Ring containing symbols

In l'exemple...\examples\general\listbox.llb\Properties Tutorial.vi, there is a constant of the ring of symbols.  How this ring was generated?

Add the symbols with the symbols of the listbox Item property.  There is a Listbox symbol ring Constant that contains the symbols; I just use a loop for simplicity.

Tags: NI Software

Similar Questions

  • How do you create a message rule in outlook express when the subject line contains symbols

    I get emails when the subject line contains square boxes.  I tried to create a message for when rule the subject contains these square boxes, but cannot do so.

    Any suggestions?

    Thank you.

    Then, it will not work. Unless the messages are always of the same address, or a domain, so the only option I see is of filter in your mail.

    Start with the only rule of AddressBook and you receive a message that you want people not in your address book (E-mail from companies, bills, your ISP, etc), you can add them to the rule.

    Tools | Message rules | Mail | New.

    Box 1 - Where the From line contains people {check it out}

    Box 2 - Check: delete it & stop processing more rules if you want messages not in the address book to go to deleted items, or you can create a spam folder and direct them here.

    You can choose to delete the server, but be careful because you never have messages downloaded to any folder, if you choose this option.

    Box 3 - Click on the blue words contains people

    Click on the first address to select it. Scroll to the end and hold down the SHIFT key while you click the last address. This will highlight all. Right-click on it and click on from the menu that appears.

    Now, click Options and choose: Message * contains no of * the people below in the top of the page Options area, then choose: Message corresponds to one of the people below in the background Options box.

    OK your way out of the new rule.

    Now, only the addresses that you entered will be uploaded to your Inbox. You won't see other emails.

    Remember, if you add a person to your address book, you must add to the rule. It will not automatically be added.

    Be sure to see these links for more options.

    A few tips:
    http://insideoe.tomsterdam.com/tips/rules.htm

    Control junk e-mail in Outlook Express:
    http://www.Microsoft.com/Windows/IE/community/columns/junkmail.mspx

    Message rules does not? :
    http://www.insideoe.com/FAQs/why.htm#rules

  • Install issues with C:\Users as a symbolic link to D:\Users

    I discovered this problem earlier this year, but has been recently bitten by it again, so I thought I should report it.

    I have 2013 LabView student which was delivered with a Sparkfun Arduino edition. My computer has an SSD as C: and a magnetic HDD as D:. I am familiar with Linux (Debian) and like the idea of users being entirely on a separate OS drive install to do the backup not only data, but also my easiest settings. I have my entire users folder on D: and a symbolic link (mklink j) on C:. Nothing that I have installed or used seems to have a problem with this configuration, until I first tried to install LabView 2013. The installer actually converted the symbolic link to a directory which as you can imagine all sorts of things in Windows. I have to go in recovery to resetablish the symbolic link mode.

    I got there, but recently installed Packager NI 2014 so I got to spend the last LINX and came across the same bug. (Installation of the latest LINX has not triggered the bug, just installing MPON.) Finally, I reaiized what has been wroing after panic that someone sniffed my network traffic and hacked my Microsoft account because I had just used a public WiFi at a local library without sending my traffic via an encrypted VPN tunnel...

    I don't know how to get more details about this bug, and I'm really not want to try to reproduce due to the dispute must recover. I hope someone in the NC can it track down and crush.

    SymbolicLinks under Windows using for Installation of the program paths is strongly discouraged by Microsoft itself as it break various things, not only confusing installers. They that prohibit specifically for several places because of that. Symbolic links, theoretically possible since NTFS v3 only appeared in Windows Vista and are even in Windows 7, a feature and not hidden. Hidden enough that it is not used often and he still has many quirks.

    Windows Installer Component and component Wiindows Services still are struggling to work correctly with symbolic links, which makes it difficult for software developers to create standard installers who can actually work correctly when targeting paths that contain symbolic links.

    Your Linux background very probably plays tricks on you. While symbolic (and difficult) links are an inherent feature of almost every Unix file system driver since its inception at the beginning, it is still a feature rarely exercised under Windows, except for some internal virtualization of Windows files to the locations of user files.

    A lu interestying is this wiki article whiich details some of the possible problems with symbolic links even under the most recent versions of Windows. For example, it is interesting to note that redirect the program basically files will be an upgrade of Windows fail catastrophally.

  • Import data from text file of control of the ring.

    Is it possible to import data to a text ring with labview control.

    I have several definitions of register in the ring controls, but manual entry would take a lot of time.

    Was wondering if there was more automatic way, I could read the values from a file.

    Thank you

    Jim

    Using the first method gives you the ability to extend such that each column specifies a control of the ring if you need fill the multiple rings.

    This example assumes that all of the three rings contain the same number of elements. If this isn't the case, you will need to create a Subvi, which removes the empty elements. [Edit - create a text file that contains a column for each ring, separated by a tab character.]

  • Text of adjustment in a cluster ring

    I have a cluster that has multiple controls text ring inside and I want to programmatically set the text of each of the rings.  So far, I have been create nodes of property for each of the ring controls and setting the values of string for each with a table (see attached code).  This works very well for some controls.  I want to use my code has seven rings; the only property nodes eat a ton of screen space in the block diagram.  I would like to pass a reference to the cluster to a Subvi and fill the text of all the rings it.  However, I can't access the nodes property of the controls of individual ring the Subvi.  (code attached as an example of this as well).

    Is there a way to access the properties of text ring via a reference to cluster?

    A little history: my genuine ring controls are labeled "Tag name", "Time Stamp", "File Name", etc. Each ring contains a list of items that are synchronized with the other rings.  If a user selects the point 3 "Tag name" ring, then point 3 in other rings will be also shown.  All remains synchronized on the screen.  I looked at using a 2D array, but I want the user to click the list and select items - exactly what the ring control.

    Thank you-

    -dennis.

    Convert the control reference to a more specific class.  In this case, a class of the ring.

    This will work as long as all the controls in this group are the rings to set the values for.  If you have other items in this cluster, you will need to browse and see if they are one of the rings that you want to work.

  • How to import symbols (α, β, γ, δ, etc.) of a file xml for indesign

    Hello world...

    I have an xml file that contains symbols such as α, β, γ, δ, etc..

    I want to import this xml file with symbols in the Indesign document,

    symbols should appear under the name appearing in the xml file, they appear as empty space.

    Is it possible, if possible then please tell me...

    Thank you very much in advance...

    I have a solution to display mathematical symbols in the indesign document.

    By setting the "Minion Pro Regular" Style so that the symbols...

    Thanks for looking at my Question...

  • AS a symbol of change operator for [all characters]

    I have an input parameter that contains symbols ' * ' (asterisk), example:

    i_search_par: = ' country * Street ';

    I'm going to interview:

    Select * from SearchTable
    where col1 like i_search_par;

    I want only the "*" would act in the same way as '%' - symbol in AS operator.

    So I want this query returns results:

    'country 1 Street '.
    'country 200 Street '.

    and so on.

    What is the best way to achieve that "*" will be interpreted as a "any number of all symbols"?

    Maybe I can say something like:

    SET SESSION ANYCHAR SYMBOL = «*»
    And after doing that Oracle includes in AS operators of this star symbol is as I want?

    Or should I really string replacement by replacing ' '%' to ' * ' in 'i_search_par' and other 30 these variables?

    I want only the "*" would act in the same way as '%' - symbol in AS operator.

    You can simply use"oracle text" with a suitable text index:

    SQL> create table t
    as
       (select 'country 1 street' str from dual
        union all
        select 'country 200 street' from dual)
    /
    Table created.
    
    SQL> create index t_idx
       on t (str)
       indextype is ctxsys.ctxcat
    /
    Index created.
    
    SQL> var i_search_par varchar2(40)
    
    SQL> exec :i_search_par := 'country * street'
    PL/SQL procedure successfully completed.
    
    SQL> select * from t where catsearch(str, :i_search_par, null) > 0
    /
    STR
    ------------------
    country 1 street
    country 200 street
    
    2 rows selected.
    
  • Main E-mail address problem

    Hi girls & guys.

    I have a slight problem, well a major problem. I have been using my e-mail address by satellite (tv providers) for those who may not be the same in their countries as I suppose you good people are from all worldwide its big cable. This TV provider is huge in the United Kingdom. Not only are they doing television, but they also make Internet access as well as telephone services at home that we chose to opt for a month later, when a huge bill came through and we use it only for calls that my supplier of laptop would cost more than calling. After receiving the first invoice we chose but kept the tv and internet.

    I know you think that you don't need the above info but think back to these discussion forums, I saw people asking for answers more so I hope that there is no need for that if I gave enough details.

    Since we had these services just like any other company offering them we got an e-mail address. I have published for use this email address since we signed. This goes back years and years like I said when the first iPhone came out, and then the App Store introduced.

    A good 18 months ago we changed internet service providers - our region finally got fiber ultra high speed of downloading music from iTunes in about 30 seconds flat if less. Movies about 5 minutes. I would never like to look back.

    I asked the supplier because I had changed my internet to another provider at the time good old Richard Branson was the only one to do these speeds for a higher price, but not all areas, until a supplier came out the woodwork that he offered at a reduced price and he was soon in my area.

    Immediately, I got on the phone with my previous provider of broadband and asked them if it was the end of my e-mail address. They assured me that as long as I kept their television services that I would be safe.

    Heres where my troubles begin.

    I was in bed sick. I woke up. Like most of the people when he is sick in bed I decided to check my email. I have a few email addresses. Work, Spam - these types of companies who send about 5 emails per day, but you are interested in their products. Emails that have as much security as the texts on your phone.

    Yes, I'm much a Virgin who likes things just right. Everything must be organized... I wish I thought of that when choosing my MAIN e-mail for my multiple iOS devices. That there are 6 in total in the House Inc. my new iPod touch of girls and one released beforehand and his iPad mini. She can't bear to get rid of its updated iPod touch and play constantly with my iPad pro. We do a tradition mother & daughter to watch the new Apple on Apple TV events. My husband can not seen related within a new phone or iPad. I myself change phones whenever they go out but tend to not buy the new iPads exuding the iPad pro masterpiece. I used the iPad 2 for many years, mainly for playback. When I heard of the watch and the new Apple TV I have. They are the way of the technology. so I paid a small fortune to my horror of husbands. :-)

    NOW TO THE REAL

    IGNORE THE ONE ON THE TOP. AHH I HAVE REVISED THIS TO SHOW HER THE ORIGNAL POST. IT SEEMS UNFINISHED. HERE IS MY NEW POST. IF A MOD CAN DELETE THE FIRST I'D LOVE. IM NEW LIGHT DIDN'T NEED HELP BEFORE AND THOUGHT I COULD REMOVE THIS ITEM. HERES ONE REVISED. SO SO SO SORRY

    Hi girls & guys.

    I know you think you probably don't have much info, but looking at these discussion forums, I noticed people ask more questions so I hope that there is no need for that if I gave enough details and you kind folks can help me.

    After all I am deeply upset that not only did I will be affected but my 9 year old daughter who is the grumpy genius for her age and she is known for this reason and his school even knows its potential and the Apple cult. So many things so she could spend hours in the store and really wants to take kids coding courses and even other classes that apple has to offer. She's on my icloud family to very difficult to buy for Christmas instead asks apple in that train to be only cases to cables. The kid is obsessed and goes as far to have wars with his father on android that it initiates. Steve jobs is a God for her and will buy magazines for Apple technicians. I guess it's my fault for letting his play kids apps as a child, so she threw his toys and to achieve peace, I bought his first iPod touch

    I have a slight problem, well a major problem. I have been using my e-mail address of satellite (tv providers) they also make phone broadband and at home as a reduced rate if you have all three. Then after searching this bundle was the cheapest option.

    Since we had these services just like any other company offering them we got an e-mail address. I continued to use this email address when we signed. This goes back years and years like I said when the first iPhone came out, and then the App Store introduced.

    Previosly that while at the time where Bebo was the major social media of the era that preceded the iPhone hacked my msn email well. After having contacted them, they told me there was nothing to do.

    A good 18 months ago we changed internet service providers - our region finally got fiber ultra high speed of downloading music from iTunes in about 30 seconds flat if less. Movies about 5 minutes. I would never like to look back.

    NOW TO THE REAL PROBLEM

    In hindsight I should have subscribed to a secure e-mail. Later, I received an e-mail from my TV provider that Yahoo was now the main source of the email. I could connect via yahoo and my address of providere tv.

    Even though I had a very strong password I changed every few months containing symbols as letters and numbers, it seems that Yahoo is not at all certain and they hacked as I discovered thanks to a search when my iPhone asked me to put my password. Later, I went on my tv providers email and my password is not valid. So I tried the same yahoo. Then, I managed to change my password by an alternative email. That seemed to do the trick...

    Until my partner received a strange e-mail telling him he could make thousands online. Since this is my email he opened. It contains no content malious, but he went to meet ask me "what you send me" and saw that the reply address was completely different.

    On hearing this I wrote then a password that I don't even remember. I do not store on my phone. I never told anyone and I put it in my safe should I need because it was a welcome e-mail and not necessary for work and does not have all the notes beside her.

    Since the space of 4 months, I had to change twice. WHY THESE PIRATES CAN GET IN.

    Before these events August 2015, I received an e-mail from Apple telling me that my icloud had used a device that was not recognized and ignore if it wasn't me. That day, I was sick in bed at 9.04 and my partner was at work that does not allow you to access things on a computer.  If necessary access I would just access it through the address main iCloud I have used twice. Even my iCloud email has not been given. I hardly use it. Although I can change that because my old e-mail address is a responsibility.

    I took immediate action on my Apple ID. I changed my security questions and the password. Asked for a check of the 2 step. Change my phone number because those people might find a way to get my number. I made sure my PIN code is sent via my new number or the devices that I use.

    IT WORKED a TREAT - I'm extremely lucky that they never blocked my access to my Apple ID after research they could do this.

    I'm now very careful to change my password. I went as far as contacting the apple team on my ID. They told me I had done the right thing and could see that I changed the reg passwords. It was a little bit of time before I start to have problems of electronic mail at least 3 weeks before.

    WHAT CAN I DO

    As I have explained above my TV provider changed their accounts with yahoo, but forever be able to connect via the address through my tv provider and my ex provider broadband. It is not without danger. This time the password changed again. However, I stupidly changed the security issue and could not change. It seems that I'm locked unless I have a phone number. It will be hard to do since I am with their services.

    I think they can ask me to change my email address but I still have contacts there and so on. So that they could keep the account open just for this reason.

    THE FIRST IPHONE WAS RELEASED IN 2007

    Can you imagine losing all your data that you have spent thousands on since then all be wiped as I guess I would need to put in place a new ID to a protected e-mail address as security iPhone that has a verification of the 2 step like Google owes much to my relief.

    My daughter would lose all his tricks for? It does not download everything I do. It would still show on the cloud if I got a new ID and put it in the family? I would then be able to delete my original account and continue with my new name?

    I know some time ago very very long before Apple had iPhones and others that my friend found his music, but it was something unique. This will come back some time ago. Only, she was extremely on the moon as they never do this, but she was an avid collector of music and crying. I've see it ask and don't know even it was not what a friend. It was well before iCloud. They said that they would do it.

    Surely, there must be a way to turn it. Like all transactions that I bought through my card number and even kept receipts of all I bought the iPhone, etc. and be able to put my new ID by family in icloud. Surely other people emails were hacked. I still find a rude apple employee. Even the community of support here is really nice. Regardless of the question.

    I'm extremely sorry for the long post. I thought that if I developed a little bit more to show what I did. Maybe someone can help me in my perdicument.

    Thank you

    Sam

  • Properties of a chart legend

    Hello!

    There is a simple XY Chart with legend on attacched photo; in the legend, the index display is visible. I would like to read the index by a knot of property or something like that, but I'm not able to find the appropriate property node or a way to do it programmatically in my VI.

    Any suggestion?

    Thank you

    Antonio

    Hi Antonio,.

    I don't think that display index legend could be used in such a way, because the index in legend display helps us tell what index plot the legend is not as input. Maybe using a table / control ring containing the name of the parcel could help you achieve the same result. Here, I have attached an example for you. Hope this helps.

  • VI appellant

    If a vi is suspended in case of appeal or has a breakpoint in there is there a way to see who calls it vi? I'm debugging then is not a function but a tool.

    Thank you

    JVH

    When the VI is suspended a new element appears.

    Beside the button control debugging (input / output of the step ) a control of the ring is shown, this ring contains the exact list of callers (call chain) for this particular race.

    Tone

  • Windows search works is not as expected

    Why windows search return results that do not include the string I searched for?

    I told windows to search files, as well as in the sub directories. I added the suffix. PLM to the list of files to search for.
    I'm looking for a directory for files containing the string "settings.h", and one of the files that is my main.plm file. When I open this TextPad and search for the string "settings.h" in this file is not there.

    Why Windows gives me this fallacious result in searches? As a programmer, it is important to be able to search through a lot of files for strings to see where they are referenced. I would expect Microsoft as a software company to understand this requirement and why it is important.
    Thank you
    Mark

    I think that period is not sought specifically for and 'settings' and 'h' are treated as strings to search for in any order.  This search syntax to find the strings that contain symbols such as periods:

    Content: ~ = "Settings.h"

    However, the extraordinary ~ = syntax does not work for the content of the files that are located in areas that are indexed.  It is strange that we have indexed the content property syntax work only outside areas, but that's what we have.  This deficit is one of the reasons why I have completely disabled search indexing.  However, with indexing disabled, we are not able to retain or add manual of new additions to the list of searchable files specified by exenstion.  It might be appropriate for keep you to keep indexing on but these files in an area not indexed together.

  • How do I search for special characters in the Explorer?

    I have a collection of 1000 + files in an FTP folder. The problem is that about 50 of them contain & symbols in their file names. I need to find and delete all the files containing the symbol '& '. I thought it should be easy enough to search for the symbol '&' File Explorer. However, in doing so, nothing happens. It returns all files. Is it possible to search for special characters like '&' in the file Explorer?

    Type filename: * & in the Explorer search field, it finds all files where appears the & character in the file or file name extension.

  • ASM different label in v$ asm_disk. Path and v$ asm_disk.NAME

    Grid below Version: 11.2.0.4

    DB version: 11.2.0.4

    Oracle Linux version: 6.4

    We have a 2 node RAC cluster.

    For a disk of particual, in general, what is mentioned after ORCL: in v$ asm_disk. V$ asm_disk. Name and the path column are identical.

    Example:

    PATH NAME

    ------                   -----------

    ORCL:DATA21 DATA21

    But in this specific cluster, I can see several discs with the label differs between the $asm_disk. V$ asm_disk. Name and the path column

    Example:

    PATH NAME

    ------------------------- --------------------

    ORCL:ARCHIVE1 CMS_ARCHIVE1

    SQL > select path, name, GROUP_NUMBER, TOTAL_MB/1024 FREE_MB/1024 from v$ asm_disk by CSA 1,2;

    PATH NAME GROUP_NUMBER TOTAL_MB/1024 FREE_MB/1024

    ------------------------- -------------------- ------------ ------------- ------------

    ORCL:ARCHIVE1 CMS_ARCHIVE1 1 100 99.9882813

    ORCL:ARCHIVE10 CMS_ARCHIVE10 1 100 99.9882813

    ORCL:ARCHIVE2 CMS_ARCHIVE2 1 100 99.9892578

    ORCL:ARCHIVE3 CMS_ARCHIVE3 1 100 99.9892578

    ORCL:ARCHIVE4 CMS_ARCHIVE4 1 100 99.9863281

    ORCL:ARCHIVE5 CMS_ARCHIVE5 1 100 99.9892578

    ORCL:ARCHIVE6 CMS_ARCHIVE6 1 100 99.9882813

    ORCL:ARCHIVE7 CMS_ARCHIVE7 1 100 99.9902344

    ORCL:ARCHIVE8 CMS_ARCHIVE8 1 100 99.9902344

    ORCL:ARCHIVE9 CMS_ARCHIVE9 1 100 99.9902344

    ORCL:DATA1 CMS_DATA1 2 500.000977 59.1601563

    ORCL:DATA10 CMS_DATA10 2 500.000977 59.1513672

    ORCL:DATA11 CMS_DATA11 2 500.000977 59.1542969

    ORCL:DATA12 CMS_DATA12 2 500.000977 59.1591797

    ORCL:DATA13 CMS_DATA13 2 500.000977 59.1484375

    ORCL:DATA14 CMS_DATA14 2 500.000977 59.1523438

    ORCL:DATA15 CMS_DATA15 2 500.000977 59.1621094

    ORCL:DATA16 CMS_DATA16 2 500.000977 59.15625

    ORCL:DATA17 CMS_DATA17 2 500.000977 59.1455078

    ORCL:DATA18 CMS_DATA18 2 500.000977 59.1542969

    ORCL:DATA19 CMS_DATA19 2 500.000977 59.1601563

    ORCL:DATA2 CMS_DATA2 2 500.000977 59.1503906

    ORCL:DATA20 CMS_DATA20 2 500.000977 59.1552734

    ORCL:DATA21 DATA21 7 500 383.53125

    ORCL:DATA22 DONNEES22 7 500 383.507813

    ORCL:DATA3 CMS_DATA3 2 500.000977 59.1464844

    ORCL:DATA4 CMS_DATA4 2 500.000977 59.1435547

    ORCL:DATA5 CMS_DATA5 2 500.000977 59.1630859

    ORCL:DATA6 CMS_DATA6 2 500.000977 59.1533203

    ORCL:DATA7 CMS_DATA7 2 500.000977 59.1572266

    ORCL:DATA8 CMS_DATA8 2 500.000977 59.1513672

    ORCL:DATA9 CMS_DATA9 2 500.000977 59.1621094

    http://docs.Oracle.com/CD/E11882_01/server.112/e18951/asmcon.htm#OSTMG94059

    When you add a disk to a disk group, you can assign a name of Oracle ASM disk or Oracle ASM automatically assigns an Oracle ASM disk name. This name is different from the name of path used by the operating system. In a cluster, a disc may be assigned names for devices of the different operating system on different nodes, but the disc has the same Oracle ASM disk name on all nodes.

    To clarify:

    For discs ASMLIB, the default disk name ASMLIB name which is the label of the user of the disc; for example, mydisk is the default name of the ASM disk for ORCL:mydisk . However, you can also add disks using the diskgroup to create sql command where the NAME clauses allow you to explicitly assign the names of the disks rather than the default names generated by the system, such as/dev/disk1. As far as I know, asmlib createdisk command will give an error if you try to use a disk that has already been instantiated. The disc ASM is physically written in the header of the disc.

    How the discs were added. The ORCL: path points actually to/dev/oracleasm that contains symbolic links to the actual path of the disks. Perhaps ASMLib was added to the system, and these links have been created manually?

  • How to ignore special characters in OSB

    Hello gurus,

    I have a situation where my application source data contains '&' symbol and will have to pass this as-is at my request of destincation thru OSB where my payload has about 250 items.
    some body can help with that.

    Kind regards
    KK

    Please see the W3C recommendation...
    http://www.w3.org/TR/2006/REC-xml-20060816/#syntax

    The ampersand character (&) and the left angle bracket (<) must not appear in their literal form, except
    when used as markup delimiters, or within a comment, a processing instruction, or a CDATA section. If
    they are needed elsewhere, they must be escaped using either numeric character references or the
    strings "&" and "& lt;" respectively.
    
  • Language of expression in Jsp problem

    Hello


    I use EL for the values stored in the session to display in the JSP page. I can get the values of the session, but when kept in a jsp to a hidden variable page, the values are interrupted if it the value contains symbols like "", [], &

    I get values in the session and store it in the page like that.

    * < input type = "hidden" name = "description" id = "description" value = "${sessionScope.description}" / > *.

    "When the value of the variable (description) is having characters of endpoints like /" & break it.

    I get the description of a page and store it in the session and return to the page in this way.

    Is there a fix to this problem?

    Use the tag instead of EL evaluation capacity integrated container. With c: out, xml escaped by default, so no ' will be replaced by "and so on.
    {code}
    ">
    {code}

    RAM memory.

Maybe you are looking for

  • When I hit the play button to a voice message, it does not play

    I have an iPhone 5 and trying to listen to voice messages, it won't play.  I hit the play button (arrow) and the button show break but does not do anything, and the number of bands/message remains the same.  How can I fix it?

  • Default phone number...

    Hello... I have recently acquired the Backflip and fell on my 1st problem. On one of my contact number of the person (linked to blur and FB) has a ' / ' in the middle of the number (which does not allow me to call or txt this person)... I seconded th

  • Dvdram PavilionDV7 does not work

    Hello I have a problem, one of my friends has the laptop HP Pavilion DV7 - WY023EA #ABH. Everything was fine, but now dvdram does not work. In Solution Explorer, there is only hard drives, no optical device. When I open the Device Manager, I can see

  • What shouldI buy?

    I'm trying to find a printer that I can be able to print multiple business cards and invitations, without spending too much on ink. How do I know where to look, what features should I consider, etc.. ? Thank you!

  • SplashID - do not launch

    Hello world. I am new to the palm community. I thank all help... I downloaded SplashId and put all my entries in as soon as I got my home phone. It works great until I installed the new update. When I click the icon, there is just a white screen. I d