question of redundency/design interface
Sorry if this is a stupid question. I went through the forum and a bunch of google searches with no joy.
I have:
PIX-active - switch-a
| ||
PIX - fo - b switch
unlikely, I know, but is it possible to configure the network/pix to take account of the active pix & switchb down?
I was thinking something like backup cmd on IOS, to connect to a network adapter of each pix for both switches.
Thanks for the research.
Not a stupid question, but do not forget this: the commercially feasible thing to do when network solutions tolerant for lack of construction is to eliminate the SPFS (single points of failure). In this design, you have no single point of failure. Trying to limit to two points of failure will be very complex to predict behavior impossible. My advice is to move to other areas of your network where you have surely SPFS. ;)
HTH
Tags: Cisco Security
Similar Questions
-
I recently dropped my laptop and it is weird, one day he int open up to 4 start times and sometimes it shows me a folder and a question mark in the interface and sometimes asked to reset my password, what are the steps to take?
Anything can be corrupted on your MacBook Pro, but from what you say, it seems that the cable drive/SSD/flash memory/SATA hard was seriously damaged. Him "question mark" means that your Mac is unable to find any bootable device, meaning that it does not yet detect your OS X drive.
You should make a backup of your files (if you can still do it) and take the Mac at the Apple Store or dealer to get a diagnosis. There may be several damaged parts.
-
QUESTION OF REDUNDANCY NORMAL ASM
Hi all
Document Oracle ASM NORMAL QUESTION of REDUNDANCY [1480954.1 ID] says the statement, I find it difficult to understand the line which is marked in italics below.
To determine the appropriate size of a diskgroup which is protected with redundancy of ASM, sufficient free space must exist in the diskgroupso that when a drive goes down, it can automatically rebuild the contents of the drive failed on another drive in the diskgroup. The database should stay online if sufficient space is available
. The amount of space required to ensure ASM can restore redundancy if there is no disc is in the REQUIRED_MIRROR_FREE_MB column in the view V$ ASM_DISKGROUP. The amount of free space that can be used safely in a disk group, taking into account, mirroring and still be able to restore redundancy after a drive failure is in the USABLE_FILE_MB column in the view V$ ASM_DISKGROUP. USABLE_FILE_MB must always be greater than zero. If USABLE_FILE_MB falls below zero, most records should be added to the disk group.
DOUBT: why what he have reconstitute the content of the disc failed on another drive in the diskgroup when scopes in mirror and I do not understand when the disc itself is failed how they can access it and rebuild its contents to another drive.
ConcerningDOUBT: why need restore the contents of the drive failed on another drive in the diskgroup when there mirrored scopes
because the data on the failed drive is not more in the opposite direction (no additional copies) and to ensure a level of normal redundancy, we'll build a new mirror copy of data
I do not understand when the disc itself broke down how they can access it and rebuild its contents to another drive.
data always available, mirrored
to explain it simply:
everything is stored with 2 copies (original + mirror)
When 1 is lost, a new copy will be rebuilt among others the 1, so there will be 2 copies again -
Simplistic questions about game design student
Hello
A high school student sent me a few questions about the design of the game. After above, they seem to be more applicable to commercial game developers. If you are such a person would be willing to post your answers, I would be grateful.
Here are the questions:
1.) how long does it take to design a video game?
(2.) what is your source of inspiration to design a video game?
3.) how to make a video game to become popular? (sold in a package)
4.) what are the resources needed to design a video game?
5.) how much money does take to design a video game?
Best regards
Chris McLaughlin
I have programmed buggoop 300, http://www.buggoop.com/BugGoop300/
and I'm currently adapting mobile android.
I also programmed this, http://rummoli.ca/bin-debug/rummoli_single.swf
-
question about the design of the INTERFACE through WebWorks
Hi all
How to display the bar at the top of my app like Facebook app?
Where can I find the width of the top bar? Thank you.
Kind regards
QC
I understand now, thanks for the clarification.
WebWorks applications, like all other applications on the BlackBerry OS, cover the full screen by default. If you want to include in your application, your own taskbar to display information at the level of the system (battery, carrier, time, etc.), you need to include this logic in the application itself (for example to create a)
and use WebWorks APIs or custom JavaScript extensions to retrieve data from these properties). -
Question of redundancy VPN l2l using 2811 as endpoint devices
I have a new implementation of VPN L2L passes using two 2811 s than VPN terminal devices. I'll try to use the HSRP address between the public interfaces of both routers as VPN peer address. The problem that I found during the test is that the tunnel will become active and debugs watch the HSRP address as an invalid address to form the tunnel. Have a work-around, or a better plan for redundancy on peering address using similar devices? Thanks in advance.
Take a look at this doc about IOS IPSec HA.
-
question about redundancy and failover from one site to tunnel
First, I create the underside of crypto card,
crypto IPSec_map 10 card matches the address encrypt-acl
card crypto IPSec_map 10 set peer 209.165.201.1card crypto IPSec_map 10 the transform-set RIGHT value
card crypto IPSec_map 10 the value reverse-road
Then I set up a 2nd card statement, corresponding to the same ACL.
crypto IPSec_map 20 card matches the address encrypt-acl
card crypto IPSec_map 20 set peer 23.10.10.10card crypto IPSec_map 20 set transform-set RIGHT
card crypto IPSec_map 20 set reverse-road
My first question is - since Cryptography cards are processed in order, does that mean the first tunnel VPN (map 10) will always be used if its place?
If so, what happens when the 209.165.201.1 remote peer becomes unreachable? is the tunnel of the 23.10.10.10 peer back automatically?
What is the best way to reach a VPN site-to-site main and secondary where 209.165.201.1 primary school and 23.10.10.10 is backup and appears only when the primary is down?
Thank you
Hello
As you mentioned that the Cryptography cards are processed in the order.
If two cryptographic cards have the same "interesting" traffic then the second card encryption is never used (first crypto card is used).
The best way to get a redundancy is to do the following:
crypto IPSec_map 10 card matches the address encrypt-acl
card crypto IPSec_map 10 set peer 209.165.201.1 23.10.10.10card crypto IPSec_map 10 the transform-set RIGHT value
card crypto IPSec_map 10 the value reverse-road
Note in the example above that you have defined an instance unique card crypto with two counterparts. The first pair will try first and if not answered, the second peer will be used as a backup.
It will be useful.
Federico.
-
Hello community,
I have a question about the function of redundancy for both WLC 2106. We have installed on a client 2106 and 6 AP site 2 WLC primary and backup WLC works very well. No customer asks the question if there is an option to copy the guest user of wlan access from the PDC to the backup controller? The entry hall activates a new user on the main controller and if the primary controller fails, so the user did not have access to the WLAN comments.
Any ideas?
Thanks for help.
René
You can read this question a little differently...
What, in my view, is mentioned, is that a user GUEST account is enabled on the PDC. When the primary contoller fails to the needs of the user to reauthenicate. If that is the question.
You must either add comments on both controllers OR purchase WCS and WCS will push the guest on both controllers for you account...
-
VPN site2site &; VPN client dailin on the question of a single interface
Hello dear colleagues,
First of all, the question of information subsequently:
Setup
C2801 race
(C2801-ADVENTERPRISEK9-M), Version 12.4 (25f)
---------- ----------
| Central | Di1 IP:80.153.xxx.xxx | DISTANCE | IP: 91.218.xxx.xxx
| Router | <-----------------------------------------> | Router |
-IPsec via GRE Tu1 - works | Debian |
^ | |
| ----------
| does not work
|---------------------------------------->-------------------
| Cisco VPN | Intellectual property: all
| Customer |
-------------------
!
AAA authentication login default local activate
AAA authentication login local VPN_Users
RADIUS group AAA authorization network default authenticated if
AAA authorization VPN_Users LAN
!
AAA - the id of the joint session
iomem 20 memory size
clock timezone THIS 1
clock summer-time EST recurring last Sun Mar 02:00 last Sun Oct 03:00
IP cef
!
username myVPN secret 5
----------------------------------------->!
!
crypto ISAKMP policy 1
BA 3des
preshared authentication
Group 2
life 3600
address
key crypto isakmp xauth No. 91.218.xxx.xxx ISAKMP crypto nat keepalive 20
!
Configuration group customer isakmp crypto VPN_dialin
key
DNS 192.168.198.4
domain example.com
pool VPN
ACL VPN
Crypto isakmp VPNclient profile
match of group identity VPN_dialin
client authentication list VPN_Users
ISAKMP authorization list VPN_Users
client configuration address respond
!
Crypto ipsec security association idle time 3600
!
Crypto ipsec transform-set esp-3des esp-sha-hmac hostb-transform
transport mode
Crypto ipsec transform-set ESP-AES-128-SHA aes - esp esp-sha-hmac
Crypto ipsec transform-set ESP-AES-128-SHA-LZS, hmac-sha-esp esp - aes comp-lzs
!
!
crypto dynamic-map vpn-dynamic-map 10
game of transformation-ESP ESP-AES-128-SHA-AES-128-SHA-LZS
Define VPNclient isakmp-profile
!
!
!
HostB-cryptomap 1 ipsec-isakmp crypto map
the value of 91.218.xxx.xxx peer
the transform-set hostb-transform value
PFS group2 Set
corresponds to hostb-address list
!
dynamic map crypto hostb-crytomap 65535-isakmp ipsec vpn-dynamic-map
!
!
!
!
!
!
Tunnel1 interface
bandwidth 100000
IP vrf forwarding vl199
IP 10.0.201.2 255.255.255.0
IP 1400 MTU
IP nat inside
IP virtual-reassembly
IP ospf network point
source of Dialer1 tunnel
destination 91.218.xxx.xxx tunnel
bandwidth tunnel pass 10000
bandwidth tunnel receive 50000
!
interface Dialer1
Description # PPPoE T-Online.
MTU 1492
bandwidth 50000
IP ddns update hostname it-s - dd.dyndns.org
IP ddns update it-s-dd_dyndns_org
the negotiated IP address
NAT outside IP
IP virtual-reassembly max-pumping 512
encapsulation ppp
IP tcp adjust-mss 1452
no ip mroute-cache
Dialer pool 1
Dialer idle-timeout 0
persistent Dialer
KeepAlive 20
No cdp enable
Authentication callin PPP chap Protocol
PPP chap hostname
PPP chap password 7
PPP pap sent-username
password 7 PPP ipcp dns request
card crypto hostb-cryptomap
Crypto ipsec fragmentation after encryption
!
!
local pool IP VPN 192.168.196.30 192.168.196.60
IP forward-Protocol ND
IP route 0.0.0.0 0.0.0.0 Dialer1 track 1
IP route 0.0.0.0 0.0.0.0 Tunnel1 20 Track3
IP route 0.0.0.0 0.0.0.0 Dialer1 254
IP route vrf vl199 0.0.0.0 0.0.0.0 192.168.1.251
IP route vrf vl99 0.0.0.0 0.0.0.0 192.168.3.1
!
The dns server IP
!
no ip address of the http server
no ip http secure server
TCP-time translation nat IP 3600
translation of nat IP udp-timeout 600
IP nat Pat_for_192.168.198.4 192.168.198.4 pool 192.168.198.4 netmask 255.255.255.0 type
IP nat Pat_for_192.168.200.50 192.168.200.50 pool 192.168.200.50 netmask 255.255.255.0 type
IP nat inside source static 5060 udp interface 192.168.200.50 Dialer1 5060
IP nat inside source static tcp 192.168.200.51 3389 3389 Dialer1 interface
IP nat inside source static tcp 192.168.198.4 3389 interface Dialer1 3390
IP nat inside source static tcp 192.168.198.9 interface 5000 Dialer1 5000
IP nat inside source overload map route dialer1 interface Dialer1
IP nat inside interface 13001 static udp 192.168.199.3 source Dialer1 13001
IP nat inside interface 32768 static udp 192.168.179.2 source Dialer1 32768
IP nat inside source static udp 192.168.179.2 Dialer1 49152 49152 interface
IP nat inside interface 64206 static udp 192.168.179.2 source Dialer1 64206
IP nat inside source static udp 192.168.179.2 interface 7597 Dialer1 7597
IP nat inside source static tcp 192.168.179.2 9998 interface Dialer1 9998
IP nat inside source static tcp 192.168.179.2 7597 interface Dialer1 7597
IP nat inside source static tcp 192.168.179.2 64206 interface Dialer1 64206
IP nat inside source static tcp 192.168.179.2 Dialer1 49152 49152 interface
IP nat inside source static tcp 192.168.179.2 Dialer1 32768 32768 interface
IP nat inside source static tcp 192.168.198.4 interface 443 443 Dialer1
IP nat inside destination list Pat_for_192.168.198.4 pool Pat_for_192.168.198.4
IP nat inside destination list Pat_for_192.168.200.50 pool Pat_for_192.168.200.50
!
Pat_for_192.168.198.4 extended IP access list
Note = Pat_for_192.168.198.4 =-
permit tcp any any eq www
permit tcp any any eq 987
permit tcp any any eq 143
permit tcp any any eq 993
permit tcp any any eq pop3
permit tcp any any eq 995
permit tcp any any eq 587
permit tcp any any eq ftp
permit tcp any any eq ftp - data
permit tcp any any eq smtp
Pat_for_192.168.200.50 extended IP access list
Note = Pat_for_192.168.200.50 =-
allow udp everything any 10000 20000 Beach
permit tcp everything any 5222 5223 Beach
allow udp any any eq 4569
permit any any eq 5060 udp
list of IP - VPN access scope
IP 192.168.198.0 allow 0.0.0.255 192.168.196.0 0.0.0.255
permit ip host 80.153.xxx.xxx 192.168.196.0 0.0.0.255
list hostb extended IP access list
permit ip host 91.218.xxx.xxx host 80.153.xxx.xxx
permit ip host 80.153.xxx.xxx host 91.218.xxx.xxx
permit ip host 10.0.201.2 10.0.201.1
!
!
access-list 10 permit 192.168.200.6
access-list 100 permit ip 192.168.0.0 0.0.255.255 everything
access-list 100 permit ip 10.1.0.0 0.0.255.255 everything
access-list 100 permit ip 10.0.0.0 0.0.255.255 everything
access-list 101 permit ip 192.168.199.3 host everything
access-list 101 permit ip 192.168.199.4 host everything
access-list 101 permit ip 192.168.199.13 host everything
access-list 101 permit ip 192.168.199.14 host everything
access list 101 ip allow any host 204.13.162.123
access-list 103 allow ip 10.0.1.0 0.0.0.255 any
!
dialer1 allowed 10 route map
corresponds to the IP 100
match interface Dialer1
!
!
####################################################################################################
SH crypto isakmp his:
status of DST CBC State conn-id slot
91.218.xxx.xxx 80.153.xxx.xxx QM_IDLE 7 0 ACTIVE
80.153.248.167
QM_IDLE 12 0 ASSETS ######################################################################################
SH encryption session
Current state of the session crypto
Interface: Virtual-Access5
The session state: down
Peer: port of 91.218.xxx.xxx 500
FLOW IPSEC: allowed ip host 10.0.201.2 10.0.201.1
Active sAs: 0, origin: card crypto
FLOW IPSEC: allowed ip host 80.153.xxx.xxx host 91.218.xxx.xxx
Active sAs: 0, origin: card crypto
FLOW IPSEC: allowed ip host 91.218.xxx.xxx host 80.153.xxx.xxx
Active sAs: 0, origin: card crypto
Interface: Dialer1
The session state: UP-NO-IKE
Peer: port of 91.218.xxx.xxx 500
IKE SA: local 80.153.xxx.xxx/500 remote 91.218.xxx.xxx/500 inactive
FLOW IPSEC: allowed ip host 10.0.201.2 10.0.201.1
Active sAs: 0, origin: card crypto
FLOW IPSEC: allowed ip host 80.153.xxx.xxx host 91.218.xxx.xxx
Active sAs: 4, origin: card crypto
FLOW IPSEC: allowed ip host 91.218.xxx.xxx host 80.153.xxx.xxx
Active sAs: 0, origin: card crypto
Interface: Dialer1
The session state: IDLE-UP
Peer: port of
55033 ITS IKE: local 80.153.xxx.xxx/4500 distance
55033 Active ################################################################################################################################
Error message:
020932: 2 Oct 21:55:14.459 CEST: IPSEC (validate_transform_proposal): No IPSEC cryptomap is to address local 80.153.xxx.xxx
020933: 2 Oct 21:55:14.459 CEST: IPSEC (validate_proposal_request): part #1 of the proposal
(Eng. msg key.) Local INCOMING = 80.153.xxx.xxx, distance =
,. local_proxy = 0.0.0.0/0.0.0.0/0/0 (type = 4),
remote_proxy = 192.168.196.32/255.255.255.255/0/0 (type = 1),
Protocol = ESP, transform = esp - esp-md5-hmac (Tunnel-UDP).
lifedur = 0 and 0kb in
SPI = 0 x 0 (0), id_conn = 0, keysize = 0, flags = 0 x 400
020934: 2 Oct 21:55:14.459 CEST: IPSEC (validate_transform_proposal): No IPSEC cryptomap is to address local 80.153.xxx.xxx
020935: 2 Oct 21:55:14.459 CEST: IPSEC (validate_proposal_request): part #1 of the proposal
(Eng. msg key.) Local INCOMING = 80.153.xxx.xxx, distance =
,. local_proxy = 0.0.0.0/0.0.0.0/0/0 (type = 4),
remote_proxy = 192.168.196.32/255.255.255.255/0/0 (type = 1),
Protocol = ESP, transform = null esp esp-md5-hmac (Tunnel-UDP).
lifedur = 0 and 0kb in
SPI = 0 x 0 (0), id_conn = 0, keysize = 0, flags = 0 x 400
#################################################################################################
I tried to understand where is my mistake, can someone help me find it?
Thank you very much
concerning
crypto map hostb-crytomap 65535 ipsec-isakmp dynamic vpn-dynamic-map
is the fault of typing in the name as in your original config?
--
Don't stop once you have upgraded your network! Improve the world by lending money to low-income workers:
http://www.Kiva.org/invitedBy/karsteni -
People,
Hello. I was installing HCM and Campus Solution 9.0 with PeopleTools8.53. Server machine is Oracle Linux 5.10 and Windows XP-based client computer. The architecture of my internet is WebLogic11g/Tuxedo11g/OracleDatabase 11 GR 1 material. PeopleTools 8,53 works correctly in the browser.In the database server Oracle Linux 5.10 machine, I run scripts 'createdb10.sql, utlspace.sql, hrcddl.sql, dbowner.sql, psroles.sql, psadmin.sql and connect.sql' one by one. Can I use Data Mover to load Windows XP data into the Oracle Linux 5.10 DB HRCS90 instance. The Data Mover script hrcs90ora.dms is done correctly in Windows XP. Configuration Manager is configured correctly. But when I login in the application designer, I can't connect and get the message as below:
«Security Table Manager (Get): the database is release 8.52.» The PeopleTools running require databases at 8.53 release. »
I followed the http://docs.oracle.com/cd/E37306_02/psft/acrobat/PeopleTools-8.53-Upgrade_02-2013.pdf document to upgrade HCM and HR 9.0 revision 5 Database Instance HRCS90 in Oracle Database Server with Linux. My upgrade is complete. The above problem is solved.When I login in the application designer in Windows XP, the error message as below:
File: E:\pt853-903-R1-retail\peopletools\src\pssys\stmget.cpp SQL error.
Stmt #: 2539 error Position: 26 back: 904-ORA-00904: "OPERPSWDSALT": invalid identifier:
Fail SQL Stmt:
Select the VERSION, OPERPSWD, OPERPSWDSALT, ENCRYPTED, SYMBOLICID, ACCTLOCK from myAccessId.PSOPRDEFN where OPRID =: 1
When I boot the Tuxedo Application Server Domain HRCS90 under Linux, I get the same error message as below:
File:/VOB/PeopleTools/src/pssys/stmget.cpp an SQL error:
Stmt #: 2539 error Position: 26 back: 904-ORA-00904: "OPERPSWDSALT": invalid identifier:
Fail SQL Stmt:
Select the VERSION, OPERPSWD, OPERPSWDSALT, ENCRYPTED, SYMBOLICID, ACCTLOCK from myAccessId.PSOPRDEFN where OPRID =: 1
... ...
GenMessageBox (0,0,M): Signon database: could not access the HRCS90 database with user Psalm code
I checked the PSOPRDEFN table in the database Linux HRCS90, not the OPERPSWDSALT field.
I also checked the connection process PS the user traverses the 3 tables: PSOPRDEFN and PSACCESSPRFL, PSSTATUS.
My oprid, the symbolicid and the accessid ownerid in the 3 tables are correct.
My question is:
Why is there a strange OPERPSWDSALT field in the SQL statement that causes Signon failed? How to solve the problem of access code?
Thank you.
> Then it connects with SQL > and then run script rel853.sql, but its outcome is not just because the database is started with sysdba.
The database is always started '' as sysdba. '' "Useless" to connect as sysdba to run the PSoft script while accessid.
You need to come back in the book of the Oracle.
Fair enough, this is my last word to this thread.
Nicolas.
-
A few questions about the design of Data Guard
Hi, I have a few basic questions around design Data Guard
Q1. Looking at the instructions of Oracle for the creation of a logical standby, he recommends first creating a physical standby and then convert waiting logic. However, I thought that a logical standby might have a totally different physical structure of the primary. How can this be the case if a logical standby first starts his life pending physical (where the structure must be the same)?
Q2. It is a normal practice to back up your database before as well - if yes why?
Q3. Can RMAN back up a database of the day before while he is in the State mounted (rather than opening it)?
Q4. What is the point of cascade redo apply rather than just get the primary ship to each standby?
I guess you could try to reduce the latency of node to node if some the day before were quite remote from the primary
Q5. Is it possible to convert a physical logical Standby?
Q6. What number best of Standby, you can have - Oracle suggests 30 but I thought I remember reading somewhere regarding the 11 GR 2, that this limit has now been increased?
Thank you
Jim
Hello again;
"begins each logical waiting first her life on hold physical?"
Its the only way I ever did. I think it is the simple way to do it. By the presence of a physical standby first you have already confirmed the network and most of the settings for Data Guard so that you can focus on only the logic of the standby database configuration.
Chapter 3 of this book, it's easy:
http://www.Visi.com/~mseberg/data_guard/new_dg_book.html
Best regards
mseberg
-
Question about new design java GUI tools
I don't know where to put the Question
I want to tool or packages to build java GUI that are quite similar to wpf
I want a tool that provide not only the code of desinging
is tool containing all these things
nice design, easyhttp://www.Eclipse.org/WindowBuilder/
-
Question about the design of conditional text
Posted in the wrong forum, post again here.
I have a relatively important book (230 pages) with dozens of tables and 100 graphics. I need 4 versions of this book. One for each grade level (3) and the other if happy for all 3 grades is sold as a "master class". Other than the implementation of conditional text, the book is ready to go. I tried two different ways to approach the tables under certain conditions (some of which are within blocks of text, some just anchored to a page) but I do not quite understand. Application of conditional text tags (with different colors and markers for each) seems to crash (i.e. almost duplicatable unlike the grave 'normal' down 3-4 I feel daily last month that are just randomly). Sidenote: I was very happy to see that they will solve the crash of book printing...
Reference markers are involved in these conditional sections, and I have my suspicions that they are guilty of the root of my other problems of crash, but then FM crashed when applying conditional text to a section that * don't * have a x - ref, so I don't know what to think.
I need to get out Monday. So my question is, if I need 4 tables in one page (one for each version) I better just do 4 copies of the book and the compilation of this way? I sold the customer on FM mainly due to the ability to compile several book of basic documents... so, I really hate to have 4 copies when I give the source. I know that you can select rows in a table for a version (so I could do a very large table for 3 versions and simply choose different lines), but this is one thing that seems almost certain to make it crash as well. And the paintings of masters have an extra column, but also a line so I still need 2 tables by doc so I could get the conditional statements to stop crashing. Is there a better way to 'design', which could suggest an experienced FMer? Some custom utility which works even if it isn't free?
Just in case someone asks:
The system configuration
FM 11
new facility in August, not upgraded
All the files are originally from FM11 and new
Windows 7-64 bit
20 GB of memory
2 TB - local disc c /.
Thanks for your suggestions on this.
Well, it didn't crashed this morning when I put the x back references in the conditional table. Sent to fmerror with the steps for dupe.
But on the mif wash. I've done it "manually" once a week now for the last two weeks. Can't say if it is to help, but it is always recommended, so I do. However, I was wondering if anyone had a recursive script that would do this automagically...
Thank you
Laurie
Edit:
Search mif washing (and variants) and nothing gets on the Adobe site. I figured out through a vague reference to an old thread where to find it and thought that I note for new users: If there is...
Book MIF Wash is that a utility provided by Adobe that recursively traverses all the files in your book, opens, writes the .mif file then re-recorded this file to your FM - washing apparently file everything watered in your FM file. Manually, this process takes forever. And even if you see frequent references to: did you do a mifwash yet? "when someone has a problem, there is no documentation on what I found.
It is a "sample" allowing Adobe script.
Go whenever you have installed FrameMaker and navigate to the BookMIFWash folder or browse to the file BookComponentMIFWash.dll, which in my case was to C:\Program Files (x 86) \Adobe\AdobeFrameMaker11\Samples\ScriptsAndUtilities\BookMIFWash.
Copy the file BookComponentMIFWash.dll in C:\Program Files (x 86) \Adobe\AdobeFrameMaker11\fminit.
Restart the console.
Then you will see that nothing has changed. ;-)
You must select the book with your mouse in the Document window, and then the menu item utilities book "dynamically" appears. Down there, you will find some MIF Wash book.
I always pay attention to the warning to make sure that I have a copy of the entire project before running it. :-)
Hope this helps someone else.
-
Hi, I'm working on my first blackberry and I'm running difficulties with my design decision, so I hope someone could clarify.
Every time I have airs in .net, I would use the MVC pattern. My will would execute a custom event defined in the regulator and I think could capture this event. However, I don't know how I can do this for blackberry. I have a text in my view field and a class that extends buttonfield in the model. I would like to set the button to have some effect on the text field, but I don't know how to get the message without the screen to each button.
How is this bit?
Thanks for your help
Well technically the best design is a Singleton model, but to be honest, I don't know how they actually work. It all depends on how you look at. This global semi variable are not available outside of an instance of your application, and you are not likely to have a large development on a BlackBerry app team, so the chances of your loss of its security program or stability due to the interference is low. I know that experienced programmers and professors who are religious opposition to global variables, but they certainly have their place, and I see no problem with taking advantage of this feature you are proposing. The key thing to remember for the development of BlackBerry, it is that mobile devices are not as powerful as a PC or console. Developers are encouraged to take advantage of multi-threading to maximize efficiency and avoid the garbage collection (in other words, create variables with limited scope that are released from memory. This memory must be systematically freed by the garbage collector). Another good practice is to stick to the condensed syntax (aka shortcut).
For example:
If (event) {/ * action * /}
Instead of...
If (event == true) {/ * action * /}
Hope that helps,
~ Dom
-
VPN - question of General design for a ut of a router tunnel more
Hello
We have a router that has VPN connections with different partners of our company. VPN remote access were used on computers that are connecting to the different partners of our company.
There has been problems of this kind, that is to say put on both a watchdog and a customer vpn cisco router led to blue-screens on the PC.
The current idea is to put different tunnels from site to site on the router (default gateway of PC clients that connect to the partners). My question is... How our PC to get DHCP addresses on networks of visitors, once the tunnels are up? I guess I'm alittle confused about the address for the PC on our side how will work.
Thanks for your help.
Divide the pool of ip from the internal network, you're going to visit. for example the document below will be exaplain the same configuration in user mode.
Maybe you are looking for
-
Boot Camp will not install on Windows 10 (end of 2015 imac)
Bought an imac 27 "5K retina, end of 2015 1 TB - (not the Fusion drive) OS X El Capitan All applications are updated on both OSX Version of Windows 10 Education loaded 64 bit ISO file (3 times 2 of 1 Flash of office) After loading Windows 10 - instal
-
step to fix windows update error number: 0x80072EFD
Need to know what steps to take to correct the following windows update error number: 0x80072EFD
-
I need help for sound on my desktop back. Help, please
-
I have my touchpad disabled, when the present mouse, randomly re touchpad allows
My touchpad disabled randomly re allows, with my hung wireless mouse. usually at the wrong time like in the middle of a battle over a game making me do right or left clicks or other things I won't do. He also re active on a start or restart and works
-
Screen flickers black when you use Photoshop CC 2015
I am under Photoshop CC 2015 with a 13 inch, Macbook Pro late 2013 OSX 10.10.3My screen flashes black when I use the program (really bad with the text tool)How can I avoid this / solve the problem?