Monday, January 31, 2011

PaperShow for Teachers is a Big Hit at MacWorld 2011

I'm back from spending a couple days in San Francisco at MacWorld 2011. MacWorld 2011 was very well attended and it was great having the opportunity to speak to so many educators at the Canson Booth, as we demoed PaperShow for Teachers. It was very energizing to watch so many people get really get excited about the product and the solution that we were offering. Many teachers liked the fact that they could walk around with the notebook and were not chained to the front of the classroom. We had other educators who really liked the idea that it could be used to annotate Keynote or PowerPoint presentations. Others were excited that they could use PaperShow for Teachers when they are doing webinars and online learning.

While I was MacWorld 2011 Conference I was interviewed by Mike Schramm from the The Unofficial Apple Weblog which was streamed via UStream. I had a chance to demo PaperShow for Teachers and share with the audience a thing are two about the program. You can watch the interview below.

Sunday, January 30, 2011

Where have all my desktop icons gone?

Windows offers the facility to hide all the icons on your desktop. The default option is to show all desktop icons, but this may be switched off either by accident or on purpose. To change this setting simply right-click on the desktop and a menu will appear.

On Windows XP you need to open up the 'Arrange icons by' sub-menu and then either tick or untick 'Show Desktop Icons'.
On Windows Vista and 7 the option is available in the 'View' menu.

Saturday, January 29, 2011

Post weekly (weekly)

Thursday, January 27, 2011

A Fun Teachable Moment Today

I had the pleasure of visiting a school near here today to see the kinds of activities that the teachers and students were doing with technology. One of those classes was being taught by a third year teacher. He is the Special Education teacher there, and he's been using the various technology tools in some powerful ways with his students. They have a moodle class set up, and when they're in the lab they're totally focused on the tasks at hand. It was something to see.

But that's not the story.

They were studying water pollution and I sat down beside a senior boy and  asked him to show me what he was doing. He was fine with that, and he showed me the moodle class and "... all the stuff we can do in there." When I saw the title of the chapter they were in, I mentioned that I had seen a picture recently about the world's most polluted river. As I was talking about it, he opened a new tab and googled, "worlds most polluted waterways." He then clicked on the images link at the top. I hadn't suggested it; he did it on his own. As he did, I wondered, "How many times would he have done that in class if he had the opportunity to explore the ideas the interested him?"

The first image he found was this one: http://seawayblog.blogspot.com/2009/03/manilas-floating-rubbish-dump.html and the other images on that page. Then he found this one: http://www.abovetopsecret.com/forum/thread576911/pg1(the second image on the page). He sat there and stared in silence at that picture for a good while before saying, "That's just awful! How can they live like that?"

Indeed.

But, I really have a feeling that this little bit of self-guided exploration did more to bring home the idea of why pollution is an important topic than ANY Study Island lesson could possibly have done alone. As I got up to leave he was still going through the images. I said, "THAT'S why we study the topic of water pollution."

Oh how I wish kids could have more time for that sort of thing. When you hear about something that sparks some interest, check it out. Look at images. Post to a discussion forum. Share those images with the rest of the class. Talk about it. If we'd had time I would have shown him the two poptech videos I had mentioned in a previous blog post. I had his attention and his interest. That's the time to provide more.

Anyway, just a thought about the difference a computer in front of a student can make.

Tuesday, January 25, 2011

Informix making the world smarter...

This article is written only in English
Este artigo apenas está disponível em Inglês

Although I'm preparing some technical articles I'm happy to make a break to echo some good news...

Informix is helping an IBM Partner, Centric Solutions, in making the world smarter. Bank of China is using it for a SWIFT application, that also helps to save trees.

These are my words, but I think everyone agrees it must be robust, fast and trustworthy... and Informix is a perfect match for that!

Read all about it here:

http://www.prnewswire.com/news-releases/bank-of-china-in-the-uk-works-with-ibm-to-become-a-smarter-greener-bank-114573679.html

Sunday, January 23, 2011

Xpaper to the Rescue



In the last week, I have several different opportunities to use Xpaper which really helped me out in a pinch. In the first instance, I was completing a credit check application to a computer distributor so that I could resell Okidata printers as part of digital pen and paper solution. The company dutifully sent me a link to their Credit Application which I completed online. When the form was completed, I was able to save it as a PDF- now my challenge was that the Credit Application had to be signed by me in several places. With Xpaper that was an easy task! I simply printed the Credit Application Form using the Xpaper driver to my OkiData printer and signed the Credit Application Form with my Logitech Digital pen. When I docked my pen I had a crystal clear PDF with my signature ready to email back to the computer company. Using the built-in workflow my signed PDF was automatically uploaded and stored to GoggleDocs. How is that for automation? There are a host of different work-flow routing (SharePoint) and connectors (ftp, email) that make storing your documents easy to accomplish. All of this took seconds to accomplish with Xpaper. Back in the day I would have had to scan the entire document and it would have never looked as good as the output from Xpaper. Find out how your business or company can use Xpaper to automate your paper work flow and make the paper work for you! To arrange a free demo click here to register and I will be in touch with you.

Saturday, January 22, 2011

Post weekly (weekly)

Posted from Diigo. The rest of my favorite links are here.

The "PaperShow Guy" is Off to MacWorld 2011

Yes- some folks have affectionately coined me the "PaperShow Guy" and I will be in all my glory next week when I arrive in San Francisco for MacWorld 2011. If you get to MacWorld 2011 Conference please stop by the Canson Booth 1001 and say hello and try out PaperShow for Teachers. PaperShow for Teachers won Best of Show at MacWorld 2010, and we are excited to show you the latest developments with the product which educators are really excited about. So stop by Booth 1001 and say hello and try out PaperShow for Teachers. PaperShow for Teachers has a rich set of features that your students will find very engaging. We will be offering special MacWorld 2011 pricing for PaperShow for Teachers as well was for PaperShow Enterprise Edition - so come over and take advantage of the special promotions. Hope to see you there!

Printing To the iPad with the HP 6500A

One of the really nice features of iOS 4.2 is the ability to print from the iPad to certain select printers. At this time there are several HP printers that support wireless printing using Apple's AirPrint technology. I had the opportunity today to set up the HP 6500A printer which supports the AirPrint capabilities for one of my clients who needs this capability at school, so that she can print out the written work she does in Pages from her iPad. HP provides very clear directions on how to set up the printer and configuring the wireless component was very easy and straightforward using the built-in touch screen. However, when I attempted to print from my iPad, for some reason it did not see the printer and I received feedback on my iPad that "No printers were found." I scratched my head and tried reconfiguring the wireless connection when I realized that there was a Menu item called Web services. When I selected this feature the HP 6500A asked me if  I wanted to check for updates and I pressed "Yes."  Once the printer had downloaded the updates I was now able to see the printer from within Pages and I was off and running. So if you get stuck remember to check for Updates on your HP Printer.

Wednesday, January 19, 2011

Computer 101: The ABC of File attachment and Transfer via your email or using Web Based Free Services.



Today I'm going blog about using the internet to send all types of files from you to your friend or simply just uploading them to your favourite social network or free on-line file storage website. Let's face it the internet has become an integral part of our daily work routine. Flash drive and external drive are simply not enough for some of us. We always want to access our file or at least a copy of it using the internet or move it from one location to another. Sometimes we are confused on what to use to accomplish all our desired goal of moving or more commonly called file transfer or file upload and download. Now how do we accomplish this task? Well there are several ways on how to go about it. First there your standard free email account from different email provider. Yup every kind of email account has function for transferring your desired file to your friend, work place and family email account. Let's your friend is asking for a copy of the birthday picture you have taken from yesterday's birthday. They requesting for copy to be printed. Instead of doing it yourself or giving the memory card to your friend which would require you to physically move around from your place to his/her place say you need to transfer picture stored on your computer to give them the copy. Why not use your email account to this. Just simple login and create or compose a new letter and after typing all the detail and message you are now ready to attach the requested picture by your friend. But wait do not attach the entire picture at once. Every email has this feature but this feature has a limit. Yup there a limit to how many you can send and attach per email. Also the process of attaching files to your email is also dependent on the speed that your computer is connected to the internet. Oh also file attachment speed is also dependent on how large each individual file and or how many file your going to attach to a single email.

 
You say, but my friends are requesting a whole bunch of picture that i have taken during the birthday party. Yup those are the reality of attaching picture thru your email free account. The size, number and the internet connection speed. All of this will determine how long you will take to upload those entire pictures and send them to your friends. One or two files you have no problem, but more than that and if each file has a large size then think of another way of transferring them via the internet. Okay how about we use free online storage system. There are a lot of them in the internet, hey that a great idea, they are much faster than on ordinary email file attachment plus you do not have to send the file always whenever your friend requested a copy. They can just copy or save the picture as they view them one by one. Well they one catch to this type of on-line storage, the number of file you can store is limited. Some of them offer up to 15 or 20 files per account. Also you need to sign-up or create an account with them in order to have your picture stored in this web based storage service. The same is true with your favourite social networking site. Creating an account is a requirement in order to use the services also every time you use the service you need to login to use it. Well i guess is not a bad thing, it is also for security reason why you need to have an account with them. Yup they have limitation but this should not discourage you in using this kind of free file transfer services.

 
Okay i will ask a question is there a web based free service that you could use to transfer your file without having to create an account and log on every time you need to transfer file? Well there is such such and they call their company File Catalyst and their website is http://www.filecatalyst.com/ just click on the link to go to their website. But wait let's make things clear first, I am not in any way related to them, i am just sharing this things because it may help you and me at some point in time. I am sharing this as an alternative means to transfer your files. It is up to you if you're going to use the free Fast File Transfer that they are offering a free service to transfer your file via the internet. Also if ever you're going to use their free services make a research of the company background and other stuff that are related to them. Everyone is free to make his own choice on what to use. Another thing when it comes to sending large files don't even attempt to send them through your standard email server. The file size is generally too large for the basic email server and it will usually exceed the limit. A great alternative is FileCatalyst, they have a free service where you can use their fast file transfer software for sending files quickly and easily, no login or registration necessary. Although you have to input your name and email address so they could notify you if the file transfer has been completed. They also offer several services including Managed File Transfers, FileCatalyst workflow, and many others. You can also always tell a company's success by their client list...check it out. To access the FREE file transfer service you can go to their products page at: http://www.filecatalyst.com/products

 

Monday, January 17, 2011

Computer 101: Un-hiding All Hidden Files after a Virus Infection


Is your USB Flash disk ever been infected by a virus and the result is all you files and folder are gone? But wait when went to the technical support personnel in you workplace they says that it is not gone all your files and folder are still there. Feeling confused, you may say but when i check my USB flash drive i cannot see all my files and folder? But if did a deeper probe, by checking the properties of your USB flash drive, you can see that it indicates that your USB flash drive is half full or almost full depending on how many files it contains before the virus infection. Still confuse, well do not be. Here is what happens, when your flash drive got infected by the virus, it hides all your files and folder and then creates a copy of itself. But that copy of itself is not going to look like a virus, it will look like a regular folder inside your flash drive. The moment you click it, it will even more infect all the other files and folder in your flash drive. Ever seen a folder that when you tried to open it via the double click method, it did not open instead nothing happen, there is no reaction from the folder. A closer will reveal that it is not really a folder it is an application. Take a closer look at the screenshot below.



 
You can see that a folder is identified as folder and an application is identified as an application in a non-infected drive. To get this kind of view, please select the detail option when displaying the content of your flash drive. Now after the infection happened. All your folder and files is hidden not deleted or erased. You are left with an application that looks like a folder, but when you view it like this you can see that the folder has been classified as an application. When you see a folder that has been classified as an application then definitely it is a virus. Have your flash drive scan immediately to avoid the virus from infecting other places in your flash drive or drive or any type of container. DO NOT click or double click it. Now how do you recover your files if it has been hidden after a virus infection? Well first make sure that you have scanned and cleaned your flash drive. Next attach it to a clean computer, a computer that has not been infected by the same virus. After is has been recognized by the computer. Follow this step very carefully. First look for a utility or program called FOLDER OPTION. The FOLDER OPTION has three tabs they are the GENERAL, VIEW and SEARCH. Please see the screen shot below.



 


From the screen shot above the three tabs can be seen. The next step selects the VIEW tab. Please see screen shot below. This is where you're going to make the hidden files from your flash drive visible again. For the nest step please select the Show Hidden files, folders and rive option and uncheck all the check boxes for the three following option. The Hide empty drives in the computer, Hide extension for known file types and Hide protected operating system files then clicks the OK button. But wait before you go any further a word of caution, make sure to go directly to the flash drive and do not do to the main hard drive which contains the system files. The system files are hidden by default to protect against accidental erasure. Now that you un-hide it, it is now very open for such an accident. Whatever you do, go directly to the flash drive to get all your files. Now that we have cleared that the next step is to proceed to your flash drive and view it again. After editing the folder option, you can now see your folder. They are now safe to open via the double click. Do not copy the folder because they will be invisible after you redo the folder option. Open the entire folder individually and move all the files inside them to a newly created folder and all your folder will accessible to your once again. Now after recovering your files from the entire affected folder. The entire affected folder can now be deleted from your flash drive. Now for the last part go back to the FOLDER OPTION and put the check mark on all the boxes that you have unchecked earlier and select the other option to return all folder to their normal state. All system files must be hidden the same as before and press the OK button and close the FOLDER OPTION.






 

Remember when ever a virus has infected your flash drive. It will try to fool you by making you think that all your files have been deleted. Do not be fooled by this kind of virus infection. Make sure that you scan your flash drive and have the virus removed and make a deeper probe to see if all your files is still there. Do not format the flash drive as soon as you see that it appears to empty. Remember you smarter than any virus. 

 


 

Saturday, January 15, 2011

Computer 101: Keeping your Computer Safe from Viruses and Other Threats P-2.


On my previous post, I emphasised on the self practice of safe browsing. Meaning do not just surf anywhere but be objected, think first of what you really need to do to get before surfing the internet that way you'll be able to get the information the you want at much faster time and less hazardous to your computer. Another thing about practicing self safe browsing technique is do not just click on the link or any link, there are a lot of link out there that once click will open the box of bad news for your computer. Also email, your email is one another source of those potentially harmful threats. The safe practice for avoiding virus from email is that avoid opening email that you do not know. Meaning if an email has been sent to you and the sender is a total stranger to you. DO NOT Open or click it, for once you click it then if it contains viruses those viruses will be let loose in your computer even if you have a anti-virus. Is that possible, my computer being infected even if i have an anti-virus installed? The answer is very big yes. Not all anti-virus can detect all viruses especially those new type and variants of viruses, especially if your anti-virus database is not updated regularly. Wait what do you mean Anti-virus database? Well you see all anti-virus as a list of virus and there corresponding mark. The terms for this are virus definitions files or database. Yup each one has this list of threats and only the virus listed on that threat and all its variants is the only detectable virus for the anti-virus. You will need other type of anti-virus to detect others. But there are anti-virus who offers complete detection from regular virus to, malware, adware and spyware. This anti-virus suite does not come free. You have to buy them. Most free version can only scan and protect your computer for a certain degree that why is it recommended to practice safe browsing and opening of email on a regular basis. It's better to be safe than to be sorry.

 
Another potential source of virus is the very useful USB flash drive that rights that very small but very big container that is very easy to use. You just plug it in and presto you have an additional storage space. This is also their weakness, if this Flash disk contains an infected file or itself is infected with a virus, chances are when you plug it into your computer your anti-virus will detect and remover the threat or it will do nothing and will allow the virus to load itself onto your computer's hard drive. Some virus the commonly infect this type of devices, create a replica of itself but the picture is a folder or a file. When the user click on thinking it was the file or folder, presto there goes all your files and folder. Imagine a virus that looks like a folder. You can verify this by viewing the directories in detailed mode. A folder does not have an extension name correct. In an infected folder it has a DOT EXE as an extension name and it is not a folder but an application as verified by the directories listing. What happen to the real files? Well it's there; you just can't see it because it is hidden. To view it you need to unhide all system files and hidden files using the file view option in the control panel. But this is dangerous you. All system files and protected system folder are hidden for their protection. Un-hiding the greatly exposes each item of being deleted or manipulated so be very careful. A word of CAUTION and WARNING do not do the things mentioned above if you are new or not familiar with the procedure, it may cause more harm than good to you computer system. I try to provide with a step by step procedure in how to it complete with picture on my future blog. So before you plug one of these handy devices to your computer make sure you scan them first thoroughly and properly. Also if you one of this does not just plug it anywhere and everywhere, this will minimize it from being infected by viruses. So practice self know and restrained in using these devices. And lastly but not the list make sure to update your anti-virus database or virus definition file regularly. This at least will help you in keeping the most common virus away from your computer.


Another potential source of infection is chatting; yup your computer could also be infected via this avenue if you are not careful and vigilant. What even in chatting? Yup that correct, how is this so? Well there are a lot of ways where you talk or chat with friends on the internet. Also a lot of programs that offers this kind feature and much more.. More than that in chatting sometimes you talk about a lot or you request a file to be sent to you, not via email, but who want it sent through the chatting software that you are using. If that is possible so the virus being sent thru is also possible, disguise as an important file or picture from a supposedly friend of yours, when you click on it to download it. It will immediately activate and infect your computer. So while chatting with friends practice being vigilant to avoid unnecessary problems with virus infection in you computer. Whenever your computer is connected to the internet and attaching devices to your computer, being vigilant and thorough will help keep your computer from being infected and therefore more productive time and usage from your machine.

Post weekly (weekly)

Posted from Diigo. The rest of my favorite links are here.

Friday, January 14, 2011

Computer 101: Keeping your Computer Safe from Viruses and Other Threats.


People get sick, the most common sickness is the common cold and it’s relative running noise, flu and head-ache. We get sick because we caught the virus that causes this sickness from other people in our home, work and other places where there are sick people. But this sickness is not life threatening except maybe for a few who has complication from this sickness. But this common sickness can be treated by much home based medicine or at least get our body to use its natural ability to fight off this viruses. Some just need to rest and drink a lot of water to let the body heal itself. Still others buy medicine for this type of sickness especially if the young one or children is sick. These viruses spread themselves thru air or sharing of things with the sick person.  Well there is another kind of virus that is not dangerous to people but is very deadly to the things people use like the computer and its entire relative.


Ever since the computer was invented and created, viruses have been one of the main threat to its healthy and useful existence. Just like the original organic virus to which it was pattern by its early creator, this viruses has already change from just being annoying to become a real threat to all computer devices. It has already metamorphosis to several different kinds to Trojan Horses, Malware, Adware, Spyware and other type which attack different type of files in our computer. I don’t need to get into the detail of what they do inside your computer. Where going to focus on the basic of keeping your computer devices free of these dangerous programs. Well how does a computer get infected by these viruses? Well first of all there’s the internet, it one of the main source of computer infection and chances are your computer is online for most of the time, then the percentage of getting infected by these virus and its cousin is very high. In this age and time, people can no longer afford not to use the internet so the viruses have become very abundant.


Okay now how do you protect your computer from being infected by this malicious and dangerous program from the internet? Well the common ways of protecting yourself is to use an anti-virus. This anti-virus is a program that detects the virus before it can infect or spread itself inside your computer. There are free type and paid type of anti-virus out here. Use any one of them or better yet use two if you know how to configure each so that they will both work in harmony not getting in the way of another. The most common way is installing one of these programs to keep an eye on your computer while you work. Now that’s done you have an anti-virus installed in my computer, my computer is safe now. I can surf to all of my heart content. Woo hold on there, your computer not totally secure yet from viruses and its cousin. You just can go to any website or location on the internet because even if you have anti-virus chances are it will not be enough to combat viruses if you keep going to the those site which has a lot of viruses or contain viruses and other deadly program whose intentions is just to destroy your files and computer. Yes folks this site is really and they don’t offer anything but virus and its cousin. So need to practice safe browsing and downloading habit to help make your computer safe from all type of viruses.


I still remember the experiment that i did way back then. The experiment was i used a computer where only the Operating system and anti-virus programs is installed only. I updated the virus definition of the anti-virus and make sure every thing is working as they should be. Then after this i connect that computer to the internet and surf away. I jump from site to another click on all kinds of links that lead from site to another and then when i thought that it was okay and my computer is still working and the anti-virus is doing its job from getting my computer infected, WHAMMM i run onto a brick wall or website that is full of viruses that the moment my computer made contact, they overwhelm my anti-virus and the computer has stop working. It has been paralysed by the viruses that attack it. The good news is this is just an experiment. Well i quickly reformatted my hard drive not once but twice and have it scanned by an antivirus software just to make nothing is left from my previous encounter. The result of my experiment clearly shows that even with an anti-virus installed on your computer. You still need to practice safe browsing technique while connected to the internet. More on my next post.

Thursday, January 13, 2011

Computer 101: The Danger of Static Electricity to your computer.

Have you heard of the words Static Electricity? Okay, maybe yes or maybe no, not clear? static electricity is not dangerous to humans or people like us but it is dangerous to the internal component of your computer, especially does inside your system unit, the motherboard, hard drive, memory and all those electronic component that you see inside when you open your computer casing. Now where do we get this static electricity? You'll probably surprise that it's fairly simple to acquire or build -up your bodies static electricity. Our body has always static electricity in very small amount of charge. Building them up also is very simple, by just walking in or on object like carpet or electrical charge object we can build up our static charge. The discharge process is also simple just touch a metal object connected to the ground and the static electricity is gone from your body, well not of all of it.

Now it is not dangerous to people like us, but this static electricity is very dangerous to the component inside your computer or electronic devices. Do not try touching the inner working of your computer if you feel that you have not touch a metal object connected to the ground. A simple precaution not to damage the inner parts of your computer is Do Not Open the Computer Case Unless you have a very valid reason to do so. One simple discharge from your body to that component that you touch on the inside of your computer and that component is toast. Electronic component is very susceptible to  static electricity. They are made of microscopic circuit that small amount of static electricity can really destroy or damage that electronic component. But if you cannot avoid opening and touching the inner parts of your computer, try to keep in mind to first touch a metal object that is connected to the ground to discharge the static electricity stored in your body, at-least try to minimize the damage that you can do to your computers's inner working.


Since the entire component inside your computer is made up of micro circuit, meaning they cannot be seen by the naked eye. You need a special device to see this circuit inside those complex integrated circuit found on every computer motherboard. Oops did I mention integrated circuit.  IC is the short term for them they looked like a square or rectangular piece of black colours things that is attached to every motherboard. Also they have a lot of metal feet connected to their side. They are called pins and they are use to connect the micro circuit in every one of them to the main system and to each other. Each pin is also numbered according to their design. Take a look at every IC inside you computer they are small right. But on every IC contains thousand of component that forms that micro circuit. They are very-very small. How can a static electricity affect damage or destroy those micro circuit and component?

Let’s put it this way, the micro circuit is the big city or town and the component on those micro circuit is the building and houses. Therefore you got a picture of a highly dense city or town. Also the static electricity is represented as the biggest and strongest storm which is depending on the charge of the static electricity. If you put them together guess what will happen. The city or town will be in ruin, there will chaos and all sort of things. All basic services will cease to function. We have seen this scenario played out in our present day. And since the static electricity has damage the inner working of your computer, then it will no longer function properly or if the damage is worst then it the end game for your computer. A word of precaution, whatever you do, leave the inside parts of your to the professional.

  

Adobe Delivers Technical Communication Suite 3

Streamlined, Simplified Workflows Powered by New Versions of FrameMaker and RoboHelp



SAN JOSE, Calif. — Jan. 11, 2011 — Adobe Systems Incorporated (Nasdaq:ADBE) today announced Technical Communication Suite 3, the latest version of its complete single-source authoring and multi-device publishing toolkit for the creation and publication of rich, standards-compliant technical information and training material. The new improved version of Adobe’s industry-leading suite enables technical writers, help authors and instructional designers to efficiently author, enrich, manage, and seamlessly publish content to multiple channels and devices. Adobe also introduced new versions of the suite’s core products: Adobe FrameMaker® 10, a powerful template-based authoring and publishing solution for technical content; and Adobe RoboHelp® 9, an HTML and XML help, policy and knowledgebase authoring and publishing solution. Adobe Photoshop® CS5, Adobe Captivate® 5 and Adobe Acrobat® X Pro round out the suite, integrating powerful image editing, eLearning and demo creation, and dynamic PDF functionalities. “Today’s technical communication end user – from an average consumer to a design engineer – expects content experiences that are clear, concise and more engaging,” said Naresh Gupta, senior vice president, Print and Publishing at Adobe. “Technical Communication Suite 3 customers can meet this demand by creating documentation that is increasingly interactive, rich and socially enabled – all with one set of tools, within one user interface.”
New Features
Technical Communication Suite 3
• Enhanced single-sourcing: Import FrameMaker content into RoboHelp with support for FrameMaker books. Directly link DITA (Darwin Information Typing Architecture) maps, automatically convert table and list styles, and publish multiple RoboHelp outputs from within the native authoring environment.
• Dynamic “single-click” publishing: Create standards-compliant XML and DITA (1.2) content and output to multiple formats, including print, PDF, Adobe AIR™, WebHelp, EPUB, XML and HTML, and deliver it to a wide range of mobile devices, such as eReaders, smartphones and tablets. Lend your content to search engine optimization, via enhanced metadata tagging of published content.
• Expanded multimedia capabilities: Take advantage of more than 45 video and audio formats and engage audiences by adding 3D models, training demos and simulations.
FrameMaker 10
• Standards support: Take advantage of significantly enhanced XML/DITA authoring capabilities of FrameMaker 10, which is an early adopter of industry standards including DITA 1.2.
• Usability enhancements: Work more efficiently with standards-compliant, prebuilt tools and templates designed for easier authoring. Use utilities like Auto Spell Check, Highlight Support, scrolling for lengthy dialogue, and enhanced Find and Replace to get the job done faster.
• Content Management System (CMS) connectors: Integrate seamlessly with leading content management systems, including Documentum and MS SharePoint. While competitors often sell these connectors for thousands of dollars, they will be included in FrameMaker 10 at no additional cost. Single-source, review, manage and automatically publish content faster and smarter – all within your favorite technical authoring tool.

Adobe Announces Technical Communication Suite 3

RoboHelp 9
• More personalized, optimized end-user experiences:
o Enable users to filter help systems based on their role, department, geography, products, operating system, or any other parameter, ensuring the most relevant information is instantly available.
o Enrich the quality of documentation by allowing users to add comments, rate helpfulness or generate relevant content independently.
o Create rich, interactive materials by adding access to external Web content including Google search, blogs,
wikis and forums.
• Efficient Workflows: Collaborate with authors, subject matter experts and readers using advanced PDF shared reviews, live linking of shared resources, moderation-enabled workflows through Adobe AIR Help, topic-rating and other multiauthor environment capabilities.

Adobe FrameMaker Server 10 and Adobe RoboHelp Server 9, the server versions of the core FrameMaker and RoboHelp products, are two separate releases that complement the new suite and help streamline enterprise workflows.

Pricing and Availability
Technical Communication Suite 3, FrameMaker 10 and RoboHelp 9 are immediately available in English, French, German and
Japanese versions through Adobe Authorized Resellers and the Adobe Store. Estimated street price for Technical Communication
Suite 3 is US$1899 (upgrades from US$699). FrameMaker 10 and RoboHelp 9 are also available as standalone products.
Estimated street price for FrameMaker 10 and RoboHelp 9 is US$999 each (upgrades from US$399). For details on FrameMaker
Server 10 and RoboHelp Server 9 pricing visit http://www.adobe.com/products/framemakerserver.html and
http://www.adobe.com/products/robohelpserver.html
About Adobe Systems Incorporated
Adobe is changing the world through digital experiences. For more information, visit www.adobe.com.
###
© 2010 Adobe Systems Incorporated. All rights reserved. Adobe, the Adobe logo, are either registered
trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. All other trademarks are the property of their respective owners.

Configure windows 7 and Windows XP Firewall to Allow Port

So what are you trying to get through the Windows firewall?
So many thing need to be configured such as networking activity like remote administrator and network tools and programming.

First Assume your using the Windows7 firewall.

Make sure you do all this as admin
First you need to get into the firewall in control panel. On the side there is "advanced settings" click it.
Now you want to select "inbound rules" and then click "new rule..." on the right hand side.
Select port and add the port details. You probably want to repeat the process for "outbound rules" also making sure you select "allow the connection".



Second Assume your using the Windows XP firewall.

1.Open the 'Control Panel' and select 'Windows Firewall'
2.Click on the 'Exceptions' tab
3.Click on the 'Add Port...' button
4.Enter a name for this exception such as 'GFI FAXmaker'
5.Under the Port Number enter '25' and ensure that 'TCP' is selected
6.Click 'OK' to save changes
7.Ensure that the new exception created is checked under 'Programs and Services'
8. Click 'OK' to close the configuration

Wednesday, January 12, 2011

Dropbox: Internet File Storage

There are a number of sites that offer you storage space to back up or share your files over the Internet. Many of them have a limit on the size of file that can be stored, but this is not the case with Dropbox. Dropbox offers 2gb of storage space for free. This capacity can be increased if you upgrade to one of the payment options.

Dropbox provide software that enables you to access your storage space as if it were a drive on your computer. This software is available for Windows, OSX, Linux and a variety of mobile devices. Alternatively you can use the Dropbox web site to upload and download files.

Files can be placed in a 'Public' folder so that other Dropbox users may access them, or they can be stored in your private area, in which you can create new folders. Dropbox also records any activity on your account. Just follow the simple registration procedure and you will have enough space to back up your essential files.

Tuesday, January 11, 2011

Insert SQL Command Query in Sybase

Sybase has differences SQL command if we compare with another database. But we just use our logic and find the right SQL Command on the Internet. I Guarantee that it would be works.

insert tb_test (no,nama) values (1,"Picas")

Where value 1 has type Int
and "Picas" has type nVarchar

Install Sybase on Windows 7 and Run Your Sybase Query On Command Prompt

Install Sybase on Windows 7 just like install another Software. But prefer to choose Developer Edition Because it was free (limited function).

It Must Be Successfull on Installation!!

and Run Your Sybase Query On Command Prompt just like
Install Sybase on Windows 7 and Run Your Sybase Query On Command Prompt

Monday, January 10, 2011

Olympic Limited Releases OPTi-Docs for MindManager

As a long time MindManger User it is really exciting to see how 3rd party companies can expand the functionality of the program with add-ins. I have come to know Nigel Goult from Olympic Limited and over the years he and his company have developed some very innovative and unique add-ins for MindManager. I had a chance to catch up with Nigel last week and he shared with me some of his new development work that he just completed on Opti-Docs for MindManger.

Brian: Tell us about your company Olympic Limited?
Nigel: Olympic is a supplier of information management tools and a developer of value added solutions/content. We primarily focus on MindManager add-in development but are steadily working our way towards platform independent solutions and have just recently completed our first solution for PRINCE2 project management, OPTi-P2 for Windows. Our knowledge of MindManager spans almost ten years across three companies and we have been involved in add-in development since MindManager X5.

Brian; Tell us about Olympic  and the range of your products?
Nigel: One of our recent goals was to start to create a brand for Olympic and that has now become what we call our "OPTi-Range" of solutions. Currently the range includes:
•    OPTi-P2 for MindManager, a PRINCE2 Project Management Solution
•    OPTi-Q for MindManager, a Quality Management System based on ISO9000
•    OPTi-Suite for MindManager, a utility add-in that extends MindManager
•    OPTi-P2 for Windows, a platform independent PRINCE2 solution for Windows
•    OPTi-Docs for MindManager, our latest MindManager add-in to manage documents linked to MindManager maps.
All of our products are developed with simplicity in mind. We believe that day to day activities such as project management, document management etc do not have to be complex and often simple solutions provide the best results. That is always the key objective whenever we look at producing a solution for any given task.
 Brian: Please share with us how Opti-DOCS came about?
Nigel: OPTi-Docs came about through several discussions I had with a long time colleague who is also a Mindjet MindManager Value Added partner like Olympic. During several conversations the fact that one of the first things that new users of MindManager tend to do is attach documents or files of some type into their maps became very apparent. This quite common task/use had always been obvious to me but I had never looked beyond the basics of the process and suddenly it struck me that currently there is no real way to easily control documents of this nature unless you are using something like Sharepoint etc. We did some thinking about what basic qualities an add-in would require and after a few brainstorms OPTi-Docs was born.
Brian: What are the Key Features?
We decided that the add-in would require several key features to really deliver benefit and as a minimum decided that a simple check-in/check-out mechanism was definitely required as well as an easily accessible top level overview of document changes so users could quickly see what changes had taken place for each document.
The add-in creates a new MindManager Task Pane that displays the details of documents on selected topics and this makes it easy for users to see the current status of the selected document and its history etc.
Auto-revision was also key to the add-in as was the ability to easily  include past document revisions in the map for other users who perhaps did not have OPTi-Docs installed. Above all the add-in had to be simple. We wanted it to be very much a background process that simply just worked for the users and we think that the release offers a truly easy to use system that delivers a good level of control for locally linked MindManager documents.

Brian: Talk about the Value proposition
Nigel: MindManager is a great tool for organizing documents but when you want to apply controls it is cumbersome to have to open a linked document and then save it with a new name and then have to re-link to the new file. This takes time and most people tend to just edit the document and then overwrite the original meaning they lose document history and the ability to audit changes through iterative documents. Using OPTi-Docs automates this process and provides a simple document control system with a minimum of user interaction.
OPTi-Docs can also be used with almost ANY file type so it is not just "documents" that can be controlled but any file that is going through an iterative change process. Image files, audio files, zip archives, even software applications and installers can all be controlled with OPTi-Docs.

Brian: How do you envision that users of MindManager would use Opti-DOCS?
Nigel: The possible user base for OPTi-Docs is very large. It can be used by anyone who links files to their MindManager maps but some very specific examples of user types are:
•    Project Managers
•    Quality Practitioners
•    Solicitors
•    Lawyers
•    Librarians
•    Software Developers
•    Graphic Artists
•    CAD Librarians
•    Human Resource Managers
•    Technical Authors
The list could go on...and on.
We developed the add-in to be compatible with MindManager versions 6, 7, 8 and 9 so users of earlier versions can also take advantage of the benefits that OPTi-Docs can offer.

Brian: What are some of the unique features of OPTi-Docs?
Nigel: OPTi-Docs does not have what I would call "unique" features. Check-in/Check-out routines and auto version increments etc are not unique, however, we are not aware of another solution that specifically aids MindManager users with this task except of course for the much larger Sharepoint type scenario's.

Brian:What do you see as the benefits of users using Opti-DOCs?
Nigel: Users benefit by gaining a level of control of documents in their maps. As mentioned earlier, the add-in's simplicity and background automation help users achieve control with very little effort or involvement except where necessary. Quick visibility of document status and change history also helps users understand their documents progress and helps users identify the current status/stage a document is at in its lifecycle.

Brian: What are your customers saying?
Nigel:
OPTi-Docs has been very well received by our customers and has proved to be the second most popular add-in we offer. It has also aided users of of our other add-ins/solutions such as OPTi-P2 and OPT-Q, both solutions that have documentation attached to their main dashboards, by bringing document control to those solutions. In fact OPTi-Docs is now provided FREE to purchasers of OPTi-P2 and OPTi-Q to help users of those solutions get maximum value and benefit from them.

Brian: Are there plans for future developments for Opti-DOCS?
Nigel: OPTi-Docs is very much a product in what we call "fluid development" which means it is being improved as and when we come up with ideas or are presented with feedback from customers.
We are already working on several new features to be included in an update which will be available in Q1 of 2011. These will include roll back of revisions, an additional method of accessing document details and some maintenance options to help users manage the files that the add-in creates.


Brian: Nigel thanks so much spending the time talking about OPTi-Docs. and thank you and your company Olympic Limited for providing me with 3 licenses as part of an OPTI-Docs give away.  In order to be in the running for the free licenses I will need you to Tweet this statement. Read about how you can use OPTi-DOCS for MindManager to streamline your document management for the New Year!- http://bit.ly/hjUIAF

Saturday, January 8, 2011

Stored procedure PDQ / PDQ dos procedimentos

This article is written in English and Portuguese
Este artigo está escrito em Inglês e Português

English version:

A few years ago I needed to check if I had some stored procedures created with PDQ. Maybe some readers don't know, but if you have SET PDQPRIORITY n in your session before creating a procedure it will run with that PDQ. And that can cause abnormal resource consumption. In most cases you'll want your procedures created without PDQ.
The PDQ associated with a procedure will also change if you run UPDATE STATISTICS FOR PROCEDURE [...], in a session with PDQ active. This is also a frequent issue when people forgot to turn it off or when the statistics are gathered for tables (where PDQ can be helpful) and procedures on the same command or script.

So, how to check the PDQ of your procedures? The catalog tables don't provide this information, so at the time I asked for help internally within IBM. Cosmo, from UK came to my rescue with a strange query that I used successfully a couple of times. The query checks the first 3 characters of the column "data" from sysprocplan where planid = -2.... Don't ask... supposedly this is an encode of the PDQ value.
Recently I had another situation on a customer, where we suspected they had their procedures with PDQ. We were expecting to see the value of 80 (which we caught in some sessions) but all we saw was NULL. Once again I asked Cosmo for help, and during our conversations we noticed that we only had run the query on little endian platforms (Linux on Intel and Tru64). So, Cosmo sent me a script that created 100 procedures with different PDQ levels and then returns the encoded values. It was no surprise that the values were different. Following Cosmo's suggestion I joined both set of values into a big CASE statement that you can check at the end of this article.

The query has a few important points:
  1. I used data[1,3] in the CASE statement. We could use data::CHAR(3), but with that it would not run on version 7. It's not supported anymore, but there are still people using it, so I decided to use a syntax that's compatible with those old versions.
  2. If I remember correctly Cosmo's first query was really a function that received the procedure name. I'm including that as another option in the end of the article. In that version the query raises and error if it enters the ELSE condition of the CASE statement. In the version I was using at the later customer, the case returned NULL and that fulled me... In this new version it will raise an error since it means there is something wrong with the query.
    For the non-procedural version, I did a small and dirty trick: If it enters the ELSE condition it will try to return a value divided by zero. This will cause an error.
    Note that this conditions can't happen because the PDQ must be a value between 0 and 100. So if in the future the encoding changes the query will start raising errors, and this should alert the user...
  3. The encoded values for PDQ 1 to 100 are distinct in the two types of platforms. The encoded value for 0 however is equal. That's why we have two WHEN conditions for each value between 1 and 100 and just one for 0.

VersĂŁo Portuguesa:

Há alguns anos atrás precisei de verificar se tinha criado algum procedimento com PDQ. Talvez alguns leitores não saibam, mas se tivermos executado SET PDQPRIORITY n na sessão antes de criar um procedimento, este irá ser executado com esse valor de PDQ. E isso pode causar um consumo anormal de recursos. Na maioria das situações não queremos ter procedimentos criados com PDQ.
O PDQ associado a um procedimento também muda se corrermos um UPDATE STATISTICS FOR PROCEDURE [...], numa sessão com PDQ activo. Isto é um problema habitual quando nos esquecemos de desligar o PDQ, ou quando as estatísticas são criadas para tabelas (processo onde o PDQ é benéfico) e procedimentos no mesmo comando ou script.

Como podemos verificar o PDQ dos procedimentos? As tabelas do catálogo não disponibilizam esta informação, por isso na altura pedi ajuda internamente na IBM. O Cosmo, de UK, auxiliou-me com o envio de uma query um pouco estranha que usei algumas vezes com sucesso. A query verifica os três primeiros caracteres de uma coluna "data" da tabela sysprocplan, onde "planid = -2"... Não pergunte... É suposto isto ser o valor de PDQ codificado de alguma forma.
Recentemente tive outra situação num cliente onde suspeitávamos que tinham os procedimentos com PDQ. Esperávamos ver o valor 80 (que tinhamos visto activo em algumas sessões), mas tudo o que a query nos dava era NULL. Note-se que se tivesse olhado bem para a query deveria ter percebido que o NULL implicava um erro. Mas como estávamos à espera de ver um valor (80) cometi um "erro de simpatia". Recorri novamente ao Cosmo para ajuda. E durante as nossas trocas de impressões notámos que só tinhamos corrido a query em plataforms que usam little endian (Linux em Intel e Tru64). Assim o Cosmo enviou-me um script que cria 100 procedimentos com diferentes valores de PDQ e que retorna os respectivos valores codificados. Não foi surpresa ver valores diferentes. Seguindo uma sugestão do Cosmo, juntei ambos os conjuntos de valores numa instrução CASE que pode ser consultada no final deste artigo.

A query tem alguns pontos importantes:
  1. Utilizei data[1,3] na instrução CASE. Podíamos utilizar data::CHAR(3), mas com isso a query não correria na versão 7. Esta versão já está sem suporte, mas ainda é usada, por isso preferi uma sintaxe compatível com versões mais antigas
  2. Se bem me recordo a primeira query que o Cosmo me enviou, era na realidade uma função que recebia o nome do procedimento que queríamos verificar. Esta forma está também incluída no final do artigo. Nesta forma o código causa um erro caso entre na condição ELSE do CASE. Na versão que estava a usar neste último cliente, o CASE retornava NULL e isso enganou-me... Nesta versão actualizada e corrigida, irá gerar um erro, dado que isso implica que algo não está correcto na query. Não versão não procedimental incluí um pequeno truque: Se entrar no ELSE do CASE vai tentar retornar um valor a dividir por zero. Isto irá causar um erro.
    Note-se que esta condição não pode acontecer pois o PDQ será sempre um valor entre 0 e 100. Se no futuro os valores codificados forem alterados a query deverá começar a dar erro, e isso deverá alertar o utilizador...
  3. Os valores codificados de PDQ de 1 a 100 são distintos nos dois tipos de plataforma (little endian e big endian). No entanto o valor codificado para 0 é igual. É por isso que temos duas condições WHEN para cada valor entre 1 e 100 e só um para o valor 0.

Non-procedural query:
Query nĂŁo procedimental:


SELECT
f.procname,
CASE data[1,3]
WHEN "AAA" THEN 0
WHEN "AQA" THEN 1
WHEN "AAE" THEN 1
WHEN "AgA" THEN 2
WHEN "AAI" THEN 2
WHEN "AwA" THEN 3
WHEN "AAM" THEN 3
WHEN "BAA" THEN 4
WHEN "AAQ" THEN 4
WHEN "BQA" THEN 5
WHEN "AAU" THEN 5
WHEN "BgA" THEN 6
WHEN "AAY" THEN 6
WHEN "BwA" THEN 7
WHEN "AAc" THEN 7
WHEN "CAA" THEN 8
WHEN "AAg" THEN 8
WHEN "CQA" THEN 9
WHEN "AAk" THEN 9
WHEN "CgA" THEN 10
WHEN "AAo" THEN 10
WHEN "CwA" THEN 11
WHEN "AAs" THEN 11
WHEN "DAA" THEN 12
WHEN "AAw" THEN 12
WHEN "DQA" THEN 13
WHEN "AA0" THEN 13
WHEN "DgA" THEN 14
WHEN "AA4" THEN 14
WHEN "DwA" THEN 15
WHEN "AA8" THEN 15
WHEN "EAA" THEN 16
WHEN "ABA" THEN 16
WHEN "EQA" THEN 17
WHEN "ABE" THEN 17
WHEN "EgA" THEN 18
WHEN "ABI" THEN 18
WHEN "EwA" THEN 19
WHEN "ABM" THEN 19
WHEN "FAA" THEN 20
WHEN "ABQ" THEN 20
WHEN "FQA" THEN 21
WHEN "ABU" THEN 21
WHEN "FgA" THEN 22
WHEN "ABY" THEN 22
WHEN "FwA" THEN 23
WHEN "ABc" THEN 23
WHEN "GAA" THEN 24
WHEN "ABg" THEN 24
WHEN "GQA" THEN 25
WHEN "ABk" THEN 25
WHEN "GgA" THEN 26
WHEN "ABo" THEN 26
WHEN "GwA" THEN 27
WHEN "ABs" THEN 27
WHEN "HAA" THEN 28
WHEN "ABw" THEN 28
WHEN "HQA" THEN 29
WHEN "AB0" THEN 29
WHEN "HgA" THEN 30
WHEN "AB4" THEN 30
WHEN "HwA" THEN 31
WHEN "AB8" THEN 31
WHEN "IAA" THEN 32
WHEN "ACA" THEN 32
WHEN "IQA" THEN 33
WHEN "ACE" THEN 33
WHEN "IgA" THEN 34
WHEN "ACI" THEN 34
WHEN "IwA" THEN 35
WHEN "ACM" THEN 35
WHEN "JAA" THEN 36
WHEN "ACQ" THEN 36
WHEN "JQA" THEN 37
WHEN "ACU" THEN 37
WHEN "JgA" THEN 38
WHEN "ACY" THEN 38
WHEN "JwA" THEN 39
WHEN "ACc" THEN 39
WHEN "KAA" THEN 40
WHEN "ACg" THEN 40
WHEN "KQA" THEN 41
WHEN "ACk" THEN 41
WHEN "KgA" THEN 42
WHEN "ACo" THEN 42
WHEN "KwA" THEN 43
WHEN "ACs" THEN 43
WHEN "LAA" THEN 44
WHEN "ACw" THEN 44
WHEN "LQA" THEN 45
WHEN "AC0" THEN 45
WHEN "LgA" THEN 46
WHEN "AC4" THEN 46
WHEN "LwA" THEN 47
WHEN "AC8" THEN 47
WHEN "MAA" THEN 48
WHEN "ADA" THEN 48
WHEN "MQA" THEN 49
WHEN "ADE" THEN 49
WHEN "MgA" THEN 50
WHEN "ADI" THEN 50
WHEN "MwA" THEN 51
WHEN "ADM" THEN 51
WHEN "NAA" THEN 52
WHEN "ADQ" THEN 52
WHEN "NQA" THEN 53
WHEN "ADU" THEN 53
WHEN "NgA" THEN 54
WHEN "ADY" THEN 54
WHEN "NwA" THEN 55
WHEN "ADc" THEN 55
WHEN "OAA" THEN 56
WHEN "ADg" THEN 56
WHEN "OQA" THEN 57
WHEN "ADk" THEN 57
WHEN "OgA" THEN 58
WHEN "ADo" THEN 58
WHEN "OwA" THEN 59
WHEN "ADs" THEN 59
WHEN "PAA" THEN 60
WHEN "ADw" THEN 60
WHEN "PQA" THEN 61
WHEN "AD0" THEN 61
WHEN "PgA" THEN 62
WHEN "AD4" THEN 62
WHEN "PwA" THEN 63
WHEN "AD8" THEN 63
WHEN "QAA" THEN 64
WHEN "AEA" THEN 64
WHEN "QQA" THEN 65
WHEN "AEE" THEN 65
WHEN "QgA" THEN 66
WHEN "AEI" THEN 66
WHEN "QwA" THEN 67
WHEN "AEM" THEN 67
WHEN "RAA" THEN 68
WHEN "AEQ" THEN 68
WHEN "RQA" THEN 69
WHEN "AEU" THEN 69
WHEN "RgA" THEN 70
WHEN "AEY" THEN 70
WHEN "RwA" THEN 71
WHEN "AEc" THEN 71
WHEN "SAA" THEN 72
WHEN "AEg" THEN 72
WHEN "SQA" THEN 73
WHEN "AEk" THEN 73
WHEN "SgA" THEN 74
WHEN "AEo" THEN 74
WHEN "SwA" THEN 75
WHEN "AEs" THEN 75
WHEN "TAA" THEN 76
WHEN "AEw" THEN 76
WHEN "TQA" THEN 77
WHEN "AE0" THEN 77
WHEN "TgA" THEN 78
WHEN "AE4" THEN 78
WHEN "TwA" THEN 79
WHEN "AE8" THEN 79
WHEN "UAA" THEN 80
WHEN "AFA" THEN 80
WHEN "UQA" THEN 81
WHEN "AFE" THEN 81
WHEN "UgA" THEN 82
WHEN "AFI" THEN 82
WHEN "UwA" THEN 83
WHEN "AFM" THEN 83
WHEN "VAA" THEN 84
WHEN "AFQ" THEN 84
WHEN "VQA" THEN 85
WHEN "AFU" THEN 85
WHEN "VgA" THEN 86
WHEN "AFY" THEN 86
WHEN "VwA" THEN 87
WHEN "AFc" THEN 87
WHEN "WAA" THEN 88
WHEN "AFg" THEN 88
WHEN "WQA" THEN 89
WHEN "AFk" THEN 89
WHEN "WgA" THEN 90
WHEN "AFo" THEN 90
WHEN "WwA" THEN 91
WHEN "AFs" THEN 91
WHEN "XAA" THEN 92
WHEN "AFw" THEN 92
WHEN "XQA" THEN 93
WHEN "AF0" THEN 93
WHEN "XgA" THEN 94
WHEN "AF4" THEN 94
WHEN "XwA" THEN 95
WHEN "AF8" THEN 95
WHEN "YAA" THEN 96
WHEN "AGA" THEN 96
WHEN "YQA" THEN 97
WHEN "AGE" THEN 97
WHEN "YgA" THEN 98
WHEN "AGI" THEN 98
WHEN "YwA" THEN 99
WHEN "AGM" THEN 99
WHEN "ZAA" THEN 100
WHEN "AGQ" THEN 100
ELSE
TRUNC(p.rowid / 0)
END pdq_value
FROM
sysprocplan p, sysprocedures f
WHERE
p.planid = -2 AND
f.procid = p.procid
ORDER BY 2 DESC


Procedural version:
VersĂŁo procedimental:


CREATE FUNCTION get_proc_pdq_value(v_proc_name VARCHAR(128))
RETURNING SMALLINT;

DEFINE v_ret_pdq_value SMALLINT;


SELECT
f.procname,
CASE data[1,3]
WHEN "AAA" THEN 0
WHEN "AQA" THEN 1
WHEN "AAE" THEN 1
WHEN "AgA" THEN 2
WHEN "AAI" THEN 2
WHEN "AwA" THEN 3
WHEN "AAM" THEN 3
WHEN "BAA" THEN 4
WHEN "AAQ" THEN 4
WHEN "BQA" THEN 5
WHEN "AAU" THEN 5
WHEN "BgA" THEN 6
WHEN "AAY" THEN 6
WHEN "BwA" THEN 7
WHEN "AAc" THEN 7
WHEN "CAA" THEN 8
WHEN "AAg" THEN 8
WHEN "CQA" THEN 9
WHEN "AAk" THEN 9
WHEN "CgA" THEN 10
WHEN "AAo" THEN 10
WHEN "CwA" THEN 11
WHEN "AAs" THEN 11
WHEN "DAA" THEN 12
WHEN "AAw" THEN 12
WHEN "DQA" THEN 13
WHEN "AA0" THEN 13
WHEN "DgA" THEN 14
WHEN "AA4" THEN 14
WHEN "DwA" THEN 15
WHEN "AA8" THEN 15
WHEN "EAA" THEN 16
WHEN "ABA" THEN 16
WHEN "EQA" THEN 17
WHEN "ABE" THEN 17
WHEN "EgA" THEN 18
WHEN "ABI" THEN 18
WHEN "EwA" THEN 19
WHEN "ABM" THEN 19
WHEN "FAA" THEN 20
WHEN "ABQ" THEN 20
WHEN "FQA" THEN 21
WHEN "ABU" THEN 21
WHEN "FgA" THEN 22
WHEN "ABY" THEN 22
WHEN "FwA" THEN 23
WHEN "ABc" THEN 23
WHEN "GAA" THEN 24
WHEN "ABg" THEN 24
WHEN "GQA" THEN 25
WHEN "ABk" THEN 25
WHEN "GgA" THEN 26
WHEN "ABo" THEN 26
WHEN "GwA" THEN 27
WHEN "ABs" THEN 27
WHEN "HAA" THEN 28
WHEN "ABw" THEN 28
WHEN "HQA" THEN 29
WHEN "AB0" THEN 29
WHEN "HgA" THEN 30
WHEN "AB4" THEN 30
WHEN "HwA" THEN 31
WHEN "AB8" THEN 31
WHEN "IAA" THEN 32
WHEN "ACA" THEN 32
WHEN "IQA" THEN 33
WHEN "ACE" THEN 33
WHEN "IgA" THEN 34
WHEN "ACI" THEN 34
WHEN "IwA" THEN 35
WHEN "ACM" THEN 35
WHEN "JAA" THEN 36
WHEN "ACQ" THEN 36
WHEN "JQA" THEN 37
WHEN "ACU" THEN 37
WHEN "JgA" THEN 38
WHEN "ACY" THEN 38
WHEN "JwA" THEN 39
WHEN "ACc" THEN 39
WHEN "KAA" THEN 40
WHEN "ACg" THEN 40
WHEN "KQA" THEN 41
WHEN "ACk" THEN 41
WHEN "KgA" THEN 42
WHEN "ACo" THEN 42
WHEN "KwA" THEN 43
WHEN "ACs" THEN 43
WHEN "LAA" THEN 44
WHEN "ACw" THEN 44
WHEN "LQA" THEN 45
WHEN "AC0" THEN 45
WHEN "LgA" THEN 46
WHEN "AC4" THEN 46
WHEN "LwA" THEN 47
WHEN "AC8" THEN 47
WHEN "MAA" THEN 48
WHEN "ADA" THEN 48
WHEN "MQA" THEN 49
WHEN "ADE" THEN 49
WHEN "MgA" THEN 50
WHEN "ADI" THEN 50
WHEN "MwA" THEN 51
WHEN "ADM" THEN 51
WHEN "NAA" THEN 52
WHEN "ADQ" THEN 52
WHEN "NQA" THEN 53
WHEN "ADU" THEN 53
WHEN "NgA" THEN 54
WHEN "ADY" THEN 54
WHEN "NwA" THEN 55
WHEN "ADc" THEN 55
WHEN "OAA" THEN 56
WHEN "ADg" THEN 56
WHEN "OQA" THEN 57
WHEN "ADk" THEN 57
WHEN "OgA" THEN 58
WHEN "ADo" THEN 58
WHEN "OwA" THEN 59
WHEN "ADs" THEN 59
WHEN "PAA" THEN 60
WHEN "ADw" THEN 60
WHEN "PQA" THEN 61
WHEN "AD0" THEN 61
WHEN "PgA" THEN 62
WHEN "AD4" THEN 62
WHEN "PwA" THEN 63
WHEN "AD8" THEN 63
WHEN "QAA" THEN 64
WHEN "AEA" THEN 64
WHEN "QQA" THEN 65
WHEN "AEE" THEN 65
WHEN "QgA" THEN 66
WHEN "AEI" THEN 66
WHEN "QwA" THEN 67
WHEN "AEM" THEN 67
WHEN "RAA" THEN 68
WHEN "AEQ" THEN 68
WHEN "RQA" THEN 69
WHEN "AEU" THEN 69
WHEN "RgA" THEN 70
WHEN "AEY" THEN 70
WHEN "RwA" THEN 71
WHEN "AEc" THEN 71
WHEN "SAA" THEN 72
WHEN "AEg" THEN 72
WHEN "SQA" THEN 73
WHEN "AEk" THEN 73
WHEN "SgA" THEN 74
WHEN "AEo" THEN 74
WHEN "SwA" THEN 75
WHEN "AEs" THEN 75
WHEN "TAA" THEN 76
WHEN "AEw" THEN 76
WHEN "TQA" THEN 77
WHEN "AE0" THEN 77
WHEN "TgA" THEN 78
WHEN "AE4" THEN 78
WHEN "TwA" THEN 79
WHEN "AE8" THEN 79
WHEN "UAA" THEN 80
WHEN "AFA" THEN 80
WHEN "UQA" THEN 81
WHEN "AFE" THEN 81
WHEN "UgA" THEN 82
WHEN "AFI" THEN 82
WHEN "UwA" THEN 83
WHEN "AFM" THEN 83
WHEN "VAA" THEN 84
WHEN "AFQ" THEN 84
WHEN "VQA" THEN 85
WHEN "AFU" THEN 85
WHEN "VgA" THEN 86
WHEN "AFY" THEN 86
WHEN "VwA" THEN 87
WHEN "AFc" THEN 87
WHEN "WAA" THEN 88
WHEN "AFg" THEN 88
WHEN "WQA" THEN 89
WHEN "AFk" THEN 89
WHEN "WgA" THEN 90
WHEN "AFo" THEN 90
WHEN "WwA" THEN 91
WHEN "AFs" THEN 91
WHEN "XAA" THEN 92
WHEN "AFw" THEN 92
WHEN "XQA" THEN 93
WHEN "AF0" THEN 93
WHEN "XgA" THEN 94
WHEN "AF4" THEN 94
WHEN "XwA" THEN 95
WHEN "AF8" THEN 95
WHEN "YAA" THEN 96
WHEN "AGA" THEN 96
WHEN "YQA" THEN 97
WHEN "AGE" THEN 97
WHEN "YgA" THEN 98
WHEN "AGI" THEN 98
WHEN "YwA" THEN 99
WHEN "AGM" THEN 99
WHEN "ZAA" THEN 100
WHEN "AGQ" THEN 100
ELSE
-1
END pdq_value
INTO
v_ret_pdq_value
FROM
sysprocplan p, sysprocedures f
WHERE
p.planid = -2 AND
f.procid = p.procid AND
f.procname = v_proc_name;

IF v_ret_pdq_value = -1
THEN
RAISE EXCEPTION -746,0,'Could not decode PDQ value. Please check query';
ELSE
RETURN v_ret_pdq_value;
END IF
END FUNCTION;



Updated on Jan 12, 2011: Cosmo noted that the procedure should be declared as a function and asked me to reference him as Cosmo instead of Simon David

Alterado em 12 de Jan de 2011: O Cosmo referiu que o procedimento deveria ser declarado como função e pediu para ser referido como Cosmo em vez de Simon David

Post weekly (weekly)

  • Talk about virtual field trips. Here are 10 great Car trips that you can play right in your browser. Show your students!

    tags: GoogleEarth

    • less costly options, like smartphones
    • paying for their iPads through federal and other grants,
    • “You can do everything that the iPad can with existing off-the-shelf technology and hardware for probably $300 to $400 less per device,
    • About 5,400 educational applications are available specifically for the iPad, of which nearly 1,000 can be downloaded free.
    • “It has brought individual technology into the classroom without changing the classroom atmosphere,”
    • “It’s not about a cool application,” Dr. Brenner said. “We are talking about changing the way we do business in the classroom.”
  • This REALLY upsets me. To me, it's clear that these folks should NOT be making decisions about what matters in education.

    tags: ipads

    • teach Kafka in multimedia, history through “Jeopardy”-like games and math with step-by-step animation of complex problems.
    • The iPads cost $750 apiece
    • Educators, for instance, are still divided over whether initiatives to give every student a laptop have made a difference academically.
    • “IPads are marvelous tools to engage kids, but then the novelty wears off and you get into hard-core issues of teaching and learning.”
    • “If there isn’t an app that does something I need, there will be sooner or later,”
    • $56,250 for the initial 75
    • 32-gigabyte, with case and stylus
    • play math games, study world maps and read “Winnie the Pooh.”
    • “I think this could very well be the biggest thing to hit school technology since the overhead projector,
    • The New York City public schools have ordered more than 2,000 iPads, for $1.3 million
    • More than 200 Chicago public schools applied for 23 district-financed iPad grants totaling $450,000. The Virginia Department of Education is overseeing a $150,000 iPad initiative

Posted from Diigo. The rest of my favorite links are here.

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Sweet Tomatoes Printable Coupons