Re: [U2] THE variable names
In a message dated 7/10/2005 6:18:39 PM Pacific Daylight Time, [EMAIL PROTECTED] writes: LOOP REMOVE PROD FROM PRODS SETTING MORE.PRODS ...do stuff... WHILE MORE.PRODS REPEAT Why use Remove? It's unfamiliar to more oldtimers and requires use of SETTING. Just SELECT PRODS and then READNEXT PROD ELSE DONE = TRUE :) Will Johnson --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/
Re: [U2] Strange phenomena using EXECUTE QSELECT and DATA statements in subr...
In a message dated 7/11/2005 6:38:11 AM Pacific Daylight Time, [EMAIL PROTECTED] writes: QUERY = \SELECT PO.GROUP = 'Group Reference'\ DATA \QSELECT PO.GROUP (2)\ DATA \SSELECT POF BY GROUP BY-DSND PO.DATE\ EXECUTE QUERY Before you execute add a CLEARSELECT in order to remove any old select lists that are hanging around in the memory of the process. I suspect that is the reason you are getting this odd result. Will Johnson --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/
Re: [U2] THE variable names
Warning ! In this thread we've seen three looping mechanisms been presented as equivalent ( pairwise, first i and ii then ii and iii): i) N = DCOUNT( PRODS,@VM) FOR II=1 TO N X = PRODS1,II ... NEXT II ii) LOOP REMOVE PROD FROM PRODS SETTING MORE.PRODS ...do stuff... WHILE MORE.PRODS REPEAT iii) SELECT PRODS and then READNEXT PROD ELSE DONE = TRUE They are not! i) extracts full values regardless of the presence of lower level marks in them. ii) extracts the smallest items between marks of any level iii) extracts fields ( attibutes ) . except in the common case that there is only one level of marks (and that the first and third are adjusted to that level of course ) -- mats --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/
RE: [U2] [UV] How does UV authenticate to Windows
U2 does not have a separate Login process. One of the great advantages of UniVerse is that it took advantage of the facilities of the operating system in relation to file systems, security, etc. It rarely in the past rolled its own. The biggest issue was telnet server on windows which was not available at the time. Whilst I do not know the internal processes that you would have get from IBM, my impression is that UniVerse uses the windows authentication. For a user to be logged into universe, they have to have a login account created for windows and that is all. UniVerse could not run on Windows 98 as Vmark stated authentication and proper file systems did not exist for them to run the database on. If you want to restrict file access you apply security restrictions through windows, you do not use any IBM utility. If you apply SQL security in universe, then you can find you don't have SQL access to UniVerse when they change domain names. Whilst SQL security is in an additional layer in windows it does not overwrite windows security. Regards David Jordan --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/
Re: [U2] THE variable names
snip (Why else is COUNT(VAR,@FM)+(VAR NE ) syntax so popular?) \snip Because there is a real difference between COUNT and DCOUNT. COUNT counts the number of delimiters and DCOUNT counts the number of elements being delimited. Sort of backwards but accurate. Thus A=mark would have COUNT(A,@VM) have a value of 0 while DCOUNT(A,@VM) would be 1. DCOUNT on null string returns 0. Nice. The addition of the +(VAR NE ) adds the needed '1' to whatever COUNT produced. my 1 cent. --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/
Re: [U2] THE variable names
Does that work. PRODS was not a File handle. Is there some magic that turns a mv'd variable into a file handle. Besides, if it did work, you would lose the included MV variable for use with associated fields or would have to manage by hand. Why use Remove? It's unfamiliar to more oldtimers and requires use of SETTING. Just SELECT PRODS and then READNEXT PROD ELSE DONE = TRUE --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/
Re: [U2] THE variable names
[EMAIL PROTECTED] wrote: snip (Why else is COUNT(VAR,@FM)+(VAR NE ) syntax so popular?) snip Because there is a real difference between COUNT and DCOUNT. COUNT counts the number of delimiters and DCOUNT counts the number of elements being delimited. Sort of backwards but accurate. Thus A=mark would have COUNT(A,@VM) have a value of 0 while DCOUNT(A,@VM) would be 1. DCOUNT on null string returns 0. Nice. The addition of the +(VAR NE ) adds the needed '1' to whatever COUNT produced. You seem to have missed the point ... to quote a previous post of yours REMOVE is not universally available on all MV platforms. DCOUNT is. Read my earlier post. All I was asking was why was the COUNT version popular if DCOUNT was available? That's the point - it WASN'T available. Cheers, Wol --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/
[U2] Re: U2 Users Digest V1 #732
Have you tried using PrcView? It's free and is much better at killing (as well as viewing) processes than the Windows Task Manager. HTH, David Beahm Date: Mon, 11 Jul 2005 21:02:37 +0100 From: Anthony W. Youngman [EMAIL PROTECTED] Subject: Re: [U2] Basic questions from a noob snip Okay - the fix. I found that Task Manager couldn't kill it directly (End Process doesn't work), but if you right-click the task then one of the options is debug. Selecting this would crash the process, getting rid of it that way. I think the worst mess I've had to clean up was when we had three or four such rogue processes - because they ate up so much cpu it was very slow to kill each one, and only when there was only one left did response speed up. Cheers, Wol --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/
RE: [U2] THE variable names
I'm just wondering who comes up with this stuff. Those who use the language to it's most interpretable form. I have seen general BASIC programming instructors focus on the use of non-cryptic, non-abbreviated variables, instead of compact code. Afterall, the pcode generated is the same for THE.CUSTOMER.CITY as it is for CCITY or CUST_CITY. Which can you comprehend the quickest at a glance? You can also parse your own code, if you have a delimited variable structure that is consistent throughout the entire project. All good things, unless you're main focus is keeping the code short and cryptic. I have to agree, though, that THE is not really a useful variable keyword. It does help with programmatic variable identification, though. To each his own. Also, was there ever any lack of faith in the READ statement when assigning the variable REC. I'm now seeing some of this: REC= ; READ REC FROM FILE, ID ELSE REC= I use the else null clause religiously under D3. I have seen numerous accounts of read failures not resetting the target variable. The program chugs along happily with data from a previous read and it eventually blows up for a seemingly unknown reason. The extra null assignment is overkill, unless it exists once at the start of the program to prevent variable not assigned run-time notices. Glen --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/
RE: [U2] OT: AVG
I thinks that the key phrase here was I've never used the product and have no experience of it -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of Glen B Sent: Monday, July 11, 2005 05:39 PM To: u2-users@listserver.u2ug.org Subject: [U2] OT: AVG Sorry to see you had such bad luck. I've been running it on 30+ PCs with varying versions of Windows and never had it once crash a PC here. I have the network admin version, though. Some of the earlier editions of the personal free software were a little flaky and problematic, but the recent for-fee versions have been very stable even on older P3 boxes running Win98. Glen -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of Anthony W. Youngman Sent: Monday, July 11, 2005 4:06 PM To: u2-users@listserver.u2ug.org Subject: Re: [U2] Recursive gosub subroutines and for/next loops In message [EMAIL PROTECTED], Glen B [EMAIL PROTECTED] writes Yay, another AVG fan. You can disable the outgoing tags for OK messages. :) And a very ANTI AVG guy here ... having had it trash my mother's system. I hate supporting Windows at the best of times, and having to fix that system down a phone line when I've never used the product and have no experience of it - NOT a pleasant experience. Glen Cheers, Wol -- Anthony W. Youngman [EMAIL PROTECTED] 'Yings, yow graley yin! Suz ae rikt dheu,' said the blue man, taking the thimble. 'What *is* he?' said Magrat. 'They're gnomes,' said Nanny. The man lowered the thimble. 'Pictsies!' Carpe Jugulum, Terry Pratchett 1998 Visit the MaVerick web-site - http://www.maverick-dbms.org Open Source Pick --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/ --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/ --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/
RE: [U2] THE variable names
I'll second Mats, and move to add an amendment: iii) SELECT PRODS and then READNEXT PROD ELSE DONE = TRUE iii) extracts fields ( attributes ) . READNEXT PROD ELSE ... extracts the ENTIRE 1st VALUE of each field (i.e., including ALL SUBvalues of that 1st value) but ignores any other values. Notice A|a and B|b disappear from being the scene: RDNXTTST 01 ARRAY = CONVERT( ' ;.', @SM:@VM:@AM, '1 one;A a.2 two;B b' ) 02 CRT ARRAY 03 SELECT ARRAY 04 LOOP WHILE READNEXT X 05CRT X 06 REPEAT RUN CDS.BP RDNXTTST 1|one}A|a~2|two}B|b 1|one 2|two That said, I'll concede it can be a useful technique. --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/
RE: [U2] THE variable names
not trying to start anything - but was this intended as a joke ? I read this as : don't use current language features because the old 'pros' who haven't picked up a manual in 20 years won't understand it ? -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of [EMAIL PROTECTED] Sent: Tuesday, July 12, 2005 03:59 AM To: u2-users@listserver.u2ug.org Subject: Re: [U2] THE variable names In a message dated 7/10/2005 6:18:39 PM Pacific Daylight Time, [EMAIL PROTECTED] writes: LOOP REMOVE PROD FROM PRODS SETTING MORE.PRODS ...do stuff... WHILE MORE.PRODS REPEAT Why use Remove? It's unfamiliar to more oldtimers and requires use of SETTING. Just SELECT PRODS and then READNEXT PROD ELSE DONE = TRUE :) Will Johnson --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/ --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/
RE: [U2] OT: AVG
I have used AVG on at least 5 machines, XP and W98. Never had a problem, except when they upgraded the software and the older program would no long update (unless I loaded the newest engine). Once the newest engine was loaded, it ran fine. (the personal - no cost program). Three programs I MUST have on all PCs, 1. Spybot SD, 2. Adaware and 3. AVG between the three most problems are either stopped, prevented or eliminated. George --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/
RE: [U2] Re: U2 Users Digest V1 #732
Is that from the wonderful SysInternals.com website? -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of David Beahm Sent: Tuesday, July 12, 2005 9:05 AM To: u2-users@listserver.u2ug.org Subject: [U2] Re: U2 Users Digest V1 #732 Have you tried using PrcView? It's free and is much better at killing (as well as viewing) processes than the Windows Task Manager. HTH, David Beahm Date: Mon, 11 Jul 2005 21:02:37 +0100 From: Anthony W. Youngman [EMAIL PROTECTED] Subject: Re: [U2] Basic questions from a noob snip Okay - the fix. I found that Task Manager couldn't kill it directly (End Process doesn't work), but if you right-click the task then one of the options is debug. Selecting this would crash the process, getting rid of it that way. I think the worst mess I've had to clean up was when we had three or four such rogue processes - because they ate up so much cpu it was very slow to kill each one, and only when there was only one left did response speed up. Cheers, Wol --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/ --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/
RE: [U2] OT: AVG
[EMAIL PROTECTED] wrote: I thinks that the key phrase here was I've never used the product and have no experience of it Bang on ... I use Sophos, and there's just been a news story that mixing W2K final rollup plus Sophos isn't wise ... But no, my brother and me were down at Mum's, where she had a working pc. I upgraded mum's Office 2000 setup, while Bro upgraded AVG from v6 to v7. I can't remember the details, but (bearing in mind it *could* have been Office that was responsible, but highly unlikely) after that the system was unusable. Iirc it wouldn't even boot properly. I ended up installing W2K. And I need to go down again because that is now doing weird and wonderful things. I really ought to work out how to get Office to run under Wine (Mum only started using doze because she went on a course that expected everyone to be using Office :-( I HATE supporting doze - especially over a phone and 60 miles away! At least my setup I can (mostly) keep clean. Cheers, Wol --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/
[U2] LOCK Query
Hi all, For a transaction lock using the LOCK command, how can we extract the user id of user who's placed the LOCK? Also which are the 64 transaction locks? Please do let me know incase of any inputs Regards, Ambika CAUTION - Disclaimer * This e-mail contains PRIVILEGED AND CONFIDENTIAL INFORMATION intended solely for the use of the addressee(s). If you are not the intended recipient, please notify the sender by e-mail and delete the original message. Further, you are not to copy, disclose, or distribute this e-mail or its contents to any other person and any such actions are unlawful. This e-mail may contain viruses. Infosys has taken every reasonable precaution to minimize this risk, but is not liable for any damage you may sustain as a result of any virus in this e-mail. You should carry out your own virus checks before opening the e-mail or attachment. Infosys reserves the right to monitor and review the content of all messages sent to or from this e-mail address. Messages sent to or from this e-mail address may be stored on the Infosys e-mail system. ***INFOSYS End of Disclaimer INFOSYS*** --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/
RE: [U2] OT: AVG
I'll AMEN on all three programs. They are absolute essentials. We started using AVG several years ago when it dramatically demonstrated it's efficiency. I can't remember now if it was the Melissa virus or the LoveBug, but when it first appeared, all the major anti-virus vendors were scrambling to find a way to block it, and their users were getting infected right and left. AVG just quietly stopped it and went on about its business. The updates are automatic and painless. The personal edition is free and the commercial version is very inexpensive. As for AdAware and Spybot SD, you do need them both. Some things will slip by one, different things will slip by the other, but between then you probably have 99.5% coverage. Another good (and free) program in this category is PestPatrol. === Norman Morgan [EMAIL PROTECTED] http://www.brake.com === Why are there interstate highways in Hawaii? === -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of George Gallen Sent: Tuesday, July 12, 2005 9:03 AM To: u2-users@listserver.u2ug.org Subject: RE: [U2] OT: AVG I have used AVG on at least 5 machines, XP and W98. Never had a problem, except when they upgraded the software and the older program would no long update (unless I loaded the newest engine). Once the newest engine was loaded, it ran fine. (the personal - no cost program). Three programs I MUST have on all PCs, 1. Spybot SD, 2. Adaware and 3. AVG between the three most problems are either stopped, prevented or eliminated. George --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/ -- No virus found in this incoming message. Checked by AVG Anti-Virus. Version: 7.0.323 / Virus Database: 267.8.13/47 - Release Date: 7/12/2005 -- No virus found in this outgoing message. Checked by AVG Anti-Virus. Version: 7.0.323 / Virus Database: 267.8.13/47 - Release Date: 7/12/2005 --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/
RE: [U2] [UV] How does UV authenticate to Windows
Then you authenicate with NTLM or basic windows authentication. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Richard Wilson Sent: Monday, July 11, 2005 5:15 PM To: u2-users@listserver.u2ug.org Subject: RE: [U2] [UV] How does UV authenticate to Windows We are being audited for SOX and they asked the question about how Universe authenticates. It appears centre around to be how fraud can be perpetrated. -Original Message- From: Bob Woodward [mailto:[EMAIL PROTECTED] Sent: Tuesday, 12 July 2005 8:59 AM To: u2-users@listserver.u2ug.org Subject: RE: [U2] [UV] How does UV authenticate to Windows Hi Mike. I don't think SOX requires you to be running any version of anything. From what I understand, SOX is an accountability requirement. Auditing is of the reliability of that accountability, not the actual SOX requirement itself. Also, I just checked and Win2k has transitioning to EXTENDED support, not unsupported, status. Bob Woodward Programmer/Analyst Harbor Wholesale Grocery [EMAIL PROTECTED] -Original Message- From: [EMAIL PROTECTED] [mailto:owner-u2- [EMAIL PROTECTED] On Behalf Of HENDERSON MIKE, MR Sent: Monday, July 11, 2005 3:29 PM To: u2-users@listserver.u2ug.org Subject: [SPAM] - [ ] - RE: [U2] [UV] How does UV authenticate to Windows Barry -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Barry Brevik Sent: Tuesday, 12 July 2005 09:26 To: U2-users (E-mail) Subject: [U2] [UV] How does UV authenticate to Windows UV 9.6.1.3 on Windows 2000. Hmm ... Running an unsupported version of the DBMS on an unsupported (since 1st July) O/S version. How can you pass a SOX audit? ;-) [snip] --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/ --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/ --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/
Re: [U2] THE variable names
In a message dated 7/12/2005 5:35:07 AM Pacific Daylight Time, [EMAIL PROTECTED] writes: Does that work. PRODS was not a File handle. Is there some magic that turns a mv'd variable into a file handle. Besides, if it did work, you would lose the included MV variable for use with associated fields or would have to manage by hand. Yes it works. Yes there is magic. And no you don't lose the variable its there just find the way it was, never knowing what malicious thing you've done to it's shadow. Will Johnson --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/
RE: [U2] OT: AVG
I find that one of the nicest systems for the 'Mums' of the world is Linspire (www.linspire.com). I have it on my kids PC's with a SurfSafe. It has an Office Suite that is compatible with Windows products. It's been over a year now and the PC's have never acted 'goofy', no bluescreen, no pop-up's, no problems at all. Anthony -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of [EMAIL PROTECTED] Sent: Tuesday, July 12, 2005 10:31 AM To: u2-users@listserver.u2ug.org; [EMAIL PROTECTED] Subject: RE: [U2] OT: AVG [EMAIL PROTECTED] wrote: I thinks that the key phrase here was I've never used the product and have no experience of it Bang on ... I use Sophos, and there's just been a news story that mixing W2K final rollup plus Sophos isn't wise ... But no, my brother and me were down at Mum's, where she had a working pc. I upgraded mum's Office 2000 setup, while Bro upgraded AVG from v6 to v7. I can't remember the details, but (bearing in mind it *could* have been Office that was responsible, but highly unlikely) after that the system was unusable. Iirc it wouldn't even boot properly. I ended up installing W2K. And I need to go down again because that is now doing weird and wonderful things. I really ought to work out how to get Office to run under Wine (Mum only started using doze because she went on a course that expected everyone to be using Office :-( I HATE supporting doze - especially over a phone and 60 miles away! At least my setup I can (mostly) keep clean. Cheers, Wol --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/ --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/
Re: [U2] THE variable names
In a message dated 7/12/2005 7:06:38 AM Pacific Daylight Time, [EMAIL PROTECTED] writes: not trying to start anything - but was this intended as a joke ? I read this as : don't use current language features because the old 'pros' who haven't picked up a manual in 20 years won't understand it ? You're write. Code to the most obtuse style. That way you ensure job security :) Will Johnson --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/
Re: [U2] LOCK Query
In a message dated 7/12/2005 8:11:37 AM Pacific Daylight Time, [EMAIL PROTECTED] writes: For a transaction lock using the LOCK command, how can we extract the user id of user who's placed the LOCK? Also which are the 64 transaction locks? Please do let me know incase of any inputs Regards, Ambika The 64 locks are completely user-definable. Your program style must take into account how to define them and how to debug them when that appears necessary. The LOCK command is rarely used because of this, imho. Where I've seen it used, it is used to keep two people from both closing a ledger at the same time or purging a file at the same time, etc. Will Johnson --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/
RE: [U2] [UV] How does UV authenticate to Windows
Well, I still don't have my answer, but the replies have been really interesting! I want to thank everyone for contributing. Barry Brevik --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/
RE: [U2] Voc pointer not working
SET.INDEX filename path Please watch copying files at the O.S level if they could be in use. On UniVerse please use SUSPEND.FILES ON / OFF and on UniData dbpause / dbresume. Of course you could just stop the database... JayJay --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/
RE: Memo: RE: [U2] [UV] indexed 64 bit files {Unclassified}
Asvin, There were a number of fixes to 64 bit files (one of them about a 3Gb limit I recall) - this is not one I know specifically but there were a few... JayJay (always learning) --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/
RE: [U2] LOCK Query
The LOCK command has no predefined meaning. It is totally up to you, as the programmer, to assign meaning to each of the 64 lock numbers. What I've done is use the menu option number to help identify which program placed the lock. Since we only use LOCK for our phantom programs, the value associated to the lock number is always 0 but I think for standard use, the user id is there. You can see which lock numbers are set by using the LIST.LOCKS command from the command line. If you want to programmatically find out who has a lock then in the ELSE logic of the LOCK command you'll need to EXECUTE LIST.LOCKS CAPTURING LOCK.LIST. Then parse out the data in LOCK.LIST to find the current user id for your lock number. BobW -Original Message- From: [EMAIL PROTECTED] [mailto:owner-u2- [EMAIL PROTECTED] On Behalf Of Ambika_Nayak Sent: Tuesday, July 12, 2005 7:58 AM To: u2-users@listserver.u2ug.org Subject: [U2] LOCK Query Hi all, For a transaction lock using the LOCK command, how can we extract the user id of user who's placed the LOCK? Also which are the 64 transaction locks? Please do let me know incase of any inputs Regards, Ambika CAUTION - Disclaimer * This e-mail contains PRIVILEGED AND CONFIDENTIAL INFORMATION intended solely for the use of the addressee(s). If you are not the intended recipient, please notify the sender by e-mail and delete the original message. Further, you are not to copy, disclose, or distribute this e-mail or its contents to any other person and any such actions are unlawful. This e-mail may contain viruses. Infosys has taken every reasonable precaution to minimize this risk, but is not liable for any damage you may sustain as a result of any virus in this e-mail. You should carry out your own virus checks before opening the e- mail or attachment. Infosys reserves the right to monitor and review the content of all messages sent to or from this e-mail address. Messages sent to or from this e-mail address may be stored on the Infosys e-mail system. ***INFOSYS End of Disclaimer INFOSYS*** --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/ --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/
RE: [U2] THE variable names
i may be correct - though i'm fairly sure i'm not 'write'. actually i don't see where obtuse comes into it. its simply a matter of keeping current in your profession. especially when the specific case in point ( REMOVE() function ) is a feature that has been around for how many years ? the oldest universe manuals I have are 17 years old and there it is. ditto for DCOUNT(). Gerry -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of [EMAIL PROTECTED] Sent: Tuesday, July 12, 2005 01:21 PM To: u2-users@listserver.u2ug.org Subject: Re: [U2] THE variable names In a message dated 7/12/2005 7:06:38 AM Pacific Daylight Time, [EMAIL PROTECTED] writes: not trying to start anything - but was this intended as a joke ? I read this as : don't use current language features because the old 'pros' who haven't picked up a manual in 20 years won't understand it ? You're write. Code to the most obtuse style. That way you ensure job security :) Will Johnson --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/ --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/
Re: [U2] THE variable names
In a message dated 7/12/05 4:51:27 PM Pacific Daylight Time, [EMAIL PROTECTED] writes: ( REMOVE() function ) is a feature that has been around for how many years ? the oldest universe manuals I have are 17 years old and there it is. ditto for DCOUNT(). 17 years? You're a beginner :) Will Johnson --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/
RE: [U2] [UV] How does UV authenticate to Windows
Probably the most honest answer to that is that UniVerse does not do any authentication at all. It relies solely upon the operating system authentication, and honours operating system file permissions. Further security can be built into applications. A finer granularity of security is possible using UniVerse/SQL GRANT, but so few sites choose to take this route. - Original Message - From: Richard Wilson [EMAIL PROTECTED] To: u2-users@listserver.u2ug.org Subject: RE: [U2] [UV] How does UV authenticate to Windows Date: Tue, 12 Jul 2005 10:15:23 +1000 We are being audited for SOX and they asked the question about how Universe authenticates. It appears centre around to be how fraud can be perpetrated. --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/
Re: [U2] LOCK Query
The LOCK command isn't really a transaction lock. It's intended more as a task synchronization lock, though you could use it to control transaction single-threading. The LIST.LOCKS command shows the current owner. In a program, if the ELSE clause of the LOCK statement is taken, then STATUS() returns the UniVerse user number of the holder. Note that these locks are cleared in BASIC using UNLOCK but from the command line using CLEAR.LOCKS. They can also be cleared by the Administrator's MASTER LOCKS command. The number of such locks is controlled by the PSEMNUM configuration parameter in the uvconfig file. --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/
Re: [U2] THE variable names
At 08:29 -0400 2005/07/12, Mark Johnson wrote: Why use Remove? It's unfamiliar to more oldtimers For a number of systems, it's faster if you're just pulling off fields or values.* Also it's the same form if the list is @FM, @VM, @SM or @TM separated, so there's no need to do one ore more RAISE()s. And for folks that started with uv or udt, instead of one of the more Pick-like flavors, using SELECT on a non-file variable is very unfamiliar and counter intuitive. Ray *If you're really trying to save clock cycles, do a benchmark, sometimes the REMOVE statement is slower than the REMOVE() function. -- .=. | =-=-=-=-=-=-= Eagle Rock Information Systems Corp =-=-=-=-=-=-= | | -=-=-=-=-=-=- web and database business solutions -=-=-=-=-=-=- | | http://www.eriscorp.commailto:[EMAIL PROTECTED] | |Midwest Regional Office: 815-547-0662 (voice) 815-547-0353 (Fax)| .=. --- u2-users mailing list u2-users@listserver.u2ug.org To unsubscribe please visit http://listserver.u2ug.org/