Need help, cannot set references to Photoshop.Application in VBA

Hello

I've used CS5 in the past and have had a VBA program works well (running in Access 2010) which went very well, open Photoshop 32-bit and controlled photoshop CS5 normally, allowing me to manipulate photos, read metadata, etc.  (It was my understanding that at least for CS5, programs including VBA script necessary to run the 32-bit version of Photoshop, not the 64-bit version).

About 6 months ago, I installed CS6 and VBA program continued to work perfectly, as it always opens the 32-bit version. (I had to be sure that I was not running 64-bit Photoshop when I started the VBA program).  CS5 was still installed but not used.

I just uninstall CS5, leaving CS6 installed.  For some reason, he left the program VBA disturbed in that the references (that you set in the window of the VBA code with tools > References) no longer seem to be valid.  I can't set a new reference to Photoshop.Application, and the program became unusable.  In other words, the "references" list is more typotheque Adobe Photoshop CS6 or Adobe Photoshop CS6 Object Library.  I've traveled to the C:\Program Files\Adobe\Adobe Photoshop CS6 (64 Bit) \TypeLibrary.tlb file to add this reference manually.  The programs does not yet compile (for example, appRef As New Photoshop.Application Dim causes an error "User Defined Type not defined").  I get the same failure to compile if I search for and install a reference to the 32-bit version, C:\Program Files (x 86) \Adobe\Adobe Photoshop CS6\TypeLibrary.tlb.  In the past, I also had a reference to the 'Adobe Photoshop CS6 Object Library".  I tried manually to C:\Program Files (x 86) \Adobe\Adobe Photoshop CS6\Photoshop.exe or the 64-bit version of Photoshop.exe, but these files are not accepted and I do not otherwise know the location of the file from the object library.

I so need help from someone who knows how to solve this problem in the transition of CS5 at CS6 to use VBA.

Thank you

EGibbon

There are global keys which crushed with every version of Photoshop. Photoshop.Application gets for example set for each installation of Photoshop. When you have uninstalled CS5 these keys got deleted.

You can install CS6 again? You don't need to uninstall. Just install again if it will let you.

I have a script that wil set them, but I don't really like to use it on other machines of people as it messes with the registry and I don't want to make it worse for you.

Tags: Photoshop

Similar Questions

  • I just reinstalled windows xp sevice pack 3 in my laptop. l need help to set up the wireless modem. My laptop is IBM ThinkPad.

    I just reinstalled windows xp sevice pack 3 in my laptop. l need help to set up the wireless modem. My laptop is IBM ThinkPad and the modem is a construction in one. would appriciate ay help

    Hi bardhiboris,

    You can follow the steps from the link below: set up a wireless network:http://www.microsoft.com/windowsxp/using/networking/setup/wireless.mspx

    Other links, please refer to: 10 tips to help improve your wireless network:http://www.microsoft.com/athome/setup/wirelesstips.aspx

    To set up automatic wireless network configuration:http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/wlan_client_configure.mspx?mfr=true

    With regard to:

    Samhrutha G S - Microsoft technical support.

    Visit our Microsoft answers feedback Forum and let us know what you think.

  • need help to set up Linksys printserver with verizon wifi hotspot

    need help to set up Linksys printserver with verizon wifi hotspot

    pfsjmhall,

    Configure your wireless router to use these recommended wireless router settings, I use channel 11. I would use a new SSID to connect easier.

    Then configure the Linksys print server. Find your network to give your passkey (password)

    Then set up the printer, choose network and follow the instructions.

    Rick

  • Need help with setting up in checkbox in interactive reports

    I need help with setting up in checkbox in interactive reports, I use this statement a query

    SELECT apex_item.checkbox

    (

    1, ROLEID,

    'onchange = "spCheckChange (this);". ',

    : F_ROLEID_LIST,.

    ':'

    ), del.

    ROLEID, ROLEDESCRIPTION

    OF EBA_ROLES

    When I run it I get the following

    < input type = "checkbox" name = "f01" value = "1" onchange = "spCheckChange (this); ' / > instead of the checkbox

    Do I need to configure anything else

    Aditya Gupta wrote:

    I need help with setting up in checkbox in interactive reports, I use this statement a query

    SELECT apex_item.checkbox

    (

    1, ROLEID,

    'onchange = "spCheckChange (this);". ',

    : F_ROLEID_LIST,.

    ':'

    ), del.

    ROLEID, ROLEDESCRIPTION

    OF EBA_ROLES

    When I run it I get the following

    instead of the checkbox

    Do I need to configure anything else

    This is one of the most frequently asked questions in this forum. Set the column attribute the text to display as Standard report column and not display text (special escape characters).


    Always include the information referred to in these guidelines when you ask a question and if you use APEX 5.0, State, if you develop using the pages or the view of the component designer.

  • IM needing help with my workspace of Photoshop 10...

    IM needing help with my workspace of Photoshop 10... I can't zoom in as much as I used to and it is difficult to work on my projects. Ive already placed my ruler in inches, but my image is enlarged on the screen.

    This window is only 3 hundredths of a 4 hundredths of an inch each way. It's as good as it gets for zoom for something of this size.

  • Need help to set up parental controls

    Hello

    I want to set up parental controls on my son's laptop computer.

    Thus, users are

    His name

    Director of comp.

    Password protected

    not monitored by family safety

    I thought that I could not / would not set up on the administrator, so I created a second user

    His name1

    standard user - control parental on

    no password

    monitored by family safety

    I have implemented controls, but they are not in force, I guess, because they should be on his main user? If this means that it can change the settings since this is admin?  I'm confused :(

    Hi Dee2537,

    We are happy to help you set up parental controls in your son's laptop computer. Given the information you have provided, we see that you addressed some of the scenarios where parental control will not work correctly. One of it is implemented in your child as an administrator's account. Family safety not restrict and recognize the account as a child, if the application detects that it is using an administrator account. The other implements access to his account without password because Family Safety requires that the user has a password to secure the account. Because you have pain to configure the account correctly, we strongly recommend that you follow the instructions step by step on how to set up on behalf of the child in the family security and laptop to your son.

    Here is the link where you can find the complete steps: setting up parental controls

    Please let us know if you need more help and we will help you the best we can.

    Thank you.

  • Need help to set up voice VLAN in SG300

    Hello

    I spent too much time on it now and need help. I'm trying to set up a voice switch VLAN on a SG300 - 28 p. I need to charge a phone Cisco 7965 connected to a port on SG300 - 28 p to use VLAN 100, and a workstation connected to the phone to use Cisco 7965 on VLAN 101 by SG300 - 28 p. In the common Cisco IOS switches, this task is configured as follows:

    interface gi25

    switchport mode access

    switchport access vlan 101

    switchport voice vlan 100

    Trying to achieve this scenario with a Cisco SG300 switch turns into a nightmare. You will have to deal with a Dynamic of VLAN voice Auto Voice VLAN mode. Then, you must have a configured trigger and activated Automatic Smartport . I tried to do this in CLI nothing helps. Cisco 7965 receives an IP address of the access VLAN on Gi15 interface, which is 101 VLAN. I need to receive an address IP of the VLAN 100.

    The current configuration under Gi15 interface is as follows:

    interface gigabitethernet15

    activate the storm control

    broadcast storm control level kbit/s 10

    Storm-control include multicast

    port security throw trap 60

    maximum port security by 10 points

    port security mode max-addresses

    spanning tree portfast

    LLDP-med disable

    switchport mode access

    switchport access vlan 101

    ! next order is internal

    macro auto smartport dynamic_type unknown $native_vlan 101 $voice_vlan 100

    Now, I don't know how the macro auto smartport dynamic_type unknown $native_vlan 101 $voice_vlan 100 command in the config, and I do not know how to remove it.

    When I try to enter the command macro auto smartport type ip_phone_desktop under Gi15 interface, I get the following error message:

    The $voice_vlan macro setting is not configurable by the user

    It seems that the auto attendant smartport macro ip_phone_desktop can not apply the setting $voice_vlan with a value of 100. In fact, I explicitly does not use this parameter to everything in the order of macro auto smartport type ip_phone_desktop ; However, the SG300 switch knows that the voice VLAN VLAN 100, and he's trying to use this VLAN ID as the value of the $voice_vlan parameter, the macro fails.

    I tried statically configure the voice VLAN on the switch SG300 using the command id of the vlan 100 voice , but I couldn't get the ip_phone_desktop macro to configure interface Gi15 correctly. Then, I removed the command id of the vlan 100 voice and obtained SG300 to learn his voice VLAN ID of UC560 connected to the SG300 through a trunk port based on the port configuration (connected to SG300) for the trunk of the next UC560:

    switchport trunk vlan 101 native

    switchport mode trunk

    switchport voice vlan 100

    Cisco-switch macro description

    This is the command switchport voice vlan 100 who announces to SG300 via CDP VLAN 100 is a voice VLAN. When I run the command show vlan local VoIP on the SG300, I get the following result:

    VLAN ID - VPT DSCP Source MAC address Interface

    1                    5          46       default           ----                    ---

    * 100 CDP e0:5f:b9:xx:yy:zz gi28

    Thus, it is clear that the SG300 receives information from UC560 via CDP in port Gi28 VLAN 100 is the voice VLAN. However, I can not always apply the ip_phone_desktop macro to SG300 Gi15 interface.

    Also, I tried to set up vState ofoithis vlan auto-déclenché as well as the commands in global configuration State vlan automatic voice activated mode. Or setting changes anything view voice VLAN announced at Cisco 7965 where Cisco 7965 continues to use VLAN101 (access the VLAN assigned to the interface Gi15).

    Hello telecastle,

    The Macro just get in the way most of the time. A default state on the switch a user will set the id of the vlan voice with orders

    (config) #voice vlan id 100

    * This will create the vlan 100

    VLAN, VoIP? * You can use to change your defaults for dscp and cos a long with all the other settings.

    State of vlan (config) enabled automatic #voice

    (config) #interface rank fa1-24

    (config-if-range) #switchport trunk vlan 101 native

    trunk (config-if-range) #switchport allowed vlan add 100

    * This function will define the vlan native on the trunk to 101 for the data port and vlan tagged will be 101 for the voice.

    CDP is enabled automatically and should learn the features of the phone and get on the phone to the vlan 101 on this port.

    CDP of the UC should automatically fill in the switch of the SG. You may need to upgrade the switch to the latest firmware however. Also make sure that the DHCP server for the voice if the CPU must be configured accordingly.

    Let me know if this helps.

    Cisco Small Business Support Center

    Randy Manthey

    CCNA, CCNA - security

  • Need help to set a DELETE statement.

    I have a table that contains the records of files. Files come in a bouquet each week. So, we need to delete records from a table to the corresponding fields and load the table with up-to-date data.

    In doing so, the DELETE statement takes a long time. Need help with this setting.

    Here are the details.

    (1) total number of records in the table: 23 million records.
    (2) approximate records deleted each time: 500 K to 1.5 million.
    (3) table is partitioned on a PERIOD key. That is, each partition will have the data for a given period.
    (4) table is not indexed
    (5) removal occurs on a combination of 2 fields (PERIOD + BATCH).

    Here is the query and the plan:

    ===========================================================

    SQL > EXPLAIN PLAN SET STATEMENT_ID = 'TSH' FOR
    2 REMOVE / * + PARALLEL(DETAIL_UNKNOWN,10) * / u DETAIL_UNKNOWN
    3 WHERE u.FLBATCHID = 'PCAFRINTERMAR1105' AND u.N_PER6 = 201214
    4;

    He explained.

    SQL > SET LINESIZE 130
    SQL > SELECT * FROM TABLE (DBMS_XPLAN. DISPLAY ('PLAN_TABLE', 'TSH', 'ALL'));

    PLAN_TABLE_OUTPUT
    ----------------------------------------------------------------------------------------------------
    Hash value of plan: 2400300449

    ----------------------------------------------------------------------------------------------------
    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time | Pstart. Pstop |
    ----------------------------------------------------------------------------------------------------
    | 0 | DELETE STATEMENT. 596K | 12 M | 838 (9) | 00:00:12 |
    | 1. REMOVE | DETAIL_UNKNOWN |
    | 2. SIMPLE HASH PARTITION | 596K | 12 M | 838 (9) | 00:00:12 | 6. 6.
    |* 3 | TABLE ACCESS FULL | DETAIL_UNKNOWN | 596K | 12 M | 838 (9) | 00:00:12 |
    ----------------------------------------------------------------------------------------------------


    PLAN_TABLE_OUTPUT
    ----------------------------------------------------------------------------------------------------
    Name of the query block / Alias object (identified by the operation identity card):
    -------------------------------------------------------------

    1 LED$ 1
    3 LED$ 1 / U@DEL$1

    Information of predicates (identified by the operation identity card):
    ---------------------------------------------------

    3 - filter("U".") FLBATCHID '= 'PCAFRINTERMAR1105' AND 'U'." N_PER6 "= 201214)


    PLAN_TABLE_OUTPUT
    ----------------------------------------------------------------------------------------------------
    Projection of the column information (identified by the operation identity card):
    -----------------------------------------------------------

    2 - (cmp = 2, 3) "U". ROWID [ROWID, 10], "U". "N_PER6" [NO.22], 'U' "." " FLBATCHID ' [VARCHAR2, 20].
    3 - « U ». ROWID [ROWID, 10], "U". "N_PER6" [NO.22], 'U' "." " FLBATCHID ' [VARCHAR2, 20].

    27 selected lines.

    ===========================================================

    Need your suggestions on how the query / table can be tuned.

    Hi Anand,

    I wanted to check why your tkprof Watch report two executions of the statement:

    call     count       cpu    elapsed       disk      query    current        rows
    ------- ------  -------- ---------- ---------- ---------- ----------  ----------
    Execute      2   2315.71    2480.17          0       3351     624489      611765
    

    In fact, it there was only a single execution of the DELETE statement. The trace file begins with a call EXEC of any statement without call analysis

    *** TRACE DUMP CONTINUED FROM FILE XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX_ora_241708.trc ***
    
    EXEC #1:c=20000,e=13996,p=0,cr=0,cu=0,mis=0,r=0,dep=0,og=0,tim=32472879711702
    =====================
    PARSING IN CURSOR #2 len=68 dep=0 uid=72 oct=42 lid=72 tim=32472883567994 hv=740818757 ad='0'
    ...
    

    TKProf aggregates this EXEC call with call EXEC of the DELETE statement because they have the same location of cursor (#1), he thinks it was the same cursor.

    PARSING IN CURSOR #1 len=93 dep=0 uid=72 oct=7 lid=72 tim=32472889974030 hv=1242910589 ad='e5979d80'
    DELETE from detail_unknown where n_per6 = 201214 and FLBATCHID = 'PCAFRINTERMAR1105'
    END OF STMT
    PARSE #1:c=0,e=11462,p=0,cr=0,cu=0,mis=1,r=0,dep=0,og=1,tim=32472889974024
    ...
    EXEC #1:c=2315710000,e=2480213492,p=0,cr=3691,cu=624489,mis=0,r=611765,dep=0,og=1,tim=32475370187626
    

    So, the question about two executions is closed - there was only a single run.

    The performance - 2315,71 seconds of time processor is absolutely huge for such amount of work. It looks like a bug.

    First, I propose to check the time without compression. If your environment allows this kind of testing try to decompress the partition and re - run on unpacking data DELETION.
    10.2 find the name of the partition

    select partition_name
      from dba_tab_partitions
     where table_name = 'DETAIL_UNKNOWN'
       and partition_position = 6
    

    After that

    alter table DETAIL_UNKNOWN modify partition  nocompress;
    alter table DETAIL_UNKNOWN move partition ;
    

    and run again the button DELETE.

    What is the operating system on the server?

  • I need help to set up the linksys adsl router

    Hello world!

    I have LINKSYS WIRELESS - N HOME ADSL2 + MODEM ROUTER (wag120n) and I connect to the internet via the cable that I took my friend who already SPEEDTOCH ADSL ROUTER, I bought the d-link wireless card and I install it in one of my PC
    what I need is to set up my linksys wireless router for my two PCs, on via the wireless and another an ethernet cable, how can I do?

    thanks4all

    Follow this link to configure the router.

  • Need help to set up AP 1142 standalone

    Hi all

    Need help. I am trying to configure Cisco Aironet 1142 standalone, this access point has been previously connected to WLC and the previous post, I found that we need to delete and reload the AP

    private-multiple-fs, c1140-k9w8 - mx.124 - 21A .JHA

    Now when I try to configure the IP address for the AP, he is in error:

    Ip address of AP1142 #lwapp ap 10.61.1.151 255.255.255.0
    ERROR! Command is disabled.
    AP1142 #.

    Current flash content:

    AP1142 #dir
    Directory of flash: /.

    2 - rwx 10264 March 1, 2002 01:25:57 + 00:00 private-multiple-fs
    3 - rwx 90396 March 1, 2002 01:18:04 + 00:00 event.log
    drwx-5 128 1 March 2002 00:12:24 + 00:00 c1140-rcvk9w8-mx
    8 - rwx 0 March 1, 2002 01:26:06 + 00:00 config.txt
    9 - rwx 337 March 1, 2002 01:18:04 + 00:00 env_vars

    total 32385024 bytes (30019584 bytes free)
    AP1142 #.

    Please let me know whatelse is required for the configured in stand-alone mode access point.

    Thanks in advance

    The image that is on the device's LWAPP, not the autonomous... If you want to use the AP autonoous mode then the image must be W7... It's...

    C1140-k9w7 - mx.124 - 21A .JHA not c1140-k9w8 - mx.124 - 21A .JHA.

    Please feel free to download any image from the below link and perform the conversion of image LWAPP to stand alone...

    http://tools.cisco.com/support/downloads/go/PlatformList.x?sftType=IOS+Software&mdfid=282439881&treeName=Wireless&mdfLevel=Model&url=null&modelName=Cisco+Aironet+1140+Access+Point&isPlatform=N&treeMdfId=278875243&modifmdfid=null&imname=&hybrid=Y&imst=N

    the methos to convert is...

    Download TFTPd32 of google and install it on your PC... point of the image that you downloaded on the TFTP server.

    Connect a cable ethernet between your notebook and AP... both should be on the same subnet... Connect a cable from the console and access the hyperterminal console with the command...

    AP > en

    AP #debug lwapp console cli or debugging console cli capwap

    T AP #config

    AP (confg) int FA 0

    AP(confg-IF) ip addr (same subnet as the laptop)

    End AP(confg-IF)

    Force - reload DOWNLOAD - AP #archieve sw / overwrite tftp: / /.

    This will solve the problem...

    Concerning

    Surendra

  • need help to set the access rights of a vmware server 2.0.1 on vmware image

    Hello!

    I have a vmware (running ubuntu server 9.04) image that was created with a vmware server installation varsion 1.0.9. now I decided to upgrade to the host, which means that the host totally changed: new equipment, new OS, new vmware-server-version: 2.0.1

    My problem atm is, I may not know, what would be the appropriate access rights (chown/chmod) for this vmware image. during the installation of vmware server 2.0.1 I was asked to specify some 'administrative user' where I took the an im working with Linux itself (lets call it "user").

    so, when I copied the old vmware image in the data store (/ var/lib/vmware/VirtualMachines for me), chown-ed the folder including all files init by A, setting chmod to something like 600, the console vmware (web surface) told me that there were several problems with the image and couln can't be started etc. etc. etc...

    I played with several rights to the image and the only thing that seemed to help was setting the folder and all files included in 'root' with the command chmod chown '777'... not what I would call 'secured '.

    so: how to set the access rights for the virtual machines? I want that they have only minimal rights as possible and especially nothing like root: 777...

    My static VM files, as in those who are not dynamically created when the virtual machine starts, are the property of root, root of group with permissions of 711. Root is the user that I have chosen as the admin user when you run vmware - config.pl. My users do not have direct access to this server, so I'm not too worried about the permissions. You can give different rights for different users to different virtual machines, creating roles and their allocation to users/groups. On that, the details are in Chapter 10 of the user guide - http://www.vmware.com/pdf/vmserver2.pdf.

    Guy Leech

    VMware vExpert 2009

    ---

    If you have found this device or any other answer useful please consider the use of buttons useful or Correct to award points.

  • Need help to set up VMware Fusion 2

    I am trying to configure VMware Fusion 2 and need help with the proper way, access this topic.  I have a Mac Pro with XP Pro installed via Boot Camp.

    One of my hard drives is 1 TB that I dedicated 300 GB to Windows and installed XP Pro with Office 2007, MS Flight Simulator and a few other programs. The rest of the disc is for Mac stuff. I intend to run MS Flight Simulator natively via Boot Camp, but want to run Office and a few other programs via VMware Fusion 2.

    VMware Fusion 2 is installed on the computer, but I'm confused by how to configure. Should what steps I take to do this?

    Normally, if there is a Boot Camp partition with Windows installed VMware Fusion detects it automatically and complete an entry on the library of Virtual Machine named Boot Camp partition and you simply double-click and he should be executed even if the first time it is run it through a preparatory process that takes a few minutes.

    That being said there are several reasons why the Boot Camp partition might not automatically appear on the Virtual Machine library and to the solution the simplest it's Fusion of closing and reopening it however if it doesn't then it becomes more difficult to diagnose and fix if possible.

    Also, there are a problem experienced during the Boot Camp partition is located on a drive more than 950 GB and a 1 TB HARD drive should show about 931 GB I don't know exactly what Fusion studies in this area to determine her size but I think that the issues that I have seen posted the deal with more than 1 TB HARD disk as in the post in this search result link: the search results for 1.5 GB Seagate.

    You can also try to manually create a virtual hard disk that is then more metadata pointing to the raw disk and manually create a partition Boot Camp Virtual Machine around that but I do not have the necessary parameters to stop this Boot Camp partition manually created the Virtual Machine to take snapshots or being suspended unless someone VMware will show what these settings are for Fusion 2.x I am reluctant to give directions as it would be dangerous to run with these capabilities on a manually created partition from Boot Camp Virtual Machine.

    Other reported problems treated with NTFS - 3G installing stopping the Boot Camp partition to be recognized automatically and have to temporarily uninstall NTFS - 3 G.

    He had to see what he says in System Profiler for the hard disk on which you have Boot Camp.  Select the target Serial - ATA drive and copy and paste the information for this drive in a response.

  • Need help, cannot connect to http sites, https only...

    BLUF: I can connect only to HTTPS Web sites, http gives me 'unable to connect to the server' or "no route to host" errors.

    While I was out of town, the woman finished downloading something on his MBP that cause a lot of pop-up ads any time during the use of the internet.  I ran Malwarebytes Anti-Malware and it found and removed a bunch of infected files.  All this while the computer was on OS X 10.9.x. Since that time, on any browser (firefox, safari, chrome) we can only connect to the https pages.  For example, http://www.google.com = no go "impossible to connect to the server...". ", while https://www.googlec.com = good, but unfortunately most of the links is http, so it is useless.

    I spent most of the last days 2 pouring on the forums, and troubleshooting to resolve this question... what I did:

    Reset my router (without success, all the remains connected to it is good (everything else is also Android/windows))

    Reset my modem (even had my ISP reset everything they could on their end too)

    Back to zero/reinstalled all browsers,

    erased the PRAM using the option + command + p + r at startup.

    verified that no Proxy box is checked in the advanced network settings

    tried to change the DNS, manual, auto, opendns, 8.8.8.8/8.8.4.4, using my ISP DNS googles, nothing changes.

    uninstalled all that was installed last week (not a lot, but now I don't know what it was).

    disabled the browser all extensions/plug-ins.

    IPv6 disabled/re-enabled (set to auto),

    What works:

    Safe mode, internet is full to the top.

    While in safe mode, I was able to connect to the app store (could not in a regular connection or guest user) and upgrade to OS X 10.11.5, but even the installation that does not solve all missing / corrupted files, I always have the same question.

    I thought for sure the new OS would have fixed it, but now I'm really stumped.

    Is there a way to reset completely all network settings? Could get blocked port 80 (http)? How can I tell?

    Any help would be appreciated,

    v/r

    Sean

    (a husband who knows enough about computers to really break, ha)

    First, never use any type of software "anti-virus" or "anti-malware" on a Mac. That's how cause you problems, not how you solve them.

    1. the present proceedings is a diagnostic test. It doesn't change anything for the better or worse and therefore, by itself, will not solve the problem. But with the help of the results of the tests, the solution may take a few minutes, instead of hours or days.

    The test works on OS X 10.8 ("Mountain Lion") and later versions. I do not recommend running it on older versions of Mac OS X. It will do no harm, but it will not do not much good.

    Do not be put off by the complexity of these instructions. The procedure is easy to do right, but it is also easy to do wrong, so I had very detailed instructions. You make the tasks more complicated with the computer all the time.

    2. If you do not already have a current backup, please back up all the data before doing anything else. The backup is needed on the general principle, not because of what anyone in the test procedure. Backup is always a must, and when you encounter any kind of problems with the computer, you can be more than the usual loss of data, if you follow these instructions or risk not.

    There are ways to back up a computer that is not fully functional. Ask if you need advice.

    3 here is instructions to run a UNIX shell script, a type of program. As I wrote above, it doesn't change anything. It does not send or receive data over the network. There is no to generate a report on the State of the computer human readable. This report goes nowhere unless you choose to share it. If you prefer, you can act on it yourself without disclosing the contents for me or someone else.

    You should ask yourself if you can believe me, and if it is safe to run a program at the request of a foreign national. In general, no, he's not sure, and I encourage it.

    In this case, however, there are ways for you to decide if the program is safe without having to trust me. First of all, you can read it. Unlike an application that download you and click to start, it is transparent, anyone familiar with the code can check what it does.

    You may not be able to understand the script yourself. But variations of it have been posted on this site several times over a period of years. One of the million registered users to have read the script and set off the alarm if it was dangerous. Then I wouldn't be here now, and you would not be reading this message. See, e.g., this discussion.

    However, if you cannot satisfy yourself that these instructions are safe, do not follow them. Ask other solutions.

    4. here is a general summary of what you need to do, if you decide to go forward:

    ☞ Copy text from a particular web page (not this one) to the Clipboard.

    ☞ Paste into the window to another application.

    ☞ Wait for the test to run. It usually takes a few minutes.

    ☞ Stick the results, which will be copied automatically, in a response on this page.

    These are not specific instructions; just a glimpse. The details are in parts 7 and 8 of this comment. The sequence is: copy, paste, wait and paste it again. You don't need to copy a second time.

    5. try to test in conditions that replicate the problem, to the extent possible. For example, if the computer is slow intermittently, run the test during a downturn.

    You may have started up in safe mode. If the system is now in safe mode and works pretty well in normal mode to test run, restart as usual before running it. If you can test only in safe mode, this.

    6. If you have more than one user and a user is affected by the problem, and the user is not an administrator, and then run the test twice: once under the affected user and one administrator. The results can be different. The user that is created automatically on a new computer, when you start it for the first time is an administrator. If you are unable to log in as an administrator, verify that the user concerned. More personal Mac have only one user, and in this case this section does not apply. Don't log in as root.

    7 load the linked web page (the site "Pastebin") in Safari. Press the combination of keys command + A to select all the text, then copy it to the Clipboard by pressing command-C.

    8. start the Terminal application integrated in one of the following ways:

    ☞ Enter the first letters of his name ("Terminal") in a Spotlight search. Select from the results (it should be at the top).

    ☞ In the Finder, select go utilities ▹ of menu bar or press the combination of keys shift-command-U. The application is in the folder that opens.

    ☞ Open LaunchPad and start typing the name.

    Click anywhere in the Terminal window to activate it. Paste from the Clipboard into the window by pressing Command + V, then press return. The text that you pasted should disappear immediately.

    9. If you logged in as an administrator, you will be prompted for your login password. Nothing displayed when you type. You won't see the usual points instead of the characters typed. Make sure that caps lock is turned off. Type carefully, and then press return. You can get a warning to be careful. If you make three unsuccessful attempts to enter the password, the test is still running, but it will produce less information. If you do not know the password, or if you prefer not to enter, just press back three times at the password prompt. Yet once again, the script will run.

    If the test takes much longer that usual to run because the computer is very slow, you can be prompted for your password a second time. The permission you grant by entering it will expire automatically after five minutes.

    If you are not logged as an administrator, you will be prompted for a password. The test will run. It just will not do anything that requires administrator privileges.

    10. the test may take a few minutes to run, depending on the number of files you have and the speed of the computer. A computer that is abnormally slow may take more time to run the test. During execution, a series of lines is displayed in the Terminal window like this:

        Test started
            Part 1 of 4 done at: … sec        …        Part 4 of 4 done at: … sec
        The test results are on the Clipboard.
        Please close this window.

    The intervals between the parties will not be exactly the same, but they give an approximate indication of progress.

    Wait for the final message "Please close this window" appear - again, usually within a few minutes. If you don't see this message in about 30 minutes, the test probably won't be completed within a reasonable time. In this case, press the Ctrl + C key combination or the point command to stop it. Then go to the next step. You will have incomplete results, but still something.

    In order to get results, the test should be allowed to perform or be stopped manually as shown above. If you close the window of the Terminal, while the test is still running, the partial results will not be saved.

    11. when the test is completed, or if you manually stopped, leaving the Terminal. The results have been saved to the Clipboard automatically. They do not appear in the Terminal window. Please do not copy from there. All you have to do is start a response to this comment and then paste it again by pressing Command-V.

    At the top of the results, there will be a line that begins with the words «Start time.» If you do not see that, but rather to see a mass of gibberish, you wait for the message "close this window". Please wait and try again.

    If personal information, such as your name or e-mail address, appear in the results, make anonymous before posting. Usually it will be not necessary.

    12. in the validation of the results, you see an error message on the web page: "you have included content in your post that is not allowed", or "the message contains invalid characters." It's a bug in the software which manages this website. Thanks for posting the results of the tests on Pastebin, then post here a link to the page you created.

    If you have an account on Pastebin, please do not select private in exposure menu to paste on the page, because no one else that you will be able to see it.

    13. When you are finished with the test, it is gone. There is nothing to uninstall or clean.

    14. This is a public forum and others can give you advice based on the results of the test. They speak for themselves, not for me. The test itself is harmless, but all that you can not be. For others who choose to run it, I do not recommend that you view the results of test on this Web site unless I ask.

    15. the related UNIX shell script is a notice of copyright. ASC readers can copy for their personal use. The whole nor any part can be redistributed.

  • Need help to set up ShaderJob

    01. I'm trying to mix two ImageSnapshots.

    02. If I have those who write in the form. PNG files, I am able to get the mixture I want of the custom PBK that I wrote and tested with the Toolkit of 2.5.

    03. the snapshots are produced in an AIR application and the desired treatment is to mix in a background ShaderJob.

    04. I have no difficulty to create the Shader of the on-board PBJ, but I'm quite confused on how to set the ShaderJob object.  The first error I got was #2166.  Which led me to re-read the instructions for the ShaderInput, certainly, I had not been able to understand:

    If the shader is executed using a ShaderJob object instance to process a ByteArray containing a linear row of data, set the ShaderInput instance height 1 and width number of values to 32-bit floating-point in the ByteArray. In this case, the input in the shader must be defined with the image1 data type.

    05. because my kernel works with typed as image4 input sources [at least when used against versions of file bitmaps], I didn't change this kernel, rather, I thought that the Diagnostics error message may indicate that I didn't provide width and height for the two ShaderInputs values.  Which led to the #2165 error, and that is why I write.  Clearly, I need to understand how to create the work to be performed on the image data in memory also differently from the way it is run in the IDE of the Toolkit.

    A. is the phrase "A ByteArray containing a linear row of data" meant to indicate that there are a few ByteArrays which do not contain a linear row of data and other ByteArrays which are not contain a linear row of data, or does the part of the sentence mean that any use of a ByteArray results in a linear data row as seen by the entrance to the core handler?  If it's the former, can provide you some guidance on knowing when a ByteArray or does not contain a linear row of data.  Specifically, for my use case, is the ByteArray which is available as a property in a linear or non-linear ImageSnapshot?

    B. assuming that my ByteArray should be seen by the entrance to the core handler as a linear byte string, while I have to rewrite my kernel to manage the image1 rather than input image4, require that any changes to the use of the intrinsic function outCoord or sampleNearest?  [This forum looking for ShaderJob, indicates that there is a bug regarding image1 versus image4 in a previous version.]  That fixed, or are there still "disconnects" that must be mastered in order to manage successfully the bytearrays shader jobs?]  Or, as it seems, sending a linear flow only modifies the strategy parallelization "behind the scenes" used by the FlashPlayer during execution of the ShaderJob object?  As I intend to do the work asynchronously, I am not too concerned about the passage of time, but are there other configuration options to be considered which could lead to a higher rate on the hosts of the multi-core where my application will work generally?

    C. Alternatively, if a ByteArray can, in certain circumstances, be considered by the kernel as non-linear input Manager, what the input.width and input.height parameters must be defined?  Yet once, to go from the general to the particular, if there is no indication on the specification of the dimensions of a ByteArray created by ImageSnapshot, I'd appreciate the advice.

    I'm not entirely sure that I understand the question - I'll do my best to answer, but please correct the misunderstandings I have. From what you described I think you should use a BitmapData object since you have 2D images. There is an example on this page:

    http://help.Adobe.com/en_US/FlashPlatform/reference/ActionScript/3/Flash/display/ShaderInp ut.html

    That shows the data entry are defined like this:

    myShader.data.src.image = new BitmapData (50, 50, true, 0xFF990000);

    The advantage of using a BitmapData object, it is that all the work to manage the offsets within the image and the number of channels is done for you automatically. The only reason to use a ByteArray would be if the data was not a bitmap image, or that it was not in this form. As you point out, if the data in a ByteArray actually represents a 2D image and you want to treat it as a 2D image, you then have to do all the magic to convert coordinates in the form of right hand.

    Bob

  • Please need help with the deployment of web applications in Jdeveloper 12 c

    Hello

    I'm desperate for help guys. am trying to deploy a web application in weblogic server, but nothing works!

    I have created a project in jdeveloper and created a jsp page in the project, what I want is to run this page!

    I followed the instructions here: Deployment of Applications Web Fusion , I don't really know if I did good or bad, the document is too detailed and not understood clearly.

    I am a newbie oracle user and trying to build a jsp web application connected to the oracle database. fails application deployment it says: cannot run application deployment IntegratedWeblogic error...

    Please could you tell me the steps of deploying applications in Jdeveloper 12 c?
    What deployment profiles, I need to create (ear, war, mar)?

    This deployment descriptor, I need for my application work?

    Please guys I am newbie to oracle, if you could give me simplified answers and straight instructions it will be appreciated .

    Thank you

    It depends on your knowledge of jsp and the possible controllers like struts, the faces and the adf (which is an addon of jsf). ADF has the advantage that a large number of configurations and other stuff is handled for you. However, if you are familiar with Struts you can use it too.

    The decision also depends on demand and what he should do. I can't comment on this, as I don't know.

    As you use 12 c my recommendation is to use the stack complete adf, meaning adf faces and adfbc for access to the data in the Database.

    There is a license for the adf if you want to deploy on a WebLogic Server, however there is a free version (adf essentials) that uses a GlassFish server.

    Timo

Maybe you are looking for

  • Bent corner trackpad

    Last week, I bought a new Macbook Pro. I noticed that one of the corners of the trackpad is protruding outward. Specifically, its case is slightly down at this point. Apple service could do something about it? In all other respects, my Macbook works

  • Hp2452: Hp2542 scanning and printing

    Just bought this all-in-one, but can't seem to know how to analyze an element then print it immediately

  • With the new cartridge is already installed, I can't retrieve the set to the top of page to complete the installation.

    Hello, I have Norton antivirus and apparently everything is installed correctly but when I click the icon on the desktop after a very short time, the message appears.  I have an Acer Aspire V3 windows 8.1 - 64 bit I am trying to solve this problem si

  • jedeveloper adf and image map click event

    Hello!I am new to jdeveloper-adf and I want to ask if is a tutorial from scratch, where I can make the UI, authorization of the user, the image map, click event, where use can click on the map image point so that they can see in a form on one specifi

  • creating a catalog rman in 12 c

    Hello everyone, I am trying to create a new catalog in version 12 c, but I have a doubt assimilated, if the database must be a container or a snap-in database, someone has any ideas on the best option for the location