Tuesday, October 19, 2010

Quick Start DB2 Viper



Create database objects

Let us first create a separate DB2 Unicode database. In DB2 Viper, only Unicode database can also store XML documents and SQL data, more traditional formats, such as integer, date / time, variable-length strings, and so on. You will then create the objects in the database to manage XML and other types of data.

Create test database

To create a new DB2 Unicode "test" database, open the DB2 command window, issue the statement to specify the Unicode code set and support areas, such as Listing 1:

Listing 1. To create a database for storing XML data

create database test using codeset UTF-8 territory us

Once you create a Unicode database, you do not need to issue any specific order or take any further steps to make to its own DB2 to store XML data in hierarchical format, for your DB2 system is ready.

Create a sample table

To store XML data, create XML column that contains one or more tables. These tables serve as the logical document collection containers; in the background, DB2 actually uses a different storage options to store XML and non XML data. However, the use table as the management of a variety of data formats supported by the logic of an object, simplifying the management and application development issues, especially when you need a separate query in the integration of different data formats.

You can define the DB2 table to include only the XML column that contains only the traditional SQL types of columns or include both. In this paper, the latter was modeled. List 2 examples of connection to the "test" database, and create the two tables. The first is the "items" list to track the sale of goods and customer evaluation information on the goods. The second track is on the table "customer" information, including contact information on the data. Note "comments" and "contactinfo" is based on the new DB2 XML data type, while all other columns are based on traditional SQL data types.

Listing 2. Create a table for XML data

connect to test;

create table items (

id int primary key not null,

brandname varchar (30),

itemname varchar (30),

sku int,

srp decimal (7,2),

comments xml

);

create table clients (

id int primary key not null,

name varchar (50),

status varchar (10),

contactinfo xml

);

If you look closely at these examples of the table definition, you will notice that "comments" and "contactinfo" column are not carried out the definition of the internal structure of XML documents. This is an important feature of DB2. Users do not need to store data on a predefined XML data structure (or, more precisely, an XML mode). In fact, DB2 can be stored in a separate column of any well-formed XML document, which means that different modes of XML documents - or not associated with any registration of a document model - can be stored in the same DB2 column . When we discuss how to store data in DB2, this article will discuss in detail this feature.

Create view

You are free to include XML data in the table to create the view, as you can include only the traditional SQL data types to create the view as a table. Listing 3 example creates a "Gold" status of a customer's view:

Listing 3. To create a view that contains XML data

create view goldview as

select id, name, contactinfo

from clients where status =''Gold'';

A Note on the index

Finally, there is no need to create a dedicated XML column indexes to improve query speed data. Because this is an introductory article, but very little sample data, so that this does not cover the topic. However, in a production environment, the definition of an appropriate index for the achievement of optimal performance is critical. View this article at the end of the "reference" to help understand new DB2 technology index

XML data storage

After the table is created, and now you can fill them up with data. You can directly issue SQL INSERT statement to finish the job, or by calling the DB2 IMPORT tools INSERT statement issued in the background.

Using the INSERT statement

Using INSERT, you can fill directly to the DB2 in the original XML data. If you have already written an application in the XML data stored in the variable, then this may be the easiest way. But if you only just started using DB2 Viper, and do not want to write applications, then you can interactively send INSERT statement (I found using the DB2 Command Editor is a convenient, although you can also use the command line processor, if you prefer so to do).

To use the DB2 Command Editor, please start the DB2 Control Center. From the top drop-down menu "Tools" select Command Editor, will appear in a separate window, shown in Figure 1.

Figure 1. DB2 Command Editor






In the above pane, enter the following statement:

Listing 4. Interactively insert XML data

connect to test;

insert into clients values (77,''John Smith'',''Gold'',

xmlparse (document''111 Main St., Dallas, TX, 00112''

preserve whitespace)

)

Click the green arrow to the left of the implementation of the order.

Note that the online provision of XML data (shown in Listing 4) require you to call XMLPARSE function to convert the document into a character value from the XML type value. In this case the input document is quite simple. If the document is large or very complex, the XML data type to the list of 4 as shown in the INSERT statement is unrealistic. In most cases, you use host variables or parameter markers write an application to insert data. You will find this article with a brief write Java code examples. However, since this is an introductory tutorial, so we will not discuss in detail the application development topics. Instead, we will discuss DB2 XML column using the data to populate another option - using IMPORT tool.

Use the DB2 IMPORT

If you're in the file contains XML data, DB2 IMPORT tools provide you with a DB2 table using the data to populate a simple way. You do not need to write applications that only need to create a delimited ASCII file that contains the table you want to load the data. Parameter is stored in a file specified in the XML data in the appropriate file name.

You can choose the text editor to create a delimited ASCII file. (By convention, these files are usually. Del type). Each line in the file represents a row into a table of data. If the line contains the XML Data Specifier (XDS), IMPORT will be included in the reference to read the data in the XML file and to import data into DB2 in. For example, Figure 2, the first line contains the Ella Kimpton information, including her ID, name and customer status. Her contact information is also included in the Client3227.xml file.

Figure 2. Entered into the DB2 IMPORT delimited ASCII file example






Client3227.xml contents of the file shown in Figure 3. As you see, the file contains Ella Kimpton of address, telephone number, fax number and e-mail and other XML elements.

Figure 3. Sample customer XML document






If you do not want to insert all the rows have the XML file, you may be curious about the import data. This is very easy to do, ignore the input file can XDS information. For example, in Figure 4 items.del file ignored Item 3641 ("Dress to Impress" package) and XML file name. The results of this line of XML column does not contain any data.

Figure 4. Delimited ASCII file in the sample line of no XML Data Specifier






With XML files and ASCII delimited file, you can now use the DB2 IMPORT the. Listing 4 in the following this statement will be C: / XMLFILES directory clients.del content specified in the file into "clients" table.

Listing 4. To import the data to the "clients" table

import from clients.del of del xml from C: / XMLFILES insert into user1.clients;

Clients.del shown in Figure 2 contains six rows of data, including the six XML files. IMPORT command successful implementation of the results of the output in Figure 5.

Figure 5. DB2 IMPORT sample output






Independent software vendors, such as Exegenix, provided to Word, PDF and other document formats into XML tools, in order to facilitate the import into DB2. (See Resources to obtain more information on Exegenix.

Validate XML data

INSERT and IMPORT only discussion of the sample to the table to write a good XML format data. They do not validate the data - that is, they do not verify whether a particular XML data model, and therefore stick to determine the structure. Control of DB2 to do that is possible, however, let us study another way to accomplish this task:

Step 1: Create XML mode

In order to validate XML data, you need to define an XML model, to specify an acceptable XML elements, their order and data types, and so on. W3C XML is an industry standard model and is written in XML. Although the model to explain the characteristics of XML beyond the scope of this article, but there are various tutorials on the Web for reference (see "Resources").

There are many ways to develop XML model from using your favorite text editor to manually create the model, and then to use the tools to generate graphical design or pattern. Independent software vendors, such as MDXSYS Limited, provide such XML tools, IBM is also through its Java? Integrated development environment provides support for XML schema generation.

For example, using IBM WebSphere? Studio, you can Client3227.xml file (Figure 3) imported into the Web project. Use the mouse right click and select Generate -> XML Schema. This will generate a specific input file a valid XML model, shown in Figure 6. You can then modify the file (if required) and register it to DB2.

Figure 6. To use WebSphere Studio XML file generated from an XML model






Let us assume that you need to make the XML model is quite flexible, so that you can collect different types of customer contact information. For example, some customers may provide you with multiple phone numbers or e-mail address and other customers do not have to provide so much.

Figure 7 shows the XML model from WebSphere Studio generated model to provide this flexibility. It includes elements of a given minimum and maximum allowed number of occurrences ("minOccurs" and "maxOccurs") for additional specifications. In this case, does not require customers to provide you with anything you want to collect contact information. However, if customers choose to your e-mail message, the model will enable the consistency of the document to contain up to five e-mail address (that is 5 "email" element value).

Figure 7. For the customer contact information of the sample XML model






As you have noted, XML model will also contain type information. Although the model shown in Figure 7 specifies only the basic elements of all are treated as strings, but most of the production of XML model will also use other data types, such as integer, decimal, date, and so on. If you INSERT or IMPORT for an operation as part of a given model to validate the XML document, then DB2 will automatically add to your XML document type comments.

Step 2: Register XML mode

Creates an appropriate XML model, you need to register the DB2 model. IBM offers a variety of ways to accomplish this task. DB2 Control Center you can run graphical wizard to guide you through the process, call the system stored procedure, or direct issue DB2 commands. Here we use the second method, because it can help you more easily understand the essence of your DB2 for that one end of the operation.

If your model is very large, you may need to register it before you try to increase the application heap size. For example, issue the following statement:

Listing 4. To increase the application heap size

connect to test;

update db cfg using applheapsz 10000;

Next, register your XML model. If your XML model does not refer to other XML model, you may need to register with a single command and to complete the process. Otherwise, you will need to issue a single command to register your initial XML model, adding other needs and complete the registration process models. When the models become very large file, usually it's content into multiple files to improve the maintainability, readability and reusability. This is similar to a complex application into multiple modules or components. Details on this topic, please refer to W3C "XML Schema primer" (see "Resources").

This article uses a simple, independent XML model. You can use this command to register the DB2:

Listing 5. Registered XML mode

register xmlschema''http://mysample.org''from''C: / XMLFiles / ClientInfo.xsd''as

user1.mysample complete;

In this case, ClientInfo.xsd is the XML model file name, it is located in C: / XMLFiles directory. The XML model will be registered to the SQL mode "user1" and the XML mode "mysample" DB2 under the internal repository. In this case is just a placeholder http://mysample.org parameter that specifies the XML instance document referenced by the Uniform Resource Identifier (URI); many XML documents use the name space, which is specified URI. Finally, "complete" XML clause will instruct DB2 to complete the registration process, so that patterns can be used to validate XML data.

It is noteworthy that model does not specify the mode of registration process will be applied to the table of which (s) listed. In other words, mode does not mean that SQL column constraint. A given model can be verified in a variety of different table XML column. However, the verification is not automatic. DB2 allows any well-formed XML documents stored in the XML column. If you want to store a registered prior to the model validation data, then you need to instruct DB2 to complete this task.

Step 3: Import XML data with validation

When you create an XML model, and it is fully registered to the DB2 in the following, you are now able to insert or import 灏?XML data in the time table, Rang DB2 on the data Yan Zheng. Now we have a model validation in mind, again recall the previous IMPORT scene.

If you have already filled the "clients" table, you can easily find the content to remove it, or delete and re-create the table. Only in the same as before when you plan to add to the table when the same data needs. Recall is defined as the customer ID column has a primary key of the "clients", The looming failure of repeated attempts to import.

In order to import XML data into "client" table to validate, use the DB2 IMPORT the XMLVALIDATE clause. Listing 6 below will instruct DB2 to use this statement you have previously registered XML mode (user1.mysample) as the default XDS (XML Data Specifier), in inserting them into "client" before the certification specified in the XML file clients.del file.

Listing 6. Importing XML data with validation

import from clients.del of del xml from C: / XMLFILES xmlvalidate using xds default

user1.mysample insert into user1.clients;

DB2 to determine if an XML document does not meet the specified pattern, then the document associated with the entire row will be rejected. Figure 8 illustrates an example of output from the IMPORT operation, the operation of six lines with a line of XML documents because it does not meet the specified pattern is rejected.

Figure 8. An example of output from the DB2 IMPORT, which his party was rejected






It is worth noting, XMLVALIDATE can also be used in conjunction with the INSERT statement to indicate the DB2 XML validation before inserting data. The syntax examples shown IMPORT similar to that specified when calling XMLVALIDATE clause, a registered (and completed) of the XML model. (See "A simple Java example," to obtain more information on this.)

Conclusion

DB2 Viper provides an important new capability to support XML, including a new XML data type and underlying engine-level components of an effective way to automatically store and process XML data. To help you quickly master these characteristics, this article describes how to create an XML document to store the test database and sample table. Also reviewed how to use XML data to populate the database. At last, the DB2 model for users to verify data and to provide a sample to show you how to entry.

Now that you have to learn how to use DB2's new "native" XML storage capacity of XML data. As for how to query the data, you will see in subsequent articles, follow-up article will introduce you to the new DB2 XQuery support, and its SQL extensions (sometimes called the "SQL / XML").







相关链接:



Top Calculators And Converters



Using Visual Basic's Timer control



Lg C2200 Review A Review Of The Lg C2200



Chinese way: do the best CAD China



JSP Experience Of Learning About The Steps And Timing



B2C transactions in China this year is expected to reach 11.1 billion U.S. dollars



Streaming Media Based On: What Is Streaming Media



3GPP to WMV



MOD to MPG



e-cology in the Pan Micro Series 68



E-cology in the Pan Micro Series 14



Material control manager, the day has come easy to you?



4 Promotion Practice Cheats



Shop Themes And Wallpaper



ASF to MPG



Monday, October 11, 2010

Fireworks of matting Kung Fu article



Fireworks Matting is not very well have been, it is sometimes better to picture effect, have to ask Photoshop brothers to help, but the brother's physique is sturdy, PS, are used to FW This guy really could not handle. This does not, in order to better play their potential FW, specially went next door to see how other people PS matting brother is training. Read half a day to find a book called "My Pictures I call the shots - the matting papers (Matting method large aggregate)," the new material back, carefully read lot of money.

Method 1: Using the magic wand, lasso tool matting

This method is simple, just punches, kicks, like a fight martial arts will be able to make twice. Fireworks for stuff with friends should be more familiar with the matting on simple when we all used them.

1. The magic wand of the application:

Brief steps: (1) Select the magic wand tool; (2) Click on a blank area; (3) anti-election; (4) emergence; (5) post-processing;






2. Lasso application:

Since there is no magnetic lasso tool Fireworks only Lasso and multilateral as well as two constituencies box type lasso tool, so use it to matting very clumsy, there is that time is not as easy to use pen tool, so this tool is used to remove the picture more some unnecessary things, such as some of the more unexpected characters.

Brief steps:

Select the Lasso tool;

Hook to delete the region;

Adjust the contour areas;

Deleted;

Post-processing;

Using the magic wand, lasso tool matting, the edge part of the effect is not very good, usually by reducing image size, masking, background, etc. to increase the appropriate post-processing method to the edge of grammaticalization.

Contour using the pen tool hook, then "the path into the marquee" is the FW and PS matting commonly used when making a method, and pen tools, it is the most basic things, like the martial arts in the horse step, as is compulsory.

Brief steps:

Select the Pen tool, set the line color, fill mode to transparent;

Hook contour line, and make minor adjustments;

Select the command "Edit - the path into the marquee", the edge is usually set to "anti-aliasing";






Using the pen tool hook profile, and then switch to select the matting method is relatively simple, with good results, but after the turn marquee when changes need to have to re-hook. Of course, before the transfer marquee can prepare a backup, but after all the trouble some, so "smart" Fireworker learned to "muddle."

Monte Edition matting not only modified at any time, and do not undermine the original image, the basic principles and Night clothes similar to some unseen black and white areas to see where the ashes are looming.

Brief steps:

Contour using the pen tool to hook;

The contour line is set to transparent, the fill set to white;

Select white graphics and base map, select the command "Edit - Mask - Combination to mask";

Detailed regulation and post-processing.






This "pen + Mask" Cutout way to meet most of the angular opponent, but when faced with changing roles of women feminine, especially with an opponent when the flowing hair, a bit insufficient.

Channel matting has been one of the PS of his secrets, FW lot less in this respect, but as so-called "people more bold, to the extent of production", as long as we go all out, we will be able to achieve Fireworks use access matting, The soul is the "way he also applied Bishen."

Detailed steps:

(1) copy the original image;






(2) The Levels filter channel to maintain a high contrast ratio;

a. Select Levels path;

b. Select the channel to be removed;

c. The maximum output gradation value is set to 0;






Choose to use the image above the green channel (channel contrast to the higher this figure), so the red and blue channels of the maximum output gradation value is set to 0.

(3) the use of filters form a grayscale color fill;

a. Select the color filling filter;

b. Fill color choose black, mixed-mode to "Saturation";






The picture for color fill effect after the map, the map and Intensity of PS in the green channel similar to the future, when we simulate PS channel can be used in the above two filters.

(4) the use of contrast enhancement filter curve;






(5) the use of Levels filter enhanced the contrast is adjusted using the slider at the bottom, "Input Levels", the maximum value;






(6) using the Pen tool within the outline of the Application List, select the internal profile and the map, use the "Edit - Graphic of the selected" order form bitmap;






(7) The use of reverse filters are used to mask bitmap, and a "plane of the selected" operation;






(8) Select the bitmap for the mask and the base map, select "Edit - Mask - Combination to mask" command to mask operation;






(9) Add the background, the formation of the final renderings.






Through the above operations on a beautiful flowing hair, stand out and acquire it after this method has been re-understanding of the Fireworks, whether there is a Zhangjian impulse to survive? If you have this plan, you do not worry here There are a hidden weapon to you, to back emergency needs.

Method 5: Using Knockout plug-in filter matting:

Knockout filters filter out sensory and PS, were similar, so you and PS heroes when PK is also occasionally used not not elegantly. The hidden weapon generally have the official version and cottage Edition (euphemistically called green version), with the official version is usually to the weapons shop to buy

If you just want to know the function with the simple version with the cottage is also not a bad idea.

Installation Method: filter folder containing the installation path into Fireworks Plug-Ins directory under the decentralization, such as "C: Program FilesMacromediaFireworks 8Plug-Ins"

Brief steps:

Select "Filter - knockout2 - reflected in the working layer";

Hook within the object, that need to keep within the region;

Hook an external object, that is, outside the need to retain the region;

Select background color, detail, and the implementation of the operation;

Select "File - Application" to create a transparent background image, to complete the work matting.






The picture above shows the basic use of the plug-in filter method, only to illustrate the problem, so do not very detailed, forgive me.

As a Fireworks user, if skillfully used the five methods of matting, so I believe enough to meet most of the invading enemy, but then it could experience a gourmet, or detour, or only PS can be pushed to the brother of the.







Recommended links:



SYBASE Services



News about Trace And Ping Tools



Comparison Project Management



How to catch a cheating spouse trace cell phone



How to "control" Yahuo sequels?



Of Photoshop CS



Overall bandwidth of Thunder Edge Broadcasting below to see new resolution



MKV to VOB



Top Mail Servers



Chemistry teachers And multimedia courseware



Why the new EMPHASIS on staff training



Real TO MP4



3GP to FLV



Credit "to Bear The Blame," Who Back?



Thursday, September 23, 2010

Routing Protocol RIP Routing Basics Introduction to note (1)



Routers are no more than two, one route choice, and second, data forwarding. Forward data relatively easy, the difficulty is how to determine the best path to the destination network. Therefore, path selection router becomes the most important work.

Many routing protocols to complete the path choice, in common with RIP, OSPF, IGRP, and EIGRP protocol and so on. These algorithms, we can not simply say who's good and who bad, because the algorithm based on the merits of using the environment to be judged. Such as RIP protocol, it is sometimes not an accurate selection of the optimal path, the convergence time slightly lengthy, Dan for small-scale, without professional maintained network Laishui, it is the preferred routing protocol, Women's fancy is its simplicity.

If you do is have a small network project, let us arrange a program, 30 minutes reading this article (first reading), 20 minutes to look over the order referred to herein and the operation method (Second Reading), 30 minutes to configure the network with all routers (small network, routers can be equipped with not a few), the final 20 minutes, check the network works properly. Well, 100 minutes, your RIP network up and running. It's that simple, do not believe, continue to look down.

1, RIP What

RIP (Routing Information Protocols, Routing Information Protocol) is the most widely used distance vector protocol, it is a Xerox (Xerox) developed in 70 years. At that time, RIP is the XNS (Xerox Network Service, Xerox Network Service) protocol as part of clusters. TCP / IP version of the RIP protocol is an improved version of Xerox. RIP biggest feature is the realization principle, whether or configuration are very simple.

Measurement

RIP metric is based on the number of hops (hops count), each through a router, the path hop count plus one. Thus, the more hops, the longer the path, RIP algorithm will give priority to the path less hops. RIP to support the maximum number of hops is 15, a network of 16 hops is considered unreachable.

Routing update

RIP routing updates are achieved through the regular broadcast. By default, the router every 30 seconds and it is connected to the network broadcast its own routing table, the router will receive the broadcast information received to add to its own routing table. Each router that broadcasts all of the routers on the network eventually will learn all the routing information. Under normal circumstances, every 30 seconds the router received a routing information can be confirmed, if after 180 seconds, or 6 update cycle, a route entry have not been confirmed, the router that it has been ineffective. If after 240 seconds, or 8 update cycle, the routing entry is still not confirmed, it will be removed from the routing table. Above 30 seconds, 180 seconds and 240 seconds of delay are controlled by a timer, which are updated timer (Update Timer), invalid timer (Invalid Timer) and the refresh timer (Flush Timer).

Routing loop

Distance vector type routing algorithms prone to cycle, RIP is a distance vector algorithm, so it is no exception. If you have a routing loop network, information is circulating transfer, will never get there. To avoid this problem, RIP equal distance vector algorithm has the following four mechanisms.

Level split (split horizon). Level of segmentation to ensure the router to remember the source of each routing information, and do not receive this information send it again at the port. This is to ensure that does not produce the most basic measures routing loop.

Toxicity reversal (poison reverse). When a path information becomes invalid, the router does not immediately remove it from the routing table, but by 16, that does not measure up to the broadcast it out. Although this increase in the size of the routing table, but helps to eliminate the routing loop, it can immediately remove any loop between adjacent routers.

Trigger update (trigger update). When the routing table changes, the update packet immediately broadcast to all neighboring routers, instead of waiting 30 seconds of the update cycle. Similarly, when a RIP router just started, it broadcasts a request packet. Adjacent routers receive this broadcast an update packet immediately answer, without having to wait until the next update cycle. Thus, changes in network topology will be the fastest spreading in the network, reducing the possibility of routing loop generated.

Inhibition time (holddown timer). After an invalid routing information, over time, this road are in the suppression by the state, that is not received within a certain period of time on the same destination address of routing updates. If, on the router from a network segment that a path failure, then immediately in another segment that this route effective. The effective information often is not correct, inhibition of time to avoid this problem, and, when a link frequent starts and stops, the inhibition reduces the routing time of floating, increased network stability.

Even with the above 4 methods, the routing loop problem can not be fully resolved only by the maximum degree of reduction. Once the routing loop is really there, routing entries count measure appears to infinity (Count to Infinity) situation. This is because the routing information is passed loop, each pass through a router to add a measure has been added to the 16, the path becomes unreachable for a. RIP choose 16 as not up to the measure is very clever, both large enough to guarantee the normal operation of most networks, but also small enough to allow counting to infinity takes the shortest time.

Neighbor

Some networks are NBMA (Non-Broadcast MultiAccess, non-broadcast multiple access), that does not allow broadcast networks to transmit data. For this network, RIP can not rely on radio transmission routing table. There are many solutions, the simplest is to specify the neighbor (neighbor), which specifies the routing table to send to a specific router platform.

RIP defect

RIP Although simple and proven, but there are some important deficiencies, mainly the following:

Too simple to jump based on the number of calculated measures, often come to non-optimal routing;

Measure the extent of 16, not suitable for large networks;

Poor security, to accept routing updates from any device;

No classes do not support IP address and VLSM (Variable Length Subnet Mask, variable-length subnet mask);

Convergence is slow, time often greater than 5 minutes;

The bandwidth consumed large.

Routers are no more than two, one route choice, and second, data forwarding. Forward data relatively easy, the difficulty is how to determine the best path to the destination network. Therefore, path selection router becomes the most important work.

Many routing protocols to complete the path choice, in common with RIP, OSPF, IGRP, and EIGRP protocol and so on. These algorithms, we can not simply say who's good and who bad, because the algorithm based on the merits of using the environment to be judged. Such as RIP protocol, it is sometimes not an accurate selection of the optimal path, the convergence time slightly lengthy, Dan for small-scale, without professional maintained network Laishui, it is the preferred routing protocol, Women's fancy is its simplicity.

If you do is have a small network project, let us arrange a program, 30 minutes reading this article (first reading), 20 minutes to look over the order referred to herein and the operation method (Second Reading), 30 minutes to configure the network with all routers (small network, routers can be equipped with not a few), the final 20 minutes, check the network works properly. Well, 100 minutes, your RIP network up and running. It's that simple, do not believe, continue to look down.

1, RIP What

RIP (Routing Information Protocols, Routing Information Protocol) is the most widely used distance vector protocol, it is a Xerox (Xerox) developed in 70 years. At that time, RIP is the XNS (Xerox Network Service, Xerox Network Service) protocol as part of clusters. TCP / IP version of the RIP protocol is an improved version of Xerox. RIP biggest feature is the realization principle, whether or configuration are very simple.

Measurement

RIP metric is based on the number of hops (hops count), each through a router, the path hop count plus one. Thus, the more hops, the longer the path, RIP algorithm will give priority to the path less hops. RIP to support the maximum number of hops is 15, a network of 16 hops is considered unreachable.

Routing update

RIP routing updates are achieved through the regular broadcast. By default, the router every 30 seconds and it is connected to the network broadcast its own routing table, the router will receive the broadcast information received to add to its own routing table. Each router that broadcasts all of the routers on the network eventually will learn all the routing information. Under normal circumstances, every 30 seconds the router received a routing information can be confirmed, if after 180 seconds, or 6 update cycle, a route entry have not been confirmed, the router that it has been ineffective. If after 240 seconds, or 8 update cycle, the routing entry is still not confirmed, it will be removed from the routing table. Above 30 seconds, 180 seconds and 240 seconds of delay are controlled by a timer, which are updated timer (Update Timer), invalid timer (Invalid Timer) and the refresh timer (Flush Timer).

Routing loop

Distance vector type routing algorithms prone to cycle, RIP is a distance vector algorithm, so it is no exception. If you have a routing loop network, information is circulating transfer, will never get there. To avoid this problem, RIP equal distance vector algorithm has the following four mechanisms.

Level split (split horizon). Level of segmentation to ensure the router to remember the source of each routing information, and do not receive this information send it again at the port. This is to ensure that does not produce the most basic measures routing loop.

Toxicity reversal (poison reverse). When a path information becomes invalid, the router does not immediately remove it from the routing table, but by 16, that does not measure up to the broadcast it out. Although this increase in the size of the routing table, but helps to eliminate the routing loop, it can immediately remove any loop between adjacent routers.

Trigger update (trigger update). When the routing table changes, the update packet immediately broadcast to all neighboring routers, instead of waiting 30 seconds of the update cycle. Similarly, when a RIP router just started, it broadcasts a request packet. Adjacent routers receive this broadcast an update packet immediately answer, without having to wait until the next update cycle. Thus, changes in network topology will be the fastest spreading in the network, reducing the possibility of routing loop generated.

Inhibition time (holddown timer). After an invalid routing information, over time, this road are in the suppression by the state, that is not received within a certain period of time on the same destination address of routing updates. If, on the router from a network segment that a path failure, then immediately in another segment that this route effective. The effective information often is not correct, inhibition of time to avoid this problem, and, when a link frequent starts and stops, the inhibition reduces the routing time of floating, increased network stability.

Even with the above 4 methods, the routing loop problem can not be fully resolved only by the maximum degree of reduction. Once the routing loop is really there, routing entries count measure appears to infinity (Count to Infinity) situation. This is because the routing information is passed loop, each pass through a router to add a measure has been added to the 16, the path becomes unreachable for a. RIP choose 16 as not up to the measure is very clever, both large enough to guarantee the normal operation of most networks, but also small enough to allow counting to infinity takes the shortest time.

Neighbor

Some networks are NBMA (Non-Broadcast MultiAccess, non-broadcast multiple access), that does not allow broadcast networks to transmit data. For this network, RIP can not rely on radio transmission routing table. There are many solutions, the simplest is to specify the neighbor (neighbor), which specifies the routing table to send to a specific router platform.

RIP defect

RIP Although simple and proven, but there are some important deficiencies, mainly the following:

Too simple to jump based on the number of calculated measures, often come to non-optimal routing;

Measure the extent of 16, not suitable for large networks;

Poor security, to accept routing updates from any device;

No classes do not support IP address and VLSM (Variable Length Subnet Mask, variable-length subnet mask);

Convergence is slow, time often greater than 5 minutes;

The bandwidth consumed large.







Recommended links:



Easy People - Screen Savers



Photoshop Top Aides - EXTENSIS Photo Graphics (1)



Recommend Audio Players



Salesforce Executives Leaving Three Hundred Will Continue To Recruit



Recommend Audio Recorders



Individual Character! Avant Browser Skin easily create



MKV to FLV



2009 CAXA Ten News



lenovo SERVER to complete the everest torch



Talent War Broke Out, The Direct Selling Industry Executives 300 000 -50 Million Annual Salary



RMVB to MP4



Call Of Operations Of Foreign Carriers



Specialist Dial Up And Connection Tools



Multinational corporations, where the moral Bottom line



TS to MPG



Deutsche Post's revelation



Tuesday, September 14, 2010

"Staying Princess" mercenary information finished



袗谐胁邪褉械褋 Agvares

High society of the devil, well-known founder of the ball.

Capacity building: +100% female unit attack

Equipment field: weapons, dress / suit of armor, gloves / belt, Treasure

Where: 楔械褌械褉褉邪 Sheterra (HITLER)

Severance costs: 30000 money

Capacity: in the dialogue interface can select a unit gain 10 attack and defense bonus and the ability to choose a

- 2 speed

- Unlimited counter

- Attack the enemy fire (can burn overlapped)

- Attack enemy vampire (not resurrection)

Select the unit from the Agvares control and restricted to men illegal division of mankind. Each of mental fatigue using a Agvares rose 100%, and in each subsequent battle back 10-15%. Means that war can be reused 7-10.






袚邪褍写懈 Gaudi

Eagle eyes of young, bright and committed advocate elimination of the devil.

Capacity building: Union forces attacking demons and the souls of the rate doubled when the explosion hit

Equipment field: weapons, armor, gloves / shield, royal flag

Where: 袘械蟹褘屑褟薪薪褘泄 Unnamed (unknown land)

Severance costs: 25% of the money

Capacity: Knight Rider upgrade sanctification (100 gold / person) holy priest upgrade CD (25 gold / person)






袛卸懈屑 袣褉邪褍写 Jim Kraud

Once handsome man, but because of scar and disfigurement.

Capacity building: a variety of pirates, thieves and the Sea Monsters +1 speed and morale.

Equipment field: weapons, armor, shoes, Treasure / royal flag

Where: 袗谢褘泄 袙械褌械褉 scarlet Wind (Scarlet Wind)

Severance costs: take away the arms.

Ability: the pirates and robbers train upgrade (respectively 7 Gold / person with 5 gold / person)

Special events: the goddess in the game if the blood was allowed to remove scar and can regain her beauty and access to the following new features:

- 700 Leadership

- Equipment field becomes: weapons, dress / suit of armor, shoes, treasure.






袦芯褉芯薪 袛邪褉泻 Moron Dark

Has sold the soul of the soul to the Dark Knight. In order to purify their soul, struggling with evil.

Capacity building: +3 attack. Dead morale +1

Equipment field: weapons, armor, helmet, royal flag / belt

Where: 协谢芯薪邪 Elon (Aron)

Severance costs: None (except he is equipment items)

Capacity:

1 (Dark Force> 0) can upgrade into a Skull Archer Skeleton Warrior (5 Gold / person) into a Dark Knight Knight (50 gold / person)

(Dark Power = 0) can upgrade archers, infantry (5 Gold / person) The Dark Knight into a knight (50 gold / person)

2 Moron Dark through every battle to purify the forces of darkness (the initial 100).

-2, If the enemy forces with the devil

-3, If the enemy forces with dead

+1, With the souls of his troops

+1, With the devil's own forces,

Once reduced to 0 to always keep at 0






袦芯谢写芯泻 Moldok

Some simple and too lazy to Orcs, to fill their stomachs with the princess chasing.

Capacity building: Orcs +1 initiative and speed

Equipment field: shield / weapon, shield, royal flag / belt, treasure.

Where: 校蟹邪谢邪 Uzala (Wuzha La) will be asked to recruit heroes ask for money 1000

Severance costs: 1000X Employment Date

Capacity: Moldok would take away half the prize, and filled in the next battle back to anger. This ability to mobilize every 8-15 random battle.






孝褉懈谐谐械褉 Trigger

Promising young engineer, inventor of Sight.

Capacity building: most of the remote units + X% crit rate

Equipment field: weapons, helmets, gloves / belts, shoes

Where: 孝褝泻褉芯薪 (袘芯谢褜褕芯泄 泻邪薪邪谢) Tekron (Grand Canal) railway empty (Grand Canal)

Severance costs: 20% of the money

Capacity: X value of sub-4, respectively (10/15/20/25), 4 pm, Big Master, Druid, Necro shamans can get bonus, but the relative alchemist, Cyclops, the dwarf Addition of the remote robot will lose.

1: the time of recruitment

2: 34 self-recruited from the war

Level 3: an additional 50 combat

4: 100 Crystal






协谢械薪褏械谢 Elenhel

Attend Mystic wizard wizard.

Capability: Intelligence +4

Equipment field: gloves / shield, skirt, royal flag / belt, treasure.

Where: 袙械褉芯薪邪 Verona (Verona) take 20 points or more intellectual

Severance costs: 5000 Money

Capacity:

A back full of magic. Cool 5 times fighting each use.

230 was a world war scroll. When recruitment was one of every 30 successful war will report on production of a scroll.

40 and the battle more than 10 games, Elenhel will be asked to leave the princess would go to war if not accept, always follow the Princess after victory.







相关链接:



Simple Text Or Document Editors



Ninetowns submitted to the U.S. SEC Annual Report FY08 net profit down 72% correction



"Batman Arkham Asylum" Customs Laws To Deal With The Ultimate Dafa BUG



Talent Strategy: "dig" And As "dependents"



Expert Cursors And Fonts



mp3 to aac converter



Dell Laser Printer pushing 999 yuan in China, "shopping" HP



.mkv file



converter mp4 to 3gp FREE



Eighth say C # sharp experience indexer and operator overloading



Good Font TOOLS



what is avchd



SIP protocol is how the agreement is better than H.323? (2)



Chrome OS is outdated? Look Jolicloud!



Wednesday, August 4, 2010

Interview with Wang Xuan: Young people should look for fanatical pursuit of goals


"Chinese Youth" Interview with Wang Xuan: Young people look for goals, we must fanatical pursuit

Wang Xuan, Vice Chairman, Chinese Academy of Sciences, Chinese Academy of Engineering, Third World Academy of Sciences, Beijing University Founder Holdings Limited's chief scientific adviser. As the inventor of Chinese laser typesetting system, he promoted the second revolution in printing technology in China, known as the "modern Bi Sheng"; as young people to mentor, he loved only care only, legendary. When I asked him: as a technology leader, your life goals? He said: fanatical pursuit, spotted the target, and never look back.

Live for others is the value of life
Reporter: March 2002, awarded in recognition of your country's highest award, Peking University, held a technology specifically for your awards ceremony. At the meeting, talk to you about your dream life in the 10; Next, they talk about your "good concept." It is your "good view" more people infected.

Wang Xuan: That one award, reminds me of when I was little. That year, I was 10 years old. Day, the teacher announced to carry out a selection of different activities with the past that they have to elect a moral good, we like the students, an overwhelming majority of the votes I received this honor. This honor is informal, I never told her father she has won this award. 50 years later, again in retrospect, realized that the honor of my life, how important. Experience tells me: a man wants to be successful, he must first be a good person. "Willing to benefit others instead of themselves," the vast majority of people, including myself, simply can not do. I agree with Mr. Ji on the "good" standard: to consider to consider themselves a little more than others is a good person. However, I think, this standard can be further reduced that to consider as many others and consider their own is good.

I often think that a person, a good man, he is living, if fighting for the interests of society, then, his life is interesting life. Einstein also said this is the case: people only lived for others, it is valuable. I agree with him. Whenever successful people, most have this quality. Their interest to the community, in order to live a valuable, always, feverishly to pursue.

Reporter: Since when you started this fanatical?

Wang Xuan: hardware and software from engaging in research projects from the development of laser photo-typesetting, the start of this pursuit. For laser typesetting, its value, its future and the possible impact of China's printing industry revolution that brought fundamental outlook, which I was captivated. Founder talk about today, people will say, "both names, but also beneficial." However, people do not understand how difficult that time! In a very long time, I have a kind of "upstream" feeling, I almost gave up all the holidays, a very tight physical and mental exhaustion, but also ordinary people would not enjoy the fun. For example, from 1987 to 1992, the Wherever he went, I first look at the streets of the newspaper and those who use our beautiful laser typesetting system exhaust layout, the fun is indescribable.

November 1990, I received the Tan Kah Kee Science Prize technology. Comrade Lee and Li together for us giving out awards. I asked Lee: Did you expect to receive the Nobel Prize? Lee said: "never thought." Even his colleagues with his mother that he could award, he thought it was nonsense. Winning the day, he is an academic report, he was an academic report, the news of his award-winning news broadcast. After completing the report, people have stepped forward to congratulate him, then he thought it was well reported for the sake of it.

I think, a successful scientist, his initial motivation is not what you want to grab a prize, or what kind of fame and wealth. The reason they feverishly to pursue, because the love and intent on exploring the unknown areas of the reason.

Reporter: For the Ming Heli, you have had such a description, you say: Ancient Chinese saying goes, sergeant forgot to name, fame completely forgotten; Sergeant Liming, the achievements of the names on their own stand up; Corporal stolen name , its impossible to steal other people's. You say you can not do Sergeant, because the point can not forget the name, but will not name to Independence-away theft.

Wang Xuan: I think I have now is not a out of society, from the enterprise, specializing in basic research scientists, and therefore can not be as indifferent to fame and fortune as Qian. That year, the British Queen to visit China, please Qian attended the banquet. Qian not. His reason was "not the way me and her people." My situation is different, my work with a business-related, business and out of a fellow, won a top award, the integrity of the enterprise is beneficial. Therefore, I can not forget the name as Mr Qian as the point.

A person should be self-confident and conceited, persistent but not rigid
Reporter: As the inventor of Chinese laser typesetting system, you push the second revolution in printing technology in China, known as the "modern Bi Sheng"; 10 years, you have been winning: UNESCO Science Prize, Tan technical sciences Awards, Ho Leung Ho Lee Science and Technology Progress Award, the Hong Kong Chiang Technology Achievement Award ... ... Science is the first productive force in this era, you become a perceived "knowledge hero." With your eyes, successful people should have what kind of literacy?

Wang Xuan: self-confident and conceited, persistent but not rigid. What is confidence? Believe in themselves. Looking back nearly 30 years of hard course, we always struggle with the difficulties for the development, use of words is a near escape. However, in 1995, Founder PC or established their own brand, set up its own advanced management system, and then after years of struggle, and eventually became the PC maker's second child. Why? Because we are confident. What is ego? Conceit is ignoring the reality that they can do anything. Attachment is a look for goals, to work tirelessly, enthusiastically to pursue, but not rigid, we must continue to develop to adapt to new changes. This again reminds me of the State Planning Commission in 1974, supported by a project. The project has a teacher is the technology leader, he has great determination to come up with the spirit of the Foolish Old Man said: I not done to my son, my son was not done to my grandchildren do. I have a thought: is over, so your son, grandson to do it as early as the demand for sub-world technological development, and is out of date, then the project died. So, to persistent, but not rigid.

A man of success, he still has the prowess of the insights and vision. In the scientific community, there was such a metaphor, so that the rabbit people, playing the rabbit people, people who pick up the rabbit. Indicate that the rabbit is the direction of the person who played the rabbit who is to carry out scientific and technological people who pick up the rabbit is to let technology in the market who can produce benefits. Therefore, a leader in scientific research positions, he should have such means the ability of rabbits and beat the rabbit.

A successful, he must have the ability to unite people
Q: Over the years, you've been stressed the unity and cooperation. You have said: China does not lack talented young people, but lack the spirit of unity and cooperation. You ask: Do the Chinese people by foreign employers only command? Can not command China, the Chinese people?

Wang Xuan: This is my question ten years ago. Now the situation has somewhat different. Ten years ago, the Chinese in the United States has used "under the Go" to describe the Japanese way of doing things, with "playing bridge" to describe the American style, with "mahjong" to describe some of the Chinese people Zuopai. "Go under" is the overall situation, to the overall interest and sacrifice the ultimate victory of the local pieces. Japanese companies or individuals often show solidarity outside the momentum, and even they are also looking for Japanese to travel overseas hotels to stay open, though sometimes more expensive, the traffic inconvenience. "Playing bridge" style is to work closely with each other for two other coalition, to fierce competition. "Mahjong" is alone, watching live at home, anti stay here at home, their own and can not, do not let other people and. This Zuopai obviously is not good, especially their own will not get results, do not let other people Success is seriously affected development.

Take this business of computer software design, the vast majority of good software is the outcome of collective creativity to make a creative contribution to the developer of the most important often is not just one, alone hardly high. The past 20 years, I have met many young people, academic or technical talented person is not uncommon, but full capacity or other quality of some of the weaknesses are more or less limited their development. Gorman and other famous psychologists pointed out the need to re-examine the traditional concept of IQ, because the decision whether a person will be successful in a number of factors, the intelligence is at best only 20%, while the remaining 80% of the factors, generous, self-confidence, determination and so can not be underestimated. Psychologists to the latter as "emotional business." They cite some examples, for example, they believe: the United States Bell Labs made remarkable achievements in many underlying causes, not in the laboratory scientists with high IQ, but the friendship between these first-rate scholar, a pleasant and effective cooperation, in other words, their "emotional business" more than ordinary people. We should promote team spirit, because, in today's technology, the good cooperation of scientists to gain a better chance of success.

Reporter: Speaking of teamwork, the psychologist Carl Jung lists a formula: I + We = Fully I, this is your's "good to see another team's base length is" some similarities.

Wang Xuan: yes ah. To explain this, I give you two examples. One is one of my students. We recognized his outstanding abilities, work quick and neat and reliable, but the "emotional business," poor, self-willed pride, and partner relationships often become a success. He later presided over a company to develop software, and when he found that the lower series of errors and pointed out that after the procedure, the lower to correct to point out his mistake, but deliberately creating another wrong. Why? Because of his poor relationship with colleagues reason. The software then quickly disappeared in the market.

Another example is one of my college classmates, grade point average, IQ is not prominent, but the "emotional business," well, he was generous, honest, treat people friendly. Freshman year, I slept in his upper berth, middle of the night to relieve himself a child I often stumbled step on his head, he always laugh. In the nuclear field, he struggled for more than 40 years, passing his sixtieth, and when on the Academy of Engineering.

Talked about team spirit, a person I respect most is the "two bombs founding father" Deng Jiaxian. Yang said in a memoir: "Deng Jiaxian is not one of the most compelling figure. And talk to him a few minutes to see that he is honest and pragmatic. He really frankly honest, never impressive. He did not narrow-minded children, life like the 'pure' character represents the word. people know he was not selfish, people absolutely believe him. "Deng Jiaxian I do not know, but I admire him. He's great is that: he not only talented, but also to make men more distinguished than his people to display their talents.

For young people to become this era of "knowledge heroes" to create conditions
Reporter: In 1993, you withdrew from the first line of research, this year you are 56 years of age. As a general concept, this is the prime of life. Why, you have decided to exit?

Wang Xuan: February 1993, I left the first line of the real design work, this year has been full years. While leaving the first line, but it has not been out of research. Let me make this choice is the Spring Festival in 1993 an incident. That year the Spring Festival, Chinese New Year the same as in previous years, I engaged in the design at home behind closed doors. Two weeks after the design is completed. Liu Zhihong Guowanchunjie happened to my students come back. He looked after me, said: "Wang, you design that does not work, IBM's PC, there is a bus line, you can detect the signal." Student's word, which means two weeks of my results become awkward design. He reminded, also reminds me of another thing two years ago, children as well as Liu Zhihong. In early 1991, the upcoming Founder 91 design, I suddenly found myself in dealing with graphics chip design that there are loopholes. Moment can not think of a solution, he gave the matter told the RIP group of three young men. Did not expect them to come up with countermeasures, because they did not participate in this chip design. But then a few days later, Liu Zhihong come up with a coup, avoided the mistakes.

These two things led me to seriously reflect on their own. Take me, I created two peaks in the hardware and software of 1964 (the year I am 27 years old) and the development of laser typesetting project in 1975 (the year I am 38 years old), that time I was a nobody. I often work in some of the surface will be better than I do "authority", but in fact little is known about the technical details of the person's interference. I own all these years, it seems to be a computer in the field of so-called "authority." But my mind clear: I see the technical information and documentation as more young people have been the first line of practice is not as young enriched. This emerging discipline in the computer field, if you do not grasp or are not familiar with important technical details are easy to commit "whim" wrong. I create the peak has passed. I should do what I can do now to help those who have talent, potential, not yet famous "little people", they need my support.

Reporter: Speaking of talented people. Thicket of your secretary, Ms. laugh when I walked in said to me: Wang Xuan, the teacher can talk about young people, on the talents of the thing, he will be very happy, because those are his "Baby" . Well, you talk about these "baby" it.

Wang Xuan: (laughs) Founder session per recruit staff, I asked the personnel department organize a roster, a time, I went to the departments where these people go and talk to them about their interests and expertise, and soon I will be able to name them one by one. I have a notebook, is designed to record conversations with employees, that is indeed one of my "baby."

I can tell you about our side is young. One is now a doctoral tutor of soup flag. That day, he accompanied the students to my house to consult something was I admitted him. Tom flag of good math, award-winning programming. Doing my graduate period, I found him particularly fascinated by technology, could not think of a question, would one want to think, until you find the answer; his programming and few mistakes. Now, who do technology-based, ZHOU Jin is responsible for market development of the eBook, plus the technical director of technology development is top-notch tension, this project is now doing very well. Computer software industry and other industries, the technical front-line people too bitter tired, but Tom thousand flag is 16 years. Such people, we should create better conditions for them.

Reporter: With talent, create the conditions for them, keep them, let them give full play to their own to show themselves, that is put before the side is an important issue.

Wang Xuan: yes ah. Some units have tried to dig our people, given the high salary than the Founder, but, they do not go. They think the side is such a team to better play their own.

Reporter: What should we, Founder With this attractive?

Wang Xuan: in order to create equality, harmony and good environment conducive to their development. Lee made a remark, he said that he is the most experience in the United States between people are equal, in other words, students against teachers. Qian mentor is an internationally renowned academic authority, once got into fierce arguments with him Qian, tutors are very angry, but later Qian think is right, give money to school the next day to climb up the third floor Sen apologize. In the Founder, we promote this equality, which is indispensable for a harmonious atmosphere of the environment.

As for the contemporary young talent, they have a common characteristic: there are certain requirements for living conditions, but up to a certain extent, the pursuit of money are not unlimited, so-called "money is not everything." However, low income, no shelter for housing, it is difficult for young people to "sacrifice" and therefore "no money is totally unacceptable to." We must create conditions for them so that they rely on knowledge and innovation to become a millionaire, become this era's "knowledge hero."






Recommended links:



Followed By A Variety Of Patches Manually Clear The New "Annie"



SCO UNIX Learning Collection



Customers say "yes", in fact, not difficult



BenQ competing against the SHINING 2008 SEPG Conference



Top Personal Finance



what is mkv format



flv to 3gp converter free download



Wmv to avi converter free



Lists Log ANALYSERS



Flash5 ActionScript Advanced PROGRAMMING Guide (6)



"Random eight-digit" BEWARE of your U disk



windows 7 rmvb



XHTML Basic Questions And Answers - For Beginners



Thursday, July 22, 2010

3Com's closing share price Friday rose 34.24%



U.S. Eastern Time on September 28 (Beijing time on September 29) news sources by the acquisition of the stimulus, 3Com's closing share price Friday on the Nasdaq rose 34.24%.

3Com today announced that it has received private equity investment firm Bain Capital (Bain Capital) takeover offer. Under the agreement, Bain Capital will be 5.3 U.S. dollars per share, a total of 2.2 billion cash acquisition of 3Com. As part of the deal, Huawei will also receive a minority stake in 3Com, 3Com established with business and strategic partnerships.

Effect by this news, 3Com's closing share price Friday on the Nasdaq rose 34.24 percent, rose 1.26 cents, or 4.94 U.S. dollars. Over the past 52 weeks, 3Com's maximum price of 5.24 U.S. dollars, the lowest price of 3.22 U.S. dollars.







Recommended links:



Youtube Converter + Player Home



Sound File Converter



Psp 6000



Youtube Movie To PS3 Live



how To convert flac to mp3



convert mov to Wmv free



Youtube Movie to WMV Now



CHRISTMASGIFT Wii Converter



Audio Presentation TOOLS Storage



Teach you a trick: how to beautify MM eyebrows, eyelashes And eyes



Jocsoft YouTube To IPhone Converter



Youtube to 3G2 Live



Dell's Expansion Overseas Territory Shake The HP Printer Status Of The King



Audio Presentation Tools Comments



Hope AVI to RMVB



Friday, July 2, 2010

Youtube Video Download + Converter Plus

Hot popluar youtube video Converter + download + player tool. With YouTube tool you can also convert downloaded YouTube videos to a format compatible with your favorite portable device; including - iPod Video, iPod Touch, iPod Nano, iPhone, Zune, PSP, as well as video capable MP3 players, video capable mobile phones, and Pocket PC, And finally... YouTube tool's embedded player will allow you to watch all your favorite YouTube videos off-line. So now you can enjoy any .flv and .swf videos anytime!
Supports YouTube video or any .flv and .swf file as input file. Supports not only YouTube video, but also various video formats as input file, including avi, DivX, XviD, rm, rmvb, MOV, MPEG, WMV. Supports a wide variety of output file format., including avi, DivX, XviD, rm, rmvb, MOV, MPEG, WMV. Provides various profiles, these profiles can meet the needs of most people. - is the most powerful YouTube assistant on the planet.