Do I need to add Apple TV as a device?

I just bought Apple TV and are trying to set up Netflix. Do I have to add Apple TV as a device?

im reallt not sure how to tell the difference but;
this is what it says under my about this mac
Model Name: MacBook
Model Identifier: MacBook4,1
Processor Name: Intel Core 2 Duo
Processor Speed: 2.4 GHz
Number Of Processors: 1
Total Number Of Cores: 2
L2 Cache: 3 MB
Memory: 2 GB
Bus Speed: 800 MHz
Boot ROM Version: MB41.00C1.B00
SMC Version (system): 1.31f0
Serial Number (system): W8815XGS0P1
Hardware UUID: 93942D18-7F35-5993-AFDF-2CA48B3743B8
Sudden Motion Sensor:
State: Enabled
does that help

Similar Messages

  • Do I need a different apple id for each device? I have two iPads and an iPod but can only purchase things on the first one. When I go to verify the questions they say they are wrong.

    Do I need a different apple ID for each device I have? I have two iPads and an iPod but I can only make purchases with the first one I purchased. It tells me the security questions are wrong but I know they are not because I wrote them down. I have also reset them and my password once. Please help if you can

    You can not login into iTunes or the App Store using VPP credentials. You must purchase all apps/book/etc.  from the VPP website. Then you can redeem the codes thru itunes/app store or import the codes thru apple configurator. Here is the url for the VPP website: https://volume.itunes.apple.com/WebObjects/MZFinance.woa/wa/login?cc=us
    (It will not affect any of the apps you already have but the id can only be used for VPP.)
    Cheers,    
             Alec

  • HT204161 I have a new ipod.  Do i need to add this to my apple id account so that if it ever needs service it shows up there?

    I have a new ipod.  Do i need to add this to my apple id account so that if it ever needs service it shows up there?

    Does it show up in your Support Profile?
    No JavaScript Error
    If should have been added when yo first setup your iPod. If not you should be able to add it  from within your Supprt Profile
    You can enter your iPods serial number here and check you wwarranty coverage. This is really all that counts
    https://selfsolve.apple.com/agreementWarrantyDynamic.do

  • HT5312 How can I add a rescue email? I forget my security questions and need to add another email to reset them. I did not add a rescue email  when I originally signed up.

    I do not recall ever answering the security questions therefore I do not know them and iTunes will not let me purchase music through my iPhone. How do I reset the security questions? I do not have a rescue email set up to do so. How can I add that?

    You can't now and need to contact Apple. Click here, phone them, and ask for the Account Security team, or fill out and submit this form.
    The time to create a rescue email address is when you set up the security questions, not after forgetting their answers.
    (90478)

  • My computer had an virous so i wiped it and i need to add my old songs on my ipod to my new itunes but it wont let me without deleting my music

    my computer had an virous so i wiped it and i need to add my old songs on my ipod to my new itunes but it wont let me without deleting my music

    - Transfer iTunes pirchases by:
    iTunes Store: Transferring purchases from your iPhone, iPad, or iPod to a computer
    - Transfer other music by using a third-party program like one of those discussed here:
    Copy music from Ipod to new computer...: Apple Support Communities
    - Make a backup of he iPod by connecting the iPod to the computer.  Right clickon the iPod under Devices in iTunes and select Backup
    - Restore the iPod from that backup.

  • Everytime i need to add a song in my i phone,it always ask for earse and sync option,i need to avoid that a add songs manually.

    everytime i need to add a song in my i phone,it always ask for earse and sync option,i need to avoid that and add songs manually.

    https://support.apple.com/kb/ht1535

  • What Software Do I need to add Chapter Markers

    I've got a 55 min QuickTime movie file that I'd like to simply add Chapter Makers as well as setup a Chapter Menu selection at that beginning.
    Also, I'd like to be able to render this file to a format that will playback on any DVD player.
    To be able to edit/sweeten the audio and/or video is not a priority....I'd just need to add chapters so to divide up this one-long-movie into...well...chapters.
    What software do I need that will do this?
    Thanks.
    Mac 17" MacBook Pro
    Mac OSX 10.4.10
    Processor: 2.16 Ghz Intel Core Duo
    Memory: 2 GB 667 Mhz DDR2 SDRAM

    You can add chapter markers using Quicktime Pro if you don't need to edit the movie.
    You can find detailed instructions in the Apple document Chapter Tracks.
    These instructions teach how to add a chapter track, containing your chapter titles and timecodes, to an existing quicktime movie without using iMovie or FCE or other editing software. No codec, compression, or conversion is applied to your video and audio, which are left alone. Only a new text track with adequate formatting is added.
    A few additional notes:
    - you need Quicktime Pro (30$)
    - you must correct a couple of points in the Apple instructions:
    a. in step 3. you have first to +enable the text track+ in the Property Window of the movie, and then you can use the Text to Text option in the Export Menu (otherwise no Text to Text option is made available).
    b. step 10 must be corrected as follow: +"Open Show Movie Properties from the Window menu, choose the *Video Track* ( not: new text track). Choose Other Settings then choose your Text track in the Chapters popup"+
    Piero

  • Do I need to add my 'Home Folder' to options in the Time Machine?

    I dont want to have my 'Home Folder' to be a unencrypted back up.
    I know that Time Machine back up my encrypted sparseimage 'Home Folder' when I log out. FileVault is on.
    But when I am log in, do I need to add my 'Home Folder' into the options button of Time Machine preferences. So that Time Machine does not back up my Home folder unencrypted?
    This is what I have done, is this right or wrong? Time Machine is backing up my 'Home Folder' when I log out.

    I bought my a new white macbook about couple of weeks ago & a Seagate ITb external HD using 400 Firewire cable.
    I partition the macbook into 5 volumes. I turn on FileVault, then a day later turn on Time Machine. It seems to be working fine until I decided that I wanted 6 partition instead of 5. So, I partition my macbook into 6 volumes & use Time Machine to restore all my data.
    Time Machine did restore everything, but when it finish & restarted, it stalled & I had to turn the macbook off, then on. I though everything was fine, then just after I posted my question above, time machine fail to back up, some error message stating it fail to link?
    So I deceided to start from the beginning. I erased the external HD. Deleted the “com.apple.TimeMachine.plist” file from Preference folder. Restarted the macbook, open Time Machine, look inside the exclusion list & I notice that Time Machine put all external volumes into the exclusion list automaticlly including my FileVault 'Home Folder'. So I took out my 'Home Folder' from the list. Then back everything up. This seem to work, until I log out. I notice that Time Machine was not backing up my 'Home Folder' then I got that error message stating it fail to link?
    Then I decided to turn off FileVault, then turn it on again. Deleted the “com.apple.TimeMachine.plist” file. Restarted the macbook, open Time Machine, delete my 'Home Folder' from the exclusion list. Then got Time Machine to do a back up. Log out & Time Machine was backing up my 'Home Folder'. Everything is working, so far!

  • Do I need to add a 802.1x profile to allow others to use my wifi?

    Before I upgraded to Mountain Lion visiting family members were able to use my internet. Now some cannot even though I have given them my password. Do I need to add a 802.1x profile? Does this mean my router?

    I cannot amend my initial post as I incorrectly described the display so here is an update.
    As far as I have read and experienced with purchasing two such displays, this model came with a Mini Displayport to DVI adapter not a HDMI to DVI adapter.
    I think I need an HDMI to Mini Displayport adapter so I can use the Mini Displayport to DVI adapter that came with the display.
    Here is the display:
    Apple Cinema Display 23-Inch Aluminum
    The Apple 23-Inch Cinema Display (Aluminum) (M9178LL/A), is designed match the Power Macintosh G5 and PowerBook G4 models. It features a 23-inch (1920x1200) wide-format active-matrix LCD display with 16.7 million colors, 170 degree viewing angle, and a response time of 16 ms. It sports dual FireWire 400 and dual USB 2.0 ports on the back of the display.
    Picture is here if link is allowed:
    http://www.sellyourmac.com/mac-product-guides/cinema-display.html
    http://www.sellyourmac.com/images/stories/mac-guides/apple_cinema_display_20_inc h_aluminum.jpg

  • I need to add my Daughters iPhone to "Find my Iphone" her

    Need to add my daughters iPhone to "Find my iPhone"

    Hi Jlharrigan,
    If you want it added to your Find My iPhone, you would need to sign on your iCloud account to her device.
    If she has her own Apple/iCloud ID, then go to Settings>iCloud and turn on the Find My iPhone switch.
    Cheers,
    GB

  • Need to add WinXP to system

    I'm currently running Mountain Lion on a 2TB, single partition hard drive.
    I need to add a WinXP partition.
    Mountain Lion's Bootcamp Assistant only supports Win7.
    How can I add a WinXP?
    Thanks
    -Mike
    P.S.
    For those on this site who love a mystery, here's one for you.
    And for those who can solve it, you'll have my eternal gratitude.  :-D
    I've attempted going back to Snow Leopard (which is the OS that came on my system when I bought it from Apple 2 yrs ago.)
    However, when the install process gets to the point where I choose the disk to install SL on, the installer shows an exclamation icon over it and a message in the installer window says "Mac OS X cannot start up from this disk."
    What!?!?  This is my one and only startup disk and am always starting up on it.
    Ideas?

    Thanks Allan and Bob. You've both confirmed my suspicions and helped me decide on a solution.
    Here's my theories:
    1) In order to maximize efficiency, Apple has chosen not to support WinXP in Lion and later Bootcamp solutions. Otherwise, they would have to provide XP drivers for all of the hardware options available in addition to drivers for Win7, perhaps forcing them to supply and maintain several DVDs. I understand this thinking. I'm thinking that this may be why ML Bootcamp Assistant only supports Win7.
    2) I then thought, well, I'll simply add an additional partition to the end of my HD using Disk Utility and install XP on that new partition formatted as FAT32. I'd then insert my XP disk, boot into that disk upon startup using the Option key and then choose this new partition for the install when the XP installer requests that I choose an install partition. The problem I discovered in this situation is that XP cannot see that last partition, precluding me from choosing it as an option for the install (Remember I'm installing onto a partition located at the end of a 2TB drive). Perhaps the XP installer was not built to even detect partitions located at this distance on such a large drive.
    This seems to indicate that Bootcamp Assistant for Snow Leopard must provide some mapping scheme when it partitions these large drives that allows XP to see this distant partition during the install process.
    3) Ok, I then figured, I'll simply run Snow Leopard's Bootcamp Assistant in Mountain Lion and create and install XP that way. Well, it turns out that SL's Bootcamp Assistant gets confused about the partitioned setup in Mountain Lion and issues a message stating "The startup disk cannot be partitioned or restored to a single partition". This seems to indicate that ML has altered the partition information on the HD in a way the confuses SL's understanding of it.
    4) Finally, I attempted to simply re-install SL by inserting the original DVD supplied with my iMac into the drive, rebooting into that DVD upon startup and then installing from this DVD. Well, this produces the result I described in the P.S. in my first post in this thread.
    Well, those are my theories at this point. Any further clarifications or rebuttals?  :-D
    I think I'll try either Allan's or Bob's (or both) solutions next.
    Thanks again.
    -Mike

  • Health App needs to add Blood Glucose and A1c for tracking. Eliminate some of the items under nutrition.

    Health App needs to add Blood Glucose tracking and A1c tracking. Plus there are way to many items under Nutrition. How many people keep track of their intake of Biotin?

    Please send your feedback directly to Apple, we all are users here.
    http://www.apple.com/feedback/

  • Do I need to add software protectin for moutain Lion 10.8.5

    Do I need to add software protection like norton

    1. This is a comment on what you should and should not do to protect yourself from malicious software ("malware") that circulates on the Internet. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
       3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandboxing security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know what is safe?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one, is unsafe.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders," for example, are outside the safe harbor, though not all are malware.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe. For instance, if a web page warns you that Flash is out of date, do not follow an offered link to an update. Go to the Adobe website to download it, if you need it at all.
    There is an increasing tendency for rogue websites such as "Softonic" and "CNET Download" to distribute free applications that have been packaged in a superfluous installer that also installs malware or something else that you don't want. Never visit those sites, and get all freeware directly from the developer's own site whenever possible.
    Software attached to email that you didn't request is unsafe, even if it comes (or seems to come) from someone you trust.
    Software advertised by means of spam is unsafe.
    Unknown "free" software that a stranger on the Internet is eager for you to download is unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    "FREE WI-FI !!!" networks in public places are unsafe unless you can verify that the network is not a trap (which you probably can't.) Even then, do not download any software or transmit any private information while connected to such a network, regardless of where it seems to come from or go to.
    I don't say that leaving the safe harbor just once will inevitably result in disaster, but making a habit of it will weaken your defenses against malware attack. Doing any of the things alluded to above should make you uncomfortable.
       6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. New threats are emerging on a daily basis. Research has shown that most successful attacks are "zero-day" — that is, previously unknown. Recognition-based malware scanners do not defend against such attacks.
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware, and even for that use it's not completely effective. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular trojan it is, but do you really care? In practice, there's seldom a reason to use the software unless an institutional policy requires it. Windows malware is so widespread that you should assume it's in every unknown email attachment until proven otherwise.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither should you assume that you will always be safe from exploitation, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. "Hmmmm, this torrent is a crack of that new game I want. I think I'll download it. It could be a trojan, but the antivirus will warn me if it is." Then they wonder why their Mac is so slow all of a sudden. It's slow because it's running flat out mining bitcoins for a hacker who has already sold their credit card number and banking passwords to a criminal gang. Maybe a week later the antivirus does warn them, but what good does that do?
    Nothing can lessen the need for safe computing practices.

  • I need a new apple id on a new mac but old iPod.

    I need a new apple id.  I have an ould one but that email is no loger active.  I have a new mac and I have not set up itunes yet. How do I transort all my old songs and apps onto my mac while changing my id on both my ipod and my mac?

    Just go to https://appleid.apple.com/cgi-bin/WebObjects/MyAppleId.woa/ and use the Manage Account feature to add a valid email and keep using your existing AppleID
    Your purchases are tied to that AppleID - there is no way to move them to another AppleID so you want to keep using the one you have, NOT create a new one.

  • I have a filable form and I need to add ranking questions

    I have a filable form and I need to add ranking questions. How do I do this?

    Kernel panics are usually caused by a hardware problem – frequently RAM, a USB device or a Firewire device. What external devices do you have connected? When trying to troubleshoot problems, disconnect all external devices except your monitor, keyboard and mouse. Do you experience the same problems?
    To eliminate RAM being the problem, Look at this link: *Testing RAM* @ http://guides.macrumors.com/Testing_RAM Then download & use Memtest & Ramber.
    Do you have an Apple Hardware Test disc? Running the Apple Hardware Test in Loop Mode is an excellent troubleshooting step for finding intermittent hardware problems. It is especially useful when troubleshooting intermittent kernel panics. If Loop Mode is supported by the version of the Apple Hardware Test you are using, you run the Extended Test in Loop Mode by pressing Control-L before starting the test. Looping On should appear in the right window. Then click the Extended Test button.The test will run continuously until a problem is found. If a problem is found, the test will cease to loop, indicating the problem it found. If the test fails, be sure to write down the exact message associated with the failure.In some cases, RAM problems did not show up until nearly 40 loops, so give it a good run.
    May be a solution on one of these links.
    Mac OS X Kernel Panic FAQ
    Mac OS X Kernel Panic FAQ
    Resolving Kernel Panics
    Avoiding and eliminating Kernel panics
    12-Step Program to Isolate Freezes and/or Kernel Panics
    Cheers, Tom

Maybe you are looking for

  • Using LogicalHostname

    Hello I am Trying to Set up a two-node cluster. I am pasting the contents of both the /etc/hosts and ifconfig -a output. Node 1 # cat /etc/hosts # Internet host table 127.0.0.1 localhost 192.18.75.223 shaw.red.iplanet.com shaw loghost #192.18.75.223

  • Authorizations migrations....

    Hi all,   Now our project in the upgrade position.i have to taken care about the migration work for authorization..please respond any one for my questions... 1) Total we have 28 authorization objects.In these 5 authorization obj are based on the hier

  • 17 months of horrible service!!

    We had dual installation with DirecTV and AT&T Uverse Internet and Voice on 1/30/2014. Instantly there were problems. DirecTV had constant signal errors or lost signal as often as the wind blew and rarely would stay connected to the internet. In orde

  • Mouse Event consumption on Button(s)

    Hi, I have a base screen (window A) with an OnClick events covering the screen. I have a popup window (window B) which can overlay this screen. This contains 3 FX Buttons X, Y, Z . The action: function() is coded on each one X and Y are OK, Cancel bu

  • Partitioning and compression

    What happens during the partition of an InfoCube? I mean, how will the data be stored after partition? Is it possible to do compression after a cube is partitioned?