasos Dagiuklas Technological Educational Institute of Mesolonghi
Carol Davids Illinois Institute of Technology
Ali Fessi Technical University of Munich
Rosario Garroppo University of Pisa
Aniruddha Gokhale Vanderbilt University
Swapna Gokhale University of Connecticut
Carmen Guerrero University Carlos III of Madrid
Christian Hoene University of Tubingen
Alan Jeffrey Bell Laboratories, Alcatel-Lucent
Cullen Jennings Cisco
Salvatore Loreto Ericsson
Jouni Maenpaa Ericsson
Enrico Marocco Telecom Italia
Joerg Ott Helsinki University of Technology
Victor Pascual Avila Acme Packets
Joachim Posegga University of Passau
Anand Prasad NEC Corporation
Yacine Rebahi Fraunhofer Institut Fokus, Berlin
Ivica Rimac Bell Laboratories, Alcatel-Lucent
Ronaldo Salles Military Institute of Engineering (Brazil)
Stefano Salsano University of Rome "Tor Vergata"
Jan Seedorf NEC Europe Ltd.
Jose Solar Technical University of Denmark
Ivan Vidal University Carlos III of Madrid
Xiaotao Wu Avaya Labs Research
Pamela Zave AT&T LaboratoriesReminder: Our call for papers is closing on Monday 27th July. Be sure to send your abstracts to [[email protected]]
We also have a Twitter account and will be posting updates via that. Se sure to follow: aus_ora_spatial
Ross. -
IPTComm 2010: Call for Papers
****** NOTE: Submissions due on Mar 5, 2010 *******
IPTCOMM 2010
============
The Fourth Conference on Principles, Systems and Applications of
IP Telecommunications
August 2 and 3, 2010
Leibniz Supercomputing Center
Munich, Germany
http://iptcomm.org
The IP communications domain has matured beyond providing VoIP only
services. Universities, enterprises, businesses and individual
consumers routinely use VoIP. The focus of IP communications is now on
the operations, management, administration and provisioning aspects of
large-scale, reliable and secure communication systems. To this extent,
the research and standardization work now includes log file analysis,
session tracing across proxy meshes and overload control. As IP
communications grapples with these issues, newer technologies in the
form of cloud-based IP communication systems; peer-to-peer VoIP
networks; use of IP communications in virtual worlds; social
networks and IP communications are starting to assert a strong
presence in the IP communications domain.
The aim of the IPTComm conference is to serve as a platform for
researchers from academia, research labs, industry and government to
share their ideas, views, results and experiences in the field of
IP-based telecommunication. IPTComm will include presentations of
theoretical and experimental achievements, innovative systems,
prototyping efforts, case studies, and advancements in technology.
We invite authors to submit papers in the following and related areas:
New services and service models
* Over-the-top services.
* Social networking and IP communications.
* IP telecommunications in virtual worlds.
* Compositional services and model checking.
* Cloud-based IP communications infrastructure.
* Rapid application development frameworks.
* APIs and enablers for IP communication services.
* Browser-based IP communication services.
* Context-aware communication services.
* IMS and NGN services.
Management and Resilience
* Advantages and disadvantages of IP communications as a P2P
application.
* Advances in P2P overlays for IP communications systems.
* Management of IP communications systems and networks.
* Overload management schemes for IP communications.
* Log files and log file analysis for IP communication systems.
* Scalability of large-scale IP communication systems.
* Traffic and QoS measurement of VoIP traffic.
* Self-tuning and self-monitoring IP communications systems.
* Service discovery.
* Energy consumption and energy management in IP communication
systems.
* Incentives in P2P IP communication systems.
* Resilience in P2P IP communication system.
Security
* Identity management for IP communications systems.
* Anonymity and privacy in IP communications.
* Forensics and diagnostics in IP communication systems.
* Techniques to detect, mitigate and prevent SPIT, phreaking
and vishing.
* Denial of service detection and prevention.
Mobile IP Communications
* Mobile IP communication services.
* Mobility in cloud-based IP communications infrastructure.
* Mobile P2P IP communication systems.
Miscellaneous
* The role of IP communications in the power grid.
* Open source development in IP communications.
* Research issues in vertical IP communication markets (e.g.,
privacy in the medical field, location in logistical
field, etc.)
* Regulatory issues in IP communications.
AUTHOR INFORMATION
==================
Papers submission is handled by EDAS (http://edas.info/N8459).
IPTComm solicits full papers up to 12 pages in length, in two-column
ACM conference format
(see http://www.acm.org/sigs/publications/proceedings-templates). All
submissions must describe original research, not published nor
currently under review for another conference or journal. The program
committee will referee all papers, and accepted papers will be
published in the conference proceedings. Pending cooperation agreements,
papers will also be published in the ACM Digital Library.
In 2010, IPTComm will be accepting short papers of at least 5 pages and
no more than 6 pages. The aim of the short paper category is to help
maintain a published record of work carried out as well as facilitate
future affiliations and foster collaborative work. Short papers are
subject to the same rigorous review process as full papers and follow
the same submission process, schedule and expectation of presentation as
the full papers.
IMPORTANT DATES
================
Paper submission: Midnight March 5th, 2010.
Notification of acceptance: May 21st, 2010.
Final camera-ready submission: June 30th, 2010.
Conference dates: August 2-3, 2010.
Conference Location: Leibniz Supercomputing Center, Munich, Germany.
CONFERENCE CO-CHAIRS
====================
Georg Carle (Technical University of Munich)
Helmut Reiser (Leibniz Supercomputing Center)
TPC CO-CHAIRS
=============
Gonzalo Camarillo (Ericsson Research)
Vijay K. Gurbani (Bell Laboratories/Alcatel-Lucent)
DEMONSTRATION AND INDUSTRY TALKS CO-CHAIRS
==========================================
Carol Davids (Illinois Institute of Technology)
Saverio Niccolini (NEC Laboratories Europe)
PUBLICITY CHAIR
===============
Gregory Bond (AT&T Research)
Steering Committee
==================
Gregory Bond (AT&T Research)
Saverio Niccolini (NEC Laboratories Europe)
Henning Schulzrinne (Columbia University)
Dorgham Sisalem (Tekelec)
Radu State (University of Luxembourg)
TPC MEMBERS
===========
John Buford Avaya Labs Research
Eric Chen NTT Corporation
Eric Cheung AT&T Labs - Research
Tasos Dagiuklas Technological Educational Institute of Mesolonghi
Carol Davids Illinois Institute of Technology
Ali Fessi Technical University of Munich
Rosario Garroppo University of Pisa
Aniruddha Gokhale Vanderbilt University
Swapna Gokhale University of Connecticut
Carmen Guerrero University Carlos III of Madrid
Christian Hoene University of Tubingen
Alan Jeffrey Bell Laboratories, Alcatel-Lucent
Cullen Jennings Cisco
Salvatore Loreto Ericsson
Jouni Maenpaa Ericsson
Enrico Marocco Telecom Italia
Joerg Ott Helsinki University of Technology
Victor Pascual Avila Acme Packets
Joachim Posegga University of Passau
Anand Prasad NEC Corporation
Yacine Rebahi Fraunhofer Institut Fokus, Berlin
Ivica Rimac Bell Laboratories, Alcatel-Lucent
Ronaldo Salles Military Institute of Engineering (Brazil)
Stefano Salsano University of Rome "Tor Vergata"
Jan Seedorf NEC Europe Ltd.
Jose Solar Technical University of Denmark
Ivan Vidal University Carlos III of Madrid
Xiaotao Wu Avaya Labs Research
Pamela Zave AT&T LaboratoriesReminder: Our call for papers is closing on Monday 27th July. Be sure to send your abstracts to [[email protected]]
We also have a Twitter account and will be posting updates via that. Se sure to follow: aus_ora_spatial
Ross. -
Call for participation: OASIS Enterprise Key Management Infrastructure TC
We would welcome your participation in this process. Thank you.
Arshad Noor
StrongAuth, Inc.
To: OASIS members & interested parties
A new OASIS technical committee is being formed. The OASIS Enterprise Key
Management Infrastructure (EKMI) Technical Committee has been proposed by the
members of OASIS listed below. The proposal, below, meets the requirements of
the OASIS TC Process [a]. The TC name, statement of purpose, scope, list of
deliverables, audience, and language specified in the proposal will constitute
the TC's official charter. Submissions of technology for consideration by the
TC, and the beginning of technical discussions, may occur no sooner than the
TC's first meeting.
This TC will operate under our 2005 IPR Policy. The eligibility
requirements for becoming a participant in the TC at the first meeting (see
details below) are that:
(a) you must be an employee of an OASIS member organization or an individual
member of OASIS;
(b) the OASIS member must sign the OASIS membership agreement [c];
(c) you must notify the TC chair of your intent to participate at least 15
days prior to the first meeting, which members may do by using the "Join this
TC" button on the TC's public page at [d]; and
(d) you must attend the first meeting of the TC, at the time and date fixed
below.
Of course, participants also may join the TC at a later time. OASIS and the TC
welcomes all interested parties.
Non-OASIS members who wish to participate may contact us about joining OASIS
[c]. In addition, the public may access the information resources maintained for
each TC: a mail list archive, document repository and public comments facility,
which will be linked from the TC's public home page at [d].
Please feel free to forward this announcement to any other appropriate lists.
OASIS is an open standards organization; we encourage your feedback.
Regards,
Mary
Mary P McRae
Manager of TC Administration, OASIS
email: mary.mcrae(AT)oasis-open.org
web: www.oasis-open.org
a) http://www.oasis-open.org/committees/process.php
b) http://www.oasis-open.org/who/intellectualproperty.php
c) See http://www.oasis-open.org/join/
d) http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=ekmi
CALL FOR PARTICIPATION
OASIS Enterprise Key Management Infrastructure (EKMI) TC
Name
OASIS Enterprise Key Management Infrastructure (EKMI) TC
Statement of Purpose
Public Key Infrastructure (PKI) technology has been around for more than a
decade, and many companies have adopted it to solve specific problems in the
area of public-key cryptography. Public-key cryptography has been embedded in
some of the most popular tools -- web clients and servers, VPN clients and
servers, mail user agents, office productivity tools and many industry-specific
applications -- and underlies many mission-critical environments today.
Additionally, there are many commercial and open-source implementations of PKI
software products available in the market today. However, many companies across
the world have recognized that PKI by itself, is not a solution.
There is also the perception that most standards in PKI have already been
established by ISO and the PKIX (IETF), and most companies are in
operations-mode with their PKIs -- just using it, and adopting it to other
business uses within their organizations. Consequently, there is not much left
to architect and design in the PKI community.
Simultaneously, there is a new interest on the part of many companies in the
management of symmetric keys used for encrypting sensitive data in their
computing infrastructure. While symmetric keys have been traditionally managed
by applications doing their own encryption and decryption, there is no
architecture or protocol that provides for symmetric key management services
across applications, operating systems, databases, etc. While there are many
industry standards around protocols for the life-cycle management of asymmetric
(or public/private) keys -- PKCS10, PKCS7, CRMF, CMS, etc. -- however, there is
no standard that describes how applications may request similar life-cycle
services for symmetric keys, from a server and how public-key cryptography may
be used to provide such services.
Key management needs to be addressed by enterprises in its entirety -- for both
symmetric and asymmetric keys. While each type of technology will require
specific protocols, controls and management disciplines, there is sufficient
common ground in the discipline justifying the approach to look at
key-management as a whole, rather than in parts. Therefore, this TC will
address the following:
Scope
A) The TC will create use-case(s) that describe how and where
the protocols it intends to create, will be used;
B) The TC will define symmetric key management protocols,
including those for:
1. Requesting a new or existing symmetric key from a server;
2. Requesting policy information from a server related to caching of keys on the
client;
3. Sending a symmetric key to a requestor, based on a request;
4. Sending policy information to a requestor, based on a request;
5. Other protocol pairs as deemed necessary.
C) To ensure cross-implementation interoperability, the TC will create a test
suite (as described under 'Deliverables' below) that will allow different
implementations of this protocol to be certified against the OASIS standard
(when ratified);
D) The TC will provide guidance on how a symmetric key-management infrastructure
may be secured using asymmetric keys, using secure and generally accepted
practices;
E) Where appropriate, and in conjunction with other standards organizations that
focus on disciplines outside the purview of OASIS, the TC will provide input on
how such enterprise key-management infrastructures may be managed, operated and
audited;
F) The TC may conduct other activities that educate users about, and promote,
securing sensitive data with appropriate cryptography, and the use of proper
key-management techniques and disciplines to ensure appropriate protection of
the infrastructure.
List of Deliverables
1. XSchema Definitions (XSD) of the request and response protocols (by August
2007) 2. A Test Suite of conformance clauses and sample transmitted keys and
content that allows for clients and servers to be tested for conformance to the
defined protocol (by December 2007)
3. Documentation that explains the communication protocol (by August 2007)
4. Documentation that provides guidelines for how an EKMI may be built,
operated, secured and audited (by December 2007)
5. Resources that promote enterprise-level key-management: white papers,
seminars, samples, and information for developer and public use. (beginning
August 2007, continuing at least through 2008)
Anticipated Audiences:
Any company or organization that has a need for managing cryptographic keys
across applications, databases, operating systems and devices, yet desires
centralized policy-driven management of all cryptographic keys in the
enterprise. Retail, health-care, government, education, finance - every industry
has a need to protect the confidentiality of sensitive data. The TC's
deliverables will provide an industry standard for protecting sensitive
information across these, and other, industries.
Security services vendors and integrators should be able to fulfill their use
cases with the TC's key management methodologies.
Members of the OASIS PKI TC should be very interested in this new TC, since the
goals of this TC potentially may fulfill some of the goals in the charter of the
PKI TC.
Language:
English
IPR Policy:
Royalty Free on Limited Terms under the OASIS IPR Policy
Additional Non-normative information regarding the start-up of the TC:
a. Identification of similar or applicable work:
The proposers are unaware of any similar work being carried on in this exact
area. However, this TC intends to leverage the products of, and seek liaison
with, a number of other existing projects that may interoperate with or provide
functionality to the EKMI TC's planned outputs, including:
OASIS Web Services Security TC
OASIS Web Services Trust TC
W3C XMLSignature and XMLEncryption protocols and working group
OASIS Digital Signature Services TC
OASIS Public Key Infrastructure TC
OASIS XACML TC (and other methods for providing granular access-control
permissions that may be consumed or enforced by symmetic key management)
b. Anticipated contributions:
StrongAuth, Inc. anticipates providing a draft proposal for the EKMI protocol,
at the inception of the TC. The current draft can be viewed at:
http://www.strongkey.org/resources/documentation/misc/skcl-sks-protocol.html
and a working implementation of this protocol is available at:
http://sourceforge.net/projects/strongkey for interested parties.
c. Proposed working title and acronym for specification:
Symmetric Key Services Markup Language (SKSML), subject to TC's approval or
change.
d. Date, time, and location of the first meeting:
First meeting will be by teleconference at:
Date: January 16, 2007
Time: 10 AM PST, 1PM EST
Call in details: to be posted to TC list
StrongAuth has agreed to host this meeting.
e. Projected meeting schedule:
Subject to TC's approval, we anticipate monthly telephone meetings for the first
year. First version of the protocol to be voted on by Summer 2007. StrongAuth is
willing to assist by arranging for the teleconferences; we anticipate using
readily available free teleconference services.
f. Names, electronic mail addresses, of supporters:
Ken Adler, ken(AT)adler.net
June Leung,June.Leung(AT)FundServ.com
John Messing, jmessing(AT)law-on-line.com
Arshad Noor, arshad.noor(AT)strongauth.com
Davi Ottenheimer, davi(AT)poetry.org
Ann Terwilliger, aterwil(AT)isa.com
g. TC Convener:
Arshad Noor, arshad.noor(AT)strongauth.comHi Bilge,
did you put your text in a blender before sending it?
I understood everything works fine except the miscellaneous menu item in the configuration tab of ERM?
Have you already tried to clear all browser cache, close all browsers and try it again?
Best,
Frank -
[Call for Speakers & Sponsors] March 4th, 2015 - ASUG Ontario
[Call for Speakers & Sponsors] March 4th, 2015 - ASUG Ontario Chapter Meeting
Follow our Events on Twitter - @ASUG_Ontario
SAP Customer Keynotes by Canada Post and Cirque Du Soliel.
Over 150 Attendees from the SAP Ecosystem.
SAP Mobility Panel
Real-World Customer Case Studies.
Break-Out Track Session.
Sponsor Showcase Area
Limited slots in the SPONSOR SHOWCASE - Reply ASAP via SurveyYou'd really have to get back in touch with Support and give them your reference number, so they can look into this for you. If you don't have any luck getting a response, post up your reference number and we'll see what we can do.
Cat -
IPTComm 2007 Call for Participation
Please find enclosed the Call for Participation for a new conference devoted to IP telecommunications to be held in New York, July 2007. You are encouraged to circulate this message to interested colleagues, mailing lists, forums and blogs.
Greg Bond
IPTComm 2007 Co-Chair
==============================================================
Call For Participation
IPTComm 2007
PRINCIPLES, SYSTEMS AND APPLICATIONS OF IP TELECOMMUNICATIONS
19, 20 July 2007
Columbia University
NY, USA
(in cooperation with ACM SIGCOMM)
http://iptcomm.org
Registration for IPTComm 2007 is now open! Be sure to register soon in order to qualify for the early registration discount. The conference program has been finalized. Some highlights are: a stimulating technical program, Jeff Pulver as the keynote speaker, Jonathan Rosenberg opening Day Two, a panel discussion with broad representation from industry and academia, two tutorials, and a demos program. We are now in the process of organizing some entertaining social events. Details will be available soon. Hope to see you in New York in July!Hi John,
Is I said in the mail I sent you, I'd be interested in having a go at this. We use TRAC in house and it would be nice to have a connector up and running for TPC.
I'm hoping others would be willing to join in as well.
Thanks
Femi -
Hello,
I'm using the Forte Developer 6 Update 2 C++ compiler and standard library on Solaris 9 SPARC. I've installed the recommended patch set for C++ (both the workshop and platform patches).
In my code, I have a STL set with some elements that I want to modify, say:
typedef set<SomeClass> MySet;
typedef MySet::iterator MySetIter;
I'm trying to look for an element, then update some of its fields:
MySet theSet;
SomeClass sci;
MySetIter it = theSet.find(sci);
if (it != theSet.end()) {
it->update_some_fields();
The above code fails with the following error (some details scrapped):
Error: Non-const function SomeClass::update_some_fields() called for const object
Which is weird, since set::find() seems to return a set<...>::iterator, not a set<...>::const_iterator!
If I try a workaround, like this:
if (it != theSet.end()) {
SomeClass &tmp = *it;
tmp->update_some_fields();
I get this other error:
Initializing SomeClass& requires an lvalue.
Is there some way to convince the Forte compiler to work around this situation (most likely a compiler / library bug)?This was fixed, too, by replacing the set with a map. It seems that the issue was related to the fact that any change made to a set member is supposed to not modify the elements that make up the key (the elements that are used in the comparison function to determine the ordering). The Windows (dinkumware) implementation of the STL allows set modifications, though I don't know how they check that the key fields are not modified. The Solaris implementation (and the GNU implementation, too) disallows any modifications made to set members. At least that's what a person more knowledgeable of C++ in our office found out. So I don't think the issue was related to template constructors or any unimplemented features after all.
-
Dear Experts,
Please note that I am facing a chllenge while confiuguring the VNCServer on the local test Server. The Local Test Sver OS Version is Redhat Enterprise Linux Server
Release 5.5 32-bit. Please review the following error message and advise me on how to fix the vncserver issue.
[root@test .vnc]# cat xstartup
#!/bin/sh
# Uncomment the following two lines for normal desktop:
unset SESSION_MANAGER
exec /etc/X11/xinit/xinitrc
gnome-session &
[ -x /etc/vnc/xstartup ] && exec /etc/vnc/xstartup
[ -r $HOME/.Xresources ] && xrdb $HOME/.Xresources
xsetroot -solid grey
vncconfig -iconic &
#xterm -geometry 80x24+10+10 -ls -title "$VNCDESKTOP Desktop" &
twm &
[root@test .vnc]# cat /etc/sysconfig/vncservers
# The VNCSERVERS variable is a list of display:user pairs.
# Uncomment the lines below to start a VNC server on display :2
# as my 'myusername' (adjust this to your own). You will also
# need to set a VNC password; run 'man vncpasswd' to see how
# to do that.
# DO NOT RUN THIS SERVICE if your local area network is
# untrusted! For a secure way of using VNC, see
# <URL:http://www.uk.research.att.com/archive/vnc/sshvnc.html>.
# Use "-nolisten tcp" to prevent X connections to your VNC server via TCP.
# Use "-nohttpd" to prevent web-based VNC clients connecting.
# Use "-localhost" to prevent remote VNC clients connecting except when
# doing so through a secure tunnel. See the "-via" option in the
# `man vncviewer' manual page.
# VNCSERVERS="2:myusername"
# VNCSERVERARGS[2]="-geometry 800x600 -nolisten tcp -nohttpd -localhost"
VNCSERVERS="1:oracle"
[root@test .vnc]# ls
passwd test.oracle.co.zm:1.pid test.oracle.co.zm:3.log test.oracle.co.zm:5.pid test.oracle.co.zm:6.pid
test.oracle.co.zm:1.log test.oracle.co.zm:2.log test.oracle.co.zm:5.log test.oracle.co.zm:6.log xstartup
[root@test .vnc]# more test.oracle.co.zm:1.log
Xvnc Free Edition 4.1.2
Copyright (C) 2002-2005 RealVNC Ltd.
See http://www.realvnc.com for information on VNC.
Underlying X server release 70101000, The X.Org Foundation
Tue Mar 11 11:18:37 2014
vncext: VNC extension running!
vncext: Listening for VNC connections on port 5901
vncext: Listening for HTTP connections on port 5801
vncext: created VNC server for screen 0
Could not init font path element unix/:7100, removing from list!
localuser:root being added to access control list
No profile for user 'root' found
SESSION_MANAGER=local/test.oracle.co.zm:/tmp/.ICE-unix/13603
Window manager warning: Log level 32: could not find XKB extension.
** (eggcups:13671): WARNING **: IPP request failed with status 1030
** (eggcups:13671): WARNING **: IPP request failed with status 1030
** (nm-applet:13697): WARNING **: No connections defined
Initializing nautilus-open-terminal extension
Unable to open desktop file /usr/share/applications/redhat-email.desktop for panel launcher: No such file or directory
Unable to open desktop file /usr/share/applications/openoffice.org-1.9-writer.desktop for panel launcher: No such file or directory
Unable to open desktop file /usr/share/applications/openoffice.org-1.9-impress.desktop for panel launcher: No such file or directory
Unable to open desktop file /usr/share/applications/openoffice.org-1.9-calc.desktop for panel launcher: No such file or directory
[root@test .vnc]#
Regards
Mohammed Abdul MuqeetHi,
Try these 3 solutions
1. Did you start vncserver services as:
service vncserver start
2.Check that port 5901 has not been blocked by a firewall:
# nc -vz localhost 5901
You should get a connection and a termination. If you get an error, fix the firewall.
3. service iptables stop
Hope This Helps
Regards,
-DK -
hello i have started using iphone 5 for which i downloaded my contacts from i clouds i am not able to get name of the person when he is calling for which i have already saved the no. on my contact list i have reseted my phone twice its only showing the names of the person whose no. i have saved it with the country code i am staying in india new delhi pls help me i am fed up not able to get the name of person who is calling
Sir, your Apple ID can be used as an iCloud account as well. They are both the same thing.
You can learn more from --> Set up your Apple ID for iCloud and iTunes - Apple Support -
I have multiple lines for family members on my account. Can I still transfer upgrades between lines? I don't see the option any more.
More everything. I have one line coming up on the 19th of this month and I'd like to transfer to another user with a later upgrade date. Just not seeing the option anywhere.
-
I have a production mobile Flex app that uses RemoteObject calls for all data access, and it's working well, except for a new remote call I just added that only fails when running with a release build. The same call works fine when running on the device (iPhone) using debug build. When running with a release build, the result handler is never called (nor is the fault handler called). Viewing the BlazeDS logs in debug mode, the call is received and send back with data. I've narrowed it down to what seems to be a data size issue.
I have targeted one specific data call that returns in the String value a string length of 44kb, which fails in the release build (result or fault handler never called), but the result handler is called as expected in debug build. When I do not populate the String value (in server side Java code) on the object (just set it empty string), the result handler is then called, and the object is returned (release build).
The custom object being returned in the call is a very a simple object, with getters/setters for simple types boolean, int, String, and one org.23c.dom.Document type. This same object type is used on other other RemoteObject calls (different data) and works fine (release and debug builds). I originally was returning as a Document, but, just to make sure this wasn't the problem, changed the value to be returned to a String, just to rule out XML/Dom issues in serialization.
I don't understand 1) why the release build vs. debug build behavior is different for a RemoteObject call, 2) why the calls work in debug build when sending over a somewhat large (but, not unreasonable) amount of data in a String object, but not in release build.
I have't tried to find out exactly where the failure point in size is, but, not sure that's even relevant, since 44kb isn't an unreasonable size to expect.
By turning on the Debug mode in BlazeDS, I can see the object and it's attributes being serialized and everything looks good there. The calls are received and processed appropriately in BlazeDS for both debug and release build testing.
Anyone have an idea on other things to try to debug/resolve this?
Platform testing is BlazeDS 4, Flashbuilder 4.7, Websphere 8 server, iPhone (iOS 7.1.2). Tried using multiple Flex SDK's 4.12 to the latest 4.13, with no change in behavior.
Thanks!After a week's worth of debugging, I found the issue.
The Java type returned from the call was defined as ArrayList. Changing it to List resolved the problem.
I'm not sure why ArrayList isn't a valid return type, I've been looking at the Adobe docs, and still can't see why this isn't valid. And, why it works in Debug mode and not in Release build is even stranger. Maybe someone can shed some light on the logic here to me. -
Error calling for web-service from BPEL
hello,
I'm getting an exception thrown when I try to call for a web service. Until yesterday it was fine, but since today we keep getting this error message:
<2006-05-29 21:02:03,635> <ERROR> <red.collaxa.cube>
<BaseCubeSessionBean::logError> Error while invoking bean "finder": Instance not found in datasource.
The process domain was unable to fetch the instance with key "c2c73aae36359a11:84cc09:10b7b50ebef:-7d45" from the datasource.
Please check that the instance key "c2c73aae36359a11:84cc09:10b7b50ebef:-7d45" refers to a valid instancet
hat has been started and not removed from the process domain.
ORABPEL-02152
Instance not found in datasource.
The process domain was unable to fetch the instance with key "c2c73aae36359a11:84cc09:10b7b50ebef:-7d45" from the datasource.
Please check that the instance key
"c2c73aae36359a11:84cc09:10b7b50ebef:-7d45" refers to a valid instance that has been started and not removed from the process domain.
at com.collaxa.cube.engine.data.AdminFinder.__lookupInstanceMetaData(AdminFinder.java:314)
at com.collaxa.cube.engine.data.AdminFinder.__lookupInstanceMetaData(AdminFinder.java:262)
at com.collaxa.cube.engine.data.AdminFinder.lookupInstanceByConversationId(AdminFinder.java:235)
at com.collaxa.cube.ejb.impl.FinderBean.lookupInstanceByConversationId(FinderBean.java:177)
at IFinderBean_StatelessSessionBeanWrapper42.lookupInstanceByConversationId(IFinderBean_StatelessSessionBeanWrapper42.java:669)
at com.oracle.bpel.client.Locator.lookupInstance(Locator.java:420)
at displayInstance.jspService(_displayInstance.java:111)
at com.orionserver.http.OrionHttpJspPage.service(OrionHttpJspPage.java:56)
at oracle.jsp.runtimev2.JspPageTable.service(JspPageTable.java:350)
at oracle.jsp.runtimev2.JspServlet.internalService(JspServlet.java:509)
at oracle.jsp.runtimev2.JspServlet.service(JspServlet.java:413)
at javax.servlet.http.HttpServlet.service(HttpServlet.java:853)
at com.evermind.server.http.ServletRequestDispatcher.invoke(ServletRequestDispatcher.java:824)
at com.evermind.server.http.ServletRequestDispatcher.forwardInternal(ServletRequestDispatcher.java:330)
at com.evermind.server.http.ServletRequestDispatcher.forward(ServletRequestDispatcher.java:222)
at com.collaxa.cube.fe.DomainFilter.doFilter(DomainFilter.java:152)
at com.evermind.server.http.ServletRequestDispatcher.invoke(ServletRequestDispatcher.java:663)
at com.evermind.server.http.ServletRequestDispatcher.forwardInternal(ServletRequestDispatcher.java:330)
at com.evermind.server.http.HttpRequestHandler.processRequest(HttpRequestHandler.java:830)
at com.evermind.server.http.HttpRequestHandler.run(HttpRequestHandler.java:285)
at com.evermind.server.http.HttpRequestHandler.run(HttpRequestHandler.java:126)
at com.evermind.util.ReleasableResourcePooledExecutor$MyWorker.run(ReleasableResourcePooledExecutor.java:192)
at java.lang.Thread.run(Thread.java:534)
Any ideas how I can fix it?
Thanks.Hi,
We've tried increasing the
<transaction-config timeout="60000" /> to 120000, and also tried increasing the syncMaxWaitTime from the console...
But nothing seems to help.
In addition, the test page of the web service we are invoking returns after 1 second (so there shouldn't be a latency problem)
Maybe you have any other ideas? -
How to look for New start Called call for a Maintenance plan
Hi,
I need to find out all calls for a maintenance plan of scheduling type- 'New Start' and Status- 'Called'. How to find this using tables.
For 'New Start' scheduling type probably table field and value is MHIS-TERMA = 'N'. There are different statuse in this table but I am not able to identify the status 'called'. Also what is the field MHIS-ZAEHL(Maintenance package number) for?
Thanks,
VimalTaken from the standard IP10 program:
* possible status combinations
* TSABR - Scheduling status: planned date called
* TSVBT - Scheduling status: call outstanding
* TSENQ - Scheduling status: call horizon not reached
* TSENM - Scheduling status: stopped manually
* TSTAT - Sceduling status
* TSABR TSVBT TSENQ TSENM TSTAT
* X - - - A called with order
* X - - - - called without order
* - X X - - on hold (TSENQ), due (TSVBT)
* - X X - F on hold, due and fixed
* X - - - X skipped
* - X X X - blocked
* - X X X F blocked
* X - - - - LRMDT <> 0, completed -
Flat File-to-RFC question, multiple RFC calls for one file.
Hi guys,
I'm quite new to XI / PI and I have a question regarding a File-to-RFC scenario we're trying in NW PI 7.1.
We have a flat file which has two lines with two fields each, let's take this as an example :
001,001
002,002
The files needs to be converted to XML and then transferred to the RFC program which will update a table with the values above.
In the ESR I've created 3 data types (z_row1,z_record1 and z_fileinput1), 1 message type (z_file2rfc_ob_mt), 1 message mapping (z_file2rfc_mm), 2 Service Interface (z_file2rfc_ob_si and z_file2rfc_ib_ztestpi) and 1 operation mapping (z_file2rfc_om).
In the Integration Builder (ID) I've created everything required (The sender and receiver communication channels, sender and receiver agreement, receiver determination and interface mapping).
We're also using content conversion to convert the flat file to XML, this does seem to work because I see all the lines/field in the message when it gets into PI. The problem is that the RFC can only accept two fields at a time and only the first line gets updated. I see that only the first line gets sent to the RFC.
How can I make the RFC call for each and every line ?
Thanks !!Create the RFC with table, which takes multiple lineitem as input and update the table in single call.
If you want response back then call RFC as synchrounous else in Asynchrounous mode.
By doing this in single call it will update the complete table.
Gaurav Jain
Reward Points if answer is helpful
Maybe you are looking for
-
How do I set a password on a document in pages 5.0.1?
I know that in the old pages it was available to set a password from opening and editing documents. However, they did away with the old setting for editing, but I was wondering if pages 5.0.1 still made it available to set a password on a document wh
-
Displaying information other than a foreign key in 'interactive reports'
I would be very grateful if someone could help with the following query. I have 2 tables (*Table1* and Table2). Table1 has the following columns:- Tbl1PrimaryKey, Tbl1Description Table2 has the following columns:- Tbl2PrimaryKey, Tbl2Description, Tbl
-
Can I automate the process of creating markers?
I want to design settings for when to begin and end a marker, and have the program automatically apply them to an entire audio file. Is this possible?
-
Trying to add Kanaka server in directory utility
When I try to add a Kanaka servier ip adress in directory utility on Mac osx 10.6.8 I click the plus sign it puts host1.com and you can not edit it just add or delete it. Any thoughts?
-
Spinning ball upon launching Compressor
I just reinstalled Final Cut Studio Pro 2 last night because of various problems with Compressor and FCP. Everything was then upgraded to the latest version. When I launched Compressor (version 3.0.3) just now the menus appear but the spinning ball p