What is the best cpu for Premiere Pro and autocad?

I am considering these three cpu's. My build has to run Premiere Pro CS6 and the latest Autocad (I know this a Adobe forum, but if any out there also run Autocad in addition to PP...let me hear from you and what your build is).
I am PP hobby enthusiast/student/want to eventually have video postproduction company in future. Right now autocad is 'bread and butter' part-time.
These three are in my price range...which would you choose for PP and why? (side comments about autocad suitability also appreciated)
1. Core i7-3930K  Sandy Bridge-E 3.2GHz (3.8GHz Turbo) LGA 2011 130W
2. Core i7-4770K Haswell 3.5GHz LGA 1150 84W
3. Core i7-3770K Ivy Bridge 3.5GHz (3.9GHz Turbo) LGA 1155 77W

Note that AutoCad is not an avanced software, it only uses one cpu thread (so if you have a fast solo processor that's all AutoCad makes use of) but the cpus mentioned above are the fastest cpus per single core. I don't know about the Premiere Pro i.e. what this program does in the regard of utilizing all cores and threads, but AutoCad for sure does not. So an AutoCad machine only needs a fast CPU, good memory and a graphics card that AutoCad knows how to make use of in 3D (if you are using AutoCad for 3D) but AutoCad is definitely not the program to consider for use in 3D modeling. AutoCad is still vector based program (and probably will continue to be in future, since there will always be some need for vector based design software) but Autodesk does have software that is not vector based like Inventor.

Similar Messages

  • FAQ: What are the best resources for Premiere Pro CS6?

    Here are high quality resources for troubleshooting and tutorials related to Premiere Pro CS6.
    Premiere Pro CS6 troubleshooting articles
    Issue: I'm having trouble downloading and installing Premiere Pro CS6. What do I do?Answer: See troubleshooting documents, post in the appropriate forum, or contact support.
    More info: http://blogs.adobe.com/aftereffects/2013/09/troubleshooting-issues-with-downloading-and-in stalling-after-effects.html
    Issue: What are the system requirements for Premiere Pro CS6?See this article: http://helpx.adobe.com/premiere-pro/system-requirements.html#Adobe%20Premiere%20Pro%20CS6% 20system%20requirements
    Issue: Why won't Premiere Pro CS6 play back AVCHD media?Answer: Update to Premiere Pro CS6 (6.0.5). Previous versions of CS6 had this issue.
    More info: http://blogs.adobe.com/premierepro/2013/08/premiere-pro-cs6-6-0-4-update.html
    Issue: Does Premiere Pro CS6 work with OS X 10.9 (Mavericks)?Answer: Yes, make sure you update to Premiere Pro CS6 (6.0.5)
    More info: http://blogs.adobe.com/premierepro/2013/10/premiere-pro-and-mac-os-x-10-9-mavericks.html
    Issue: Is there a trial available for Premiere Pro CS6?Answer: Yes, subscribe to the free version of Creative Cloud, then download the trial.
    Issue: I'm having unexpected behavior in Premiere Pro CS6 and want to trash preferences. How do I do that?Answer: See this blog post: http://blogs.adobe.com/genesisproject/2011/02/premiere-pro-cs5-maintenance-two-great-tips. html#more-537
    Issue: I'm getting errors related to QuickTime. What do I do?Answer: See this blog post for troubleshooting items related to QuickTime: http://blogs.adobe.com/aftereffects/2011/02/troubleshooting-quicktime-errors-with-after-ef fects.html
    Premiere Pro CS6 tutorials
    Issue: I'm new to Premiere Pro CS6. How do I get started?Answer: See this blog post: http://blogs.adobe.com/kevinmonahan/2011/05/20/getting-started-with-adobe-premiere-pro-cs4 -cs5-cs5-5/
    Issue: I'm switching to Premiere Pro CS6 from Final Cut Pro 7. Are there any tips for me?Answer: See this article by Scott Simmons on Pro Video Coalition: http://provideocoalition.com/ssimmons/story/105_adobe_premiere_pro_cs6_questions_answered
    Issue: I just switched to Premiere Pro CS6 from Final Cut Pro 7. Are there any missing features between the applications?Answer: See this article: http://provideocoalition.com/ssimmons/story/10_fcp_things_fcp_editors_might_be_missing_in_ adobe_premiere_pro_cs6
    Issue: Are there any good, free Premiere Pro CS6 tutorials available?Answer: See these tutorials: http://library.creativecow.net/series/Premiere-Pro-Basics-CS6--above-with-Andrew-Devis
    Issue: How do I optimize Premiere Pro CS6 for best performance?Answer: See this article: https://www.video2brain.com/en/courses/after-effects-premiere-pro-performance-workshop
    Issue: How do I operate the multicam function in Premiere Pro CS6?See this article: http://provideocoalition.com/ssimmons/story/working_with_multicam_in_adobe_premiere_pro_cs 6

    Hi ..
    GO to website www.Apache.org
    down load Apache tomcat server .
    install it ...
    Go to sun site
    c and download jsp tutorials ...
    Go to
    (www.coreservlets.com)download book core servlets
    u can find lots of nice books supported by sun on sunwebsite ...
    Now u r equipped ....
    start doing everything (R &D) on server ..
    Join This JSP forum and ask any thing u didnt got ..or learn or get confused..
    I thing once u go through this ..it will do all what u want
    Hope it helps
    Best of Luck :)
    regds & take care

  • What is the best stylus for macbook pro?

    What is the best stylus for macbook pro?

    I dont understand? Why would a mac use a stylus when they aren't touchscreen?

  • What is the best antivirus for MacBook Pro?

    What is the best antivirus for MacBook Pro?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use one of the free anti-virus products in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use the software unless a network administrator requires you to do it.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • What's the best App for downloading, editing and saving Microsoft Excel spreadsheets please?

    What's the best App for downloading, editing and saving Microsoft Excel spreadsheets please?

    You can have a look at Quickoffice
    http://i1224.photobucket.com/albums/ee374/Diavonex/74fb0e85.jpg

  • What is the best way for my partner and I to share our work across computers?

    What is the best way for my business partner and I to share our work (projects, libraries, images) across computers without emailing items?  Is there creative cloud storage place we can share?

    Can't I just purchase the 200 GB storage, throw our photo library in it, share it with her, and have both of our new and future pics dumped into it?  If so, how do I do that?
    The iCloud Photo Library cannot be shared between users, unless you are using the same AppleID.
    You can share selected photos with shared albums:  iCloud: iCloud Photo Sharing FAQ
    Or create a Photos library on an external drive, that you both can access, as described here for iPhoto:   iPhoto: Sharing libraries among multiple users

  • What is the best app for address labels and mail merge?

    What is the best app for address labels, mail merge and keeping track of customers information?

    Whilst this will work, it's intended for merging information (e.g. producing personally-addressed letters to a list of people).
    If you simply want address labels, open Contacts and then choose which contacts you want (either a group or hold down Cmd and click on those you want - if they're together, click on the first and use Shift when you click on the last). No need to select any if you want all.
    Then press Cmd-P and click on Show Details (at the bottom). Choose Labels (at the right hand side) and choose the size labels you have. You can even adjust the font and colour if you wish.

  • What are the best practices for Database management and performance tuning?

    Hello,
    I want to ensure that I am using the best practices for managing and maintaining our Database.
    Is there any documentation out there that outlines how to maintain and ensure top performance out of our database?
    Thank you!
    John Sefton

    I appreciate the responses, however this is not the information I am looking for.
    I am specificaly looking for best practices invloving the managment and performance tuning.
    Example: are their tools that I can install that will monitor the size and response time of the database and alert me if there is degradation in performance?
    Are there specific periodic activities I should be doing to garuntee that my database will continue to function that way it is supposed to?
    Or is this a fire and forget solution that does not need this attention?

  • What is the best product for network mapping and monitoring? I am an inexperienced user). Mac 10.9.2 laptop

    I have lots of questions, but the gist is that I want to know the best product, preferably from the app store, that I can use for network mapping mapping and monitoring.
    I want to get their mac address or other police trackable etc info so I can use my computer safely.
    I am also being cyberbullied.
    I try just using ethernet but still get intruded on, for instance, messages that "other devices are using my ip address". The only other device I own is an iPod that I keep sahut off plus wifi turned off then.
    (NOTE:  You can skip the rest of this message if you want. It regards hacking attempts etc,  a little out of the scope of discussion, perhaps).
    Also a home intrusion where computer was thoroughly hacked with router(s) set up "very very close to me," according to Apple.
    Also, hackers get into my Facebook and gmail and yahoo mail, really,  no matter what I try to do on my computer and how many times I change passwords it does no good.
    Also,  The ip addresses for google and the one in syste preferences and the one looking up my ip address on ip chicken always gets three different results.
    More worrisome it that hackers got into my Wells Fargo account a week after the intrusion even though I changed all account #'s and pw plus notified bank. They also broke into paypal using my new account numbers.
    Also, stuff like Facetime pops up on my computer without my clicking on it even though I'm using ethernet to connect. I've given up on Time Capsule because I'm told that's how the hackers hacked my computer so thoroughly duriung the intrusion.
    Thanks.

    Aubry,
    why don't you send your sequences straight to Compressor first, encode your movies as MPEG 2 and AC3 audio and import all assets in DVD studio PRO?
    G.

  • What is the Best case for iPad 2 and something to protect the back

    Hi there I am wanting to protect my dear iPad 2 lol. So I would like some advice on the best cases please,I would to protect the back of it too,I see the smart case is ok but no cover for the back,there are loads on eBay but are they just cheap plastic, any names and place to buy is a great help thank you

    Hello tori77,
    the Best will be what suits your needs.
    I use OtterBox Defender Series for my iDevices.
    http://www.otterbox.com/iPad-2-Defender-Series-Case/APL2-IPAD2-D9-E4OTR_A,defaul t,pd.html
    IMHO you should also have a good screen protector.
    Here is a choice:
    http://store.moshimonde.com/ivisorag-for-ipad2-black.html?gclid=CPvLnf2J2qoCFYXt 7QodbGtD6Q
    No bubbles, removable, washable, reusable.
    The above are also carried by BestBuy.
    Happy Computing,
    A

  • What is the best practice for setting up and migrating two notebook users on one desktop

    My wife and I have just purchased a desktop iMac and would like to migrate our 2 notebooks to it.  I plan to use the Migration Application to achieve this.  I am trying to gather information on the best ways to establish a main music library merging ours together, multiple photo libraries keeping ours apart and maintaining unique user log ins.  I'm sure alot of this stuff is may appear to be pretty straight forward setting up multiple users and all, yet we individually have never established multiple users on our personal notebooks, so there will be some bit of learning.  Any advice on the hang ups or tricks users have encountered would be greatly appreciated.  Thank you.

    Step one would be to the steps in Pondini's Setup New Mac guide and migrate your account, apps, and settings from your machine, using the Setup Assistant on first boot. Then, use the Migration Assistant to migrate your wife's account to the machine. That should carry over her photos and music. Merging those libraries should be detailed in the respective help files for iTunes and iPhoto. I don't share anything and only have one account, so I can't help with those details.

  • What are the best programs for word processing and excel for the iPad

    Was planning to use my iPad for word processing and excel work, what programs are best that would be compatible with Word documents I have on a Wi-Fi drive.

    http://itunes.apple.com/ca/app/pages/id361309726?mt=8
    http://itunes.apple.com/us/app/numbers/id361304891?mt=8
    http://itunes.apple.com/ca/app/documents-to-go-premium-office/id317107309?mt=8

  • What are the best books for PL/SQL and Forms for BEGINNERS?

    I asked about learning Oracle Forms in an earlier thread. Some suggested Oracle training at official Oracle Training centers like Koenig. I just went to the Koenig site. The OCA & OCP Forms Developer Training Boot Camp is a whopping 2,610 USD. That’s like 1/4 Million LKR. It’s more that the yearly salary of both the 2 new developers we got and want to train. That’s out of the question.
    Some have suggested shadowing experiences programmers and team coding. Both options are out, since those things don't work here.
    Learning from sites such as Francois Degrelle's blog is no good for new people since they will get confused.
    I have come to the conclusion that the only way to do is to buy 2 books, one for PL/SQL and another for Oracle Forms, give it to them and ask them to follow the book and learn it and also give a time period like 2 or 3 months.
    What are the good books out there for BEGINNERS to learn PL/SQL and Forms?
    Edited by: Channa on Aug 8, 2010 10:08 PM
    Edited by: Channa on Aug 8, 2010 10:12 PM

    In addition to the books the chapter Application Developer's Guide - Fundamentals in the documentation is also worth giving a shot:
    http://download.oracle.com/docs/cd/B19306_01/appdev.102/b14251/toc.htm
    Just for the record: I believe leaving them alone with the books won't do it. I'd at least define objectives (e.g. $chapters of the books in a week) and after they achieved them I'd test their knowledge of the individual objectives (like it was back in school :p ). By that you have control over how they are proceeding, you can focus on the things they didn't understand and you are able to eradicate some bad habits they might adopt during their studies.
    If you don't take your time to train them proper you won't get good developers anyway and you will loose much more time and money...
    cheers

  • What is the best printer for macbook pro

    The hp series is good, but 7510 goes only to 10.7.
    Any other printers as easy as hp for home printing, not office?

    I have a hp photosmart C7180 and it works great. I run os x 10.8.1 no problems. Samsung is great aswell and brother. But the hp photosmart C7180 is the on i would tell you to use

  • What is the best App for simple sketching and maybe coloring in the drawing?

    Hello I am James,
    I am brand new to graphic arts. I just purchased a Wacom pro pen & touch medium and my yearly plan to the CC suit of apps. I want to jump right in and get used to the Tablet by doing some simple sketches to get the hand eye thing down. What app should I use?
    Thanks for your help,
    James

    James,
    If you DoubleClick the Pencil Tool or the Paintbrush Tool you can see the options. I believe you will wish to have both Keep Selected and Edit Selected Paths unticked for what you describe, but you can try all the possible settings and see what they do.
    Help>Illustrator Help can give you some more, and you can make searches of this kind here (shown for Pencil Tool):
    https://www.adobe.com/cfusion/search/index.cfm?cat=support&term=pencil%20tool&loc=en_US&se lf=1&lr=en_US&site=illustrator…

Maybe you are looking for