Friday, March 11, 2011

To scroll to open it - to do with Flash effect shaft


To scroll to open it - using Flash to do pivot effect (1)

The Internet often asked questions about the production of shaft effect, today I talk to everyone.

1, shaft production / conimages/web/2001-05/user-0525-image001.gif

conimages/web/2001-05/user-0525-image001.gif

(1) transfer the fill (Fill) dialog box, choose Window> Panels> Fill,

(2) In the drop-down menu, select Linear Gradient, in the middle of two small cursor click the left mouse button, you will find more than a cursor. You will find a small box behind the cursor within the meaning of the color and the color is the same place, the mouse click the small box behind the pop up color palette, select white. Click the cursor in front, click the small box behind the pop up color palette, select dark brown. Similarly, within the meaning behind places the cursor set to dark brown. Completed as shown in Figure 1.



(3) Select the toolbar floating panel on the Rectangle Tool (Rectangle Tool), the window at work painting a canvas rectangle shown in Figure 2. Use the arrow tool (Arrow Tool) remove the border (double-click the left mouse button at the border office select the whole frame, press the Delete key to delete). Rotating tools (Rotate) rotated 90 degrees. Shown in Figure 3.



Figure 2 Figure 3

(4) select the rectangle in Figure 3 (click the left mouse button), press the F8 key component in the pop-up property (Symbol Properties) in the Name column the "axis", in Behavior selected Graphic. Completed as shown in Figure 4. Click "OK". So far, we have created a shaft component.



(5) Add two layers, double-click the first layer of the layer name, its name was changed to "paper", the other two are "masking" and "roll axis." Remove all objects on the canvas. Shown in Figure 5 after the completion of:



Note: Do not mistake the order of layers!

(6) Click on the paper layer of the first frame, select the rectangle tool, select the fill color is dark brown, draw a rectangle on the canvas. Then select the fill color to white, draw a rectangle on the canvas than the previous rectangle smaller. Completed as shown in Figure 6.




[Next]

To scroll to open it - using Flash to do pivot effect (2)

(7) Click on the text tool, activate the Text dialog box, select a good font and font size. Font recommended Chinese Xing Kai, font size and the size of your paper and enter the text to be related to the number. In the middle of the white canvas area click the left mouse button, type write the text (enter a word once on the carriage return to make them in a row). Adjust the text to the right size. Completed as shown in Figure 7.



Figure 6 Figure 7

(8) Press Ctrl + L key to open the component library. Select the axis on which we can build. Hold down the left mouse button and drag it to the canvas, on paper the top. To adjust its length (if not convenient to adjust, please use the zoom tool to zoom to the appropriate size, then adjust) to ensure the same width of paper. Completed as shown in Figure 8.



(9) Click on the mask layer of the first frame. Select the rectangle tool, draw a rectangle on the canvas, and paper rectangle the same width, but slightly longer than the paper. Open the fill color, but best not with the same color paper.

(10) Double-click the left mouse button, select the rectangle. Press the F8 key component in the pop-up property (Symbol Properties) in the Name column the "mask", in Behavior selected Graphic. Completed as shown in Figure 9.



(11) to the top of the mask components onto the paper, so just cover the lower edge of the mask layer on the paper axis. Completed as shown in Figure 10.

(12) Select the "rolling axis" layer of the first frame, press Ctrl + L key to open the component library. Select the axis on which we can build. Hold down the left mouse button and drag it to the canvas, on paper layer beneath the shaft. Adjust its length, making it the length of the paper layer with exactly the same length shaft. If you prefer to place, please speak hidden layer mask (click the small black spot on the mask, after layers of name is that it becomes red cross). Completed as shown in Figure 11.



Figure 10 Figure 11




[Next]



To scroll to open it - using Flash to do pivot effect (3)

(13) Click on the paper layer of the first frame, press the F5 key, you will find the increased time frame online, and we make it to 20 frames. Using the same method to make the mask layer and the rolling axis layer also increased to 20. Completed as shown in Figure 12.



(14) Click the mask layer 20, press the F6 key, we are here to add a key frame. Under the mask components will be moved to just cover the paper layer, as shown in Figure 13 to complete.

(15) Click the scroll axis layer 20, press the F6 key, we are here to add a key frame. Shaft component is shifted to the bottom layer of paper, as shown in Figure 14 after.

(16) axis in the rolling time line of 0-20 layers of the middle frame on any frame press the right mouse button. In the pop-up shortcut menu, select Create Motion Tween. Mask layer in the timeline of 0-20 frames on any of the middle frame by pressing right mouse button. In the pop-up shortcut menu, select Create Motion Tween. Completed as shown in Figure 15.

聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽聽 聽聽聽聽聽聽聽聽聽聽聽聽聽 銆??銆?銆??銆?br />
Figure 13 Figure 14 Figure 15

(17) in the mask layer Right-click on layer name in the pop-up shortcut menu, select Mask. Shown in Figure 16. Completed in Figure 17.



Figure 16



Here, has been basically completed, you can press Ctrl + Enter (Enter) look at the results.

You will find that the result is out, but stay on after opening without Banke and "cooperation" on the (in fact have to start playing back the first frame). We hope that it will stay for a while after opening. Here we use the action to solve the problem.

(18) Delay Control

In the rolling axis layer 20 on the right-click the shortcut in the pop-up menu, select Action. Add the following code.

stop ();// stop playing

var timer1; / / define variables

timer1 = getTimer ();// will have playing time in the existence of variable

flag = 0; / / set up a flag

while (flag == 0) (

if (getTimer ()-timer1> 5000) (

flag = 1;

)

) / / If you stay 5 seconds, it will mark change to end the cycle.

gotoAndPlay (1); / / back to the first frame and continue playing.










Prerelease download ATi Catalyst 5.5



Icons Shop



RealPlayer to PSP



Expert Help Tools



First Job Out Of The Ivory Tower Beginning How The Election



Using De exterminate rabbits annoying ads RMVB movies



The birth of kissing fish



Quot ie object doesn t support this property or



MP4 To Windows Media Center



3G2 Converter



Saturday, October 23, 2010

Custom FreeBSD Kernel Reference






Custom FreeBSD Kernel Reference
Published: wxjoshua
Time: 2002/10/11 19:35:24


Custom FreeBSD Kernel Reference
meaculpa (2001-06-27 10:46:15)
#
# GENERIC - Generic Machine kernel
#

# # Console type i386, because FreeBSD is the only thing running in the X86
machine "i386"

# # CPU types, see themselves as almost 86 Well
# Cpu "I386_CPU" # 386 computer
# Cpu "I486_CPU" # 486 computer
cpu "I586_CPU" # 586 computer
# Cpu "I686_CPU" # 686 computer

# # Core identity, no special significance
ident GENERIC

# # Define some structure of the system should retain much of the memory space, usually
# # 16 or 32 is enough, unless you open stations, or run X, on the right with 64
# # Note that this value is always less than the number of your memory
maxusers 32

# # A user can limit the process of implementation
options CHILD_MAX = 256
# # A user can open files limit
options OPEN_MAX = 256

# # Turn on kernel debugging, it is generally less than
# Options DDB

# # Allow debug trace memory unit (see ktrace, kdump), or left to the kernel hackers to use it
# Options KTRACE # kernel tracing

# # No FPU (SX) friends use, with people who do not need the DX
# Options MATH_EMULATE # Support for x87 emulation

# # Do you have more than 64MB of memory when the amount specified, the unit is K. For example, 128MB RAM:
# Options "MAXMEM = (128 * 1024)"

# # Support network, there must be, what nonsense
options INET # InterNETworking

# # IPX-related protocols
# Options IPX # IPX / SPX communications protocols
# Options IPXIP # IPX in IP encapsulation (not available
# Options IPTUNNEL # IP in IPX encapsulation (not available
# Options IPXPRINTFS = 0 # IPX / SPX Console Debugging Information
# Options IPX_ERRPRINTFS = 0 # IPX / SPX Console Debugging Information

# # File system settings
# # Only UFS is required, the other can not, use the load when the kernel will use LKM
# # Note that the file system name with figures, use double quotation marks Oh, look at the following Linux file system will know
options FFS # Berkeley Fast Filesystem
# Options NFS # Network Filesystem
# Options NFS_NOSERVER # Disable the NFS-server code.
# Options MSDosFS # MSDOS Filesystem
# Options "CD9660" # ISO 9660 Filesystem
# Options PROCFS # Process filesystem
# Options KERNFS # Kernel filesystem
# Options NQNFS # Enable NQNFS lease checking
# Options FDESC # File descriptor filesystem
# Options LFS # Log filesystem
# Options MFS # Memory File System
# Options NULLFS # NULL filesystem
# Options PORTAL # Portal filesystem
# Options UMAPFS # UID map filesystem
# Options UNION # Union filesystem
# Options DEVFS # devices filesystem
# #
# # A LINUX file system, use the following line friends attention
# Options "EXT2FS" # ext2fs, only in 2.2-CURRENT

# # 4.3BSD compatibility, it is necessary, there may be some procedures will be used
options "COMPAT_43" # Compatible with BSD 4.3

# # Implementation of the Linux program files, even if you use LKM loading, you still need the parameter
# # You can modify / etc / sysconfig in linux = YES, or the implementation of the / usr / bin / linux
# # By the way, you must install the packages in the linux_lib
# Options "COMPAT_LINUX" # Linux Emulator

# # SCO binary simulation
# Options "IBCS2"

# # 1 boot device SCSI card will be prepared to wait several seconds for the slower SCSI devices
# # If the CDROM is concerned is needed, the minimum is 2, select the appropriate value you like the
options "SCSI_DELAY = 4" # Be pessimistic about Joe SCSI device

# # Allow users to intercept console information, procedures for xconsole like it is necessary
options UCONSOLE # Unix console

# # The maximum number of virtual console, Alt-F1 to Alt-F12 and so on, but only the definition of limit
# # Really can use the virtual console must see / etc / ttys defined vty number
# # The value of pre-determined 16
options "MAXCONS = 8" # Max number for virtual console

# # To WINE (MS-Windows Emulator) used
# Options USER_LDT # For WINE, MS-Windows Emulator

# # Use QUOTA limit
# Options QUOTA # For quotas

# # SYSV IPC / SHM (BBS with X-window and COMPAT_LINUX needed), it is necessary
options SYSVMSG, SYSVSEM, SYSVSHM # For SYSV-IPC

# # LKM's loader, it is necessary (after the 2.1.5R has been abolished, a pre-determined parameters)
# Options LKM # Loadable kernel module loader

# # If you use the ISA to SCSI card, there are more than 16MB of memory, required to open this, or not
# # Use> 16MB of memory. If you are using EISA / VL / PCI to SCSI card do not need a
# # Open it will reduce the speed a little bit, all right Do not open (of course without the use of IDE)
# Options BOUNCE_BUFFERS # include support for DMA bounce buffers

# # Only need to use IP-Firewall, you can load with LKM
# Options IPFIREWALL # Firewall code
# Options IPFIREWALL_VERBOSE # Print information about dropped packets
# Options IPACCT # Used with ipfirewall

# # Use IP-Firewall or should it be when the router
# # In the 2.2-960323-SNAP abolished after to sysctl open (see / etc / sysconfig)
# Options GATEWAY # Internetwork gateway

# # Multicast routing, router used to do more
# Options MROUTING # Multicast routing

# # Allow the number of swap device (default 20)
# Options NSWAPDEV = 20

# # Specify the root partition on the hard disk
# On the first SCSI HD
config kernel root on sd0
# On the first IDE HD
# Config kernel root on wd0 dumps on wd0

# # Use the ISA bus
controller isa0

# # Use the EISA bus
# Controller eisa0

# # Use the PCI bus
controller pci0

# # Floppy controller
controller fdc0 at isa? port "IO_FD1" bio irq 6 drq 2 vector fdintr
# Floppy A
disk fd0 at fdc0 drive 0
# Floppy B
# Disk fd1 at fdc0 drive 1

# # IDE hard disk controller
controller wdc0 at isa? port "IO_WD1" bio irq 14 vector wdintr
disk wd0 at wdc0 drive 0
disk wd1 at wdc0 drive 1

# # The second IDE hard disk controller, IDE controller has access only to use the second
# Controller wdc1 at isa? Port "IO_WD2" bio irq 15 vector wdintr
# Disk wd2 at wdc1 drive 0
# Disk wd3 at wdc1 drive 1

# # IDE (ATAPI specification) CD-ROM
# Options ATAPI # Enable ATAPI support for IDE bus
# Options ATAPI_STATIC
# Device wcd0 # IDE CD-ROM

# # SCSI controller card, from / sys/i386/conf/LINT read details
# Controller ahc0
# Controller ncr0
# Controller bt0 at isa? Port "IO_BT0" bio irq? Vector btintr
# Controller uha0 at isa? Port "IO_UHA0" bio irq? Drq 5 vector uhaintr
# Controller ahc1 at isa? Bio irq? Vector ahcintr
# Controller ahb0 at isa? Bio irq? Vector ahbintr
# Controller aha0 at isa? Port "IO_AHA0" bio irq? Drq 5 vector ahaintr
# Controller aic0 at isa? Port 0x340 bio irq 11 vector aicintr
# Controller nca0 at isa? Port 0x1f88 bio irq 10 vector ncaintr
# Controller nca1 at isa? Port 0x350 bio irq 5 vector ncaintr
# Controller sea0 at isa? Bio irq 5 iomem 0xc8000 iosiz 0x2000 vector seaintr

# # SCSI bus support necessary to use SCSI
# Controller scbus0

# # SCSI HD SCSI hard drive
# Device sd0 # Only need one of these, the code dynamically grows

# # SCSI CDROM SCSI drive
# Device cd0 # Only need one of these, the code dynamically grows

# # SCSI tape SCSI tape drive
# Device st0 # Only need one of these, the code dynamically grows

# # SCSI optical disk (MO) SCSI's MO drives
# Device od0 # Only need one of these, the code dynamically grows

# # SCSI media changers (Juke-Box)
# Device ch0 # Only need one of these, the code dynamically grows

#------------------ With the AT-bus drive (non-ATAPI, it is seldom a) ---------------
# # Mitsumi CDROM Mitsumi drive
# Controller mcd0 at isa? Port 0x300 bio irq 10 vector mcdintr

# # SONY CDROM drive Sony
# Controller scd0 at isa? Port 0x230 bio

# # Panasonic CDROM drive Panasonic
# Controller matcd0 at isa? Port?

# # QIC tape QIC tape drive
# Device wt0 at isa? Port 0x300 bio irq 5 drq 1 vector wtintr

# # Console screen drivers, it is necessary, less will not start
device sc0 at isa? port "IO_KBD" tty irq 1 vector scintr

# # Call the FPU in the system, regardless of whether the FPU must have, are necessary
device npx0 at isa? port "IO_NPX" irq 13 vector npxintr

# # COM1 to COM4 serial devices 1-4
device sio0 at isa? port "IO_COM1" tty irq 4 vector siointr
device sio1 at isa? port "IO_COM2" tty irq 3 vector siointr
# Device sio2 at isa? Port "IO_COM3" tty irq 5 vector siointr
# Device sio3 at isa? Port "IO_COM4" tty irq 9 vector siointr

# # Joystick joystick device
# Device joy0 at isa? Port "IO_GAME"

# # If you have a Logitech or ATI InPort bus mouse card, would this open
# # Please note that most people use a serial mouse is not a bus mouse
# Device mse0 at isa? Port 0x23c tty irq 5 vector ms

# # To PS / 2 mouse using
# Device psm0 at isa? Port "IO_KBD" conflicts tty irq 12 vector psmintr
# Options PSM_NO_RESET

# # Printer Port
device lpt0 at isa? port? tty irq 7 vector lptintr
# Device lpt1 at isa? Port? Tty
# Device lpt2 at isa? Port? Tty

# # Card, read / sys/i386/conf/LINT, pay attention to PCI cards do not specify the hardware resources, the system will self-test
# Device ed0 at isa? Port 0x280 net irq 5 iomem 0xd8000 vector edintr
# Device ed1 at isa? Port 0x300 net irq 5 iomem 0xd8000 vector edintr
# Device eg0 at isa? Port 0x310 net irq 5 vector egintr
# Device ep0 at isa? Port 0x300 net irq 10 vector epintr
# Device IE0 at isa? Port 0x360 net irq 7 iomem 0xd0000 vector ieintr
# Device ix0 at isa? Port 0x300 net irq 10 iomem 0xd0000 iosiz 32768 vector ixintr
# Device le0 at isa? Port 0x300 net irq 5 iomem 0xd0000 vector le_intr
# Device lnc0 at isa? Port 0x280 net irq 10 drq 0 vector lncintr
# Device lnc1 at isa? Port 0x300 net irq 10 drq 0 vector lncintr
# Device ze0 at isa? Port 0x300 net irq 5 iomem 0xd8000 vector zeintr
# Device zp0 at isa? Port 0x300 net irq 10 iomem 0xd8000 vector zpintr
# Device de0 # PCI --- DEC chip 21x4x series (such as DE530CT +)
# Device vx0
# Device fpa0
# Device fxp0 # PCI --- Intel chip

# # SB16 sound card, sound card other reference / sys/i386/conf/LINT
# Controller snd0
# Device sb0 at isa? Port 0x220 irq 5 conflicts drq 1 vector sbintr
# Device sbxvi0 at isa? Drq 5
# Device sbmidi0 at isa? Port 0x330
# Device opl0 at isa? Port 0x388

# # SB32/AWE32/AWE64 sound card, sound card other reference / sys/i386/conf/LINT
# Controller snd0
# Device sb0 at isa? Port 0x220 irq 5 conflicts drq 1 vector sbintr
# Device sbxvi0 at isa? Drq 5
# Device sbmidi0 at isa? Port 0x330
# Device opl0 at isa? Port 0x388
# Device awe0 at isa? Port 0x620

# # PC Speaker Audio (sound card with the PC Speaker simulation, the effect crappier)
# Device pca0 at isa? Port IO_TIMER1 tty

# # Network circuit, it is necessary,
pseudo-device loop

# # Use the Ethernet interface, it is necessary
pseudo-device ether

# # Berkerley packet filter, tcpdump, dhcp needed, it is necessary
pseudo-device bpfilter 4

# # Syslogd needs, it is necessary
pseudo-device log

# # User tty limit the maximum login limit the number of pre-set limit of 256
pseudo-device pty 256

# # PC speaker, it is necessary
pseudo-device speaker

# # Can implement gzip program, it is necessary, but only to support a.out format programs
pseudo-device gzip # Exec gzipped a.out''s

# # Support for monitoring user tty
pseudo-device snp 4 # Snoop device - to look at pty / vty / etc ..

# # Simulate a file into a sub-drive, are generally used for the exchange of files or read files with the disk image
pseudo-device vn 4 # Vnode driver (turns a file into a device)

# # Kernel-level PPP (man pppd), available LKM loading
# Pseudo-device ppp 2 # Point-to-point protocol

# # User-level PPP (man ppp), available LKM loading
# Pseudo-device tun 1 # Tunnel driver (user process ppp)

# # SLIP, available LKM loading, now rarely used
# Pseudo-device sl 2 # Serial Line IP

# # Virtual network card driver, free to write, read the information for the development of network-related programs, available LKM loading
# Pseudo-device disc # Discard device

# # Provides RAID-0 Striping, Mirroring, parity (not complete) of the function
# # Can effectively combine multiple SCSI disk, into a high-speed file system
# # For details, please man ccdconfig
# Pseudo-device ccd 4







Recommended links:



Pause slideshow TIPS



Jack Gao, became president of Autodesk China



Audio Encoders Or Decoders Report



Who cuts should be cut? Old staff or new staff?



How To Fake Brand-name Motherboard Identification



Themes And Wallpaper brief



ASF to AVI



ASF To MOV



Photoshop mouse painted illustration major combat (3): Draw Butterfly



FreeBSD Serial (49): access To X Window



Murdoch: Gone are the days BEFORE



Photoshop color change animation effects



How to transfer files from iphone to computer



How out of the trap of pseudo-BI



Wednesday, October 20, 2010

Farewell, annoying pop-up window



The process of using the computer, pop-up window will always be some that correspond to our operations must occur, while others are passively accepted. In particular, all kinds of advertising window is pervasive, hard to detect, these pop-up window has seriously affected the normal use of the computer, even cause the computer appear a certain period of time "play dead" phenomenon, so how should we deal with them?

Q: The computer often illegal advertising pop-up pages automatically with a popup blockers, and many other software can not be prohibited, killing the virus has not found any abnormality, I was Meizhe, and are there any ways to solve it?

A: This is the shared version of FlashGet to join the ad, you must run the FlashGet to appear, and register the software can disappear after the ad. There is also a way to deal with it, if you install the Windows 2000/XP/2003 operating system and partition in NTFS format, you can use folder permissions to prohibit, to Windows XP, for example, the first exit FlashGet, find C : WindowsCache277 folder (this folder to store ad files). Right click the folder, the pop-up shortcut menu, select "Properties" command, switch to the "Security" tab, the permissions to delete the role, and then click the "Advanced" button, then uncheck "Allow to come from inheritable permissions to propagate to the parent of the object "check box so that any subsequent user can not access this folder, of course, it also not work FlashGet.

Q: visit the website frequently encountered Taobao pop-up ads, strange that such a shield adware pop-up ads have no effect. How does it prohibit it pop?

A: These pop-up advertising is the use of IE browser window IE kernel to call. It is reported that Taobao is www.unionsky.cn site agents, various pop-up windows are also transferred through this site Taobao, Hosts file, we just ban this website. In the C: WINDOWSsystem32driversetc to find hosts file, use Notepad to open it, adding "127.0.0.1

www.unionsky.cn ", ANSI coded form and then save it to its original position. This trick only works here on a number of pop-up windows can play the role of prohibition, you simply pop the page address to" 0.0. 0.0 Web address "can be then added to the form of prohibition to prohibit, pop-up pages.

Q: The computer is always somehow messenger service pop-up window, the contents are all useless, illegal advertising, as long as the one on the line will appear and ask how we can eliminate?

A: Windows 2000/XP operating system at boot time, automatically activated a built-in Messenger service can receive and send popup messages to other computers. This feature was malicious, giving rise to the phenomenon of flying messenger ads. We are prohibited by the following methods: Select "Control Panel 鈫?Administrative Tools 鈫?Services", in the event of the "services" window find the "Messenger" entry and double-click, and then in the pop-up "Messenger Properties" dialog box, select the "General "tab," Startup Type "to" prohibited "and click" Stop "button.

Q: visit the website often a number of authentication dialog box will pop up, such as network name, little communication and so on, each time experiencing this phenomenon, the computer will stop responding for some time authentication pop-up window, feeling Hao Fan! So I banned the ActiveX control, although these things do not pop up, but sometimes visits a bank site or those who need to install Flash and other plug-ins to browse the site normally is not normal, what are the best of both worlds solution?

A: After all, these plug-ins are installed can be a permanent use, and so need to install plug-ins, you can start the ActiveX control, such as the installation is complete, then ban on it. Also recommend you for a very good software - Anti ActiveX nags, it can shield the window 42 kinds of nuisance, basically out of trouble authentication dialog box. Download: http://www.onlinedown.net/soft/28775.htm.

Q: I found a boot the computer will automatically pop up IE and open a number of silly sites, while browsing the web will often pop up when IE window. How do I remove them, it is also a clean computer?

A: These situations are generally malicious Web site to your computer is modified, added in the boot of illegal startup items, and modify the registry created. Since modifying the registry is too complex and could easily lead to system crashes, we propose to install the fix to restore the system software, such as "IE repair experts", "IE Registry Repair device" and software can help you clean up.

Editor Note: the current pop-up window for the browser more and more software and even Windows XP SP2 also added the function to ban the pop-up window. Full use of these functions can be against most of the pop-up window, but because of the particularity of the Internet, it is difficult to do 100 without a leak. Illegal pop-up window and the fight against illegal pop-up window will continue.







相关链接:



MP4 standard expected by the end of line introduced to avoid repeating the mistakes MP3



HTML Tools Comparison



My Favorite Helpdesk And Remote PC



Days of thinking and ultrafiltration: a pure space also people



Why the new emphasis on staff training



EVALUATION Remote Computing



U.S. online travel nearly 50% share



Easy to use Browsers



Log multiple Gmail accounts at the same time - Firefox extension



Fireworks MX 2-1 early experience



12 large companies in 2007-2008 compared the welfare state



MOV To iPod



integrated steel supply chain MANAGEMENT



MPG To DivX



3GPP Converter



"Chino Conflict" Comment



Friday, October 8, 2010

Qingdao Shengli Oilfield nursing home use Maxima



Qingdao Shengli Oilfield Shengli Oilfield nursing homes is the nursing home in Qingdao, hotels and reception, is now in Qingdao Shengli Oilfield division level units. Nursing home is located in Qingdao City, the political, economic, cultural, financial, business center, transportation is very convenient. Nursing homes and beautiful environment, facilities, Qingdao municipal government named the "Garden" unit.

December 2009, Shengli Oilfield, nursing homes used in Qingdao Maxima front hotel management system management system, restaurant management systems, back office systems.








Recommended links:



Kai-fu Lee: The most worried about the phenomenon of Misleading the 80 students after the start-Star



Taobao Alipay betrayal?



DivX to 3GP



How to avoid price War



Storage INVENTORY And Barcoding



MOV to MPEG4



Younger's Quickstep



Lists Log Analysers



Year Season: How To Make Cash "flow Up"



exe stopped working quick repair



AVI to MOV



Wizard Java And JavaScript



FrontPage easy to adjust inside the framework of the margins



"Personal efficiency" and "organizational efficiency"



Golden ABACUS settled in Wuhan air "Gold Dealer"



Wednesday, September 29, 2010

International logistics, look for "evergreen" recipe for (I)



Global 500 companies with average life expectancy is only 40 years, the Chinese SMEs to escape the "Seven Year Itch," reflects that the initial stage of market economy and enterprise development environment, switching does not match the requirements of enterprise strangling fierce "Died," "disease" after another. In theory, companies follow to produce a flow - the smooth transition of the reproduction of the logic chain, until the "end" of the ideal state, in reality, more and more difficult to swing a reality. The reason, on the one hand, with the global economy, businesses with market changes faster and faster; the other hand, many see the enterprise in order to humble, conventional leads, also markets the process of switching constantly adjust and mutation to occur, as the growth of human physiological and psychological needs of synchronous development as simple as Destructive Enthusiasm, Yihuo conservative, it will lead to corporate "life shortened."

First, the "evergreen" in the recipe?

Enterprise is a series of organic combination of production factors. When the companies to better use than the competition to complete these elements of a work, the company will have some competitive advantages, competitive enterprise is the effective use of the real factors of production capacity. The form of an extremely diverse competitiveness, such as: the master has some important technology patents and technical aspects of competitiveness, from the excellent experience in marketing and efficient distribution network formed by the market competitiveness of marketing, and so on. Core competence is the long-term stable business foundation for competitive advantage is to the skills, assets and operation mechanism of organic self-organizing capacity of the enterprise integration, enterprise internal management of the implementation of strategies and the results of external trade strategy. A competitive edge to become a core competence:

First, users need to have sufficient value, that is fundamental to provide users with the benefits or effectiveness.

Second, the core competitiveness should have unique, if the enterprise expertise can be easily imitated by competitors, or through efforts to quickly build, it is difficult for enterprises to provide a lasting competitive advantage. Unique expertise and persistence in large part by the foundation on which it is determined. Those within the organizational system of the enterprise as a whole, the establishment of the learning experience in the system based on expertise, than based on individual patent or a good manager or technical backbone on the basis of expertise, with more unique.

Third, the core competitiveness should be of scalability, should be able to open a wide range of products for the enterprise market to provide support to the business range of products or services have a role in promoting competitiveness. Have a strong core competitiveness, means that companies rely on core competence in participating in the best product on the market have the right to choose. If companies do not get the core competitiveness of leadership, have been shut out of more than just a product market, but losing a series of market and business opportunities.

Core competence of the continuing construction, more is dependent on the accumulation of experience and knowledge leader, not just a result of re-invention of a great leap forward. Therefore, it is difficult, "compression" or "surprise", even if the products become shorter and shorter, the core competitiveness of the construction still take years or even longer.

This regard, so that competition is difficult to imitate, and thus has strong persistence and entry barriers;

On the other hand, the key to building competitiveness as an investment risk and more than business resources and patience to pursue this area of clear senior management can promote the interests go beyond sectoral limitations, more from their overall strategy and consider the perspectives to grasp the future market needs, and early into their core competitiveness of the construction. Core competence in the building behind the competition of enterprises, often very difficult to catch up.



In the process, the application of information technology have a direct impact on the survival and development of enterprises. The successful application of information systems to become the leading enterprise in the erection of a wall and catch up with, will not realize that all this enterprise is far from the block in the back. Also made in the information age, information technology applications and the successful application of information technology management has become a powerful business tool to enhance core competitiveness, as the company "evergreen" an important factor, do play an important role in enterprise development.

Construction Enterprise Management Information Technology has not only computer applications in business management, it is more a condensation of the leading companies have long experience and accumulated knowledge, wisdom and leadership of international best management practices. Management Information technology has become a corporate business strategy an important part of decision-making, Yu enterprise strategic and operational needs of 鍙戝睍, closely combine Yunzuo strategy for enterprises to produce, market, marketing strategy, product development strategy, financial management strategies Yiji human resources strategy provide strong support for such information, more companies offer the basis of the development strategy and decision-making tools.

Needs to be emphasized is that in today's economic times, companies have not only reflects the value of physical assets and financial assets, but includes physical assets, financial assets, and customer assets, employees and suppliers of assets and organizational assets, including five assets. Thus, the enterprise information and analysis not only to understand the needs of business entities and financial, must be more comprehensive understanding of enterprise customers, employees, suppliers, and the entire supply chain and ecosystem needs.

Business needs of enterprises in all aspects involving the information system is varied. Enterprise information is an important task is through comprehensive analysis of internal and external needs, and establish the current and future development for enterprise information system architecture, the business needs of existing and construction of different information systems into a unified framework to achieve integration integration integration goals. As a manufacturing enterprise, general business information systems needs, including: financial, distribution, manufacturing and human resources management, communication with customers, sales and channel management, links with suppliers, and logistics management, enterprise and knowledge of office automation management, in-depth analysis of data mining and decision support. Finally be able to use well the means to integrate e-commerce implementation. In the construction business the way through the information bus, application networking technology as the enterprise information architecture and e-commerce will be the integration of various information system applications integrate data and information to achieve interoperability and sharing, and using enterprise information portal provided internal and external users personalized information interface.

Information systems success in the enterprise application can also bring real benefits for the enterprise, not only depends on the system's technical and business suitability, more importantly, whether the enterprise business processes can be closely integrated with information systems , from corporate strategy, management mechanism, business processes, performance appraisal and staff quality and corporate culture, to effectively change and integration.

Therefore, relying on management information systems to promote and support the business processes of "automation" and "Information Integration", enables enterprises to conduct business more efficient real-time operation. To provide effective and fast performance evaluation data of the business sector in areas such as performance assessment. These indicators of the strategic goals and business again and the process target, identify gaps corresponding to further improve the management or adjustment strategy, the company to success.

Second, corporate transformation Yantai Wanhua caused the "evergreen" Deep Thoughts

"Production creates demand" of the law of corporate life are welcome wake-up call times the excess, the external market environment of the switch pairs of the traditional business cycle of the challenges, business has been a classic in our past, "nurturing, growth, maturity and decline of the "four stages of life theory that eclipsed. At the same time, business system environment, reflect on their own core competence, but also will encounter a new phase of history - is to seize the product development of the hill continue to enhance the management level and means and ability to always half a beat faster than the competition, or change the concept of rules of the game from the creative staff, as competition "gatekeeper" role? These problems have become a business from the "middle age" to "known fate" had to step in Hom. Otherwise, the result of passively waiting for the excess can only be "sucker" melt in their hands, many years of painstaking efforts burned overnight.

From a single variable to see its rising trend of decline in amplitude are instantly on the enterprise "birthday" produced indeed affect the body's role, called corporate "net worth of his life"; the same time, a section of "small life" constitute the affect the company's comprehensive "injunction."

If you step on quasi-market Huanbu business beat, the indicators up the stairs, you live longer; the other hand, once behind bars, the decline is not far off. Moreover, traditional industries related to the greater firm size, the more a single product, the more intensive production, the competition more fierce. Often when I look back, he died but in the dim light.

Throughout history, when it comes before the economic cycle Dikaigaozou are all embarked on the vitality of enterprises, innovation and constant change breeds good time, until all enterprise system, and gradually put in place mechanisms and regulations are constantly promote macro-economic aspirations to a new high just around the corner. Furthermore, in reality, the coexistence of microscopic chaos and confusion of a macro-micro and macro rationality disorder go hand in hand for a micro-macro straighten drive, are the three stages of the evolution of economic patterns. As the "hot water in the frog," died on the environment is not sensitive to snatch the most vicious of the Kitty Hawk ultimate survival of the fittest in charge sky laws, Livestock, as indicated by the enterprise If understand the situation, a clear understanding on the chest and a positive trend response, the tree of life may be evergreen. Otherwise, the reform is likely to only become a stepping stone, too the world by storm and eventually vanished. According to the present scenario analysis that the reason China's economy is still in the micro-macro order to switch to the occasion, with the improved market environment, corporate nature "Birthday" will also be gradually extended.

2.1, enterprise reform is an inevitable trend

Yantai Wanhua Polyurethane Co., Ltd. (hereinafter referred to Yantai Wanhua) is mainly engaged in polyurethane and additives, isocyanate (MDI) and derivative product development, production, sales, is currently the only country with MDI production technology and equipment companies is the world's sixth MDI advanced manufacturing technology manufacturer of intellectual property rights. Isocyanate oligopoly market competition in the state of the world's major MDI manufacturers BAYER, Huntsman ICI, BASF, DOW Chemical, Mitsui NPU, Yantai Wanhua MDI production technology as complex, demanding process equipment, advanced production technology essentially the hands of several multinational companies, as the only industrialized production factory - Yantai Wanhua embarked on the path of independent development, and gradually mastered the art of MDI manufacturing technology, making China the following Germany, Britain, America and Japan after the fifth MDI manufacturing countries have to break the technological monopoly of transnational corporations, China's industrial development isocyanate had a profound significance.





In today's business environment around the world, the trend of globalization, under the influence of popular e-commerce, threats and opportunities are at the endless expansion. Enterprises are faced with increasing competition, and enterprises need to rapidly changing business models to adapt to changes in the environment. In the past, business success tips in the superiority of its tangible assets, such as advanced production equipment, or capital adequacy. Now, more companies are using their network of relationships with customers, brands, goodwill and other intangible assets as the most powerful tool in the face of competition, we can see that the importance of corporate transformation.

Urgency for change, for Yantai Wanhua addition to changes in the international environment, seize the opportunity, companies have to face the "WTO" impact. Chinese enterprises, especially state-owned enterprises, including Yantai Wanhua change left over for historical reasons, the operation is extremely weak base, the lack of more effective management and operation mechanism, more or less reflected in the following areas, and for Yantai Wanhua is, there are different levels of performance:

Need for effective implementation of the strategic orientation: the vision of industry enterprises and their own understanding of positioning, the lack of more detailed implementation procedures and effective means of achieving, in the execution and monitoring of the management of the lack of strong support system (such as: effective organization, management, business processes, management information technology), can not be a more effective organization and resources needed to establish the future of competition and competitiveness;

Non-matrix organization: organizational structure can not be a more effective implementation of the strategy with the company, it is difficult to effectively integrate and upgrade resources;

There is no scientific business process: the lack of horizontal links between business effectiveness, lack of information-sharing mechanism can not effectively create value for the enterprise;

Incentive mechanism is not clear: is subject to the performance evaluation system to enhance incentives to the growth of organizations and people behind the development of enterprises;

Low-level information technology: information systems lag behind, with less use of information technology, it is difficult to provide up to enterprise decision support;

Lower working capital: lack of mature businesses of funds and investment management skills, can not be efficient utilization of capital;

Therefore, the enterprise transformation for enterprises, it is particularly urgent and important.









相关链接:



Fireworks in the FADE in animation production



Evaluate Dial Up And CONNECTION Tools



AWS Express, turned out to Yanhuang PCC writing a new chapter in BPM



AMD Quad-core Processor "Barcelona" Prices Announced



Enhance the concept of active intrusion prevention IPS is not speculation



AutoCAD Watch A Good Helper



Lesson: Payment orders I have lost 170 000



News about Project Management



In October 2007 the sixth New York International OUTSOURCING Exhibition



ASF to MPEG



MJPEG to AVI



Astronomy Wizard



indian software industry in china Frequent



Cool my music box, the new interface, mainly practical



Effective process improvement method must Contain the elements



MTS to MOV



Sunday, September 19, 2010

Log multiple Gmail accounts at the same time - Firefox extension



Gmail Appinn is written in the software I use AutoHotKey, using Firefox3 and expansion of Prism, the Gmail system into the Central Plains as an independent desktop program, like students. And compared with normal Web browser, Gmail Appinn neither the menu nor the toolbar, just to maintain minimal UI. Gmail Appinn advantage is that you can treat it as a normal desktop application to use.

Very suitable for busy people do not want to open Gtalk disturbed the Gmailer.






Figure 1 Gmial interface

Features:

Support for multiple Gmail account simultaneously log.

Can be minimized to system tray

Auto Login

Background control Prism

Tips for new messages, and similar to Google Talk Tips

When Google Talk presence, you can set up a new pop-up message asks if






Fig 2 e-mail reminder

Support the main interface shortcuts exhale

Custom Projects rich (check mail interval, pop-up prompts residence time, a new voice message prompts, Prism window name, the default login of Gmail interface)






Figure 3 login screen

Encrypted password stored in the configuration file

Automatically check the message data stored in memory, not to hurt the hard drive

Usage:

The first step, you must install the FireFox 3 browser and install the expansion of Prism.

The second step, run FireFox, open Gmail, click on "tools" menu, select "Convert Website to Application", in pop-up window, in the "name" in input: Gmail, check Gmail, click ok. See next map:

The third step is to run "install. Exe", is set up, click "OK" to start the program directly.

Tips:

1, Firefox and Prism where the path where the path is a shortcut from the second step in the establishment, acquisition of data, keep the default on the line. The second step to establish a shortcut will be deleted.

2, mouse over the "check mail interval" and "pop-up prompts stay", scroll wheel can automatically change the data.

3, when GmailAppinn.exe running, open the setup interface is set up, click "OK", GmailAppinn.exe will automatically restart.

4, the contents of the password input box is empty every time you start, because your Gmail password is encrypted and stored in the configuration file, if there decrypt the password and the password input box to display your password as asterisks, it can be See the software detects an asterisk, encryption will be lost meaning, so empty. After the first set, they do not change your password, let the password box blank on the line.

5, in the Gmail interface when maximized, click the task bar, you can hide the tray, I believe that eMule and used software like Twhirl friend some love. (This feature is especially want to thank Helfee code provided)

6, how to turn off the "new mail alert sound"? In the setting where it will be empty on it.

7, N to open a Gmail? After the above settings, a copy of the entire Gmail Appinn, and then click your account and password reset.

8, left-click the tray icon to display the Prism.

bug:

Please do not use the right menu ShowGmail to display interface, or will happen can not be hidden to tray problem. If the unfortunate Click how to do? Please restart the computer. If that does not work, open the setup interface, change it "Gmail window name."

Careless, to set interface "When Gtalk exist", labeled "When Gtalk time"

Disadvantages:

Prism, is to eat large memory. Will occupy 50 ~ 80 MB of memory. Here someone may ask: how do IE ah? Because with IE I do not go on the development and use IE, then N can not be achieved to open a Gmail.

If you are using Firefox Portable version, first run Gmail Appinn, and then run Firefox will prompt: Another instance of Firefox is already running. Please close other instances of Firefox before launching Mozilla Firefox, Portable Edition (Test). To the effect that: another Firefox is running, please close it after running the program.







Recommended links:



ICBC AMENDMENT



Dell Go From Here



TS video format



ogm Ps3



Wizard Covert Surveillance



Convert m4v to mov



Job 10 kinds of unhealthy attitude towards students



Recommend Puzzle And Word Games



Shop PEOPLE - Screen Savers



avchd to mov



U.S. stocks comment: Sun DIE-HARD



C + + Monitor: compatible with the accepted type of member function templates



Easy GAMES Arcade



Adobe Illustrater draw radish



Shi Yuzhu giant empire base



MATTING, Photoshop master of the Road, 2



Thursday, July 29, 2010

Matting, Photoshop master of the Road, 2



Flexible use of tools in Photoshop, image processing

Portraits part of the deal:



Look at the picture above, if the people on both sides of the head should be removed, then they would fill the position should be used to remove the area it fills the background next to complete. Well, look at what most people picture the background of what the right, in addition to the trees the sky, some people, so we will use these to fill the better.

1. We first selected on a piece of wood in the background, shown in Figure 10,



(Figure 10)

Copy and then paste, the new layer, then the eraser to rub the edge of this layer to reach the edge of a kind of feathering effect, the diameter eraser set above Figure 11.



(Figure 11)

2. In the deal, we can move layers to the character's face, the face covered. If the area is not large enough, then you can copy more than one layer, until her face covered up. Treatment Figure 12:



(Figure 12)

Now we have to deal with the picture on the left of the head



Figure 13

1. We must first choose some of the region to deal with it with a spray gun. We can use the first tool to draw in color with the color of the sky, and then spray gun tool to the location of the sky with color fill. Using the same approach slope. Finally as shown in Figure 14 so.



Figure 14

2. Then select the following section, Figure 15, copied and then paste, then rub this layer the edge of the eraser. To move it above his head, and if not, then on to reproduce more layers.



Figure 15




[Next]



Has been dealt with in Figure 16:



Figure 16

Haha, that this step we can look at photos of the treatment, how?



On this practice? Not yet, we have to change it curves and color saturation.

Steps:

1. Press ctrl + M pop-up window, as shown below, watching images side adjustment curve.



Press ctrl + U pop-up window (Figure) to adjust saturation value



Haha, look how well the picture changed?



Summary: In fact, we found that in dealing with the picture of what is useless, just some basic tools. Often need is patience, careful, with these, together with the flexible use of various tools to deal with images will become easier. Welcome to exchange letters with my email: wa7456886@21cn.com

[Editor's note]

Cipian tutorial there are a small story, one day greatly accelerates forum Xia Guang, occasional discussion of a crowd in the original image processed with a photo, think of a good photoshop technique, made every effort to inquire into their whereabouts, stalker, only this article, interested friends can visit the following website for further understanding of:

The original is so long, bean sprouts into the http://flash.fan8.net/Douyacai/







Recommended links:



Online Player DIY



Brief Gallery And Cataloging Tools



audio TO mp3 converter



Using the seven combat the Heart Jakarta Struts



wma Converter



Ulead Photo 6 produced a tough, big run (FOREWORD)



EXPERT Games Card



youtube video format



Interview With Eastman Kodak Asia Pacific Director Of Human Resources Is Pleased To Ms.



.dvd File



Baidu statistics the first to experience: the promotion of impact Assessment papers



Solution "CMMI consequences"



Contact HOME Linkist then the new tactics: to provide professional exhibition space



Directory Fax Tools



Premier RELIGION