question about sending mail and the use of UrlEncodedPostData

Hello

I need to send over https three things:

(1) framework, which is a byte [] object, and has some information about the device and the things that need to be sent to the server

object String 2) imei - imei of the device.

(3) data - some data, which are a String object

now I need to use URlEncodedPostData, but...

UrlEncodedPostData _post = new UrlEncodedPostData(null, false);

_post.append("frame", ???)-> my frame is a byte[] object

so, what should I do? should I change channel frame? but, later when I send the _post to the server that I use:

_httpConnection.openDataOutputStream(_post.getBytes());

YH, the problem is-how to put a byte [] object to the urlEncodedPostData and then send it?

The point of encoding is to ensure that special characters can be detected correctly.  There is no URL address, as the settings.

You will notice that the class that you are trying to use is called URLEncodedPostData.  I don't know if the same URL encoding is used in BOTH and given POST, but I think this class should be used in the data of PUBLICATION, rather than to GET data (look at the name).  You will find that the process of encoding data GET is not so difficult and I don't know if you look you will find J2ME coding code on the Web, that will help you create correctly to GET URL format.

However, I still think you should consider the difference between GET and POST, and what data is passed by each type of application.  I think that if you had done that earlier, you wouldn't be in this position, you understand better my answers and you will understand how to create the queries POST you have to best use later.  GET and POST are NOT Blackberry or specific RIM, they are the Web specifications and used on all platforms.  There is a lot of documentation out there.

Tags: BlackBerry Developers

Similar Questions

  • Protégé M200: Question about Vista TPM and the Bitlocker

    You want to know if I have a TPM chip to launch bitblocker on the M200 using Vista. Just call Toshiba Technical Support - the guy was totally distraught!

    If I don't have a TPM chip, then I can install it?

    Hello

    It is a good question. To my knowledge the Portege M200 does not support TPM but the Portege M400, R400 module and the R200

    But the Bitlocker, which is only available on the Vista Enterprise and ultimate can also be used without the TPM chip but then some functions are not available; for example, the SecureBoot.
    Without TPM only the OS volume encryption is available.
    In this case you can encrypts the entire Windows volume including both data and file system user, the file of hibernation, the page file and the temporary files.

    Using volume of BONE (HDD) encryption an encryption key will be generated. This key will be written to the USB and then the USB is required!

    AFAIK the Bitlocker requires 2 partitions. A partition must be created as needs at least 50 MB primary partition. I recommend a? about 1.5 GB
    The second big partition Vista can be installed.

    After the installation of Vista the Bitlocker must be enabled in Group Policy (units without secure TPM). This can be done using the command 'gpedit '.
    And then under models of administration-> windows components-> Bitlocker bitlocker function can be activated!

    Anyway, there is much information Bitlocker and I think you should also consult the Microsoft Web site for more information:
    BitLocker Windows Drive Encryption step-by-step guide

    I hope I could help a little

  • Satellite C660-1F1 - Question about newer drivers and the speed of the memory

    Some of the drivers for this laptop are outdated compared to the most recent drivers on peripheral manufacters website. Is it safe to use these new drivers or is it recommended to stick with the old drivers that are on the Toshiba site?

    And second question: is it possible to make the fastest possible working memory supported? Don t BIOS options include options for the parameters of memory. Why the memory is running as low mhz in case of default? CPU - Z shows that the current frequency of dram is 532, 2 mhz. What is the maximum, it is at 667 mhz? Probably she can´t be 1 066 MHz as promised in the specs?

    Hi cryogenized,.

    > Some of the drivers for this laptop are outdated compared to the most recent drivers on peripheral manufacters website. Is it safe to use these new drivers or is it recommended to stick with the old drivers that are on the Toshiba site?
    Why you want to update your drivers? Do you expect a gain of performance with newer drivers?

    Way General, with official Toshiba drivers you are on the safe side because they are pre-tested. If you can make sure that they work properly and don t cause property damage. Install the other drivers happens on your own risk!

    > And second question: is it possible to make the fastest possible working memory supported? Don t BIOS options include options for the parameters of memory. Why the memory is running as low mhz in case of default? CPU - Z shows that the current frequency of dram is 532, 2 mhz. What is the maximum, it is at 667 mhz? Probably she can´t be 1 066 MHz as promised in the specs?
    The laptop is equipped with modules of DDR3 1066 MHz and the RAM speed is dependent on the FSB of the processor. If your CPU is throttling down, RAM modules will work also on low speed. On a high utilization of the processor (100%) the RAM modules must run with speed of 1066 MHz I think.

  • Buy new computer Windows 7 Professional and have questions about other files, and the removals of document on the old computer

    Hi all!

    I need help.    I just bought a new computer that has Windows 7 on it.     This old computer is 7 years old

    and last year I had put win 7 professional about it.     I'm trying to delete files on it.    How can I do this correctly.

    What I need to remove the Windows 7 Professional out of it since I bought it and have the license and the disc.    Or, do

    to keep the disc and just remove it from this computer.     What happens if someone else wants the computer I leave it on and

    Give them the disc.   How can I handle this?     I am new to this?    Someone just set up my new computer and I want to

    to make sure that I have all my passwords and other things out of that right.

    CAN SOMEONE HELP ME SOON!    A.S.A.P.!    Cause I need to work for the new space.

    Thank you.    Sharon

    If you delete all partitions found (when booting from the cd of win) it will only destroy what is on the hard drive of the PC (all data can be saved), he won't do anything to victory dvd

    If your new PC shipped with win7 preinstalled you need not really your origonal dvd win7. -You can sell or keep

    If you do not want to give the old PC, then simply remove the hard drive (how can be found on google) and destroy the hard drive with a heavy hammer

    (A seven year old PC is practically worthless)

  • Question about activating windows and media used for installation

    Intel Visual BIOS 2 my computer on board DZ87KLT - 75 K (Firmware updated) can not detect the optical drive as boot EFI device. So I made a bootable USB flash drive to my system OEM Windows 7 Pro x 64 DVD manufacturer who (USB flash drive) my system detect successfully as efi boot device. My question is if I do a windows 7 clean install with EFI enabled using the flash drive on the same computer that runs this window for the last 9 months, there will be an activation problem to not use the DVD?

    The problem is that your key is already used. He'll have to re - install Windows by using the same key (as long as it's the same motherboard and not a replacement) phone activation.

    J W Stuart: http://www.pagestart.com

  • Question about Excel AddIn and the UDA in Excel

    Hi all

    I have a dimension attribute, and I am able to recover data in Excel and drill down based on the size of the attribute.

    But when I try to do the same exercise using a UDA, I get weird errors. Has anyone tried the same thing with the UDA?

    Thank you.

    UDAs can be selected through the Select Members dialog box, but cannot be drilled in on because Adu do not have a corresponding dimension; attributes do - that's why you can break into an attribute.

    I tend to use aggregates for purposes of calc - I prefer to maintain a contour with UDAs creation never reported on the hierarchies to select a group of members.

    Kind regards

    Cameron Lackpour

  • Phone numbers contained in the e-mails and the web links will appear for several seconds and then disappear. I use Yahoo mail, however, if I use IE 8, the problem does not occur. Help!

    Phone numbers contained in the e-mails and the web links will appear for a few seconds and then disappear. I use Yahoo mail, however, if I use IE 8, with Yahoo mail, the problem does not occur. Help!

    This has happened

    Each time Firefox opened

    Is whenever I use Firefox

    Tools > Addons > > Extensions

    You have the Skype for Firefox extension?
    If so, disable it. Known to cause this problem for many users.

  • I can't send or receive any e-mail and the error code: 0x800CCC19 I call the provider and they say it's a software problem. Help, please

    I can't send or receive any e-mail and the error code: 0x800CCC19 I call the provider and they say it's a software problem.  Help, please

    1. Windows Mail.  But he argued that email account for more than a year without problem.

    2 here is the full error message:

    "Are subject: how pumpkin pies are made ', account: 'pop3.live.com', server: 'smtp.live.com', Protocol: SMTP, Port: 25, secure (SSL): Yes, error number: 0x800CCC19.

    ("How pumpkin pies are doing it" the subject of an email I tried to answer to and it does not work)

    I get another message when sending email: "your POP2 server has not responded in 60 seconds.  You want to wait 60 seconds for the server to respond? »

    And I'm waiting for 60 seconds, several times and it does not send

    It was 1 year there, not more. Not sure when it started.
    Read this article from Microsoft Help Support &:

    http://support.Microsoft.com/default.aspx/KB/926374

    t-4-2

  • Suddenly cannot send email, I get error message saying: an error has occurred when sending mail. The mail server responded: authentication is required before to

    Thunderbird has worked perfectly on 9/3. This morning all of a sudden I can't send e-mail. The message is: an error occurred while sending mail. The mail server responded: authentication is needed before sending it [R0107005]. Please make sure that your e-mail address is correct in your e-mail preferences and try again.

    I made no changes between 9/3 and 9/4

    any help appreciated, have been using Thunderbird for many years.

    Jerry

    problem solved. a message to update thunderbird stood, updated and now works. WOW!

  • How can I configure Outlook Express to receive messages to different mailboxes (via POP3) but to send messages and responses using a single SMTP account?

    How can I configure Outlook Express to receive messages to different mailboxes (via POP3) but to send messages and responses using only a single SMTP account?

    In other words, I need to download via POP3 messages sent to the * address email is removed from the privacy *, * address email is removed from the privacy *, * address email is removed from the privacy * but I want to send messages using Mar SMTP service associated to * address email is removed from the privacy *

    If I get a message like * address email is removed from the privacy * I want to answer as * address email is removed from the privacy *.

    Is this possible?

    How can I configure Outlook Express?

    Concerning

    Marius

    You can do this if the Server SMTP allows you to send from a location that you are not connected via their internet service.  So if you have this permission, go to tools | Accounts | Add mail.  Then under the account of property | You want to set the server for incoming mail to the POP3 account, and then the SMTP protocol for the other account that you use to send servers.  And then indicate whether or not the server requires authentication, and if yes, then you will need to put in the user name and password for the SMTP server it.  Under properties. Advanced to define appropriate ports that may be different from the default value according to e-mail accounts.  You can also check the "leave a copy of messages on the server" for accounts POP3, if you access messages from multiple computers.

    Once you have an account set up, then you can set others upward in the same way, but change the POP3 properties for each while leaving the SMTP ones the same.

    Once you have all that in place, you might want to backup things in case something goes wrong: www.oehelp.com/OETips.aspx#6

    Steve

  • More by e-mail and the time

    When I signed up for Microsoft 10 my mail applications and weather conditions will not open.  I get a msg saying cannot open see repairs to the system administrator or replace.  I can't receive messages on this computer all my mail now comes on me via ipad or iphone

    DW - I have some good news!

    I kept poking around and found a convenience store for windows applications and he ran.  He finds a bunch of parameters and problems of files, including trouble with the app store for windows.  I let the Wizard do its fixation and concluded that the problems persisted.  A full close and restart later, and everything seems to work again - including my e-mail and the weather.  Maybe it will work for you, as well.

    Try the Troubleshooter Windows Apps:

    http://go.Microsoft.com/fwlink/p/?LinkId=271185

  • Need to access info "header / properties" and the use of a 'peek-a-boo' feature that allows an opening not assigned an e-mail message. BOTH are necessary.

    When the list of "incoming mail is received, a few times an e-mail will have a familiar name, BUT the message is NOT the person I know.» A header would reveal which is the familiar name of MASKING. It is located on the right click of an email entering under "properties.", for those who use the Windows Mail service. Upon activation, two panels are available: "general", line information base; and the jury of "Details". [email protected]

      Here is the "Details" on your recent request:
    

    Return-Path: < 8fd.10.Ragingmt =rochester.rr.com@mxsp4.email-od.com>
    Received: from dnvrco-pub-iedge - vip.email.rr.com ([107.14.70.244])

             by dnvrco-fep24.email.rr.com
             (InterMail vM.8.04.01.13 201-2343-100-167-20131028) with ESMTP
             id <20150527165815.TQBS12014.dnvrco-fep24.email.rr.com@dnvrco-pub-iedge-vip.email.rr.com>
             for <[email protected]>; Wed, 27 May 2015 16:58:15 +0000
    

    Return-Path: < 8fd.10.Ragingmt =rochester.rr.com@mxsp4.email-od.com>
    Received: from [64.151.119.54] (helo [64.151.119.54:45118] =mail24.smtprelayserver.com)
    by dnvrco-iedge04 (envelope-from < 8fd.10.Ragingmt =rochester.rr.com@mxsp4.email-od.com>)
    (ecelerity 3.5.0.35861 r (Momo - dev:tip)) with ESMTP)
    ID 05/42-22770-6A7F5655; Wednesday May 27, 2015 16:58:15 + 0000
    DKIM signature: v = 1; a = rsa-sha1; d =email - od.com; i=@email-od.com; s = dkim;
    c = relaxed/relaxed; q = txt/dns; t = 1432745904; x = 1435337904;
    h = content-type: mime-version: subject: to: to: date: message-id: reply - to;
    BH = BorokUNlliKkKGt/h0t9J5QZRXM =;
    b = ivSHJkJVgtIuuPbdKelm8wrP9MTDBOfWi38tURaeWYyE7irIYrzg8PjdIXA/r9B3Uc8l1gJJ9blRBU2jcN + jKV4C2 + / 5tSrQSrfiqa9l5xBx81Fm8Winq6uvCxyTCUwioUwJ21eUR7FDAXlDmcg7fbRBoG2b4 + f0CvQLBrdPNxU =
    X-wire-Info: OGZkLjEyLjhhMDAwMDA3NmJmNzIzLlJhZ2luZ210PXJvY2hlc3Rlci5yci5jb20 =
    Received: from r2.us - West - 2A .aws .in .socketlabs .com ([54.186.58.227]) by mail30.email - od.com
    with ESMTP; Wednesday, may 27, 2015 12:58:23-0400
    Received: from support3.webapp.phx1.mozilla.com ([63.245.216.223]), of r2.us - West - 2A .aws .in .socketlabs .com
    with ESMTP; Wednesday, may 27, 2015 12:58:14-0400
    Content-Type: multipart/alternative;

      I do NOT have this option on the right-clicked menu.
    
      Yes, I have been fooled, BUT, with a name of an extended family member, who questions such?  However, the message came from an unknown party, pushing some product from Oprah.   I check now.
    
      There are also e-mails I may NOT wish to indicate that I have "read" them via the formal opening process.  I call this the "peek-a-boo" method of opening an e-mail, as it is NOT a formal opening, per my research.  The point is that NOT all you see on the screen IS what you ARE seeing.  Thus the old saying: "Seeing IS believing.", is NOT true.   This is a more current peeking process, an advancement on the old "300 watt bulb behind the envelope" method of finding out contents withOUT opening the letter.  This applies to a sender I am familiar with BUT, the current topic is NOT of interest to me.   Thus, I can use the "Delete" function with complete satisfaction.
    
      Therefore I wish to know HOW I can gain these two features on THUNDER BIRD e-mails?
    

    Thomas J. Baglin
    [email protected]
    27/05/2015

    R.M. said

    Thank you, you, Matt.
    Regarding the "peek-a-boo," about 15 years ago, it was somewhat revealed the Web that some shippers had the ability to detect IF you had opened their missive.

    This is handled by the Web beacons. Thunderbird blocks remote images by default. Web beacons work only if you enable the remote images in specific email.

    From THIS time, it is the GOVERNMENT that has the ability to detect if you open all or part of your receipts "Entrants".

    Interesting point of view, but not quite corr4ect. f they have access to a mail server IMAP "could" determine the status of mail on this server. In the case of POP e-mail that could determine if it has been downloaded. While I do not trust of Government oversight. About the only time where they would do that would be when they are already studying you as an individual. It's a slow late then.

    So, WHY Windows Mail offers this function and the T-bird, NO mail?

    I played with Visual basic using integrated Internet Explorer about 15 years ago and it was a simple toggle to change the display of the HTML displayed in the source. So I would say it is in windows mail, because he was already in Internet explore and it made for a very simple to implement the functionality. Just expose the existing functionality. After all the composition and rendering in Windows mail used Internet explorer.

    Although the header can help tremendously, , what I SEE is NOT NECESSARILY WHAT THAT REALLY is the content of the e-letter.

    This is a feature of Thunderbird. It uses the display names from your address book on incoming mail. You can disable it in the menu (alt + T) tools > options > advanced > reading and posting.

    If the follow-up can be done via the 'Key STROKE' method, and YOU do NOT know of it, then a "peek-a-boo" is useful to have, huh?

    Keyloggers are all also able to capture screens and clicks. If your number more ahead.

    It makes me feel, I have a FEW C-O-N-T-R-O-L that I CHOSE to read, and what I based on the content and subject.

    Seriously. encryption of e-mails with s/mime and free email certificates will do more to protect your mail that any kind of fake check before you read. Most of the people may face apparently not having a certificate of personal mail to encrypt their mail and like most internet technologies, we get the lowest common denominator. This is the plain text that scours the internet to an ordinary human-readable text.

    Please when using these forums not your text indent. This is what makes it become very difficult to read and not wrap. I don't know that that is how you were taught in school. I learned the same thing. But it must comply with the requirements of the opportunity.

  • Probably a stupid question about sending electronic mail but not be received (or sent)

    Hello

    I try to send an email from my BB. I use this code below...

    Message msg = new Message();

    try {}
    String emailAddress = "[email protected]";
    msg.addRecipient (Message.RecipientType.TO, new address (emailAddress, emailAddress));
                        
    String fromAddress = properties.fetch () .getFromEmailAddress ();
    If (fromAddress.length () > 0) {}
    msg.setFrom (new address (fromAddress, fromAddress));
    }
                        
    If (properties.fetch () .isCopyEmailToSelf ()) {}
    If (fromAddress.length () == 0) {}
                                
    Returns false;
    } else {}
    msg.addRecipient (Message.RecipientType.BCC, new address (fromAddress, fromAddress));
    }
    }
                        
    msg.setSubject ("Testing");
                        
    content
    String content = "some test string";
                        
    msg.setContent (content);
                        
    Transport.Send (MSG);
    } catch (AddressException e) {}
                        
    Returns false;
    } catch (MessagingException e) {}
    Returns false;
    }

    I followed the tutorials in the knowledge base. I want users of my application to be able to configure the address and I don't want to save a copy of the email to any folder/email address on the phone.

    I'm currently debugging the code and it does throw an exception, and it is correctly signed. However, I get e-mails in the e-mail account 'to' or 'to' if account I have configured the application to bcc a copy for the account.

    Do I need to configure the appliance to send emails? I don't want to use any account e-mail on the device.

    Thank you

    SArah

    "can be sent to programtically without going through an email account set up on the phone?

    There is no API that I'm aware of that will support this.

    "When you say"works"he throws any exceptions, but it sends no emails no more"

    Doing so on the Simulator, not the end of the email to the top in the list of Messages.  The Simulator will attempt to send it and then, since you don't have the ESS work, give up.

    "If the user must create an account on the phone, do I need to modify the code to use it.

    As mentioned, I don't think that this code works without an account on the phone, so I think that this question is moot.

    "If you use the e-mail account on the device how is, you can define an address «of» the message?

    I don't think you can define an address.

    "you have more than one e-mail account on a device?

    Yes.

    You might find these links useful:

    http://supportforums.BlackBerry.com/T5/Java-development/sending-email-messages/Ta-p/442790

    http://supportforums.BlackBerry.com/T5/Java-development/retrieve-the-default-email-address-for-the-d...

    http://supportforums.BlackBerry.com/T5/Java-development/send-a-message-from-a-non-default-email-addr...

    Do a search too, I'm sure you'll find other useful things.

  • I have a Photosmart C7280 and s question about a decision of the network.

    I currently have two workstations connected to a router via ethernet cables.  They are connected to a single (not HP) printer with USB cable through a USB switch.  Two laptops to connect to the wireless router.  I could replicate the existing configuration with the C7280, but the idea of a network in which the laptops were allowed to participate is very attractive.  One of the laptop is running Windows version 7, the other computers running Linux.  If I go for an ethernet network, the laptops will be able to connect to the printer via the router?  If I go for a wireless network, desktop computers will be able to connect to the printer via their ethernet cables?  A couple of Wireless USB adapters are a possibility.

    I understand that you have questions about networking with your printer.

    Yes, wired network connections will be no problem to connect to a wifi connected printer.  Most routers bridge cable and wireless to work as a single network.  There are some routers between wired and wireless networks, but these are before any company grade routers and network equipment.

    A wired desktop computer will be able to print to a wireless printer as long as it is connected via the same router.  Conversely, a wireless computer can print to a printer connected Ethernet as long as it's the same router.

    I recommend using a network for the printer configuration, if possible, to avoid printing problems.  USB hubs have been known to cause printing problems, although this isn't always the case.

  • Question about full scan of the Table and Tablespaces

    Good evening (or morning).

    I read the Concepts of Oracle (I am new to Oracle) and it seems that, based on the way in which Oracle allocates and manages the storage of the local the following is true:

    Principle: A table which is often accessible by using a full table scan (for some reason any) would be better resident in its own dedicated tablespace.

    The main reason I came to this conclusion is that when you perform a full table scan, Oracle doesn't diluvium IO, reading probably one step at a time. If datafile (s) of storage space only contain data for a single table, then a reading series will have to skip segments containing the data in the other tables (as is the case if the tablespace is shared with other tables). The performance improvement is probably low, but it seems that there is a very similarly.

    I wish I had the thoughts of DBA experienced about the assumption above.

    Thank you for your contribution,

    John.

    a reading series will not jump the segments that contain data from other tables

    You are referring to a misleading picture of the operation.

    Let's say 'A' table is a table among a number of tables in a tablespace that consists of one or more data files.
    Since this is one of the many tables, it may not start at the beginning of a data file. His first measure may be somewhere in the middle of the file. The next step may not be nearby with the first step. The 3rd degree can be in different data file.
    So, it's the picture where you see Oracle having to jump the other tables when you do a FullTableScan.

    Now, view the same image:
    Measure 1 is in the 1000 to the 1127 block block (IE 128 blocks) in the data file 6
    Measure 2 is the 2400 block 2527 block in the data file 6
    3 is to the block to block 9371 9245 in datafile 12

    How Oracle does not have a FullTableScan? It starts with the segment header to get a map of the extent (it would read UET$ in a dictionary managed tablespace). He knows now what degrees it should read.
    What is doing?

    He made a call to the operating system to read 1000 blocks Oracle 1127 in the data file 6.
    The operating system then translates this call to starts and ID ranges and the block of the file system.
    The operating system puts this request to the storage subsystem.
    The storage subsystem and then translated the BONE, ID, blockrange to the drive starts, track, sector.
    Assume that these are all the neighbor on the single disc (that is, the volume is not distributed over multiple LUNS and disks).
    Storage reads the information and sends it to the operating system. This can still mean multiple readings, because the head (or several heads because the disc is made up of several trays) does not read 1 MB in an "appeal".
    The operating system then collects the 1 MB and passes it to Oracle.
    Oracle then fills buffers in its cache buffers--(PS: Astuce!) Tip! (: don't you know that it will be not be neighbor memory locations?)
    Microseconds past milliseconds.
    The disc is still spinning (it stops ). It has "evolved" - a different set of blocks are now under the read head.

    Oracle is now asking the OS for blocks of 2400 to 2527 in the data file 6.
    Oracle did not to "jump the other tables. He just made a separate call to the OS with a new range of blocks.
    The operating system now translates the block ID and filenumber at its own mapping.
    Storage then made his translation.
    The disc under the head blocks are very (almost certain) to be a different from blocks together. Not even those corresponding to 1128 Oracle Oracle datafile block 6. Not even the ones corresponding to 2400 block Oracle in Oracle data files.
    We are suffering now fetch - and reading the disk.

    and the story continues...

    And what happens if there is finally another user on the same system? Between the first blocks 1000-1127 call and the second call to blocks 2400-2527, that other user requested blocks 2000 (IE made a call from reading one piece).
    And, after the second measure is read by the user FullTableScan, a third user has requested block 2048 in a single block read call.

    It is important that the Table is not in the neighbor extensions? Even if you did put the table in "adjacent areas" they are not likely to be contiguous on the disk. Even if they are nearby on the disk, they are not likely to be able to read without delay, because the disc has passed.
    And we have not even spoken interleaving where readings from multiple disks need to be coordinated.

    So why still prefer 1Mo diluvium readings in Oracle? Because most SOAs allow a single OS call of up to 1 MB. Therefore, the overhead of Oracle making a call to read 1 MB are experienced only once. If the operating system allowed a maximum of 256KB reads diluvium, even a reading of 1 MB measurement must be carried out as 4 separate calls to the OS (and, recursively, 4 separate calls to the OS for the storage subsystem). We try to reduce the number of calls from software that we do. We cannot reduce the time of access and reading (but allows us to achieve more high "parallelism" in readings striping).

    Hemant K Collette
    http://hemantoracledba.blogspot.com

Maybe you are looking for