Access and modify rich components inside cells in the table of the ADF

Hello.

This is my current problem with Tables in the ADF.

I drop a simple VO in a page and create a table. Suppose one of the attributes/columns (named flagID, for example) may have specific values: 1 or 2.

Next, I add another column that contains links to the ADF.

For each line, I need it:

  • If row.flagID.value is equal to 1, then its corresponding line contains an ADF link with text '1 link' value and go to destination 1 (can be a page, popup, etc.)
  • If row.flagID.value is equal to 2, then its corresponding line must include an ADF link with text "Link 2" value and proceed to destination 2.

My main problem is to customize each cell. I add a column, I add a link "ADF" in this column, but how can I customize the link and its attributes as I have explained, at the level of cells?

How to access programmatically the cell, not its value, but its rich Component?

Is it possible (programmatic or not) to do?

Any help would be much appreciated.

Thanks in advance. Best regards

Try the EL Expression on the property of the ADF link text

#{row.flagId.value = 1? {Link 1: link 2}

If the link is to behave differently according to the text, and then create a listener of the action on the link and do the required action.

Thank you

Morgan.

Tags: Java

Similar Questions

  • Version 9.0.1 opens on a Google page, with no option of Firefox menu available and no obvious way to access and modify. Firefox is configured as the default browser. Uninstalled and reinstalled several times - same result. Version 8 was fine.

    Once installed, the icon of Firefox opens a Google web browser page that has no toolbar or the navigation buttons. He won't go to Firefox with Google as a research tool. It doesn't seem to be a way to get Firefox.

    You can be in full screen; Press the F11 key to toggle full screen or not.

    If this does not resolve the problem, make sure that the Navigation bar is enabled (checked = displayed; UN - check = not displayed)

    If this answer solved your problem, please click 'Solved It' next to this response when connected to the forum.

    Not related to your question, but...

    You may need to update some plug-ins. Check your plug-ins and update if necessary:

  • The appleid on my iphone is an old email address that I no longer have access and for which I don't remember the password. My ID apple implemented through my pc is my new e-mail address. How can I change the appleid on my iphone to match my new email addr

    The appleid on my iphone is an old email address that I no longer have access and for which I don't remember the password. My ID apple implemented through my pc is my new e-mail address. How can I change the application on my iphone to match my new email address

    Here is the procedure to change the Apple ID:

    Change your Apple - Apple Support ID

    If bad comes to worse, use the link below to contact the Apple Support.

  • I can access and modify current credit card info in apple pay on iphone 6 ios 9.3.2 with new expiration date?

    My salary of apple has not worked at whole foods, walgreens, or sephora. I think I may need to update dates of expiry on the maps, but I can't find where to change it or even see the information to check it out. do I have to remove the current cards and replace them with the new? can I access current information in order to determine if this is my problem?

    You can probably remove and re - enter the map.  Settings > portfolio & Apple pay unless the credit card is also the default value, the one you use with your Apple ID.  In the latter case, go to settings > iTunes & App Store > Apple ID > review Apple ID > payment information to update your card information.  Yet once, you may need to remove and re-add the map here.

  • How can I access and modify a text of a button in different symbols!

    I have this: ELEMENTS: stage - symbol_1

    -symbol_2

    So... I would change a text inside the symbol_2 by a button on the symbol_1, using sym.$("Text").html ("NewText");  What is the correct path!

    Thanks in advance,

    Kind regards

    SYM.$('symbol_2')

    sym.getComposition () .getStage (). getSymbol('symbol_1').$("Text").html ("NewText");

  • Do simultaneously or successively mobile and modifiable fields or text sprites in the movie.

    I'm having a little problem with the creation of field or the sprites that are editable and movable text. I want a user to enter text in the sprites and move on the stage to serve as labels for the schemas they make. I can easily make it draggable or editable, but trying to do both a property interferes with the other. I have been using various combinations of the properties on the mouseenter, mouseleave, and mousedown managers. One version of my not cultivable efforts are below. Seems that I can move a sprite but becomes editable update once it can no longer move.  Any ideas?

    stem

    ___________________________________________________________

    property spritenum

    on mouseenter me
    Sprite (spritenum) .moveablesprite = true

    Sprite (spritenum) .editable = false
    end
    on mouseleave me
    Sprite (spritenum) .editable = false
    Sprite (spritenum) .moveablesprite = false

    end

    on mousedown me
    Sprite (spritenum) .moveablesprite = true
    Sprite (spritenum) .editable = false
    end

    on mouseup me
    Sprite (spritenum) .moveablesprite = false
    Sprite (spritenum) .editable = true
    end

    Just set your text properties in the property inspector and associate a sprite drag behavior.

    -Sprite drag

    sp - this sprite property

    property pStartLoc - location of sprite on mouseDown

    property pMouseStart - location of the mouse on mouseDown

    property pMoving - flag for enterFrame. True/false

    on beginSprite me

    SP = sprite (me.spriteNum)

    pMoving = false

    end beginSprite

    on mouseDown me

    pStartLoc = sp.loc

    pMouseStart = _mouse.mouseLoc

    pMoving = true

    end mouseDown

    on mouseUp me

    pMoving = false

    end

    on mouseUpoutside me

    pMoving = false

    end

    on enterFrame me

    If not pMoving then exit

    deltaMouse = _mouse.mouseLoc - pMouseStart

    SP.loc = pStartLoc + deltaMouse

    end enterFrame

  • my account has been temporarily blocked during an investigation of unauthorized access and now I can't connect to or re: access my account

    I created this account so that I can post this question on my real account associated with xbox live gamertag "kookamango" that is blocked.

    So far, I've dealt with xbox live support, which all have confirmed that this problem is not solvable on their end. My last support Xbox Live call reference number is 1160762648
    My account has unauthorized access and fraudulent charges have been made. The situation has been studied, and my money was refunded to me. The number of service request for the investigation of fraud was 1160762648. My account has been blocked in the investigation and is still blocked even if the investigation is completed and I was sent my email account recovery. Despite the reset my password several times and multiple recovery emails, I couldn't again access to my account, because he always goes to a window saying: "your account has been temporarily blocked."
    Please unblock my account windowslive

    Hello

    By facing the problem with Windows live account, it would be better to post the same question in the Windows Live Solution Center for assistance.

    Windows Live Solution Center: http://windowslivehelp.com/product.aspx?productid=10

    For more information, see the following articles:

    http://support.Xbox.com/en-us/Xbox-Live/how-to/Xbox-Live-account-management/home

    http://support.Xbox.com/en-us/Xbox-Live/how-to/Xbox-Live-account-management/manage-Live-ID

    Hope the information is useful.

  • I deleted my dial-up access and now I can't connect to internet

    I have removed my dial-up access

    I deleted my dial-up access and now I can't connect to the internet, how can I get that back

    Hello

    1. how exactly did you remove the dial-up access?

    Method 1:

    If you have removed the dial from the network and sharing Center, then it should be detected automatically once you restart the computer.

    You can also check the link provided below for more information on the implementation of an incoming VPN or dial-up connection

    Set up an incoming VPN or dial-up connection
    http://Windows.Microsoft.com/en-us/Windows-Vista/set-up-an-incoming-VPN-or-dial-up-connection

    Method 2:

    Perform the system restore. You can restore the computer to a date and time when there are no problems with dial-up access.

    Click on the link provided below for more information on restoring the system.

    What is system restore?
    http://Windows.Microsoft.com/en-us/Windows-Vista/what-is-system-restore

    System Restore: frequently asked questions
    http://Windows.Microsoft.com/en-us/Windows-Vista/system-restore-frequently-asked-questions

  • How did the same predicate is completed access and filter?

    SELECT select, j.job_title, d.department_name

    OF e hr.employees, hr.departments d, hr.jobs j

    WHERE e.department_id = d.department_id

    AND e.job_id = j.job_id

    AND select LIKE 'a % ';

    Execution plan

    ----------------------------------------------------------

    Hash value of plan: 975837011

    ---------------------------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    ---------------------------------------------------------------------------------------------

    | 0 | SELECT STATEMENT | 3. 189. 7 (15) | 00:00:01 |

    |* 1 | HASH JOIN | 3. 189. 7 (15) | 00:00:01 |

    |* 2 | HASH JOIN | 3. 141. 5 (20) | 00:00:01 |

    | 3. TABLE ACCESS BY INDEX ROWID | EMPLOYEES | 3. 60. 2 (0) | 00:00:01 |

    |* 4 | INDEX RANGE SCAN | EMP_NAME_IX | 3 | | 1 (0) | 00:00:01 |

    | 5. TABLE ACCESS FULL | JOBS | 19. 513. 2 (0) | 00:00:01 |

    | 6. TABLE ACCESS FULL | DEPARTMENTS | 27. 432. 2 (0) | 00:00:01 |

    ---------------------------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - access("E".") DEPARTMENT_ID "=" D ". ("" DEPARTMENT_ID ")

    2 - access("E".") JOB_ID '=' J '. ("' JOB_ID ')

    4 - access ("E". "Last_name" LIKE 'A %') "

    filter ("E". "LAST_NAME" LIKE 'A %') "

    I understand not only how to select column is evaluated by the access and filter? Can someone there explain please? Or recommend me an article or document that explain this predicate excatly explains to explain the plan?

    Thanks in advance.

    Near NightWing.

    I believe that the predicate can be used to access THE index entries and if entries of access could include potentially "false positives" then filtering is required to remove the FPs.

    This filtering can be done in the same step of the operation (such as access) or as an extra step.

    My apologies, this has become much longer and more detailed that I intended it to be. :-(

    If I understand correctly,

    In terms of the explanation of the path, each step can include access and filtering process for "entries" (index or line). In the plan to explain the predicate section shows Information the use of predicate for step 'matching. "

    Some predicates can be "used" to ACCESS (ing) the entries, while the same or additional predicates (or even other) can be "used" to FILTER (ing) access entries (which have been consulted, but the optimizer is not sure that EACH AACCESSed entry is indeed a part of final result set). In such cases optimizer applies filtering predicate also during the operation stage. The optimizer can sometime even add additional operation steps or predicate [almost like a short circuit]

    So, using our previous configuration, allow us to run test cases.

    In this query we use AS predicate but the operand does NOT contain any 'wild' character In this case INDEX RANGE SCAN is performed, but since there is no wild characters are involved we can be sure that each entry using this predicate is indeed part of the final result set. This predicate Section shows that the predicate is used ONLY to access (index) entries.

    We know that the result set of this query is NULL lines.

    > explain plan for select v1 of tst where v1 as "A".

    ------------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    ------------------------------------------------------------------------------

    |   0 | SELECT STATEMENT |           |     1.     7.     1 (0) | 00:00:01 |

    |*  1 |  INDEX RANGE SCAN | TSTV1_IDX |     1.     7.     1 (0) | 00:00:01 |

    ------------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - access ("V1" = 'A')

    However, in this application, there is a wildcard character in the predicate, so while the INDEX RANGE SCAN step access entries using this predicate, it could potentially access entries that can be part of the final result set. So in the SAME step of the INDEX RANGE SCAN operation the predicate is also used for filtering. Since this is the only predicate, it may seem redundant.

    > explain plan for select v1 of tst where v1 like 'a % '.

    ------------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    ------------------------------------------------------------------------------

    |   0 | SELECT STATEMENT |           |    24.   168.     1 (0) | 00:00:01 |

    |*  1 |  INDEX RANGE SCAN | TSTV1_IDX |    24.   168.     1 (0) | 00:00:01 |

    ------------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - access ("V1" LIKE 'A %')

    filter ("V1" LIKE 'A %')

    If we add an another predicate as below (also includes wild character), it gets interesting. INDEX RANGE SCAN step performs two access AND filtering.

    Please note that the predicate 'V1' AS '%' is used to ACCESS and FILTER, fine FILTER uses additional predicates.

    > explain plan for select v1 of tst where v1 like 'A %' and v1 as "%c".

    ------------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    ------------------------------------------------------------------------------

    |   0 | SELECT STATEMENT |           |     1.     7.     1 (0) | 00:00:01 |

    |*  1 |  INDEX RANGE SCAN | TSTV1_IDX |     1.     7.     1 (0) | 00:00:01 |

    ------------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - access ("V1" LIKE 'A %')

    filter ("V1" IS NOT NULL AND "V1" LIKE 'A %') AND "V1" LIKE "%c"

    When we change the predicate 'V1' LIKE 'A %' to 'V1' > 'A', then we can use the predicate to access entries AND do not forget that each entry using this predicate are

    Indeed part of results if other predicates are met. In this case optimizer of must not filter on 'V1' > 'A', wherever it must continue to filter on 'V1' LIKE '%c '.

    > explain plan for select v1 of tst where v1 > 'A' and v1 as "%c".

    ------------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    ------------------------------------------------------------------------------

    |   0 | SELECT STATEMENT |           |     1.     7.     1 (0) | 00:00:01 |

    |*  1 |  INDEX RANGE SCAN | TSTV1_IDX |     1.     7.     1 (0) | 00:00:01 |

    ------------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - access("V1">'A')

    filter ("V1" IS NOT NULL AND "V1" LIKE "%c")

    Of course, if we do the predicate so that the entries are NOT accessible using the predicate, then for INDEX FULL SCAN (no Beach cannot be determined) operation comes into play and the predicate of ACCESS goes. All entries in the index are ALWAYS accessible (predicate applied no ACCESS) and FILTER predicate is applied.

    > explain plan for select v1 of tst where v1 like '%c %'

    ------------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    ------------------------------------------------------------------------------

    |   0 | SELECT STATEMENT |           |     1.     8 S     1 (0) | 00:00:01 |

    |*  1 |  INDEX SCAN FULL | TSTV1_IDX |     1.     8 S     1 (0) | 00:00:01 |

    ------------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - filter ("V1" IS NOT NULL AND "V1" LIKE '%A%c')

    For the example proposed by JL, two predicates are used in the INDEX RANGE SCAN step to access THE entries. In addition, we can be sure that all entries that are accessible with success using this predicate can be included in the final result set. So not necessary filtering.

    > explain plan for select v1 of tst where v1 > 'A' and v1<>

    ------------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    ------------------------------------------------------------------------------

    |   0 | SELECT STATEMENT |           |    24.   168.     1 (0) | 00:00:01 |

    |*  1 |  INDEX RANGE SCAN | TSTV1_IDX |    24.   168.     1 (0) | 00:00:01 |

    ------------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - access("V1">'A' AND "V1")<>

    Interestingly, when we change the 'B' in the previous query to 'A', change predicates of inequality, so we cannot use index. Optimizer knows this and switches for FTS and introduced an additional step of operation FILTER. In my view, the filter predicate can be applied in operation of FTS. Additional FILTER stage is the predicate as FALSE hard-coded value. It does not yet use our predicate of the query.

    Well, don't know if he actually bypasses the operation of FTS. SQL trace can indicate that.

    > explain plan for select v1 of tst where v1 > 'A' and v1<>

    ---------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    ---------------------------------------------------------------------------

    |   0 | SELECT STATEMENT |      |     1.     8 S     0 (0) |          |

    |*  1 |  FILTER |      |       |       |            |          |

    |   2.   TABLE ACCESS FULL | TST |    49.   343.     3 (0) | 00:00:01 |

    ---------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - filter (NULL IS NOT NULL AND NULL IS NOT NULL)

    Subsequently, optimizer decides to use the INDEX RANGE SCAN, even if the predicate is always an inequality. Go figure...

    > explain plan for select v1 of tst where v1 > 'A' and v1<=>

    -------------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    -------------------------------------------------------------------------------

    |   0 | SELECT STATEMENT |           |     1.     8 S     0 (0) |          |

    |*  1 |  FILTER |           |       |       |            |          |

    |*  2 |   INDEX RANGE SCAN | TSTV1_IDX |     1.     8 S     0 (0) | 00:00:01 |

    -------------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - filter (NULL IS NOT NULL)

    2 - access("V1">'A' AND "V1")<>

    As others have said, it is difficult to understand and predict the path, but fortunately Oracle doing the right thing, 99% of the time.

    VR

    Sudhakar

  • Outlook Express 6 is the e-mail client 'default' in Works 8.5, can remove this icon and or replaced by Outlook 2003 or the 'other' no matter what version of outlook?

    Hi all

    I have an old Dell Dimension 2400 desktop running Windows XP Pro. It has Microsoft Works 8.5, which contains a reference to Outlook Express 6 icon, so that it can be launched from inside Works 8.5.

    I use NO Outlook Express 6, because I have Outlook 2003 AND Outlook 2007, can I use on it instead, if I want to - which I am not at the moment.

    Anyone in this community know if it is possible to remove the icon from Outlook Express 6 to Works 8.5.

    (and possibly 'replace' the icon with one for Outlook 2003 so that THIS 2003 version opens instead?)

    There is no icon in Add/Remove programs for Outlook Express, or y at - it one in the "all programs" list. Is it possible to uninstall Outlook Express Windows XP completely somehow so that it does not Works 8.5 launch when a user clicks on its ' icon?

    This version of Outlook Express does not work anyway (I tried to set up accounts in there, but they do not work even with the correct details) so it's wasting space on this little hard drive.

    I want to be able to implement this old pc - that works fine as long as I accept his ' limits (Intel Celeron 2.4 Ghz single core cpu, 2 GB of Ram, 80 GB HDD)-for the nephews and my 11 years old 7yr to use it safely for the duties of the school, (I have a copy of the Encyclopedia Britannica 2006) , basic base 'games for kids' Web site, when they come to visit. My nephews have not much experience pc anyway and have no interest in the emails.

    There is no other applications on it (which were not ' provided with Window XP Pro") for the moment, outside Works 8.5 and Windows Live nephews will have access to.

    Norton Internet Security 2012, Norton Utilities, Norton go back 4.2 and control Parental Norton will be also created on this pc with Admin access only.

    Otherwise, anyone here know of any 'other' app is similar to 8.5 Works that have the same characteristics of the task/project based - but without email - that I could use instead, which would continue to operate on an old XP pc?

    I would greatly appreciate any ideas or advice from someone who wants to give it.

    Thank you!

    Bob

    I can probably only partially help because I've never used Outlook or works.
     
    Outlook Express is a part of XP, so it cannot be deleted, and probably, it takes less space than Norton.
     
    Control Panel | Add/Remove programs. Add/Remove Windows components. Find Outlook Express and uncheck the box.
     
    Control Panel | Add/Remove programs. Set Program Access and Defaults. Custom + down arrow | Select the option for Outlook 2003.
     
    Start with that and see where you are.
     
    Microsoft Office Outlook forums can be found here.
    http://answers.Microsoft.com/en-us/Office/Forum/Outlook?tab=all

  • Moving text to a cell in one table to another

    I don't know if I'm somehow missed something, but in earlier versions of the Pages I could click and keep text in a cell in a table of Pages, the text would be "lifting" off the page and I could move it to another cell. I now use 5.6.2 Pages and the text does not move. When I click and hold, nothing happens, and when I try to move it's just active adjacent cells that spans my mouse.

    Any help is appreciated.

    I have Pages here on OS X 10.11.6 v5.6.2. I have a table in text format cell or automatic, I can select text in a cell, click and drag this text in another cell of arbitrary table. Although Pages v5.6.2 is a completely different application of v4.3 Pages ' 09, this operation of copy of text in a cell to works for me - although not the levitate text when you click on it.

  • How to access a PDF file imported inside a rectangle and move

    Hi, I have the following code which puts a PDF file inside a rectangle var f = new File ("C:/pdf.pdf");    var doc = app.activeDocument;  var thepdf = doc.pages [0] .rectangles [0] .place (f, false);  doc.pages [0] .rectangles [0] .fit (FitOptions.FILL_PROPORTIONALLY);  Now I want to spend "thepdf" (which is the type of PDF object), but I can only find a way to move the rectangle around it. I need to move the inner rectangle (PDF), as I would with the direct Selection tool. is this possible?

    Yes. It is possible.
    The PDF file placed inside the rectangle is the graphics object [0] of the rectangle.
    Or, if search you the collection of links, the parent of this link. The parent of the parent that is the container, the rectangle object.

    myRectangle.graphics[0].move(/*insert your arguments here*/)
    

    Move the PDF file inside. When the move() method could have different arguments:

    Adobe InDesign CS6 (8,0) object model JS: graph

    Uwe

  • bean, containing the business logic and user interface components

    Hello experts design ADF, please guide me.   I came across a critical design aspects.  I have the homepage with a lot of UI, region 1, region 2 components. I bind the components of the user interface of the page at a session scope managed bean and is the reason why, when control passes to the region 1 or region 2, I'm going to do a lot of processing logic and then on that basis, I have to update the page user interface components.   Same thing with region 2 also.  And then I should be able to access the information in all regions and also through other components of interface user etc.

    I see only the scope session bean can help me here to get my tasks in all regions and in all the other components of the interface user to the page because I'm not able to spend too many parameters in all regions.     Now the problem is, I can't serialize this bean because as I've mentioned a lot of user interface components are updated based on logic.

    If I do not serialize the bean, I might have a problem in the future when the application must be deployed to the cluster envt.

    I don't know how can I go with my design now.   Please give me ideas, brilliant and very grateful for your advice.

    Thank you

    Hello

    I did not follow the entire thread, but this last message, I can tell that you are not using ADF how it should be used. So let me address two issues

    1. I use data controls generated on methods of bean managed my areas (workflow).

    If you create a POJO data control that you configured as controlled beans then this will be two instances (separated) from the same Java class. This means that they do not share anything. The only option to share state between a managed bean and a data control is if you would have the data dynamically control bean up the bean managed using the language of Expression of the 8which then however creates a dependency between the DC and the bean - however, there are use cases like that)

    2 activation / deactivation of the buttons in the parent view of a region

    This can be done using bean-injection, which is a bean managed in extended view defined on the parent view that you pass as parameter for the workflow. See: http://www.oracle.com/technetwork/issue-archive/2013/13-may/o33adf-1920483.html

    As said, I haven't read the entire thread, but want to point out that there is enough information in writing (product documentation) and video (Insider ADF - who teach the development of SFM practices http://www.oracle.com/technetwork/developer-tools/adf/learnmore/adfinsider-093342.html take the time to review this)

    Frank

  • I installed it twice, but he was now part of a pop-up that I can't access and I can not access Firefox is.

    When I start it, it seems correct, except that a pop-up appears partially on. The ToolTip is not fully displayed, and I can't find any means of l ' turn off. Also, I can't access Firefox, because everytime I try, it gives me a beep. The only way to stop all this out is to reboot the machine.

    AHA, AOL Toolbar is the first extension! Now... Why wasn't that visible when you went to the Add-ons page before? Can you check once again, make sure you select Extensions in the left column and either disable or delete?

    The page also contains a warning about a user.js file, which is a file of option settings you (or other software) can create to modify your preferences of Firefox from the previous session. Usually, it is a file, you'll want to remove it, and this article has more information on the study that: How to fix preferences that will not save.

  • DIAdem programming - how to access each data cell in the table?

    How access us each cell in the file of PDM current access using the script of DIAdem environment? Could someone send me a code example?

    Thank you

    Hi NiCoder,

    If you can load these channels as digital channels instead of the string channels, then you can use the function "G" use in the channel Finder to retrieve a specific bit value of a digital channel (which contains integers).  You can alternatively convert all strings string channels to digital channels, and then use the function 'G' out of all the values 0 or 1 of the 5th bit of the values of each channel.  Running this command with ChnCalculate() runs much faster than access to each value of the layer one at a time, although you can use the GetB() function with each value in a loop of the channel.

    Brad Turpin

    Tiara Product Support Engineer

    National Instruments

Maybe you are looking for

  • I need suggestions to replace a hard drive on my laptop the macbook unibody shell 2008.

    The 2008 macbook unibody laptop computer (metal) is running on a HD even older, I cleaned up an old mac laptop broken. I have more money and just use this laptop for e-mail and writing. A representative of Apple at the genius bar told me months ago w

  • How to print or save a voice mail of iphone constantly 6

    Hello I have an i phone 6. Question: There is an important answering machine that I want to print (or save constantly). What I've done so far: 1. my phone provider suggested I have find an app for this. 2. online search has not been successful 3. I h

  • Analyze the data in the column

    Hello, sorry if this has been addressed before. What I have is a large CSV with 60 000 rows and 7 columns. I wanted to make calculations of the file existing on the columns 3 and 4 I have done with tables index and formulas. What I want now, is to pu

  • Computer is stuck on 36 of 41 updates Windows 7 Home Premium

    I did a reboot on my PC and appearantly were 41 new updates that needed to be done.  PC is stuck on 36 of the 41 and has been for about 2 hours now.  How to get out of it without destroying my OS as seeking answers on that it seems that the warning o

  • KB954430 update installs several times.

    Why a previously installed update continues to appear as being available at the facility?  My OS is Windows 7 (64-bit).  Update KB954430 (update of security for systems of Microsoft XML Core Services 4.0, Service Pack 4 for x 64 based) is available f