Wats the best practise for performance

Hi all,
In my out line i have 15 dimensions and for one dimension i have 39000 members so wat is the best practise for performance , If we have more dimensions and more meebers is there any problem for performance
so wat is the best practise for dimensions and members??
Thanks in advance??

If it is ASO application it is not a problem.
If it is a BSO application surely it will hit the performance.
More dimensions will create performance issues.
If the said 39000 members dimension is a Flat dimension. It will be another issue.
If BSO is obvious try to split into two models.
Create intermediate groupings for the Filat dimension.

Similar Messages

  • What is the best practise for setting dirty flag of a page/view?

    For a page/view, normaylly there are 2 things to do for diry data:
    1. when it's clean, Save button is disabled, when it's dirty, save button is enabled.
    2. when it's dirty and the window is closed, a popup says "you have unsaved data, close will lose the data".
    My thought is: it must be handled at client side, because not all valuechange is auto submitted. E.g., you type the 1st letter of a string in a input box, the server side does not know it, but save button should be enabled immediately.
    Is it possible to capture all valueChange events in a page or a view at client side?
    I'm not sure what is the best practise for setting dirty flag? If there is better solution? Does ADF provide facility for this?

    public void save(ActionEvent event){
    boolean formValid = isFormValid();
       if (formValid) {
      save button is enabled.
        private boolean isFormValid() {
            boolean valid = true;
            if (Check Condition 1) {
                valid = false;
               showErrorMessage1();
            if (Check Condition 2) {
                valid = false;
               showErrorMessage1();
            return valid;
        private void showErrorMessage1() {
                    when it's dirty and the window is closed, a popup says "you have unsaved data, close will lose the data".

  • Suggest me the best practise for accesing database by JSP page

    Hi,
    Can you please suggest me the best practises to connect to database through JSP page.
    I am using the Struts-Portlet environment. And I have to display some contents from the database to the jsp page(view.jsp).
    Please suggest.
    Saurabh.

    If you know how to use struts and portlets, you wouldn't be asking this question. I suggest looking into the Model-View Controller pattern to get an idea how to set up a web application, then think about how to do it in a portlet environment.

  • Best Practises for doing Master Scheduling using SNP

    Hello Gurus ,
                         Can you please suggest the best practises for doing Master Scheduling using SNP . Which engine to use , what would that mean etc
    Regards,
    Nick

    APC Back-UPS XS 1300.  $169.99 at Best Buy.
    Our power outages here are usually only a few seconds; this should give my server about 20 or 25 minutes run-time.
    I'm setting up the PowerChute software now to shut down the computer when 5 minutes of power is left.  The load with the monitor sleeping is 171 watts.
    This has surge protection and other nice features as well.
    -Noel

  • Wat is best ios for iphone 3g as far as battery performance is concerned?

    wat is best ios for iphone 3g as far as battery performance is concerned?

    According to tests done in the wild iOS4 lasted 5% longer than iOS3 (about 10 minutes). Not much of a notible difference. Best bet is to upgrade your phone. A 3Gs on iOS4 ran more than 30 minutes longer on the same test.

  • What is the best practise to provide a text file for a Java class in a OSGi bundle in CQ?

    This is probably a very basic question so please bear with me.
    What is the best way to provide a .txt file to be read by a Java class in a OSGi bundle in CQ 5.5?
    I have been able to read a file called "test.txt" that I put in a structure like this /src/resources/<any-sub-folder>/test.txt  from my java class  at /src/main/java/com/test/mytest/Test.java using the bundle's getResource and getEntry calls but I was not able to use the context.getDataFile. How is this getDataFile method call to be used?
    And what if I want to read the file located in another bundle, is it possible? or can I add the file to some repository and then access it - but I am not clear how to do this.
    And I would also like to know what is the best practise if I need to provide a large  data set in a flat file to be read by a Java class in CQ5.
    Please provide detailed steps or point me to a how to guide or other helpful resources as I am a novice.
    Thank you in advance for your time and help.
    VS

    As you can read in the OSGi Core specification (section 4.5.2), the getDataFile() method is to read/write a file in the bundle's private persistent area. It cannot be used to read files contained in the bundle. The issue Sham mentions refers to a version of Felix which is not used in CQ.
    The methods you mentioned (getResource and getEntry) are appropriate for reading files contained in a bundle.
    Reading a file from the repository is done using the JCR API. You can see a blueprint for how to do this by looking at the readFile method in http://svn.apache.org/repos/asf/jackrabbit/tags/2.4.0/jackrabbit-jcr-commons/src/main/java /org/apache/jackrabbit/commons/JcrUtils.java. Unfortunately, this method is not currently usable as it was declared incorrectly (should be a static method, but is an instance method).
    Regards,
    Justin

  • What are the best ways (for best performance) in MII to process the incoming process messages from shop floor systems to SAP ECC 6.0 and vice versa?

    Hi All,
    Can you please suggest to choose the best ways (for best performance) in MII (12.2 on NW 7.3), to process the incoming process messages from shop floor systems to SAP ECC 6.0 and vice versa?
    Thanks

    Hi Surya,
    Best practices for flow of data from ECC --> SAP MII --> Shop floor & Vice verse:
    1. Send ECC data through IDOC's/RFC's as messages to SAP MII message listener and BSL transaction process data and update directly on shop floor database as if you configured in Data services or later send those data by web service to shop floor system (i.e. depends on Shop floor machines).
    From Shop floor:
    shop floor --> SAP MII --> ECC
    1. Use either Web service or fetch data from DB and pass data to BAPI's  for sending to ECC through BLS transaction.
    Regards,
    Praveen Reddy

  • Water damaged iPhone 5c. what is the best thing for me to do?

    i dropped my brand new iphone 5c in water. what is the best thing for me to do? should i just go straight to apple? and how much would i be looking at?

    Fact is, the chances of fully recovering from water damage, on an iPhone, are extremely low. Your best bet is to belly up to the bar & pay Apple the out of warranty exchange fee: US $269. Make an appointment at any Apple store.
    Good luck.

  • Liquid: What are the suggested best practises for multiple languages?

    Right now we are doing this:
    {% if globals.country == "EU" %}
    {% assign login = "Log in" %}
    {% assign userName = "Username" %}
    {% assign password = "Password" %}
    {% assign rememberMe = "Remember me?" %}
    {% assign confirmLogout = "You are now logged out!" %}
    {% endif %}
    {{login}} would output "Log in"
    Another thought would be to have it all in a string with commas and split it, like this:
    {% if globals.country == "EU" %}
    {% assign strings = "Log in;Username;Password;Remember me?;You are now logged out!" %}
    {% assign lang = strings | split: ";" %}
    {% endif %}
    {{lang[0]}} Would output "Log in".
    What are the best practises here?
    I would imagine either being slower than the other as well, maybe Adobe have some input?

    Hi Machinette,
    Use your first option in my opinion:
    A webapp where each item would contain a field for each language. i.e.  item 1 name login; en -> Log in; es -> Iniciar sesion. item 2 name logout; en -> Log iout; es -> Cerrar sesion....
    Here's an example of my multilingual web apps:
    FAQs:
    EN Question
    JP Question
    EN Answer
    JP Answer
    Testimonials:
    Title-NZ
    Title-JP
    Quote-Preview-NZ
    Quote-Preview-JP
    Quote-Full-JP
    How did you hear about us:
    Title_En
    Title_JP
    Multilingual Text:
    Text_En
    Text JP
    As you can see above, the items in the web apps form the different multilingual text - the different FAQs, the different Testimonials, the different Multilingual Text. The domain name needs to determine the language. Very important. And use a globals.site.countryCode to determine the language.
    The key is when you want to reference that item. I think Abhishek was onto it using JSON files, easy to select the text you want. If JSON files don't work, here's what you do:
    {module_webapps id="Multilingual Text" filter="i" itemId="4951580"}<!-- login -->
    {module_webapps id="Multilingual Text" filter="i" itemId="4951611"}<!-- Try Lesson 1 -->
    {module_webapps id="Multilingual Text" filter="i" itemId="4951612"}<!-- Join for free -->
    Else place everything into a collection, but I have hundreds of items, so I don't want to collect too many records. Only the ones I need per page.
    Finally, here's my code for one of the web apps, FAQs.
    {% assign countrycode = globals.site.countryCode -%}
    {% case countrycode -%}
    {% when 'JP' -%}
    <div class="faq-question">
        <h4>{{this['JP Question']}}</h4>
        <div class="faq-details">
            <div class="answer"><p>{{this['JP Answer']}}</p></div>
        </div>
    </div>
    {% else -%}
    <div class="faq-question">
        <h4>{{this['EN Question']}}</h4>
        <div class="faq-details">
            <div class="answer"><p>{{this['EN Answer']}}</p></div>
        </div>
    </div>
    {% endcase -%}
    http://www.samandmelenglish.com/faqs
    http://www.samandmelenglish.jp/faqs
    Hope this helps.
    Stephen - Fuel Design

  • Have Pixma MG2120. What is the best paper for water resistant photos?

    I have a Pixma MG2120. What is the best paper for water resistant photos?

    Hi neuend1,
    While the ChromaLife100 inks (included with the PIXMA MG2120) in combination with our genuine Canon photo paper, will provided basic protection against humidity, we do not recommend direct moisture exposure to the image.  If the image will be displayed in an environment that demands water resistance, I recommend protecting your finished print behind glass or another airtight display.
    If you have any other questions, please feel free to Contact Us!
    Did this answer your question? Please click the Accept as Solution button so that others may find the answer as well.

  • What are the best practices for Database management and performance tuning?

    Hello,
    I want to ensure that I am using the best practices for managing and maintaining our Database.
    Is there any documentation out there that outlines how to maintain and ensure top performance out of our database?
    Thank you!
    John Sefton

    I appreciate the responses, however this is not the information I am looking for.
    I am specificaly looking for best practices invloving the managment and performance tuning.
    Example: are their tools that I can install that will monitor the size and response time of the database and alert me if there is degradation in performance?
    Are there specific periodic activities I should be doing to garuntee that my database will continue to function that way it is supposed to?
    Or is this a fire and forget solution that does not need this attention?

  • SQL Server 2012 - Wat Is The Best Solution For Creating a Read Only Replicated/AlwaysOn Database

    Hi there I was wondering if someone may have a best recommendation for the following requirement I have with regards setting up a third database server for reporting?
    Current Setup
    SQL Server 2012 Enterprise setup at two sites (Site A & Site B).
    Configured to use AlwaysOn Availability groups for HA and DR.
    Installed on Windows 2012 Servers.
    This is all working and failover works fine and no issues. So…
    Requirement
    A third server needs to be added for the purpose of reporting, to be located on another site (Site C) possibly in another domain. This server needs to have a replicated read only copy of the live database from site A or Site B, whichever is in use. The Site
    C reporting database should be as up-to-date to the Site A or Site B database as possible – preferably within a few seconds anyway….
    Solution - What I believe are available to me
    I believe I can use AlwaysOn and create a ReadOnly replica for the Site C. If so do I assume Site C needs to have the Enterprise version of SQL server i.e. to match Site A & Site B?
    Using log shipping which if I am correct means the Site C does not need to be an Enterprise version.
    Any help on the best solution for this would be greatly appreciated.
    Thanks, Steve

    for always on - all nodes should be part of one windows cluster..if there site C is on different domain - I do not think it works.
    Logshipping works --as long as the sql on site C is is same or higher version(sql 2012 or above).  you can only do read only.
    IMHo, if you can make site C in the same domain then, Always is better solution else log shipping
    also, if your database has enterprise level features such as - partitonin, data compression -- you cannot restore the database on lower editions- so you need to have enterprise edition.
    Hope it Helps!!

  • Best Practise for rebooting ISE Nodes?

    Hello Community,
    I administer an ISE installation with two nodes (I am not an ISE Specialist, my job is just to manage the user/mac-adresses... but now I have to move my ISE Nodes from one VMWare Cluster to another VMWare Cluster.
    (Both VMWare environments are connected to our enterprise network, but are different environments. vMotion not possible)
    I would shutdown ISE02, move it to our new VMWare environment and start it again.
    Than I would do this with our ISE01 Node...
    Are there any best practises for doing this? (Shutdown application first, stopl replikation etc)?
    Can I really simply reboot an ISE Node - or have I consider something bevor I doing this? After I doing this?
    Any tasks after reboot?
    Thank you for any answer!
    ISE01    
    Administration, Monitoring, Policy Service    
    PRI(A), SEC(M)
    ISE02    
    Administration, Monitoring, Policy Service    
    SEC(A), PRI(M)

    There is a lot to consider here.  If changing environments means changing IP Address and IP Scopes, then your policies, profiles, and dACLs would also have to change among other things.  If this is the case, create a new ISE VM in the new environment using the built in evaluation license and recreate the deployment from the old environment using the addressing scheme of the new environment.  Then spin-up a new Secondary node and register it on the Primary.  Once this is done, you can re-host the license from your old environment onto your new environment.  You can use this tool to re-host:
    https://tools.cisco.com/SWIFT/LicensingUI/loadDemoLicensee?FormId=3999
    If IP Addressing is to remain the same, it gets simpler. 
    First, and always, perform a configuration and operational backup.
    If downtime is not an issue, or if you have a maintenance window of an hour or so: Simply shut down both nodes.  Transfer them to the New Environment and turn them on, Primary Node first, of course.
    If downtime is an issue, shut down the Secondary Node and transfer it to the New Environment.  Start the Secondary Node and when it is up, shut down the Primary Node.  Once services on the primary node have stopped, promote the Secondary Node to Primary Node.
    Transfer the OLD Primary Node to the New Environment and turn it on.  It should assume the role of Secondary Node.  If it does not, assign that role through the GUI.
    Remember, the correct way to shut down an ISE node is:
    application stop ise
    halt
    By using these commands, the risk of database corruption decreases by about 90% (Remember to always backup).
    Please Rate Helpful posts and mark this question as answered if, in fact, this does answer your question.  Otherwise, feel free to post follow-up questions.
    Charles Moreton

  • Pls help putting together the BEST SOLUTION for PP and AE CS4

    Hi guys
    I was tasked to put together the best machine (machines) for video editing / rendering .. money is not an issue.
    My client is a TV broadcasting network and they do lots of videos everyday .. They want to render their work as FAST as possible because sometimes they have tight deadlines and rendering and re rendering (if there are mistakes) has cost them .. so now they're serious about getting the best technology to achieve best rendering time possible, but in a bit of practical sense of course.. i mean there's no sense spending 1000USD or more for a piece of technology that offers under 10 second faster rendering only ..
    What they do and want
    - edit/put together/ sequence lots of videos constantly, under premiere cs3 (will upgrade to cs4 on the new machine)
    - use affter effects for some effects and 3D stuffs.. but not that much.. but increasingly as time goes by and their video editors get more affter effects training..
    - needs really really fast rendering!! Right now it takes them typically 1-2 hours to render stuffs, and what to cut this time by half or more..
    Existing Setups on work stations:
    Intel QuadCore (Q6600, i7, Q9550, Xeon x3220, and the likes)
    4GB RAM DDR2 1066mhz
    Highend motherboards
    GeForce 9500GT , 9800GT, and GTX 260 216sp
    GSKILL Falcon 64GB SSD Drive as primary
    1TB Western Digital BLACK edition drives for storage
    Software:
    Windows XP 32 bit
    Adobe Premiere Pro CS3 (80% of all their work done here)
    AE CS3
    etc..
    Running NOD32 Antivirus
    I am an somewhat of an expert in Hardware and stuff, i build custom PC's machines most of my life but i have limiited knowledge on optimizing hardware for VIDEO EDITING stuffs.. so i turn to you all.
    I do understand that w/ video editing CPU is the most important, followed by RAM, and ofcourse by HDD for disc caches and stuff.. and where videocard may come to an advantage as well. and normally i'd suggest the fastest components available . i7 , extreme processors, skulltrail dual quad setups perhaps? RAID 0 SSD Drive? etc.. but I do not know w/c gives the most advantage, and w/c is a waste of money..
    I also read about quadro cards offering really big performance improvements using CUDA tech etc..
    again im not the expert at this type of requirment.. so i need your advises..
    with unlimitted PRACTICAL budget given to me to come up w/ a solution I initially thought a rendering farm would be the solution, but upon reading around it seems there's no rendering farm solution for PP CS4.. just the adobe after effects part.. so i had to go back to the drawing board and suggest really powerful work stations instead..and perhaps have them migrate to 64bit OS for that "extra" performance.. i myself am on win7 64bit and it's looking mighty good.
    1) is this the right move?
    2) is it still worth it to put together rendering farm for AE renders only? or might as well concentrate funds on the machines/workstations?
    Also along the PRACTICALITY LINE, would it be practical to maintain all the existing machines, and instead build a manned RENDERING MACHINE w/ PP and AE (basically desktop or Server if they are faster at rendering w/ the best specs for the purpose etc) where they can just throw the workload to some guy there for rendering? Atleast the editors can continue using the workstations while the rendering machine guy is at work? and even perhaps setup a gigabit lan network where the RENDERING MACHINES can dynamically pull the work load via the network , not needing to transfer the files to the rendering machine first ? etc
    as you can see im not only looking for the best machine, but the best STRATEGY for my client.
    Good suggestions would be much appreciated.
    regards to all

    in a nut shell no. if you do not have to "Share" then Avid is pointless Adobe is a far better answer.
    Avid solutions still need a computer. The Mojo.Nitris are a joke and Avid no longer provides computers even the Symphany comes with your choice of Apple Mac Pro or HP 800. (Dual Xeon)
    there are better "hardware" answers that what Avid sells for Adobe. Decklink, Aja to name a few.
    if you have to share then you have no choice. this is the one area Abode does not lead.
    renders have to do primarily with 2 things CPU power (Xeon will render faster than single i7)
    and Drives. the faster your drive set up the faster the render. Memory does play a part and so does the video card depending on what codec and to what
    it also depends on WHAT you are rendering and from what for the HDDs.
    without knowing your work flow format and codec its impossible to suggest something.
    in terms of rendering
    Core i7
    Dual Xeon (faster unless still doing DV/HDV thru firewire)
    Sonnet raid array
    Scott
    ADK

  • What is the best antivirus for MacBook Pro?

    What is the best antivirus for MacBook Pro?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use one of the free anti-virus products in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use the software unless a network administrator requires you to do it.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

Maybe you are looking for