Few tips on best practices of GUI please

I am trying to create a small slot - VI, which allows to get a relatively simple goal, but I'm stuck.

I need a modal window to appear display a table to two columns and then OK and Cancel buttons. Here are my requirements for the Subvi:

  • It must fill a table with two columns, the first column with string entries, the second column with whole numbers.
  • The user must be able to change the second value in the column, but not the first column of strings.
  • There must be a vertical scroll bar that this list could get quite long.

I created the Subvi, as shown in the snapshot attached, which satisfies the above requirements. I use filter events to get rid of the clicks of the mouse in the first column, which prevents the modification of string values. However, this does not exeactly I want, and so I know that my client won't be happy either: when the user clicks on an entry in the second column, the text of the string in the first column is highlighted. AND this does not prepare the numeric value for the edition or the other. As it is an array of LabVIEW, to change the value of the user must wait about a second, then reselect it - I think a tedious requirement. And why the first entry in column get highlighted when selecting in the second column?

Is there a way to set up the table to accept simple clicks as a request for editing, or

Is there a better way to present my two column list and allow the user to easily change the numeric values?

I'll try to create a stand-alone version of the Subvi and attach it to a subsequent message if that helps people to see what I mean...

Thoric,

Consider two tables.  The first is an array of indicators of the string, the value disabled.  The second is a whole array of controls.  Hide controls index on both screens.  It may take a bit of tweaking to get the vertical size on the elements of each the same so that they remain aligned.  Create a vertical sliding regulator to use the scroll bar.  Use its output with nodes of property to control which parts of the tables are visible.

Lynn

Tags: NI Software

Similar Questions

  • Just improved m tips on best practices for sharing files on a Server 2008 std.

    The field contains about 15 machines with two domain controllers, one's data is the app files / print etc...  I just upgraded from 2003 to 2008 and want to get advice on best practices for the establishment of a group of file sharing. Basically I want each user to have their their own records, but also a staff; folder. Since I am usually accustomed to using windows Explorer, I would like to know if these actions can be done in the best conditions. Also I noticed on 2008 there is a feature of contacts. How can it be used? I would like to message or send an email to users their file locations. Also, I want to implement an admin at a lower level to handle the actions without making them far in on the server, not sure.

    I read a certain bbut I don't like test direct more because it can cause problems. So basically a way short and neat to manage shares using the MMC, as well as the way that I approach their mail from the server of their actions. Maybe what kind of access cintrol or permissions are suitable also for documents. Also how can I have them use office templates without changing the format of the model.

    THX

    g

    Hello 996vtwin,

    Thank you for visiting the Microsoft Answers site. The question you have posted is related to Windows Server and would be better suited to the Windows Server TechNet community. Please visit the link below to find a community that will support what ask you:

    http://social.technet.Microsoft.com/forums/en-us/category/WindowsServer

    Hope this helps J

    Adam
    Microsoft Answers Support Engineer
    Visit our Microsoft answers feedback Forum and let us know what you think

  • Canvas campaign best practices

    Hello my dear modern marketing. I wonder if you might be able to help out me. I'm hosting a Webinar this week on best practices of campaign canvas and even though I have a decent amount of material for the webinar, I'm sure there are a few other tricks, tips and best practices that you discovered that I have not taken into account. This webinar is for my marketing here at Intel security managers but I want to keep it generic enough so that it will apply to all the B2B marketing specialists who create campaigns in Eloqua. In this way, I can share it on Topliners for all to view/take advantage.

    So, what advice, tips, and best practices you have to share?

    Marking: Eytan Abrahams, freejung Michael Seto-Oracle, Kristin Farwell-Oracle mcalnan Mike McKinnon, schwartzrw, dliloia, hwhitehead, hdurante, jennifer.igartua first to us.

    P. S.

    PRICE!  Everyone who responds with a good tip or best practices, will win the #1 Prize and be entered in a drawing for the Grand Prize!

    Notes:

    Price #1 = un super hug

    Grand Prize = a Cross pen super-cool Oracle Cloud Marketing!

    Sterling Bailey-Oracle - huh, my answers were not useful? I got there first, so for that I am ready to plan this embrace.

  • Upgrading ESX 3.0.2 for 3.5 - best practices and tips

    Hello

    I am currently managing a virtual environment running on ESX 3.0.2 and VC 2.0.2. I intend to upgrade this year to ESX 3.5 and VC 2.5. Anyone know where I can find information on best practices to upgrade and / or a document of instructions that will take me through the process? I had a glance on the VMWare Web site but cannot find anything.

    See you soon

    G

    I have attached a document with this information.

    First of all you must upgrade the VC and the database, then you must upgrade from ESX.

    Kind regards.

  • Best practices Apple ID

    I help the family members and others with their Apple products. Probably the problem number one revolves around Apple ID I saw users follow these steps:

    (1) share IDs among the members of the family, but then wonder why messages/contacts/calendar entries etc are all shared.

    (2) have several Apple IDs willy-nilly associated with seemingly random devices. The Apple ID is not used for anything.

    (3) forget passwords. They always forget passwords.

    (4) is that I don't really understand. They use an e-mail from another system (gmail.com, hotmail.com, etc) as their Apple ID. Invariably, they will use a different password for their Apple ID than the one they used for other email, so that they are constantly confused about which account to connect to.

    I have looked around for an article on best practices for creating and using Apple ID, but could not find such a position. So I thought I would throw a few suggestions. If anyone knows of a list or wants to suggest changes/additions please feel free. Here are the best practices for normal circumstances, i.e. not cooperate accounts etc.

    1. every person has exactly 1 Apple ID.

    2. do not share Apple ID - share content.

    3. do not use an email address of another counts as your Apple ID.

    4. When you create a new Apple ID, don't forget to complete the secondary information to https://appleid.apple.com/account/manage. It is EXTREMELY important questions your email of relief and security.

    5. the last step is to collect the information that you entered in a document and save to your computer AND print and store it somewhere safe.

    Suggestions?

    I agree with no. 3, it is no problem with using a addressed no iCloud as the primary ID, indeed, depending on where you set up your ID, you may have no choice but to.

  • Best practices for designing a view in PlayBook

    Hello world

    I'm new to BlackBerry PlayBook development and I would like to know how to make a user interface appropriate for playbook, what would be the best practice to do and it will be helpful to me if someone can post sample code here

    Thanks in advance

    A few tips:

    * Views extend Sprite

    * Views should be resizable, IE have a setSize() method

    * views should 'PIN' children at some edges of the screen, from when they are resized it runs correctly.

    * a parent class must listen to the scene for Event.RESIZE and call of resizing on the view.

    * Use the component of QNX, set if possible

    * Implement native controls, like sliding down to the options

  • denying denying interceptor inline best practices

    We recently deployed an inline IPS solution using software 5.1 7 E1. We wish to refuse-attacker-victim-pair-Inline for a few signatures on a particular subnet on the network but to destroy the rest.

    To implement this correctly, I think that we must use Action SigEvent filters on the sensor and use the commands > for all subnets agree that we want to allow deny actions for.

    I have seen that in the configuration of the sensor, you can implement in the section > a > statement. My understanding is that does more for fleeing rather than deny solutions online.

    Am I right about that?

    Please could someone on the list post that it is the best practical solution to deny deny attackers inline.

    create 2 event action filters.

    The first action event filter will match signatures and subnets you want to deny on and do not subtract all actions. Make sure that you set to "stop the match".

    The following will match the same signature but the address 0.0.0.0 - 255.255.255.255. remove the appropriate actions.

    The net result is that the filter action first event will apply when it matches and the second when it doesn't.

  • Best practices for the restart of the nodes of the ISE?

    Hello community,

    I administer an ISE installation with two nodes (I'm not a specialist of the ISE, my job is simply to manage the user/mac-addresses... but now I have to move my ISE a VMWare Cluster nodes to another VMWare Cluster.

    (Both VMWare environments are connected to our network of the company, but are different environments. vMotion is not possible)

    I want to stop ISE02, move it to our new VMWare environment and start it again.

    That I could do this with our ISE01 node...

    Are there best practices to achieve this? (Stop request first, stopl replikation etc.) ?

    Can I really just reboot a node ISE - or I have consider something before I do this? After I did this?

    All tasks after reboot?

    Thanks for any answer!

    ISE01
    Administration, monitoring, Service policy
    PRI (A), DRY (M)

    ISE02
    Administration, monitoring, Service policy
    SEC (A), PRI (M)

    There is a lot to consider here.  If changing environments involves a change of IP address and IP extended, then your policies, profiles and DACL would also change among other things.  If this is the case, create a new VM ISE in the new environment in evaluation license using the and recreate the old environment deployment by using the address of the new environment scheme.  Then a new secondary node set rotation and enter it on the primary.  Once this is done, you can re - host license from your old environment on your new environment.  You can use this tool to re - host:

    https://Tools.Cisco.com/swift/LicensingUI/loadDemoLicensee?formid=3999

    If IP addressing is to stay the same, it becomes simpler.

    First and always, perform an operational backup and configuration.

    If the downtime is not a problem, or if you have a window of maintenance of an hour or so: just to close the two nodes.  Transfer to the new environment and light them, head node first, of course.

    If the downtime is a problem, stop the secondary node and transfer it to the new environment.  Start the secondary node and when he comes back, stop the main node.  Once that stopped services on the head node, promote the secondary node to the primary node.

    Transfer of the FORMER primary node to the new environment and turn it on.  She should play the role of secondary node.  If it is not the case, assign this role through the GUI.

    Remember, the proper way to shut down a node of ISE is:

    request stop ise

    Halt

    By using these commands, the risk of database corruption decreases by 90% (remember to always backup).

    Please rate useful messages and mark this question as answered if, in fact, does that answer your question.  Otherwise, feel free to post additional questions.

    Charles Moreton

  • Sliders - best practices

    Hi all

    This question is based on the thread: Re: best practices with the sliders with curls

    Here I've created the same script with different methods.

    1 CURSOR

    ------------------

    DECLARE

    CURSOR table_count

    IS

    SELECT table_name

    From user_tables

    ORDER BY 1;

    sqlstr VARCHAR2 (1000);

    numrow NUMBER;

    BEGIN

    Dbms_output.put_line ('Start time' | to_char (sysdate,' dd-mon-yyyy hh24:mi:ss'));))

    I'm IN table_count

    LOOP

    sqlstr: = 'SELECT COUNT (*) FROM "| i.table_name;

    EXECUTE IMMEDIATE sqlstr INTO numrow;

    If numrow > 0 then

    Dbms_output.put_line (RPAD (i.table_name, 30, '.') |) ' = ' || numrow);

    end if;

    END LOOP;

    Dbms_output.put_line ('End time' | to_char (sysdate,' dd-mon-yyyy hh24:mi:ss'));))

    END;

    My understanding:

    He's going to line-by-line treatment generally slow performance

    2. BULK COLLECT

    -----------------------------

    DECLARE

    sqlstr VARCHAR2 (1000);

    numrow NUMBER;

    Table-name TYPE is table of the varchar2 (30);

    tNom table_name;

    BEGIN

    Dbms_output.put_line ('Start time' | to_char (sysdate,' dd-mon-yyyy hh24:mi:ss'));))

    SELECT table_name

    TNom LOOSE COLLECTION

    From user_tables

    ORDER BY 1;

    BECAUSE me IN tNom. FIRST... tNom. COUNTY

    LOOP

    sqlstr: = 'SELECT COUNT (*) FROM "| tname (i);

    EXECUTE IMMEDIATE sqlstr INTO numrow;

    If numrow > 0 then

    Dbms_output.put_line (RPAD (tname (i), 30, '.') |) ' = ' || numrow);

    end if;

    END LOOP;

    Dbms_output.put_line ('End time' | to_char (sysdate,' dd-mon-yyyy hh24:mi:ss'));))

    END;

    My understanding:

    1 avoid context switching

    2 uses more PGA

    3. THE CURSOR AND IN BULK AT COST VIRES

    --------------------------------------------------

    DECLARE

    CURSOR table_count

    IS

    SELECT table_name

    From user_tables

    ORDER BY 1;

    sqlstr VARCHAR2 (1000);

    numrow NUMBER;

    Table-name TYPE is table of the varchar2 (30);

    tNom table_name;

    BEGIN

    OPEN table_count;

    Pick up the LOOSE COLLECT tNom table_count;

    Dbms_output.put_line ('Start time' | to_char (sysdate,' dd-mon-yyyy hh24:mi:ss'));))

    BECAUSE me IN tNom. FIRST... tNom. COUNTY

    LOOP

    sqlstr: = 'SELECT COUNT (*) FROM "| tname (i);

    EXECUTE IMMEDIATE sqlstr INTO numrow;

    If numrow > 0 then

    Dbms_output.put_line (RPAD (tname (i), 30, '.') |) ' = ' || numrow);

    end if;

    END LOOP;

    Dbms_output.put_line ('End time' | to_char (sysdate,' dd-mon-yyyy hh24:mi:ss'));))

    END;

    My understanding:

    I really don't understand why some people prefer this method is to have the two SLIDER and COLLECT in BULK

    4. IMPLICIT CURSOR

    ----------------------------------

    DECLARE

    sqlstr VARCHAR2 (1000);

    numrow NUMBER;

    BEGIN

    Dbms_output.put_line ('Start time' | to_char (sysdate,' dd-mon-yyyy hh24:mi:ss'));))

    FOR I IN (SELECT table_name

    From user_tables

    ORDER BY 1)

    LOOP

    sqlstr: = 'SELECT COUNT (*) FROM "| i.table_name;

    EXECUTE IMMEDIATE sqlstr INTO numrow;

    If numrow > 0 then

    Dbms_output.put_line (RPAD (i.table_name, 30, '.') |) ' = ' || numrow);

    end if;

    END LOOP;

    Dbms_output.put_line ('End time' | to_char (sysdate,' dd-mon-yyyy hh24:mi:ss'));))

    END;

    My understanding:

    It will also gives better performance compare that loops of CURSOR

    Given that the 4 methods above do the same work, please explain how to choose the correct methods for different scenarios. That is what we have to consider before choosing a method.

    I asked this question on asktom a few years ago Tom Kyte. He recommended that the implicit cursors:

    • they have a size of 100 (not 500) extraction;
    • PL/SQL manages the opening and closing of the cursor automatically.

    He mentioned one important exception: If you need to change data and not just read it, you need in "bulk" so much read as write operations - and that is to use the FORALL.

    To use FORALL for writing, you must use the COLLECTION in BULK for reads - and you should almost always use LIMIT with the COLLECTION in BULK.

    So, to make it "in bulk the Scriptures ', use FORALL. For the ' readings in bulk "preparing the ' written in bulk ', use BULK COLLECT with LIMIT. For the ' readings in bulk "when you change all the data, implicit cursors are more simple.

    Best regards, stew Ashton

  • Receptive - best practices

    In the process of creating a sensitive site, I would also have a better training on the use of new tools and BEST PRACTICES for resizing images and objects to work best on all devices.

    For example, how large a slider should be?
    What happens if I want her to be up to 30%, then the image, the size must be created in?
    Same thing with text, Logos, Menus, etc...

    Another thing, how will this affect the new resolutions superior phones vs tablets and desktop computers? Clear teaching is necessary as well. Sony has a new phone with a resolution of 4K, which is higher than my main desktop computer! Meanwhile Muse used 380px wide to provide phone and they recommend even the same breakpoint in the "Muse of Beta reactive" too. Of course, I might just do all huge but I try to keep my fast loading sites.

    Just a few details about these things please...

    Found a few links that might help

    Sensitive design best practices

    http://webdesignledger.com/7-best-practices-of-responsive-Web-design

    Thank you

    Preran

  • Best practices for managing strategies of path

    Hello

    I get conflicting advice on best practices for managed paths.

    We are on version 4.0 of ESXi connection to a HP EVA8000. Best practices guide HP recommends setting the strategy of railways handle on Round Robin.

    This seems to give two active paths to the optimized controller. See: http://h20195.www2.hp.com/v2/GetPDF.aspx/4AA1-2185ENW.pdf

    We used certain consultants and they say that the best practices of Vmware for this solution is to use the MRU policy which translates a single path to the optimized controller.

    So, any idea what good practice is best practice? Does make a difference?

    TIA

    Rob.

    Always go with the recommendation of the storage provider.  VMware recommendation is based on the characteristics of the generic array (controller, capable ALUA failover methods, etc.).  The storage provider's recommendation is based on their performance and compatibility testing.  You may want to review their recommendations carefully, however, to ensure that each point is what you want.

    With the 8000, I ran with Round-Robin.  This is the option of creating more robust paths available to you from a failover and performance point of view and can provide performance more even through the ports on the storage controller.

    While I did of the specific tests/validation, the last time that I looked at the docs, the configuration of HP recommends that you configure each IO to the ports in the switch configuration.  This adds the charge to the ESX host, the switch to other ports, but HP claims that their tests showed that it is the optimal configuration.  It was the only parameter I wondered in their recommendation.

    If you haven't done so already, be sure to download the HP doc on configuring ESX and EVA bays.  There are several parameters that you must configure the policy path, as well as a few scripts to help make the changes.

    Virtualization of happy!

    JP

    Please consider awarding points to useful or appropriate responses.

  • Best practices for automation of ghettoVCBg2 starting from cron

    Hello world!

    I set up an instance of vma for scheduling backups with ghettoVCBg2 in a SIN store. Everything works like a charm from the command line, I use vi fastpass for authentication, backups complete very well.

    However, I would like to invade the cron script and got stuck. Since vifp is designed to run only command line and as I read not supposed to work from a script, it seems that the only possibility would be to create a backup user dedicated with administrator privileges and store the user and pass in the shell script. I'm not happy to do so. I searched through the forums but couldn't ' find any simple solution.

    any IDE for best practices?

    Thank you

    eliott100

    In fact, incorrect. The script relies on the fact that the host ESX or ESXi are led by vi-fastpass... but when you run the script, it does not use vifpinit command to connect. It access credentials via the modules of vi-fastpass which don't vifpinit library but as you have noticed, you cannot run this utility in off-line mode. Therefore, it can be scheduled via cron, basically, but you must run the script interactively, just set up in your crontab. Please take a look at the documentation for more information

    =========================================================================

    William Lam

    VMware vExpert 2009

    Scripts for VMware ESX/ESXi and resources at: http://engineering.ucsb.edu/~duonglt/vmware/

    Twitter: @lamw

    repository scripts vGhetto

    Introduction to the vMA (tips/tricks)

    Getting started with vSphere SDK for Perl

    VMware Code Central - Scripts/code samples for developers and administrators

    VMware developer community

    If you find this information useful, please give points to "correct" or "useful".

  • Computer configuration virtual for SRM - files from memory Swap file/Virtual - best practice replication?

    Hello, I am very new to the model DR VMWare and have a few persistent questinos.

    What is the recommended best practice re: virtual computers invited windows and virtual memory files.  I think it would be unnecessary to replicate these changing data on the DR site.  I have several virtual machines with 6-8gig memory and I'm just wondering how can I isolate the ESX memory swap files and virtual memory in Windows feedback, so they get not replicated on the Dr site as often as changing os/data.  If it's even necessary to replicate.

    We use vspere vcenter 4.1 related modes, RS 4.1 the two on-site Cellera NX4 ReplicatorV2.

    I wonder if I can install the files of pages to be in a condition NOT replicated file system or a file system which is the only value replicates every 24 hours, or once a week.

    My reasoning here is.  Once the file is there, the operating system really cares about the changes in this file and dumps windows virtual memory on a restart, as well as the .vswp file.

    what I mean is built on a virtual disk full and placing the windows file on this virtual disk to Exchange.  This virtual disk could exist in a data store hosted on a celerra file system that does not get repeated as frequently as data/OS file systems.

    or am I completely off base here.

    I think that if you tried to reproduce these files and maintain a sync time minute 10, you would need a ton of bandwidth.

    any suggestions or recommendations or even pointers to Articles/items worth points = D.

    Thanks for your time.

    Given that the configuration is made at the level of the cluster and has no impact on the SRM, replication is not a factor.  Don't forget, not to replicate the LUNS with the swap, just files have a LUN configuration on the side of recovery as well and have this defined cluster Exchange files.  Also, on the virtual machine critical we define reservations memory so the pagefile is not a factor at all.

    Kind regards...

    Jamie

    If you found this information useful, please consider awarding points to 'Correct' or 'useful '.

    Remember, if it isn't one thing, it's your mother...

  • Best practices VMotion network prod.

    Our team has looked at the requirements of network speed for the VMotion network on an ESX Server.  Details to our environment, we are looking at a cluster of 8 knots with each ESX Server running over 25 virtual machines.  Given this information, a network of 1 GB for the VMotion network connection seems sufficient, or should we be looking at more closely to the provision of a connection of 10 GB?

    Thank you very much in advance,

    Steve

    best practical vMotion is a network isolated from 1 GB - 10 GB would be a stretch the network is used when a vmotion event happens and if your environment is sized correctly I don't expect vmotion occurning more than a few times per hour - and based on your virtual machines per host, I would say that you will have a lot of extra capacity--

    If you find this or any other answer useful please consider awarding points marking the answer correct or useful

  • Size of the file - best practices

    I am putting together my first iPad app DPS and looking for a few tips to keep the manageable file size.

    I did a quick project about 6 pages and it came as a huge 28 MB. My document end will be about 100 pages (x 2 for directions)

    I really did nothing to try to reduce the size of the files in the project, I used PSD images with layers and not a not resize to 1024 x 768. Same thing with any jpg I used. I should do? Also, I did not bother to check if the image was CMYK or RGB. Basicially, I was working on the assumption that the images would be optimized in the process.

    I created the files using JPG because I wanted to use the content viewer Desktop and I get PDF's will help with the size of the file. But that will make a big difference?

    Is the largest part of this DPS overload just 28Mo or will it increase proportionally I've added pages?

    You are looking for just best practices.

    Thank you

    Brian

    A few tips:

    (1) we will be re-sample images to the right size, so don't worry if your sourc eimages are bigger they must do.

    2) publish as PDF. This will make a big difference if you have a lot of text content.

    (3) not to publish two orientations. While we do support the feature, this means you have to do twice the work of layout and the size of the file is quite a bit larger. Choose an orientation that works best for your content, and stick with that. The vast majority of our publishers only portrait or landscape, not both.

    Neil

Maybe you are looking for