How about other generations

can I send the apple tv (2nd generation) sound to my mini bose by using bluetooth

Hello. I do not think that your device is equipped with Bluetooth, see Apple TV (2nd generation) - technical specifications.

Tags: Apple TV

Similar Questions

  • My watermark came before I did the recent update on CC 2015, always when I would export to PhotoShelter.  Now, the watermark does not appear.  I asked PhotoShelter for help and they said they have heard about other problems.  How ca

    My watermark came before I did the recent update on CC 2015, always when I would export to PhotoShelter.  Now, the watermark does not appear.  I asked PhotoShelter for help and they said they have heard about other problems.  How can I solve this?  Nothing has changed on my computer.  Thank you.

    Sharon Cameron

    Hi sharonc,

    Have you tried to reinstall the plugin Photoshelter for Lightroom CC newer version 2015.

    See the below for the upgrade to the latest Version

    https://support.PhotoShelter.com/HC/en-us/articles/203373590-PhotoShelter-s-official-Adobe - Lightroom-Plugin

    Let us know if that helps.

    Kind regards

    ~ Mohit

  • How about iCloud on my iPad?

    How about iCloud on my iPad?

    Generally, you use an application - for example, Photos, iCloud drive, etc., but if you are determined to sign on iCloud.com of Safari, it can be done by pressing on into the arrow update in the address bar and choosing to go to the site office when this choice appears.

  • How the other drive app option to calculate calories? I did 45 minutes yoga with him and he showed the 260 callus which is high of 45 mins of yoga session.

    How the other drive app option to calculate calories? I did 45 minutes yoga with him and he showed the 260 callus which is high of 45 mins of yoga session.

    ISuspect that is not correct.

    Hello

    Saving workouts through the app to drive using others as the type of activity, active calories are estimated at a rate equivalent to a brisk walk or based on the data recorded by the heart rate sensor, according to what is higher.

    The following steps can help to improve the accuracy of the estimates made by your watch:

    • Estimates for calories and other results depend, in part, your personal information. To verify that it is accurate:
      • On your iPhone, in the application of the watch, go to: My Watch (tab) > health > Edit (top-right).
    • While training, to optimize the performance of the heart rate sensor (data from which is used when estimating calories), make sure you wear your watch fits on top of your wrist. Apple suggests that consider you the clamping Strip before starting a workout and it loosen again thereafter.
      • Note that the heart rate sensor is likely to give better results for the workouts that involve rhythmic (such as running) rather than the irregular movements.
    • Calibrate your watch can improve the accuracy of various estimates related to the activity, including estimates of calorie. To calibrate your watch, follow the instructions in the link below support article. You can reset your calibration data and start the process:
      • On your iPhone, in the application of the watch, go to: Watch My > privacy > Motion & Fitness > tap reset Calibration data.

    More information:

    Use of the workout on your Apple Watch - Apple Support

    Your heart rate. What it means, and where on Apple Watch you will find. -Apple Support

    Calibrate your Apple Watch for better accuracy of training and activity - Apple Support

  • How about a readme for the new signing of RVS - 4000 IPS: 1.42 in firmware 1.3.2

    Hello

    How about a readme for the new Signature IPS 1.42 inside the new firmware to version 1.3.2 RVS-4000?

    Or am I just too fast and it comes out in a bit?

    Thank you

    Bruce

    Bruce,

    You are right.  He left this time by mistake.  We will solve it.  In the meantime, here's what it will be:

    RVS4000/WRVS4400N IPS Signature Release Note

    Version: 1.42 rules Total: 1097

    In this signature, we talked about the exploits/vulnerabilities and applications
    as below:

    Supported P2P application called BitTorrent up to version 5.0.8.
    Supported P2P application named uTorrent up to version 1.7.2.

    Version: 1.41 rules Total: 1098

    In this signature, we talked about the exploits/vulnerabilities and applications
    as below:

    -EXPLOIT the MS video control ActiveX Stack Buffer Overflow
    A buffer overflow vulnerability exists in Microsoft DirectShow.
    The defect is due to the way Microsoft Video ActiveX Control parses image files.
    An attacker can convince the user target to open a malicious web page to exploit
    This vulnerability.

    -EXPLOIT the Injection SQL Oracle database Workspace Manager
    Multiple SQL injection vulnerabilities exist in Oracle database server product.
    The vulnerabilities are due to inadequate sanitation of input parameters
    in the Oracle Workspace Manager component. A remote attacker with user valid
    credentials can exploit these vulnerabilities to inject and execute SQL code
    with lift is SYS or privilegesof WMSYS.

    Supported P2P application named uTorrent up to version 1.7.2.

    Content signature for 1.41
    ========================================================================
    Added new signature:
    1053635 video MS stack buffer overflow EXPLOIT control ActiveX-1
    1053636 video MS stack buffer overflow EXPLOIT control ActiveX-2
    1053632 EXPLOIT Oracle database Workspace Manager SQL Injection-1
    1053633 EXPLOIT Oracle database Workspace Manager-2 SQL Injection
    1053634 EXPLOIT Oracle database Workspace Manager SQL Injection-3

    Updated the signature:
    1051783 P2P Gnutella Connect
    1051212-P2P Gnutella Get file
    1051785 P2P Gnutella UDP PING 2
    1051997 P2P Gnutella Bearshare with UDP file transfer
    1052039 P2P Gnutella OK
    Get Foxy P2P file 1052637

    Signature removed:
    1050521 Worm.Klez.E1 - 1
    1050522 Worm.Klez.E1 - 2
    1050523 Worm.Klez.E1 - 3
    1050524 Worm.Klez.E2 - 1
    1050525 Worm.Klez.E2 - 2
    1050526 ¡v Worm.Klez.E2 3
    1050536 Worm.Blaster.B - 1
    1050537 Worm.Blaster.B - 2
    1050538 Worm.Blaster.B - 3
    1050539 Worm.Blaster.C - 1
    1050540 Worm.Blaster.C - 2
    1050541 Worm.Blaster.C - 3

    Number of rules in each category:
    ========================================================================
    Back/DDoS 51
    Buffer overflow: 241
    Access control: 92
    Scan: 41
    Trojan horse: 62
    Misc: 3
    P2P: 40
    Instant Messaging: 121
    VRU/worm: 410
    Web attacks: 37

    Version: 1.40 rules Total: 1091

    In this signature, we talked about the exploits/vulnerabilities and applications
    as below:

    1053406 FEAT MS IE HTML Embed Tag Stack Buffer Overflow (CVE-2008-4261)
    An error of border during the processing of a too long file name extension specified
    inside a "EMBED" tag can be exploited to cause a stack-based buffer overflow.

    1053421 USE MS IE XML Handling Remote Code Execution (CVE-2008-4844)
    The vulnerability is due to a use-after-free error when composed
    HTML elements are related to the same data source. This can be exploited to
    dereference of a pointer released by a specially designed HTML document memory

    Version 1.38

    In this signature, we addressed the following exploits/vulnerabilities and
    applications:

    1. support for P2P, BitTorrent and eMule applications.

    Version 1.33

    In this signature, we addressed the following exploits/vulnerabilities and
    applications:

    1. support application IM named AIM (http://dashboard.aim.com/aim) until
    version 6.5.

    2. support application IM called MSN (http://get.live.com/messenger) until
    version 8.1.

    3 PcShare is a Trojan tool that can remotely administer an attacked computer.

    4-CVE-2007-3039: the vulnerability is due to an error of limit in the
    Microsoft Message Queuing (MSMQ) service during the treatment of MSMQ messages.
    This can be exploited to cause a buffer overflow by sending specially
    packages designed for the MSMQ service.

    Version 1.32

    In this signature, we addressed the following peer-to-peer applications:

    1. named IM application PURPOSE up to version 6.5 support.
    2. press the request of IM named MSN until version 8.1.

    Version 1.31

    In this signature, we addressed the following peer-to-peer applications:

    1 P2P application called BitTorrent up to version 5.0.8 support.

    2. support the P2P application named uTorrent up to version 1.7.2.

    Version 1.30

    In this version, we have addressed the following vulnerabilities in Microsoft
    applications:

    1 SUBMISSION-24462: dereference of a pointer Null vulnerability exists in some versions
    Microsoft Office.  Remote attackers can trick users into visiting a
    specially designed web page.  The symptom includes a denial of
    condition of service for the process in question.

    2 Microsoft Security Bulletin MS07-027: Microsoft Windows support
    Services NMSA Session Description object ActiveX control does not reach
    restrict access to dangerous methods. This vulnerability could allow
    a remote attacker to execute arbitrary code on an affected system.

    Version 1.29

    In this version, we have addressed the following exploits/vulnerabilities and
    peer-to-peer applications:

    1 Microsoft Security Advisory (935423): there is one based on the stack
    in Microsoft Windows buffer overflow. The vulnerability is due
    for insufficient format validation when handling incorrect ANI
    file cursor or icon. A remote attacker can exploit this
    vulnerability of prompting grace target user to visit a malicious
    Web site by using Internet Explorer. A successful operation would be
    allow the execution of arbitrary code with the privileges of the
    currently logged in.

    2. support a named QQ instant messaging application blocking until the
    2007 Beta1 and Beta2 version.

    Version 1.28

    In this signature, we address the following exploits/vulnerabilities:

    Microsoft Security Bulletin MS07-014: there is a buffer overflow
    vulnerability in Microsoft Word. The vulnerability is created due to
    a flaw in the Table entry of the Section within the structure of Table data flow.
    An attacker could exploit this vulnerability by tricking a user to open
    a designed Word file. Exploitation of the vulnerability may result
    injection and execution of arbitrary code in the security context
    the user target.

    Microsoft Security Bulletin MS07-016: there is an alteration of the memory
    vulnerability in Microsoft Internet Explorer. The flaw is due to a bad
    posting lines of response in the responses from the FTP server. By persuading a user
    to visit a malicious website, an attacker could run arbitrary on code
    the target system with the privileges of the currently logged in user.

    Version 1.26

    In this signature, we addressed the following exploits/vulnerabilities:

    CVE-2006-5559: there is a memory corruption vulnerability in
    the ADODB. Connection ActiveX control in Microsoft Internet Explorer.
    The flaw is due to improper validation of the data provided to the
    Execute method. By persuading target the user to visit a malicious
    Web site, an attacker can cause the application process
    to terminate or possibly divert its flow of execution to arbitrary
    code.

    Version 1.25

    In this signature, we addressed the following exploits/vulnerabilities:

    Microsoft MS06-070 security bulletin: MS Windows 2000 Workstation
    Service (WKSSVC. (DLL) has a remote code execution vulnerability. One
    unauthenticated attacker could exploit this vulnerability to run
    arbitrary code with the privileges of the level system on Windows 2000 and
    Windows XP computers.

    Version 1.24

    In this signature, we addressed the following exploits/vulnerabilities:

    1 Microsoft Data Access Components (MDAC) has a remote code execution
    vulnerability in the RDS object. DataSpace ActiveX control.  A remote attacker
    could create a specially designed and host the malicious file on a
    Web site or send it to the victim through e-mail.  When the file is opened,
    the attacker can run arbitrary code on the victim's system.

    2. control WMI Object Broker ActiveX (WmiScriptUtils.dll) in Microsoft
    Visual Studio 2005 has a vulnerability that could allow a remote
    attacker to execute arbitrary code.

    3 Microsoft Internet Explorer has a type of heap buffer overflow vulnerability.
    A remote attacker could create a malicious web page containing COM objects
    Daxctle.OCX HTML when instantiated as an ActiveX control and the thing the
    victim to open the web page. By this attack, the attacker to execute
    arbitrary code on the victim's browser.

    Version 1.23

    In this version, we have addressed the following exploits/vulnerabilities:

    The vulnerability lies in some of the engines in Microsoft XML core
    Windows. It is the result of the failure of the engine to properly manage the
    bad arguments passed to one of the methods associated with the XML
    purpose of the request.

    Version 1.22

    In this version, we discussed the exploits/vulnerabilities as follows:

    Vagaa is a P2P that supports the network BitTorrent and eDonkey software.
    It can be downloaded from the two network. The software is mainly used in people's Republic of CHINA.
    There are some problems with this software because it didn't follow the official eMule Protocol.
    The question can be referenced on the wiki (http://en.wikipedia.org/wiki/Vagaa).
    Classify us Vagaa as eDonkey2000 program and allow admin users to disable in the user Web interface.

    Version: 1.21

    In this version, we have addressed vulnerabilities exploits as below:

    Microsoft Internet Explorer WebViewFolderIcon has a buffer overflow
    Vulnerability. A remote attacker could create a malicious Web page and
    trick the victim to open. By this attack, the attacker could cause buffer
    Overflow and crash the browser of the victim.

    Version: 1.20

    In this version, we discussed the exploits/vulnerabilities and applications
    as below:

    1 foxy is a P2P application that can search and download music and movies.
    Foxy follows most public Gnutella P2P protocol but still has its own
    signature under certain conditions. After the inclusion of the file Get Foxy P2P
    rule, we can perfectly detect and block the Foxy and it will be detected as Gnutella.
    Foxy can be blocked by deactivating Gnutella.

    2 Microsoft Internet Explorer 6.0 and 6.0SP1 have impaired memory
    vulnerability in the ActiveX component.  A remote attacker can create a
    malicious Web page and trick the victim to open the web page. By this attack.
    the attacker could cause the crash of the browser of the victim or to execute arbitrary code.

    3 Microsoft Internet Explorer has heap buffer overflow vulnerabilities
    Vector Markup Language (VML).  A remote attacker can create a malicious Web site
    page and the thing the victim to open the web page. By this attack, the attacker
    could cause the buffer overflow and execute arbitrary code on the victim's browser.

    Version: 1.19

    In this version, we have added a rule to meet cross-domain redirect
    Microsoft Internet Explorer vulnerability (MS06-042). The vulnerability
    is caused by the inappropriate use of URL redirection by the object.documentElement.outer
    HTML property. A remote attacker could create a malicious web page and
    trick the victim to open the web page. With this attack, the attacker could
    run arbitrary code on the victim's browser and get sensitive information.

    Version: 1.18

    In this version, we have added the 6 rules to facilitate the blocking of QQ, the most
    popular instant Messenger in China. There are several versions of QQ on the
    official download site. Currently, we can detect and block QQ until the
    Version 2006 Sp3 beta 2.

    Version: 1.17

    In this version, we discussed the exploits/vulnerabilities below:

    1. the Server Service in Microsoft Windows 2000 SP4, XP SP1 and SP2, server
    2003 and SP1 have a buffer overflow vulnerability. A remote attacker
    could exploit a server response designed to cause the buffer overflow and run
    arbitrary code on the victim's system.

    2 hyperlink Object Library in Microsoft Windows 2000 SP4, XP SP1 and SP2,
    Server 2003 and SP1 have a code execution vulnerability. A remote control
    attacker could send a malicious Office document containing a
    specially designed hyperlink to a victim in an email or host the file on
    a web site. When the operator successfully this vulnerability, a remote control
    attacker to execute arbitrary code with the privileges of the victim.

    3 Microsoft Word XP and Word 2003 have a remote code execution vulnerability.
    A remote attacker could host a DOC file on a Web site. If successfully
    exploiting this vulnerability, remote attacker could execute arbitrary code
    with the privilege of the victim.

    Version: 1.16

    In this version, we discussed the exploits/vulnerabilities below:

    1 Microsoft Excel 2000, XP and 2003 Excel have a remote code execution
    vulnerability, due to an error in Excel when incorrect URL handling
    channels. A remote attacker could send a malicious .xls file of a victim
    in an email or host the file on a web site. When the operator successfully this
    vulnerability, a remote attacker to execute arbitrary code with the victim
    privileges.

    2 hyperlink Object Library in Microsoft Windows 2000 SP4, XP SP1 and SP2,
    Server 2003 and SP1 have a code execution vulnerability. A remote control
    attacker could send a malicious Office document containing a
    specially designed hyperlink to a victim in an email or host the file on
    a web site. When the operator successfully this vulnerability, a remote control
    attacker to execute arbitrary code with the privileges of the victim.

    3 Microsoft Windows XP/NT/2000/2003 have a denial of service vulnerability.
    A remote attacker can send a malicious SMB packet causes the victim computers
    Crash.

  • How do other companies manage orders without internal costs?

    Hello

    How do other companies manage orders without internal costs? Free of charge, which means that orders placed internally and charged to the company's specific services.

    We are looking to update our process underway, and I would like to hear how other companies handle this.

    If any questions, or if additional clarifications are needed please let me know.

    Kind regards

    Kailey

    In one recent companies that I worked, we have created a command type 'order of expenditure. "  Then, we created order lines for each service requiring the order free of charge.  We filled the expense account of COGS on the command line type. Then, we modified the workflow of CMV to use the expense account defined on the command line type.

  • How about the text of the .txt file output?

    This is my code:

    #include "iostream.h".

    #include 'fstream.h.

    ofstream myfile;

    MyFile.Open ("C:\test.txt");

    MyFile < < 'text ';

    MyFile.Close ();

    But it occurs the error C1083: cannot open include file: 'iostream.h': no such file or directory.

    How about the text of the .txt file output?

    I would suggest that you do in the InDesign style to match...

    InterfacePtr stream (StreamUtil::CreateFileStreamWrite (...);

    if(Stream->GetStreamState() == kStreamStateGood) {}

    flow-> XferByte (buf, size);

    flow-> Flush();

    }

    flow-> Close();

    There are lazy as CreateFileStreamWriteLazy equivalent methods.

    Deferred methods will open the file in the application, but you will always get a valid pointer.

    See docs on its use.

  • How about image card reactive new/change?

    My system Dreamweaver CC 20141

    How about image reactive card again and change

    Please help me!

    123.jpg

    Exit Live View mode.

  • I want to know if there are a lot of components such as adobe color and setting if install photoshop? What about other adobe products? We bought adobe vendor products and provide installation CD, but many components we do not want. Please Hel

    I want to know if there are a lot of components such as adobe color and setting if install photoshop? What about other adobe products? We bought adobe vendor products and provide installation CD, but many components we do not want. Please help, thanks!

    You don't like the additional components, but many of them are essential and cannot be omitted and must they be removed after the fact.

    Mylenium

  • How about this problem of latency with computers portable studio?

    Hi guys,.

    After almost a year of bored on my computer laptop dell studio and its crazy latency issues I have that to give it another go at the Dell Forum. Is there any fix for this widespread problem. I am a user of windows 7 and couldn't really find a solution for this google search.

    I would like to hear from you guys.

    See you soon,.

    Jon

    A problem with the DPC latency issue is that it is a symptom with a number of possible causes, software and hardware. It can be caused by a bad driver written and may not even have anything to do with Dell. Or it could; I'm just pointing out some of the complexities. For example, stan_-_ wrote that he has "problems", but maybe it's having the same symptoms caused by a different problem than the problem causing the symptoms on cell phone JonHil. (stan_-_, you use the latency Checker tool. There are instructions on the web page of the tool on how to use it to isolate a pilot that could be causing the latency. Also if the latency is cyclical it is probably caused by a device or a program at specified intervals.) Most of my knowledge of the DPC latency is 2 wires:

    Latency DPC Studio 1737 thread started on June 13, 2009

    and

    Studio XPS 1340 latency thread started February 23, 2009

    The main models that have been affected at this time were the Studio 1735 1737 Studio, Studio 1535, 1537 Studio and Studio XPS 1340 and Vostro models. Maybe Studio 1555 also.

    Over the years I didn't have Dell to put a large part of its resources trying to solve the existing audio problems. They seem to release a new model of laptop once a month and probably have their hands full think of names for each of them. Once a production model without doubt they are already deeply in the development of future models. However, in this case, they seek to solve the problem, for 2 reasons in my opinion. One was that the Studio XPS line was a new line of premium that they wanted to work right, and the other is that one of the people from Dell with a sweater got involved and pleaded for a fix for 14 months. The history of it is as follows.

    Dell came with a revision of BIOS (11) that fixed latency dpc on Studio XPS 1340 model, as long as the units have been configured with the Intel WLAN cards and not Dell cards (Broadcom). Encouraged by that success, the plan of engineers was to get a fix of the BIOS for the Studio 1737 and then apply that knowledge to a difficulty for other models, but that never happened. The A07 BIOS was released in September ' 09 and what it was supposed to be the fix, but it was a big flop. They re - worked and published A08 almost 3 months later. The Dell guy who was tube communication between posters and Dell engineers was Bill B, who a few months later wrote:

    "The last word I got was that the 1737 has a design limitation that prevents the latency issues to be resolved. The platform is moved to a new team of engineers. The new team reached out to me for feedback on the recent release of BIOS. I knew it was in no way a solution and this thread is passed to a few comments recent choice. "(The thread of latency Studio 1737)

    It was about Bill B last post on the thread. He has 13 months he wrote these words, but no Dell never returned the "new engineering team" done with the problem. My guess is that the engineers had shot their wad with A08 and just left falling on it after this - so no hope for much less later 1737 models or 1735, who have time dpc latency, but whose root cause could easily be unrelated to earlier models. As seen, the fix for the Studio XPS 1340 did translates not one difficulty for the other line Studio, so there was never a chance for a unique solution. Bill B pointed out that the models released after the Studio 1737 lacked the same latency issues designed in dpc as those before, which if true gives hope that, on later models this is a driver or a problem with wireless.

    One thing that came out of all that was that some wireless network adapters are a source of dpc latency regardless because there are other cases on the same computer. The worst offenders are the brand of cards (Broadcom), in particular the Dell from Dell 1515.

    Of interest, there is also a workaround for the Studio 1737 developed by DJQuartz, which is to suspend the ACPI under Win XP using Process Explorer. Some people got it to work in Vista and 7 with process Hacker. The engineering team is convinced that the dpc latency was caused by the physical design of the card system, but Bill B thought they were wrong because of the DJQuartz.

    Another solution was to create a hackintosh running Apple OSX on the Studio 1737. It worked because "DPC" is a Windows procedure (which creates a lot of latency with a poorly written driver) is not in the Apple OS or Linux. If you want to buy a Mac, you can try this. The problem will be in obtaining drivers for your computer that you can install.

    So to summarize:

    > There are different causes of latency dpc even on the same model as the others, much less through the lines or brands of manufacturers - is not only a problem of Dell

    > there are still uncertainties about the fundamental nature of all the underlying causes of the problem

    > there are some causes that Dell just doesn't know how to fix despite a lot of time and effort - you should read the thread of latency Studio 1737 together to get a feel for the amount of effort

    > there is no hope of a Dell solution on existing models, in my opinion (I may be wrong)

    > some of the causes are user serviceable.  A few months ago DJQuartz reported that the dpc latency spikes are now under control the sound Studio 1737 even without using his circumvention of ACPI, with the latest drivers and BIOS revisions. There the last Chipset of Intel wireless network adapter and drivers touchpad. It is still using XP is the best Windows OS for audio work.

  • Buy new computer Windows 7 Professional and have questions about other files, and the removals of document on the old computer

    Hi all!

    I need help.    I just bought a new computer that has Windows 7 on it.     This old computer is 7 years old

    and last year I had put win 7 professional about it.     I'm trying to delete files on it.    How can I do this correctly.

    What I need to remove the Windows 7 Professional out of it since I bought it and have the license and the disc.    Or, do

    to keep the disc and just remove it from this computer.     What happens if someone else wants the computer I leave it on and

    Give them the disc.   How can I handle this?     I am new to this?    Someone just set up my new computer and I want to

    to make sure that I have all my passwords and other things out of that right.

    CAN SOMEONE HELP ME SOON!    A.S.A.P.!    Cause I need to work for the new space.

    Thank you.    Sharon

    If you delete all partitions found (when booting from the cd of win) it will only destroy what is on the hard drive of the PC (all data can be saved), he won't do anything to victory dvd

    If your new PC shipped with win7 preinstalled you need not really your origonal dvd win7. -You can sell or keep

    If you do not want to give the old PC, then simply remove the hard drive (how can be found on google) and destroy the hard drive with a heavy hammer

    (A seven year old PC is practically worthless)

  • Now that I'm in it, how about iCloud document reader?

    My files are all in the cloud, out of my MacBook Pro right now. Now, I have no files at all without electricity and WiFi. This does work for me at all. I have not read the words very few subtleties in the promotion of this cloud of Apple service. I thought it would be copy and sync my files, not take them all of me and allow me to access it as long I have pay and have wifi access.

    I now know nothing now how to reverse and restore my 30 GB of files. I think to disable the iCloud drive documents and just restore my files from my local time machine backup. Is there a better way to go? Should I delete the files present in the iCloud drive?

    If you see the files in the Finder/iCloud drive, they copy on your computer in one location other than a document, and then clear the option to synchronize. Then you should be able to put the files where you want.

  • How about you, the personalization feature in reading a csv file?

    I want to know about the personalization feature and how to implement it in j2me blackberry for reading a csv file

    So guys someone help me about this

    It is a code that I found somewhere that will provide this type of functionality.

    It uses % and $ to indicate where substitutions must go, and the number between the two is used as the index in the array of strings that you provide as the second parameter.

    I suspect that you can adapt it to your needs.

    As Simon points out, it's really just a problem of standard Java, and you will be able to find solutions to these kinds of things looking around the Internet rather than here, where our attention is BlackBerry Java.    in fact, I think I found this code somewhere on the Net.

            private final static char LEFT_INDICATOR = '%';
            private final static char RIGHT_INDICATOR = '$';
    
            /**
            * Replace placeholders in template with parameters.
            *
            * @param message  the template with placeholders
            * @param params   array of parameters
            * @return         buffer containing formatted message
            */
            public static String formatMessage(String message, String[] params) {
                    if (message == null || message.length() < 1 || params == null || params.length < 1 ) {
                            throw new NullPointerException("formatMessage Template or parameter array is null or empty.");
                    }
                    boolean inside = false;
                    boolean escaped = false;
                    StringBuffer result = new StringBuffer();
                    StringBuffer placeholder = null;
                    char lookingFor = LEFT_INDICATOR;
                    char c;
    
                    for (int i = 0; i < message.length(); i++) {
                            c = message.charAt(i);
                            if (c == lookingFor) {
                                    if (escaped) {
                                            result.append(c);
                                            escaped = false;
                                            continue;
                                    }
                                    if (c == LEFT_INDICATOR) {
                                            // look ahead for escaped indicator
                                            if ((i + 1) < message.length() &&
                                                    message.charAt(i + 1) == LEFT_INDICATOR) {
                                                    escaped = true;
                                            } else {
                                                    inside = true;
                                                    lookingFor = RIGHT_INDICATOR;
                                                    placeholder = new StringBuffer();
                                            }
                                    } else {
                                            inside = false;
                                            lookingFor = LEFT_INDICATOR;
                                            // placeholder finished get parameter
                                            int index = -1;
                                            try {
                                                    index = Integer.parseInt(placeholder.toString());
                                                    result.append(params[index-1]);
                                            } catch (Throwable t) {
                                                    result.append(Characters.EM_DASH); // Something
                                                    t.printStackTrace();
                                                    LibraryRepository.logEventError("Format Error for:" + message +
                                                            ", placeholder: " + placeholder.toString() + ", parm #:" + params.length);
                                            }
                                    }
                            } else {
                                    if (inside) {
                                            placeholder.append(c);
                                    } else {
                                            result.append(c);
                                    }
                            }
                    }
                    // for
                    return result.toString();
            }
    
  • HttpConnection works with MDS, but how about Wi - Fi?

    Hello

    I have a really strange problem, I open a URL like this:

    httpConnection = (HttpConnection) Connector.open (m_sURL);

    status = httpConnection.getResponseCode ();

    It works if I am connected to MDS, but if I take the SIM card it does not Wi - Fi. Browser works on a Wi - Fi connection.

    Help, please! What I am doing wrong? The specified URL is a URL HTTPS (not HTTP), but which works very well with physicians.

    I want to use MDS when they are available, other use Wi - Fi, to the moment I even don't care MDS, Wi - Fi is extremely important to make it work.

    Concerning

    Lionel

    Too bad, think about it. Add '; interface wifi =' at the end of the URL.

  • How do others deposit their Raw

    Hello everyone. I am wanting to get feed back on how to manage your files/images of other photographers. After a shoot, I store all the images on my G-Drive, then I open them in light rightroom and start tweaking their. Once you guys tweaking your images in lightroom, save you it as a jpeg or keep it in Raw format? Also are you putting these images in another folder or even. I always liked to see how other photographers store their images from lightroom, once they are done. Your comments on how others make their who want to.

    Thank you

    JI

    [Moved from the forum show general (which includes people from all disciplines, not just photography, including Acrobat PDF creation, video editing, marketing cloud, etc.) and in a more specific to photography - Mod forum]

    save you it in jpeg format or keep it in Raw format?

    Just for the record, cannot you record images in Lightroom, export them only.

    There is no need to export unless you need an image for a specific use - changes you make to raw files are automatically saved in the catalog. If you just want to watch your pictures, you can do in Lightroom.

    Personally, I always delete exported images when they reached their goal.

    It is easy to export them again if the need arises.

Maybe you are looking for

  • How can you change the name of the device on FIND MY IPHONE?

    I have several phones on my account, but they all appear with my name.  How can I change the name of each device so I can make a difference?

  • Qosmio G - right side of the screen is unusable

    Hello guys I recently installed Windows 7 and nvidia driver update by using Windows Update.It was working fine - but all of a sudden on the right side of the 2 bar black screen appeared a darker and a lighter. I tried to go back to the old driver als

  • Pavilion Slimline s7320n: Pavilion Slimline s7320n - compatible Win10? Any necessary changes?

    My friend has an HP Pavilion Slimline s7320n PC, running WIndows XP, 32-bit. It has 1 GB of RAM. Direct X 9 Celeron M 1.6GHz I intend to help to upgrade memory to 2 GB. Will it do anything else before you install Win10? Are there any known issues wit

  • dynamic contrast settings

    My laptop is a model y560; I got it a week ago. I know that the settings of the monitor and whatnot have this thing "dynamic contrast" pass, which apparently made the screen dim/brighten up whenever he felt the time to do it, DESPITE some power setti

  • Upgrade to Windows 2008 R2 SP1 - error code: DS_S_SUCCESS (0x0)

    I don't know why, but I keep getting this error code no matter what I do.  It seems that the upgrade has completed, but when I connect to the box I have 'Installation failed' with the error code "DS_S_SUCCESS (0x0).  It is not sensible for me as this