Need advice on what kind of report, queries to tune database slow issues

Currently we have AWR reports. Our system is 11.1.07 version on AIX/Linux.
Sometimes application will say it is slow running some queries.
We have firewalls implemented so we cannot use toad, or other tools to access through our workstation.
Any good manual suggestions to pinpoint what exact wrong in the system?
Any good suggestions?
Thanks in advance.

846422 wrote:
Any good suggestions?
Try to forget for a moment the nice GUI tools and read instead what experts do when trying to answer "Why my database is slow ?" in http://www.nocoug.org/Journal/NoCOUG_Journal_201105.pdf.
In your case I would try to work with end users to identify application scenarios that are slow and use SQL trace/TKPROF on related database sessions. For this you only need command line interface (CLI) access to run SQL statements and access to machine hosting database server: that should be possible with the jump server otherwise you cannot do anything and you would better ask someone that has CLI access to database and database server machine.
If you have license to use AWR, you can also use ADDM report which runs an automatic analysis of AWR report and give some advices:
SQL> @?/rdbms/admin/addmrptEdited by: P. Forstmann on 22 juil. 2011 20:15
Edited by: P. Forstmann on 22 juil. 2011 20:40

Similar Messages

  • I need some advice on what kind of virus protection program to buy.I am new to using a Mac,the promotional one is expired .I need to decide soon

    I need advice about what security program to buy the promotional one is expired. To keep the Webfoot program is expensive.Is there another less costly one recommended ?

    Mac users often ask whether they should install "anti-virus" (AV) software. The usual answer is "no." That answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions.
    It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to take control of it remotely. That threat is in a different category, and there's no easy way to defend against it. AV software is not intended to, and does not, defend against such attacks.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't been checked for security by Apple unless it comes from the App Store, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has taken far too long to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. Those lapses don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, not machine behavior, and no technological fix alone is going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're better informed than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software. A genuine alert that Flash is outdated and blocked is shown on this support page. Follow the instructions on the support page in that case. Otherwise, assume that the alert is fake and someone is trying to scam you into installing malware. If you see such alerts on more than one website, ask for instructions.
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Rogue websites such as Softonic, Soft32, and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission. All "YouTube downloaders" are in this category, though not all are necessarily malicious.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a padlock icon in the address bar when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial AV or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It can be as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • Need some advice on what kind of printer to purchase???

    Hello!
    I'm a graphic designer in a small town and I'm wanted to break away from working under someone and start my own small business. I want to be able to print my own work and I'm looking for some suggestions on what kind of printer to purchase (something comparable to the xerox 7750?? or if there is something better???) I was looking at Xerox and not sure if that is the way to go. Most of my work will be small: business cards, wedding invites, graduation announcements, etc. I work at a print shop now and we do a TON of that type of work off our Xerox 7750.
    I'd appreciate any advice you have on purchasing the right printer and getting my small business started!
    Thanks

    I also have a Oki C9800hdn postscript and am a solo operator. The Oki also does banners 325x900mm (up to 1200mm long too)on paper and a special weatherproof paper. Standard sizes are up to oversize A3. Remember to order the POSTSCRIPT version of whatever printer you get.
    Consumables are the thing to look at which makes it hard to price cost of prints.
    I used to have a FujiXerox where I paid monthly on a rental agreement - but it was over 5 years which was too long for me. In real terms it worked out about $850 per month including the cost per 'clicks' which I didn't like either. The black toner and maintenance was included for the Xerox, but I still had to pay for the colour toners which were the same price as the Oki colour toners. (Colour approx AUD$480 each and mono approx $170AUD each). Plus the drums for each colour have to be replaced at 30,000 prints. However the Oki colour toners last longer and do more prints. Don't believe the 'number of prints with 5% coverage'. My average coverage is 80% with full colour or mono. Weight of card is up to 250gsm (more than the Xerox did). You can set up profiles so that what you print is very close to any commercial prints you get done for larger runs.

  • Need advice on what to purchase:FCE,iMovie09,Soundtrack,Garageband.

    Deciding best purchases.I am attracted to moving up, seeking a better visual experience for editing. Looking at Final Cut express, Soundtrack, Garageband, ilife09 with iMovie09. The more I read the more confusing it is. I am often lining up educational audio to video for hiqual pro product (voiceover mixed with 1 track of music-usually only 2 track audio). I am experienced somewhat in Audacity. I might need noise clean later. With multi versions out there and changes to stuff (this dropped this added) what should I do. This all started because I was told I should/could be using garageband instead of Audacity and then importing my iMovie06 into it. But then I can't export it back as project tro iMovie06 I think. I was told move up to iMovie09 since FCE is too complicated for now. But it appears FCE allows visual tie in of audio and video but then I don't know what version of FCE to get (Soundtrack was dropped form latest version FCE). Do I still need to use garageband with FCE for audio editing?

    +" ... Do I still need to use garageband with FCE for audio editing? ..."+
    It depends on what you need to do. Audio can be edited in FCE, which includes a good set of audio filters & effects. I've done some pretty extensive audio editing in FCE and even when I did have SoundTrack I never used it. If you're adding voiceovers or additional audio tracks then I'd say FCE can do what you need and you don't need an external audio editor. (Except perhaps for sound cleaning, for which I suggest SoundSoap.)
    Overall, I'd suggest spelling out exactly what kind of video & audio editing you think you need or want to do. Then with those requirements you can figure out which software is best suited to your needs.

  • I need to know what kind of disk i need for my portege z835-sp3240L

    I have an Portege z835-sp3240L Ultrabook and the SSD disk failed, so i need to replace it. I want to know what kind of disk i need (size, inches, etc) Please, can you give all the info about the disk. I live in Chile, so i can´t take it to a Toshiba repair place.

    Portege Z835-SP3240L
    Downloads here.
    Essentially any capacity SATA disk that fits a laptop should do.
    Best to restore the hard disk to its original out-of-the-box contents using Toshiba recovery media. All the drivers and utilities are properly preinstalled. Windows is preactivated.
    If you failed to create recovery media, you can obtain it from Toshiba. Scroll down to Get Recovery Media here. Toshiba in the US will ship to Chile (see this message).
    For instructions, see the section Restoring from recovery media, which begins on p. 65 of the User's Guide.
       Portégé Z830 Series User’s Guide
    If the disk uses advanced-format technology, see my message about that.
    -Jerry

  • I need to know what kind of photo paper to use on the HP Photosmart 375.

    What are the specifications for photo paper to be used on the Photosmart 375.  HP Advanced Photo Paper is too thick (66 lb) and won't feed through the printer.  HP Premium Photo Paper (64 lb) will feed through the printer but the ink takes at least 2 hours to dry.  HP sold paper in the past for injet printers which worked perfectly: it was the right thickness to feed through the printer and the ink dried instantly.  Canon also sold similar paper, but both HP and Canon have changed the specs on their photo paper so that they no longer are suitable.  So, I need to know what are the proper specs for a Photosmart 375 and where can I buy it.  Shouldn't HP provide a suitable paper for its Photosmart 375 printer, as it did in the past?

    I have had good results with HP Premium Plus Glossy photo paper.  The Office Depot Brilliant Gloss Professional Photo Paper also works well for me.
    In both the cases above I notice the packages have changed since I bought the paper, I do not know if this is still the same paper formulation I have.
    For instant drying the HP Advanced Photo paper should be a good choice.  You may need to clean the paper rollers if it does not feed properly.  You can do this by gently releasing the catch on the right side (looking from the front, but the catch is on the back panel).  This will allow the panel to lie flat exposing the rollers.  These can be cleaned with a damp q-tip, remove any buildup on the rollers.
    Bob Headrick,  HP Expert
    I am not an employee of HP, I am a volunteer posting here on my own time.
    If your problem is solved please click the "Accept as Solution" button ------------V
    If my answer was helpful please click the "Thumbs Up" to say "Thank You"--V

  • Hello friends, need advice on what PREPAID broadband (USB TYPE)(compatible) to use... I'm from the Phils, i use macbookpro macosxLION 10.7.2

    need advice/help

    my mbp (Leopard) used to work w prepaid wireless broadband (usb type) here in the phils... but when i upgraded my osx to LION... it dsnt any more... ds any1 have sol'n w this?

  • How do I set up a wirelss music system with a MacBook Pro? Need advice on what to use: Bluetooth or AirPort. I don't have speakers yet. I listen mostly to classical music. Any advice on what kind of speakers?

    I live in a small apartment and would like speakers in the bedroom and the living room. I like the "all-in-one" units. Would two of these sound better than one in the living room? I have a wireless modem from my phone company, but I have not hooked it up yet. What is AirPort and is it necessary to do what I want to do?

    If your goal is to have a "whole home" audio experience, then using separate speakers in both the living room and bedroom would the proper approach.
    If you decide to go the AirPort Express Base Station (AX) route, then you would need a minimum of two of these devices; one each for each room. The AX is a wireless Internet router with built-in audio. The AX's audio port supports both analog and digital optical audio output and will work with either self-powered speakers or an audio receiver that supports either connection type.
    Classical music has very fine dynamics and, of course, the better the speaker, the better the sound reproduction. However, you don't need to go overboard as the AX is limited to the audio files that iTunes can play.

  • Need advice on how to create report

    I'm not sure how to do this, so I'm asking advice from the apex gods...
    here is the issue, I have two tables that I need to combine info from. not an issue in its self. I can do that. but here is the issue. in Table A I have some data like disc_id, title, theids, etc.. Table B contains fullname, theid, emplid
    now in table A the column 'theids' is populated from apex as a multi select list. so the values in the column is something like 48;3;88
    it got these id numbers from the Table B query (lov popup) that returns theid of the person chosen.
    now I have to create a report that will be used in a excel download and what they want is one line per disc_id and they want the more useful 'emplid' in the field where 'theids' are at. that is instead of :
    disc_id Title theids
    101 Test 48;3;88
    they want:
    disc_id Title Theids
    101 test N33456,N3457,N43562
    so I'm kind of stuck, I can figure out how to write a sql using instr to get something like this:
    101 test N33456
    101 test N3457
    etc
    but that is not what they want. so I'm thinking I need to create a package to do this and return some sort of values. the problem is I can't figure out how I can substitute the 48;3;88 for N33456,N3457,N43562
    I'm still new at this pl/sql and apex stuff so sorry if this seems to have some obvious answer.

    I might be dense so forgive me on this, but I don't think that will solve it.
    your example uses field from apex, like :P3_SOME _VALUE
    this report screen has no fields. there are no :P#_ type values to pull. I'm writing a report screen using a report template.
    all the data I need for the report exists within the table. I just need to display it the way they want.
    I could do just a:
    select *
    from my_table
    and it would create the report just fine. the only issue is one of the columns would have 48:3:88 in the field. which to a person reading the report means little. so i have no apex fields to pull.
    I was trying to write a pl/sql function that would substitute those delimited values with meaningful data. but when I do I get multiple rows and I can't have that. so my choices so far I see are..
    1) create the report with a simple select leaving the data as is
    2) create report that has multiple rows of data where each instr value now has the correct names (some have 2 some have 5, big list to read of dups)
    3) create a package that populates a temporary table with the data I need then select on that table to get the report.
    right now I'm thinking #3 is the only way to get what I want. By the way your examples would be a great help in doing that I can already see that I can use some of them to create a temp table with that data.
    what I was hoping for was some option that I don't understand or missed that a more experienced person would know. but its looking grim.
    I thank you all the info you have given, its been a great deal of info that I can use at some point, but so far I don't think it will solve my issue.

  • Need advice on what antivirus/security measures are recommended for Macs

    Between us my husband and I have a MacBook Pro and a MacBook Air.
    I'm looking for guidance on what might or might not be useful, beyond what is standard on a Mac, to protect against viruses and improve security on our system.
    Thanks in advance!

    Linc Davis wrote:
    (1) Don't install any commercial anti-virus software. It's all useless garbage.
    Not true, at least if you email or send files to Windows users. It won't do you much good if your Mac isn't compromised but theirs is by something you pass along to them. Any info about you on their computers is put at risk of exploitation. We live in a connected world, & like it or not we are all in this together.
    (2) Use your administrator account (the first one you created) only for administrative tasks such as installing software.
    This offers reasonable protection but some malware is potentially capable of exploiting unpatched vulnerabilities that allow privileges to be escalated to admin or even root level without a user's knowledge. And even if an exploit is confined to the domain of a regular user account it can still do damage or compromise information.
    NEVER enter your administrator password when prompted to do so by an application UNLESS it's a built-in application, such as the Installer.
    That would preclude the use of a great deal of commercial software that doesn't use Apple's Installer.app, including most Adobe products.
    NEVER install any third-party software except by drag-and-drop into your Applications folder, or by download from the App Store.
    Same as above: not everything users want or need uses Apple's installer or can be installed by a simple drag & drop. And obviously, if the system is already infected all bets are off: you can no longer trust Installer.app to be what it says it is.
    NEVER run any program you receive as an unsolicited email attachment, even if you know and trust the apparent sender.
    This does not apply only to attachments containing executable code, or even just to email. Apple has provided security updates to patch vulnerabilities that can be exploited just by clicking on links to maliciously formed web pages. This kind of attack is becoming more popular, in part because browsers send info about the client computer to the server that can be used to tailor the attack to the specific vulnerabilities of the platform, & in part because browsers increasingly rely on executing scripts & other instructions provided by web pages to render them.

  • Need advice on what to look for when buying an external HD

    Hello iBook enthusiasts,
    I want to buy an external HD for backing up my important documents, and for having a way of booting up just in case the iBook should fail. I have searched some of the old posts, but I am still a bit confused.
    So far, it seems that the most important criterion is that the drive have FireWire in order to be bootable.
    I don't want to spend a ton of money. Somehow, I get these emails from Buy.com, advertising their specials. For example, they had a 250G one for $100 (although that particular deal is now expired). This seems like a good deal to me. Is that right? Should I try to buy the largest or smallest one that's in my price range? If iBook does die, I would like to still be able to use the HD with whatever replacement I get.
    Also, is there any particular brand that I should either look for or avoid? How do I know these things?
    Anyway, sorry these questions are so vague. Thanks in advance for any advice.
    Anna
    Ibook G3 500 MHz   Mac OS X (10.3.9)   14 GB HD, 640 MB RAM

    Anna:
    Yes, rule no. 1, Firewire or FW/USB
    2. Largest HDD you can afford (having more space than you need it not a problem; needing more space than you have, is.)
    3. 7200 rpms. (Most of them are, but not all)
    Here is a list of some of the best buys already sorted for 200-300 GB.
    Different folks like different manufacturers. I have had my LaCie for 2 years. No problems. I like it for it's compact size and elegance.
    Here are some good hints from Dr. Smoke on Backup and Recovery. Instead of Retropect, which I could never quite figure out, I use Carbon Copy Cloner or SuperDuper.
    Post back with further questions or comments.
    Good luck.
    cornelius
    Message was edited by: cornelius

  • Need advice on what component(s) to use

    I'm trying to put together a UI that displays a background image and displays on top of that image several jpanels, jlabels, and icon type images . I'd like the user to be able to drag the panels etc. to a desired location.
    I'll then need to grab the coordinates and store them to a file, so that I can rebuild the UI with the components in the same place that they were placed when restarting the application
    Wow that was hard to put into words.
    The idea is the image will be a layout and the panels will be the physical position of a data source. A bit like in home automation programs that shows a layout of the house with the locations of cameras and switches etc.
    So I'm thinking JInternalFrames may work but I need something that is transparent.
    Any advice or a push in the right direction before I dive in will be greatly appreciated.
    Edited by: xavier33 on Feb 22, 2008 4:08 PM

    panels would work equally as well, but you're still going to have the same problem (from your first post)
    "I'm trying to put together a UI that displays a background image and displays on top of that image several jpanels, jlabels, and icon type images ."
    if any of the add-ons has a listener, you'll have to pass on the event to the panel.
    this might be close enough - a small area at the top, when the cursor changes you can drag the panel around
    import javax.swing.*;
    import java.awt.*;
    import java.awt.event.*;
    class Testing
      int xPos, yPos;
      Cursor normalCursor = new Cursor(Cursor.DEFAULT_CURSOR);
      Cursor moveCursor = new Cursor(Cursor.MOVE_CURSOR);
      public void buildGUI()
        ImageBackgroundPanel backgroundImage = new ImageBackgroundPanel("test.gif");
        backgroundImage.setLayout(null);
        final JPanel viewPanel = new JPanel(new BorderLayout());
        viewPanel.setOpaque(false);
        viewPanel.setBounds(0,0,100,100);
        final JPanel p = new JPanel();
        p.setOpaque(false);
        p.setPreferredSize(new Dimension(viewPanel.getWidth(),10));
        viewPanel.add(p,BorderLayout.NORTH);
        viewPanel.setBorder(BorderFactory.createLineBorder(Color.BLACK));//<---just so you can see it moving
        backgroundImage.add(viewPanel);
        JFrame f = new JFrame();
        f.getContentPane().add(backgroundImage);
        f.setSize(600,400);
        f.setLocationRelativeTo(null);
        f.setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);
        f.setVisible(true);
        p.addMouseListener(new MouseAdapter(){
          public void mousePressed(MouseEvent me){
            xPos = me.getX();
            yPos = me.getY();
          public void mouseEntered(MouseEvent me){
            p.setCursor(moveCursor);
          public void mouseExited(MouseEvent me){
            p.setCursor(normalCursor);
        p.addMouseMotionListener(new MouseMotionAdapter(){
          public void mouseDragged(MouseEvent me){
            Point vp_p = viewPanel.getLocation();
            Point me_p = me.getPoint();
            viewPanel.setLocation(vp_p.x + me_p.x - xPos,vp_p.y + me_p.y - yPos);
      public static void main(String[] args)
        SwingUtilities.invokeLater(new Runnable(){
          public void run(){
            new Testing().buildGUI();
    class ImageBackgroundPanel extends JPanel
      Image img;
      public ImageBackgroundPanel(String file)
        try
          img = javax.imageio.ImageIO.read(new java.net.URL(getClass().getResource(file), file));
        catch(Exception e){}//handled in paintComponent
      public void paintComponent(Graphics g)
        super.paintComponent(g);
        if(img != null) g.drawImage(img, 0,0,this.getWidth(),this.getHeight(),this);
    }

  • I am an Entrepenuer as well as Business Manager related to Residential Developer and Construction, I am considering in buying a MacBook Pro 13" or an Ipad. I need advice on What should I get appropriate to my type of business?

    Don't know What is best for my type of business?

    The advice I give is one writes documents on a Mac while one reads documents and writes short notes on an iPad.  The iPad is great for surfing the net and is more portable but will not do heavier tasks as well as a Mac such as creating and editing documents, spreadsheets, and presentations.  The data you create is more secure on a Mac; it has better storage and backup features.  So for a read-mostly device the iPad work great but if you get into creating and editing documents then the iPad can fall short.
    For a portable Mac consider a 3 lb. 13” MacBook Air or a 3.5 lb 13” Retina MacBook Pro.  For your applications they have similar capabilities and similar portability.  The non-Retina MacBook Pro weighs a lot more (4.5 lbs).

  • IPhone 5 is glitching. Need to know what kind of restore to do

    The apple tech said something about how I have some corrupt software and how i needed to do a certain restore.because the phone is freezing. if I just restored from a backup it would restore from the corrupt data. He said if I did it right i wouldnt have my text message history. I cant remember exactly what he said though. Any help would be great
    thanks.

    "Restore iPhone" to get a full iOS restore, then when the iPhone boots back up, it will prompt you to restore from backup to get your data back. Make sure to go to File>Devices>Transfer purchases FIRST to get your apps backed up too.

  • We need advice on what cloud service is the best option for us

    Hello,
    I work for a very small company, we have two designer. Both of the designers just go new computers and we are looking at switching to the cloud but are confused about what the best plan is for us. We mainly need the creative suites softwares but we occasionally both work with a few production suite programs as well. Again, it is only the two computers and we do not see a need to add anther computer within the new few years. What is the best option for us?

    Team license links that may help
    -http://www.adobe.com/creativecloud/buy/business.html
    -manage your team account http://forums.adobe.com/thread/1460939?tstart=0

Maybe you are looking for