Friday, May 14, 2010

Creating library project in flex

Creating library project:
  • Open Flex builder 3
  • Navigate to File->New->Flex Library Project
  • In the New Flex Library Project dialog
  1. Enter the project name as "FirstLibProject"
  2. Click on Next
  3. Select the Classes tab
  4. In the Main source folder item click on Browse
  5. In select Source folder dialog select the project
  6. Click on New button
  7. A new folder will be added under the projects
  8. Click Ok
  9. Select the checkbox for the src folder (All the classes in this folder will be included in library swc)
  10. Click on Finish button
  • Create an mxml component under src folder by right clicking on src folder and name it "LibrarySample.mxml"
  • Create an Action script class under src and name it as "LibraryAS.as"
  • In the bin folder a swc file will be created by name FirstLibProject.swc

In our mxml if we want to use these Files which we created above we can include the swc file to our project.


Including the swc file in a project:
In the project "Xyz" which we want to include the swc copy the swc which we created above:

  • Copy the FirstLibProject.swc to some path (c:\lib)
  • Open the project "Xyz" in Flex builder
  • Right click on the project "Xyz" (in navigator view) click on Properties
  • Select Flex Build Path in the Properties dialog
  • Select Library path tab
  • Click on Add SWC and browse for C:\temp\FirstLibProject.swc and click Ok
  • In this project we can use the classes LibrarySample and LibraryAS

Wednesday, May 12, 2010

Find in CF

Finds the first occurrence of a substring in a string, from a specified start position. The search is case-sensitive.
A number; the position of substring in string; or 0, if substring is not in string.
Syntax:
Find(substring, string [, start ])

Parameter Description
substring A string or a variable that
contains one. String for which to search.
string A string or a variable that contains one.
String in which to search.
start Start position of search.

Program :


#find("the",stringToSearch)#

#find("the",stringToSearch,35)#

#find("no such substring",stringToSearch)#



Source :
http://livedocs.adobe.com/coldfusion/6.1/htmldocs/functi80.htm#wp1104451

Monday, May 10, 2010

MVS SYSTEM CODES-S813

The data set name in the JCL did not match the data set name on the tape.

1. The JCL volume serial number was wrong.
2. The data set name in the JCL was misspelled.
3. The wrong tape was mounted.
4. The incorrect data set sequence number was specified in the label parameter.
5. The data set does not exist on the magnetic tape. Verify that the JCL is correct, and resubmit the job.

Ref: www.ibmmainframes.com

Saturday, May 08, 2010

How to find out Version Of Oracle Application in Unix-2

c. Class file version
Step 1. Go to the UNIX box
Step 2. Go to the class file location
$strings -a grep Header

d. Apachhe Version
Step 1. Go to the UNIX box
Step 2. Go to the $iAS or $IAS_CONFIG_HOME
Step 3. Then go to Apachhe/Apachhe/bin directory
Step 4. run the following Command
$httpd -version

The output will be
bash-2.03$ httpd -version
Server version: Oracle HTTP Server Powered by Apache/1.3.19 (Unix)
Server built: Jan 26 2005 11:06:44 (iAS 1.0.2.2.2 rollup 5)

Thursday, May 06, 2010

How to find out Version Of Oracle Application-1

Whenever you are working in oracle application you will face some situation where you have to know the version of the products you are using in your Oracle Application. Though the env file help you a lot to reduce the need of the versions as it makes the system user friendly. In some issue solving cases such as upgrade, patching or some specific issues you must have to know the versions.

The products we are using can be of almost three types -
1. Components related to Application
2. Components related to Database
3. Components related to some useful utilities and OS

Components related to Application:
a. The version of the oracle application.
Step 1. First open the Oracle Application Frontend
Step 2. Open any form session in it
Step 3. Go to help
Step 4. Click on "About Oracle Application"

b. Version of Oracle Application Forms or Reports.
Step 1. Go to the UNIX box
Step 2. Go to the $CUSTOM_TOP location
Step 3. Then go to /11.5.0/forms/US/
Step 4. Run the following command

Tuesday, May 04, 2010

Call a class private method from another class

while googling, i have came accross a interesting thing, these blog is just to share the information with you all.
Here i am calling private method method1() in PrivateMethodClass from another class CallingMethod. the below is the source code, which i tried.

Source Code:
PrivateMethodClass.java

package com.src;
public class PrivateMethodClass {
private void method1(int a,int b){
System.out.println("Var:a:"+a+"::Var b:"+b);
int c = a+b;
System.out.println("Var c:"+c);
}

public void method2(int a,int b){
System.out.println("Var:a:"+a+"::Var b:"+b);
int c = a+b;
System.out.println("Var c:"+c);
}
}

CallingMethod.java
package com.src;
import java.lang.reflect.Method;
public class CallingMethod {
public static void main(String[] args) {
Class klass;
try {
klass = PrivateMethodClass.class;
PrivateMethodClass pmc = new PrivateMethodClass();
Class[] param = {Integer.TYPE,Integer.TYPE};
Method m[] = klass.getDeclaredMethods();
int c =0;
int a[] = {1,2};
for(int i=0;i System.out.println("Method name is "+m[i].getName());
m[i].setAccessible(true);
m[i].invoke(pmc,1,2);
}
} catch (Exception e) {
System.out.println("Exception::"+e.getMessage());
}
}
}

The Output Result:
Method name is method1
Var:a:1::Var b:2
Var c:3
Method name is method2
Var:a:1::Var b:2
Var c:3

Source: http://vishalnjain.blogspot.com/

Sunday, May 02, 2010

MVS SYSTEM CODES-S913

An error occurred in opening a magnetic tape data set.

1. The error occurred during open or end-of-volume processing. The data set was password protected, and a correct password was not entered.

2. The error occurred in opening a checkpoint data set which was concatenated to a non-checkpoint data set.


1. Supply the correct password, and resubmit the job.

2. Eliminate any concatenations of checkpoint and non-checkpoint data sets.


Ref: www.ibmmainframes.com

Saturday, May 01, 2010

MVS SYSTEM CODES -SA13

An error occurred in opening a tape data set.

1. The file sequence number was wrong on a multi-volume tape data set.

2. The file sequence number was wrong, or it was less than that of the first data set on the tape.

3. The volume serial number was wrong.

4. The job which wrote the tape did not write all the data sets.

Steps:
1. Verify that the JCL is correct, and resubmit the job.

2. If the desired data set does not exist on the tape, recreate the tape.
Ref: www.ibmmainframes.com

Friday, April 30, 2010

Value restricions

Some primitive value besides a conrete data-type may have a predefined set of values. And the value can be set only to one of that variants, like enumerations. XML schema allows us to restrict the value of a given type by a set of enumerated values. From the other hand we can restrict some value by defining its min/max bounds:

http://www.w3.org/2001/XMLSchema">




























source: java-tips.org

Wednesday, April 28, 2010

DataBase Links

A database link is a pointer in the local database that allows you to access the data on a remote database.
For example: If we want to access the database of a different server other than the one we are working on. we cannot access that database directly if we don’t have access.In such cases we use Database links to access the remote database.
There is no special syntax fort using these Dblinks.we should just add that link after the table name as shown below.

Select * from emp where emp_id=’1111111’;

This is the actual query.using this query we should access the remote database to which we don’t have access.In this case you can access that remote database if it has a DBlink available to connect to our database.

For Example if GOAT is the Dblink used to access the database of Goat,then the above query should be given in this way

Select * from emp@GOAT where emp_id=’1111111’

In this way by using DBlinks we can access remote databases.

Monday, April 26, 2010

Tired of including configuration files in your scripts

I am often tired of including configuration files in my scripts. Even if it is a single file it becomes important to include that file in our scripts otherwise we wont get the necessary variables set. Once when I started searching for a workaround for it, I found that we can configure it right in one place and say PHP take care of this headache.
Yes, We can do it.

1.Place all your configuration files in one folder in the server. Say "DOCUMENT_ROOT/config/lib"
2. Create a new file with a name preinclude.php
3. Declare or include (again include ) all your common variables, config files in this file.
4.In the DOCUMENT_ROOT folder create a .htaccess file
5. Write the following code in this:

# Code starts here
php_value auto_prepend_file "path to include directory/preinclude.php"
# Code ends here

We can include whichever file which we feel should be executed before each and every file execution here.

Saturday, April 24, 2010

Advantage of SYNC Class

The SYNCHRONIZED clause is sometimes used with USAGE IS COMP or USAGE IS INDEX items. It is used to optimize speed of processing but it does so at the expense of increased storage requirements.
The word SYNC can be used instead of SYNCHRONIZED.
The SYNCHRONIZED clause is used to explicitly align COMP and INDEX items along their natural word boundaries. Without the SYNCHRONIZED clause, data-items are aligned on byte boundaries.
Example: 01 TWO-BYTE PIC S9(4) COMP SYNC.

Thursday, April 22, 2010

Optimize SOAP Messages

As we all know SOAP content is nothing but a XML.Though XML is descriptive, sometimes it might be typically larger due to the volume of tags. So given the case,if you have any performance problems in using SOAP XML's, consider using Message Transmission Optimization Mechanism (MTOM), which builds on XML-binary Optimized Packaging (XOP). XOP provides a more efficient serialization of XML by using MIME encoding. MTOM uses XOP to encode portions of SOAP messages,while still presenting an XML Infoset to the SOAP application.

Another, more recent alternative is to use XFire. XFire is an open source,standards-compliant SOAP framework that uses the latest technologies, including a StAX parser, to boost SOA messaging performance. As i spoke about StAX,i will give a brief intro about that here…

StAX:Streaming API for XML:
StAX
is a parser API that falls between the tree-navigation DOM and push event-based SAX interfaces. It works serially on an XML document as SAX does, but it allows tokens to be pulled by the application.
Again, unless your performance is unacceptable, you should be fine with regular XML SOAP messages. However, if you are providing services to a large community of clients, you may need to boost your performance using one of the above mentioned alternatives.

Tuesday, April 20, 2010

Show data with JTable

This Java Swing tip illustrates a method of showing data in database in a JTable. JTable act as a output for the database. The developer may use this to display a part of data (for example data generated form a query) to the user in a table. The table gives user an impression of database.

import java.awt.*;
import java.awt.event.*;
import javax.swing.*;
import javax.swing.table.*;
public class DatabaseTest extends JFrame {
JTextField hostField;
JTextField queryField;
QueryTableModel qtm;

public DatabaseTest() {
super("Database Test Frame");
setDefaultCloseOperation(EXIT_ON_CLOSE);
setSize(350, 200);
qtm = new QueryTableModel();
JTable table = new JTable(qtm);
JScrollPane scrollpane = new JScrollPane(table);
JPanel p1 = new JPanel();
p1.setLayout(new GridLayout(3, 2));
p1.add(new JLabel("Enter the Host URL: "));
p1.add(hostField = new JTextField());
p1.add(new JLabel("Enter your query: "));
p1.add(queryField = new JTextField());
p1.add(new JLabel("Click here to send: "));
JButton jb = new JButton("Search");

jb.addActionListener(new ActionListener() {
public void actionPerformed(ActionEvent e) {
qtm.setHostURL(hostField.getText().trim());
qtm.setQuery(queryField.getText().trim());
}
} );

p1.add(jb);
getContentPane().add(p1, BorderLayout.NORTH);
getContentPane().add(scrollpane, BorderLayout.CENTER);
}
public static void main(String args[]) {
DatabaseTest tt = new DatabaseTest();
tt.setVisible(true);
}
}

Source: java-tips.org

Sunday, April 18, 2010

Creating a Confirm Dialog Box

The easiest way to create a Yes/No/Cancel dialog box is to use showConfirmDialog(Component, Object) method of JOptionPane class.
The following example uses a confirm dialog box with a text message and stores response in the response variable:
int response;
response = JOptionPane.showConfirmDialog(null, "Should i delete all files?");


source: java-tips.org

Friday, April 16, 2010

Restarting Windows Without Restarting Your PC

A modern PC with Vista Home Edition takes about one and a half minutes to boot. An older machine with XP is about the same. That’s 30 seconds for the PC itself (the BIOS) to boot up, plus a minute for the Windows operating system to boot. Sometimes, you need to reboot Windows (e.g. when installing new software), but there is no need to restart BIOS, too. However, the default is to reboot both. (That’s called doing a “cold boot,” rather than a “warm boot.”) There’s a trick that works on both XP and Vista to get it to do a warm boot instead, thus saving you 30 seconds per cycle.
The trick is to hold down the SHIFT key when invoking the restart.
Select Start. Select “Shut Down…”. Change the drop-down combo box under “What do you want the computer to do?” to “Restart”. Hold down the SHIFT key while clicking on the “OK” button.

Source: www.masternewmedia.org

Wednesday, April 14, 2010

Lotus notes: Change your password

In my previous article about lotus notes, we have seen how to configure an email account in Lotus notes.Today we will look into the topic, how to change the password of your Lotus notes account.
Open the Lotus notes client,1. Go to File-> Security-> User Security2. In the 'User Security' window, go to 'Your Login and Password Settings' section3. Click on the 'Change Password' button4. Change Password Pop up window is displayed 5. Type the new password, then reenter the new password and click OK6. A popup message box is dispayed "Your Password Change succeeded".
Now you can access your email with your new password.

Monday, April 12, 2010

AS/400 Tips 17

Retaining Customization
It is often required or desirable to customize certain system attributes from how they are set out of the box. For example, you may want to change certain command defaults from the IBM-shipped defaults.
When you do an O/S upgrade however, you'll find that your changes were erased. Unless you kept very good documentation, you'll be hard pressed to remember which changes you made.
A good workaround to this is to create a CL source member that contains all the commands you've customized your system with. Keep the source member up to date and include thorough comments.Compile this member into a program, and simply run the program whenever you've done an upgrade.

Source: http://midwareservices.com/tipstricks/windows.htm

Saturday, April 10, 2010

AS/400 Tips 18

POP UP COMMNAD LINES
It's pretty common to be several programs deep in an application when you suddenly have the need for a command line. There's any easy way to allow this without having to back out or switch to a different session.
Program QUSCMDLN is the IBM supplied API to call a command line. No parameters are required. You may want to add a function key to your application programs (perhaps F21) to call this program.
If you don't want to go through this much work, simply change your user profile (CHGUSRPRF) and set QUSCMDLN as your attention key handling program.

Source: http://midwareservices.com/tipstricks/command_lines.htm

Thursday, April 08, 2010

Turn off Indexing to speed up XP

Windows XP keeps a record of all files on the hard disk so when you do a search on the hard drive it is faster. There is a downside to this and because the computer has to index all files, it will slow down normal file commands like open, close, etc. If you do not do a whole lot of searches on your hard drive then I suggest turnning this feature off:
1. Control Panel
2. Administrative Tools
3. Services
4. Disable Indexing Services

Source: www.tweakxp.com

Tuesday, April 06, 2010

Unload .dll’s to Free Memory

Windows Explorer caches DLLs (Dynamic-Link Libraries) in memory for a period of time after the application using them has been closed. This can be an inefficient use of memory.

1. Find the key [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer].

2. Create a new sub-key named 'AlwaysUnloadDLL' and set the default value to equal '1' to disable Windows caching the DLL in memory.

3. Restart Windows for the change to take effect.
I tried this after running a intense program, then watched the task manager; memory recovered it self.

Source: www.tweakxp.com

Sunday, April 04, 2010

Input Dialog Box

An input dialog box asks a question and uses a text field to store the response.
The easiest way to create an input dialog in Java is to use showInputDialog(Component, Object, String, int) method of JOptionPane class.

The following example uses this method to create an input dialog box:

String response = JOptionPane.showInputDialog(null, "What is your name?", "Enter your name", JOptionPane.QUESTION_MESSAGE);

Source: java-tips.org

Friday, April 02, 2010

Message Dialog Box

A message dialog box is a simple window that displays information. A message dialog box can be created with a call to the showMessageDialog(Component, Object) method of JOptionPane class.

The following statement creates a message box:
JOptionPane.showMessageDialog(null, "I am happy.");

Source: java-tips.org

Thursday, April 01, 2010

MVS SYSTEM CODES -SB37

An error occurred during end-of-volume processing of a data set. The system was unable to fulfill a request for more space.

1. A program loop caused too many records to be written to the output data set.
2. Insufficient space was allocated to this data set in the JCL.
3. There was no more room available to receive any more output on the output volume, and another volume could not be mounted.

1. Verify that there are no program loops or logic errors.
2. Increase the primary and/or secondary allocations for the data set.
3. Change the JCL to request that the data set be created on a volume with more space.

Ref: http://www.ibmmainframes.com/

Tuesday, March 30, 2010

MS WORD SHORTCUT KEYS

Ctrl + A Select all contents of the page
Ctrl + B Bold highlighted selection
Ctrl + C Copy selected text
Ctrl + X Cut selected text
Ctrl + N Open new/blank document
Ctrl + O Open options
Ctrl + P Open the print window
Ctrl + F Open find box
Ctrl + I Italicize highlighted selection
Ctrl + K Insert link
Ctrl + U Underline highlighted selection
Ctrl + V Paste
Ctrl + Y Redo the last action performed
Ctrl + Z Undo last action
Ctrl + G Find and replace options
Ctrl + H Find and replace options
Ctrl + J Justify paragraph alignment
Ctrl + L Align selected text or line to the left
Ctrl + Q Align selected paragraph to the left
Ctrl + E Align selected text or line to the center
Ctrl + R Align selected text or line to the right
Ctrl + M Indent the paragraph
Ctrl + T Hanging indent
Ctrl + D Font options
Ctrl + Shift + F Change the font
Ctrl + Shift + > Increase selected font +1
Ctrl + ] Increase selected font +1
Ctrl + Shift + < Decrease selected font -1
Ctrl + [ Decrease selected font -1
Ctrl + Shift + * View or hide non printing characters
Ctrl + f Move one word to the left
Ctrl + g Move one word to the right
Ctrl + h Move to beginning of the line or paragraph
Ctrl + i Move to the end of the paragraph
Ctrl + Del Delete word to right of cursor
Ctrl + Backspace Delete word to left of cursor
Ctrl + End Move cursor to end of document
Ctrl + Home Move cursor to beginning of document
Ctrl + Space Reset highlighted text to default font
Ctrl + 1 Single-space lines
Ctrl + 2 Double-space lines
Ctrl + 5 1.5-line spacing
Ctrl + Alt + 1 Change text to heading 1
Ctrl + Alt + 2 Change text to heading 2
Ctrl + Alt + 3 Change text to heading 3
F1 Open help
Shift + F3 Change case of selected text
Shift + Insert Paste
F4 Repeat last action performed (Word 2000+)
F7 Spell check selected text and/or document
Shift + F7 Activate the thesaurus
F12 Save as
Ctrl + S Save
Shift + F12 Save
Alt + Shift + D Insert the current date
Alt + Shift + T Insert the current time
Ctrl + W Close document

Sunday, March 28, 2010

Sticky Notes as your Browser Homepage

Sticky Screen(http://stickyscreen.org) is a simple online version of the yellow Post-It Note that you can set as your browser homepage.
You just have to type something onto the sticky note and set that website as your browser home page. No need to register anywhere and there’s no save button.
The yellow sticky note will show up whenever you start the web browser. The magic is due to a cookie that gets saved locally so the sticky note will change to the default one if you decide to clear the cookies someday.
For something more permanent, check these Post It Notes for Desktop.

Friday, March 26, 2010

findnocase in CF

Finds the first occurrence of a substring in a string, from a specified start position. If substring is not in string, returns zero. The search is case-insensitive.
The position of substring in string; or 0, if substring is not in string.

Syntax:
FindNoCase(substring, string [, start ])

Parameter Description
substring A string or a variable that contains one. String for which to search.
string A string or a variable that contains one. String in which to search.
start Start position of search.

Program:

#findnocase("the",stringToSearch)#
#findnocase("the",stringToSearch,5)#
#findnocase("no such substring",stringToSearch)#


Source : http://livedocs.adobe.com/coldfusion/6.1/htmldocs/functi81.htm#wp1104504

Wednesday, March 24, 2010

Getting into the .NET runtime

The IISAPIRuntime interface acts as the interface point between the unmanaged code coming from the ISAPI extension (directly in IIS 6 and indirectly via the Named Pipe handler in IIS 5). If you take a look at this class you’ll find a ProcessRequest method with a signature like this:

[return: MarshalAs(UnmanagedType.I4)]
int ProcessRequest([In] IntPtr ecb, [In, MarshalAs(UnmanagedType.I4)]
int useProcessModel);

The ecb parameter is the ISAPI Extension Control Block (ECB) which is passed as an unmanaged resource to ProcessRequest. The method then takes the ECB and uses it as the base input and output interface used with the Request and Response objects. An ISAPI ECB contains all low level request information including server variables, an input stream for form variables as well as an output stream that is used to write data back to the client. The single ecb reference basically provides access to all of the functionality an ISAPI request has access to and ProcessRequest is the entry and exit point where this resource initially makes contact with managed code.

The ISAPI extension runs requests asynchronously. In this mode the ISAPI extension immediately returns on the calling worker process or IIS thread, but keeps the ECB for the current request alive. The ECB then includes a mechanism for letting ISAPI know when the request is complete (via ecb.ServerSupportFunction) which then releases the ECB. This asynchronous processing releases the ISAPI worker thread immediately, and offloads processing to a separate thread that is managed by ASP.NET.

ASP.NET receives this ecb reference and uses it internally to retrieve information about the current request such as server variables, POST data as well as returning output back to the server. The ecb stays alive until the request finishes or times out in IIS and ASP.NET continues to communicate with it until the request is done. Output is written into the ISAPI output stream (ecb.WriteClient()) and when the request is done, the ISAPI extension is notified of request completion to let it know that the ECB can be freed. This implementation is very efficient as the .NET classes essentially act as a fairly thin wrapper around the high performance, unmanaged ISAPI ECB.

ref:west-wind

Monday, March 22, 2010

findoneof in CF

Finds the first occurrence of any one of a set of characters in
a string, from a specified start position. The search is case-sensitive.
The position of the first member of set found in string; or 0, if no
member of set is found in string.

Syntax:
FindOneOf(set, string [, start ])

Parameter Description
set A string or a variable that contains one.
String that contains one or more characters to search for.
string A string or a variable that contains one. String in which to search.
start Start position of search.

Program:

#findoneof("aeiou",stringToSearch)#


#findoneof("aeiou",stringToSearch,4)#


#findoneof("@%^*()",stringToSearch)#



Source: http://livedocs.adobe.com/coldfusion/6.1/htmldocs/functi82.htm#wp1104557

Saturday, March 20, 2010

MVS SYSTEM CODES - SC13

An error occurred in opening a concatenated partitioned data set.
1. A concatenated data set was opened for output. 2. A data set was opened twice. Be sure that the concatenated partitioned data set is being opened properly.

Ref: www.ibmmainframes.com

Thursday, March 18, 2010

MVS SYSTEM CODES -SD37

An error occurred in writing to a data set which had not been allocated enough space. 1. A secondary allocation was not specified, and all of the primary space had been used. 2. There was a program loop.

1. Check through the program logic for a loop.
2. Allocate more space to the data set by specifying larger primary and/or secondary quantities in the space parameter in the JCL DD statement.

Ref: www.ibmmainframes.com

Wednesday, March 17, 2010

Notepad as a diary

1. Open a blank Notepad file
2. Write .LOG as the first line of the file, followed by a enter. Savethe file and close it.
3. Double-click the file to open it and notice that Notepad appends the current date and time to the end of the file and places the cursor on the line after.
4. Type your notes and then save and close the file.
5. Each time you open the file, Notepad repeats the process, appending the time and date to the end of the file and placing the cursor below it

Monday, March 15, 2010

OTA, an API for extending Quality Center

Quality Center API
The manipulation API is called Quality Center API and allows the interaction with Quality Center.

It also allows you to interact with the database through the API making the interactions more secure. Also, it avoids your DBA (DataBase Administrator) having to provide an access to the database server(s) hosting the Quality Center database(s).The API has only 1 entry point which is the TDConnection object. From this object, you can access a lot of Quality Center functionalities. The API functions are accessible through VBScript and any COM aware programming languages. It means that you can use this API as a standalone .VBS application, a macro in an Excel file, a script in QuickTest Professional or any other application where you would like to integrate such functionalities.As an example, we are going to download all the defects that are stored on a Quality Center project using the Excel application.The steps involve:
Connect to the project Run a query to retrieve a list of defects Store the result in an Excel worksheet

1. Connect to the project:
Each project stored in a Quality Center server is identified by its pair Domain/Project and a project is accessible only if the user belongs to this project. The connection to a server can be done by using only 4 lines of code:Dim QCConnection‘ Return the TDConnection object.Set QCConnection = CreateObject(“TDApiOle80.TDConnection”)QCConnection.InitConnectionEx “http:///qcbin”QCConnection.login “”, “”‘ DEFAULT = Domain, QualityCenter_Demo = ProjectQCConnection.Connect “DEFAULT”, “QualityCenter_Demo”

2. Execute a query:
To execute a query in Quality Center, you have several options available.The first one is to use the Command object. This object can run SQL queries for any Quality Center table. However, you need to be aware of what table to query and make sure you know what you do because you can mess up Quality Center. Also, this Command object can be used only if you are part of the TDAdmin group in this project.The second one is to use a Factory object. The factory object returns objects that are part of the API, restricting the user from making mistakes. This is the method we’ll be using in this article. To access the defects, we are using the BugFactory:Dim BugFactory, BugListSet BugFactory = QCConnection.BugFactorySet BugList = BugFactory.NewList(“”) ‘ Get a list of all the defects.

3. Store the result in an Excel worksheet:
We assume that you are running this script from a VBS file. Consequently, we have to open Excel first, then store the data in an Excel worksheet:

Dim Bug, Excel, Sheet
Set Excel = CreateObject(“Excel.Application”) ‘ Open Excel
Excel.WorkBooks.Add() ‘ Add a new workbook
‘ Get the first worksheet.
Set Sheet = Excel.ActiveSheetDim Bug, Row
Row = 1
‘ Iterate through all the defects.
For Each Bug In BugList
‘ Save a specified set of fields.
Sheet.Cells(Row, 1).Value = Bug.Field(“BG_BUG_ID”)
Sheet.Cells(Row, 2).Value = Bug.Summary
Sheet.Cells(Row, 3).Value = Bug.DetectedBy
Sheet.Cells(Row, 4).Value = Bug.Priority
Sheet.Cells(Row, 5).Value = Bug.Status
Sheet.Cells(Row, 6).Value = Bug.AssignedTo
Row = Row + 1
Next‘ Save the newly created workbook and close Excel.
Excel.ActiveWorkbook.SaveAs(“c:\QualityCenter_Demo_DEFECTS.xls”)
Excel.Quit

Saturday, March 13, 2010

Workflow Authoring - Workflow Foundation WF32

Workflow Authoring:
Authoring of workflows can use code, markup languages, or a combination of both code and markup.

Types of Authoring modes:
1. Code only:
The default authoring mode for windows workflow foundation is code only. This provides the code behind mode.(C# or VB) to declare the workflow structure. A code only workflow must be compiled. This mode shoud be choosed only if the workflow solution will not change over a time.
2. No Code:
This mode provides the author a workflow by using workflow markup. we can then compile the workflow with the Windows Workflow Foundation command-line workflow compiler, or we can load the workflow markup file into the workflow runtime engine.
If we have a workflow definition entirely in XOML we can use workflow activation and avoid compilation. Activation is useful when building a large number of dynamic workflows. We merely need to pass the XML into the workflow runtime to have a run-able instance of a workflow.
Eg:

3. Code seperation:
This mode provides us to define workflows by using workflow markup and combining it with C# or Visual Basic code-behind implementations—similar to the ASP.NET model.The code only workflow must be compiled. This mode is choosed if the workflow will change over a time.Also complex business rules can be handled in this mode.

Thursday, March 11, 2010

RSS to PDF believe me its possible

Many of you must have felt the same as myself with busy schedule and always on move or offline. Just happen to view your RSS reader found something interesting but don’t have time to read it online. If you are facing the same problem, at last I have found a solution to it. Now you can convert your RSS feeds to PDF online and that too free of cost and read it when you are on move or offline.

RSS 2 PDF (http://www.rss2pdf.com/) is a free online service that turns any RSS feed to PDF document at a lightening speed. Along with RSS, this service also converts other sources like ATOM and OPML to PDF. The only problem with the service is - images of the RSS source are not part of the output PDF. Due to server resource usage restrictions, the creator of the service temporarily disabled images in the output.

So what are you waiting for, start converting your favorite feed and read at your leisure time.

Tuesday, March 09, 2010

Cross-site scripting (XSS)

Cross-site scripting (XSS) attacks exploit vulnerabilities in Web page validation by injecting client-side script code. Common vulnerabilities that make your Web applications susceptible to cross-site scripting attacks include failing to properly validate input, failing to encode output, and trusting the data retrieved from a shared database. To protect your application against cross-site scripting attacks, assume that all input is malicious. Constrain and validate all input. Encode all output that could, potentially, include HTML characters. This includes data read from files and databases.

The injected script code embeds itself in response data, which is sent back to an unsuspecting user. The user's browser then runs the script code. Because the browser downloads the script code from a trusted site, the browser has no way of recognizing that the code is not legitimate, and Microsoft Internet Explorer security zones provide no defense. Cross-site scripting attacks also work over HTTP and HTTPS (SSL) connections.

One of the most serious examples of a cross-site scripting attack occurs when an attacker writes script to retrieve the authentication cookie that provides access to a trusted site and then posts the cookie to a Web address known to the attacker. This enables the attacker to spoof the legitimate user's identity and gain illicit access to the Web site.

source : msdn

Sunday, March 07, 2010

Java program for image decompression

This is a java program to decompress the given image.we have first initialized the given file using file input stream reader and read character by character from input file and copied into the target file and displayed the size of the image.The program is as follows.

import java.io.*;
import java.util.zip.*;
class Izip{public static void main(String args[])throws Exception
{
InflaterInputStream in=new InflaterInputStream(new FileInputStream("Ashes.zip"));
FileOutputStream sout=new FileOutputStream("Ashes.bmp");
int b;
while((b=in.read())!=-1)
sout.write(b);
in.close();
sout.close();
File f1=new File("Ashes.zip");
File f2=new File("Ashes.bmp");
System.out.println("The size of zipped file is "+f1.length());
System.out.println("The size of unzipped file is "+f2.length());
}
}

OUTPUT:
C:\jdk1.3\bin>javac Izip.java
C:\jdk1.3\bin>java IzipThe size of zipped file is 1372The size of unzipped file is 589878

Friday, March 05, 2010

List of EIB fields in DFHEIBLK member in CICS

EIBCALEN(COMMAREA Length): It will be the length of the Communication area.
EIBAID(AID Key pressed): It gives the attention of the user has entered any attention key or not
EIBCPOSN(CURSOR Position): It gives positions of the cursor
EIBDATE(Task DATE (00YYDDD)): It gives Task Date
EIBTIME(Task Time (0HHMMSS)): It gives Task time
EIBTRNID(Transaction ID of Task): It gives the transaction of task has stored
EIBTRMID(Terminal ID of Task): It has the terminal ID and it is different from entry in PCT
EIBRSRCE(Resource Recently): Recently used Resource Name
EIBDS(Data Set): Recently accessed Data Set
EIBFN(Final CICS Command): Last CICS Command
EIBRESP(Response): Completion Status
EIBRESP2(Response2): More Completion Status
EIBRCODE(Response Code (OLD)): Response Code (OLD)

Wednesday, March 03, 2010

compare in ColdFusion

Performs a case-sensitive comparison of two strings.
  • -1, if string1 is less than string2
  • 0, if string1 is equal to string2
  • 1, if string1 is greater than string2

Syntax :
Compare(string1, string2)

Parameter Description

string1 A string or a variable that contains one

string2 A string or a variable that contains one

Compares the values of corresponding characters in string1 and string2.


Coding :


Source: http://livedocs.adobe.com/coldfusion/6.1/htmldocs/functi37.htm#wp1101820

Monday, March 01, 2010

Facilities used in CICS.

Facilities used in CICS:
- Transaction Dump
- Execution Diagnostic Facility(EDF)
- Command Level Interpreter

Transaction Dump:
It Contains useful information which shows the status of the program at the time of an ABEND

Execution Diagnostic Facility(EDF):
- CICS supplied transaction
- Monitors the execution of an application program as an interactive debugging aid

Command Level Interpreter:
- CICS supplied transaction that performs syntax checking
- To invoke
  • CECI (CICS command to be interpreted)
  • CEBR Transaction(CICS transaction which browses Temporary Storage Queue (TSQ) Invoking CEBR directly)

Sunday, February 28, 2010

One of Unix Command

1.Esc :set nonu
This command is used to take off the line numbers that gets displayed in a unix program.

2.Esc :set nu
This brings back the Line numbers of the Unix program.

Friday, February 26, 2010

Get up-to-the minute data with Excel’s automatic Web queries

An Excel Web query allows you to bring data from a Web site into an Excel worksheet. It will find any tables on the Web page and let you select the ones containing data you want to put into your worksheet, allowing for dynamic updates from the Web page. Web queries are not just useful for pulling information from standard HTML pages. They can also be used quite nicely in situations where a standard ODBC connection would be difficult or impossible to create or maintain, such as a worksheet that’s used by salespeople around the country.I am going to explain how to use the web query through a basic example to get a feel for how Web queries operate. Before delving into minute details, here is a basic procedure to import data through web query.

Getting started:
To demonstrate the process, we’re going to start with a simple Web query using cricinfo score card. To create the Web query:
1.Select the first cell in which you want results to appear.
2.Choose Data Import External Data New Web Query to open the dialog box shown (see attachment , Fig A)
3. Enter the URL to query in the Address area and click the Go button ( see attachment, Fig B)
4. Navigate to the desired page. Select the table you want to use for the query ( see attachment, fig C)
5. Click the Import button. In the next dialog, enter cell number or worksheet where you want to import data
That’s it. The data is now in your worksheet ( see attachment , Fig D)
6. Once the table is loaded, you can right click anywhere on it and say Refresh Data! and it would fetch the new data from web automatically

Wednesday, February 24, 2010

Some ISPF Tips

Tip1:
While trying to open any member in a PDS, we sometimes come across "member in use" message. In that situation, if you want to know who is using the member currently, press F1 twice.

Tip2:
To find the last 10 datasets those we have accessed
1. GO TO ISPF 3.4 option.
2. On the top, there is a MENUBAR. Select REFLIST
3. Select Option 1 in it.
Using this option you can find out the last 30 datasets that you have accessed….

Tip3:
To know what are the last 25 COMMAND LINE commands that issued from ISPF panel.
To get that issue RETP on the Command line.

Tip 4:
Suppose you are in a ISPF Screen and want to know in which TSO Region ( Development, Production, or other TSO regions) you are now .
Issue on the command line : SAREA
ISPF STATISTICS Pop-up window will show you the region( and other info too)

Tip 5:
When we issue CUT , we know that the CUT content are placed in a clipboard. And when we issue PASTE, the clipboard content are pasted. But is it possible for us to view/edit the clipboard ?
One can view the clipboard after any valid CUT command was issued.
To view the clipboard, issue : CUT DISPLAY.
Clipboard manager will pop up and gives us options to edit or browse the content.

Tip 6:
Here is another tip on ISPF CUT. I have a dataset with 10,000 lines.I want to cut the first 10 lines and last 10 lines and paste into another dataset.When I cut the first 10 lines and then again the last 10 lines ,only the last 10 lines are pasted into the new dataset. Is there anyway out (other than doing a 2 cut & paste)?
The answer for the above question is to:
1.first cut 10 lines, then issue CUT APPEND
2.then cut last 10 lines, then issue CUT APPEND
3.When you PASTE it, you got both.

Ref:www.fresherscircle.com

Monday, February 22, 2010

Replace in CF

Replaces occurrences of substring1 in a string with substring2, in a specified scope. The search is case-sensitive.

Syntax:
Replace(string, substring1, substring2 [, scope ])

Parameter Description
string String in which to search
substring1 String for which to search
substring2 String that replaces substring1
scope one: replace the first occurrence (default)
all: replace all occurrences


To remove a string, specify the empty string ("") as substring2.
You do not need to escape comma characters in strings.

Program:
#Replace(FORM.myString, FORM.MySubstring1, FORM.mySubString2)#

Source: http://livedocs.adobe.com/coldfusion/6.1/htmldocs/functa68.htm#wp1111342

Saturday, February 20, 2010

Getting Cookie ID

This code gets the cookie id of current page without using WebUtil in QTP.

theCookie= Browser("micClass:=Browser").Page("micClass:=Page").Object.Cookie
pos=InStr(1,theCookie,"/",1)
cookieID= mid(theCookie, pos + 1, 16)

Thursday, February 18, 2010

Getting Active Object deatils

Browser("").page("").Object.activeElement.Name
Browser("").page("").Object.activeElement.Value
Browser("").page("").Object.activeElement.ID

Tuesday, February 16, 2010

Asynocronous Data Table Loading

When you have a very large datatable and QTP starts to read the datatable objects before it is getting fully loaded. Also if the the .sync is not working
You can use Asynocronous Data Table Loading

oldRowCount=0
While (oldRowCount<>B().P().WebTable().RowCount)

oldRowCount=B().P().WebTable().RowCount
Wait 3Wend

Sunday, February 14, 2010

Point to remember while using Sybase Central

Problem:
Sybase central's SQL window is different from oracle's sql+ in atleast one way. If we have done updates or deletes accidentally in the SQL+ window, in oracle we can just issue a rollback and get back whatever we have lost but sybase central doesnt provide us with any such luxury. The only way to get back the data is to manually insert it again.

Hence it is very important for us to take control of transactions. So before we do any processing give this command
  • begin tran my_tran
  • do all the processing in the transaction andfinally after we are done with everything, if we need to rollback we just have to issue a rollback
  • rollback my_tran which will rollback all the statements issued inside the transaction.
    Hence make sure you start each SQL window of sybase central with begin tran tran_name

Saturday, February 13, 2010

From Browser to ASP.NET

Let’s start at the beginning of the lifetime of a typical ASP.NET Web Request. A request starts on the browser where the user types in a URL, clicks on a hyperlink or submits an HTML form (a POST request). Or a client application might make call against an ASP.NET based Web Service, which is also serviced by ASP.NET. On the server side the Web Server – Internet Information Server 5 or 6 – picks up the request.

At the lowest level ASP.NET interfaces with IIS through an ISAPI extension. With ASP.NET this request usually is routed to a page with an .aspx extension, but how the process works depends entirely on the implementation of the HTTP Handler that is set up to handle the specified extension. In IIS .aspx is mapped through an ‘Application Extension’ (aka. as a script map) that is mapped to the ASP.NET ISAPI dll - aspnet_isapi.dll. Every request that fires ASP.NET must go through an extension that is registered and points at aspnet_isapi.dll.

Depending on the extension ASP.NET routes the request to an appropriate handler that is responsible for picking up requests. For example, the .asmx extension for Web Services routes requests not to a page on disk but a specially attributed class that identifies it as a Web Service implementation. Many other handlers are installed with ASP.NET and you can also define your own. All of these HttpHandlers are mapped to point at the ASP.NET ISAPI extension in IIS, and configured in web.config to get routed to a specific HTTP Handler implementation. Each handler, is a .NET class that handles a specific extension which can range from simple Hello World behavior with a couple of lines of code, to very complex handlers like the ASP.NET Page or Web Service implementations.

For now, just understand that an extension is the basic mapping mechanism that ASP.NET uses to receive a request from ISAPI and then route it to a specific handler that processes the request.

Ref:west-wind

Thursday, February 11, 2010

The ISAPI Connection

ISAPI is a low level unmanged Win32 API. The interfaces defined by the ISAPI spec are very simplistic and optimized for performance. They are very low level – dealing with raw pointers and function pointer tables for callbacks - but they provide he lowest and most performance oriented interface that developers and tool vendors can use to hook into IIS. Because ISAPI is very low level it’s not well suited for building application level code, and ISAPI tends to be used primarily as a bridge interface to provide Application Server type functionality to higher level tools. For example, ASP and ASP.NET both are layered on top of ISAPI as is Cold Fusion, most Perl, PHP and JSP implementations running on IIS as well as many third party solutions such as my own Web Connection framework for Visual FoxPro. ISAPI is an excellent tool to provide the high performance plumbing interface to higher level applications, which can then abstract the information that ISAPI provides. In ASP and ASP.NET, the engines abstract the information provided by the ISAPI interface in the form of objects like Request and Response that read their content out of the ISAPI request information. Think of ISAPI as the plumbing.

For ASP.NET the ISAPI dll is very lean and acts merely as a routing mechanism to pipe the inbound request into the ASP.NET runtime. All the heavy lifting and processing, and even the request thread management happens inside of the ASP.NET engine and your code.

As a protocol ISAPI supports both ISAPI extensions and ISAPI Filters. Extensions are a request handling interface and provide the logic to handle input and output with the Web Server – it’s essentially a transaction interface. ASP and ASP.NET are implemented as ISAPI extensions. ISAPI filters are hook interfaces that allow the ability to look at EVERY request that comes into IIS and to modify the content or change the behavior of functionalities like Authentication. Incidentally ASP.NET maps ISAPI-like functionality via two concepts: Http Handlers (extensions) and Http Modules (filters).

ref:west-wind

Tuesday, February 09, 2010

Retrieving the contents of a ZIP file

This Java tip illustrates a method of listing the contents of a ZIP file. Developer may use this as a functionality for its users to first see the contents of the ZIP file and then decompress the chosen one.
try {
ZipFile sourcefile = new ZipFile("source.zip");
for (Enumeration entries = sourcefile.entries(); entries.hasMoreElements();) {
String zipEntryName = ((ZipEntry)entries.nextElement()).getName();
}
} catch (IOException e) {
}

Source: java-tips.org

Monday, February 08, 2010

cfsilent in CF

cfsilent:
Suppresses output produced by CFML within a tag's scope.
This tag requires an end tag.

Syntax:




Program:

cfsilent



Inside cfsilent block
b-a = #c#


b-a = #c#



Source : http://livedocs.adobe.com/coldfusion/6.1/htmldocs/tags-pc7.htm#wp1103549

Saturday, February 06, 2010

Factors to differentiate entity bean and session bean

The following factors differentiate entity and session bean. They are - :
  • persistence
  • Shared access
  • Primary key
  • Relationship
  • Container managed persistence
  • Abstract schema
  • Multiplicity in container managed relationship
  • Direction in container managed relationship

Source : http://www.hi.is/pub/cs/2002-03/hv1/j2eetutorial/doc/EJBConcepts4.html

Friday, February 05, 2010

How do you make a link open in a new window or tab?

This tip that helps us to make links open up in new tabs or windows. When you create the hyperlink, add target="_blank" just after you mention the url and before you close the tag.

For example, you want to hyperlink Click here to navigate to Google Maps and you want that to open up in a new window, then this is how you do it --
you say: Click Here

Wednesday, February 03, 2010

Change the Internet Properties in a single command!!

1) Press WINDOWS+ R key to get the Run command box.
2) Type "Inetcpl.cpl" to get the Internet Properties window. Make the necessary changes in that Screen.

Monday, February 01, 2010

View your site in different Browsers

I usually test my site for Firefox and Internet Explorer 6. Firefox has a very useful extension called IE Tab than allows you to view web pages in Firefox using the Internet Explorer engine.
This is where Browsershots.org will come in handy for many. Browsershots takes screenshots of your web page for different browsers.
To view the web design for different browsers:
1. Go to Browsershots.
2. Submit your URL and Click Start.
This will lead you to a 'Select browsers and configurations' page where you can specify the browsers and other configurations like javascript, screen resolutions, color depth etc…Click Submit Jobs.
3. On submission, your website will be added to a job queue. You can view the queue status from the Queue page.The screenshots of your site will appear after some time in the Screenshots page.

Source: http://txpress.blogspot.com/2006_12_01_archive.html

Saturday, January 30, 2010

Sharing info on MQ Cluster

A cluster is a network of queue managers that are logically associated in some way. In a Web Sphere MQ network using distributed queuing without clustering, every queue manager is independent. If one queue manager needs to send messages to another it must have defined a transmission queue and a channel to the remote queue manager.If you group queue managers in a cluster, the queue managers can make the queues that they host available to every other queue manager in the cluster.

Then, assuming that you have the necessary network infrastructure in place, any queue manager can send a message to any other queue manager in the same cluster without the need for explicit channel definitions, remote queue definitions, or transmission queues.There are two different reasons for using clusters: to reduce system administration and to improve availability and workload balancing.

Thursday, January 28, 2010

Use special characters from Windows

Symbols like £ (UK Pound), © (Copyright), ¥(Japanese Yen) can be easily used by following a few simple steps:
1. Firstly, these characters are not provided as keys with the keyboard. So stop staring at the keyboard.
2. Go to Start >> Programs >> Accessories >> System Tools >> Character Map.This opens the Character Map as shown below.
3. This window displays all the possible charaters you can enter.
  • Click on any of the symbols to get an enlarged view.
  • Then, click on the Select button to select a character.
  • To copy the selected symbol, press the Copy button (the symbol is actually copied to the clipboard).

4. That's it! Now you can paste the character where you need it.

Also notice the lower-right corner of the Character Map screen. This displays the keystroke required to produce the character you want.
In the figure above its Alt+0163. This means if you Press and Hold the ALT key and type 0163, you will get the UK Pound symbol.
( NOTE: the numbers must be typed from the keys to the right of your keyboard and NOT from the keys above the character keys).

Source: http://txpress.blogspot.com/2006/11/use-special-characters-from-windows.html

Tuesday, January 26, 2010

Few commands on MQM

To create a queue manager: crtmqm (to make it the default, specify theParameter /q)To start the queue manager: strmqm
To start the utility in an interactive mode: runmqsc
To run Mq commands in a wrapper : runmqadm

Sunday, January 24, 2010

cfinclude in ColdFusion

cfinclude
Embeds references to ColdFusion pages in CFML.
You can embed cfinclude tags recursively.

Syntax :


ColdFusion searches for included files in the following sequence:
In the directory of the current page
In directories mapped in the ColdFusion Administrator for the included file
The included file must be a syntactically correct and complete CFML page.For example, to output data from within the included page, you must have a cfoutput tag, including the end tag, on the included page, not the referring page. Similarly, you cannot span a cfif tag across the referring page and the included page; it must be complete within the included page.

Program:


Source :
http://livedocs.adobe.com/coldfusion/6.1/htmldocs/tags-p63.htm#wp1100248

Friday, January 22, 2010

Flex Development on Visual Studio

Well, this is came a little late but I think anticipated. Though not from Microsoft itself, but seems developers on Visual studio are also feeling it. After all the noise regarding the new front ends from all around; AJAX, SilverLight, JAVAFX etc, SWF seems to be on top. Here are two more IDEs for SWF development and that to on Flex Framework and on top of Visual Studio. Amethyst and Tofino.

Amethyst comes in 2 flavors Personal and Professional. Personal Edition is Free as well. According to its makers, SapphireSteel Software, The personal edition will be completely free and may optionally be installed into the free Visual Studio ‘shell’ edition. Amethyst Personal (beta) will be available from Amethyst site in the 2nd week of December 2008. Amethyst Professional will be released in beta in the first quarter of 2009 and the final version is expected to ship in the 2nd quarter.

Tofino is from the company named Ensemble . Its ready to be downloaded from their site and as per the company, Ensemble Tofino is available for free.

Wednesday, January 20, 2010

Some of the Control commands in CICS

Interval Control: All these commands can control the intervals(time)
- ASKTIME
- FORMATTIME
- DELAY
- POST
- WAIT EVENT
- START
- RETRIEVE
- CANCEL

ASKTIME:
- To request the current data and time

FORMATTIME:
- To receive information of date and time in various formats

DELAY:
- Used to DELAY the processing of a task

START:
- Used to start a transaction at the specified terminal and at the specified time or interval
- Data can be passed to the new transaction

RETRIEVE:
- Used to retrieve the data passed by the START

CANCEL:
- Used to cancel the Interval Control requests like DELAY,POST and START
- Identified by REQID.

Monday, January 18, 2010

Task control commands in CICS

Task Control: We have some commands to control the Task, and command are given below.
- SUSPEND
- ENQ
- DEQ

SUSPEND:
- After the execution of higher priority tasks, control will be returned to the suspended task

EXEC CICS
SUSPEND
END-EXEC

ENQ:
- To gain exclusive control over a resource

Syntax:
EXEC CICS ENQ
RESOURCE(data area)
[LENGTH(data value)]
[NOSUSPEND]
END-EXEC

DEQ:
- To free the exclusive control from the resource gained by ENQ

Syntax:
EXEC CICS DEQ
RESOURCE(data_area)
[LENGTH(data_value)]
[NOSUSPEND]
END-EXEC.

Saturday, January 16, 2010

cfhtmlhead in ColdFusion

Writes text to the head section of a generated HTML page. It is useful for embedding JavaScript code, or putting other HTML tags, such as meta, link, title, or base in an HTML page header.
Syntax:


Note:
If you use this tag after the cfflush tag on a page, an error is thrown.

Program:

">


Source: http://livedocs.adobe.com/coldfusion/6.1/htmldocs/tags-p57.htm#wp1099843

Thursday, January 14, 2010

Rich Internet Applications(RIA’s)

Rich Internet applications (RIAs) offer a rich, engaging experience that improves user satisfaction and increases productivity. Using the broad reach of the Internet, RIAs can be deployed across browsers and desktops.

Benefits of RIAs:
RIAs offer organizations a proven, cost-effective way to deliver modern applications with real business benefits:
  • Offer users a richer, more engaging experience.
  • Keep pace with users' rising expectations.
  • Increase customer loyalty and generate higher profits.
  • Leverage existing personnel, processes, and infrastructure.


Source : http://www.adobe.com/resources/business/rich_internet_apps/

Tuesday, January 12, 2010

Technologies to develop Rich Applications

Technologies for building Rich applications:

Sunday, January 10, 2010

Building first Flex App

Prerequisites:
1.Download Flex Builder 3 from
http://www.adobe.com/cfusion/entitlement/index.cfm?e=flex3email
2.Install Flex Builder
3.Install Adobe Flash player 9 plugin for Internet explorer

Creating first project in Flex:
1.Run the Flex builder
2.Click on File -> New -> Flex Project
3.In the New Flex Project dialog: >Enter Project Name as "MyFirstApp" >Check the Use Default Location checkbox >Select Web application as Application type >Select Application Server type as None >Click on Finish
4.MyFirstApp.mxml will be opened in the editor
5.In between the tag add the line below, which adds a label with text My First Appin blue color to the application:

Friday, January 08, 2010

Windows tabs Shortcut

Try this shortcut !
Instead of using ALT + TAB,
Try, windows key + TAB.
Press ENTER to open the active window

Wednesday, January 06, 2010

END task in windows

If an application or a page is hanged, normally we would go to task manager and select that application or page and then we would click on End Task !
It would take sometime to end that application, we got look at the hanged monitor till it closes it and then resume our work.
But, do we know that we have an easier way to close that application ?
Here is it !
Goto the task manager window, and select the Processes tab, and then select the corresponding process and say end process.
It will immediately close it !
The only difficulty is, to find the corresponding process.
The key is that the process would be named in relation to the application.
For eg : notepad.exe, OUTLOOK.EXE, iexplore.exe ( Browser window )
You will get used to finding the process, once you start using it !

Monday, January 04, 2010

Unix Command on sessions

Unix command to check all the active sessions which are currently running.
ps –ef grep rts
ps : Reports the process status
-e: List information about every process now running.
-f: Generate a full listing
rts:Request To Send, RTS is a signal sent by a communications device, such as a modem, to verify if the other device is ready for data to be sent to it.

If you have some issues in unix for example like “license on the server expired”, by giving the above command you can find all the active sessions running on that server.So by killing all the unused or expired sessions your issue may be resolved.Command to kill the session
kill %pid
Kill: cancels a job
Pid-A job control job ID that identifies a background process group to be signaled.

Saturday, January 02, 2010

Reading a zip file

This sample code read the name of all files from a zip file. It uses ZipInputStream to read zip file.


import java.io.*;
import java.util.zip.*;

public class ZipFileRdrExp {

public static void main(String[] args) {

try {

FileInputStream fis = new FileInputStream("C:\\MyZip.zip");
ZipInputStream zis = new ZipInputStream(fis);
ZipEntry ze;
while((ze=zis.getNextEntry())!=null){
System.out.println(ze.getName());
zis.closeEntry();
}

zis.close();

} catch (FileNotFoundException e) {
e.printStackTrace();
} catch (IOException e) {
e.printStackTrace();
}
}
}


Source: java-tips.org
Computers Add to Technorati Favorites Programming Blogs - BlogCatalog Blog Directory