What is the recommended 'file handling cache' size for LRCC(6) on MAC OS? Is there an upper limit at which it has a negative impact on performance?

When using the brush tool at full screen (Fill mode not 1:1) for extended period (10-15 minutes) I begin to experience a lag in screen replenish and often get the Mac beachball. The entire operation of the Dev/Brush tool slows and gets unmanageable. I usually close LR and restart but the problem returns. I turned off the GPU support as that exacerbated the problem.
Image is 21MB Canon Raw file.
1:1 and Smart Preview was built on Import.
Using brush tool at low flow (40%) and density (100%) so there are a lot of 'strokes' applied in B/D of areas of image
File cache currently set at 20GB
Running late 2012 Mac Mini (Quad Processors/I7-2.3ghz/16GBRAM) and with Dell U2415
Original images located on W/D 4TB external drive; LR Catalog on Mac 2TBHD-256GB SSD/Fusion drive
Graphics card is Intel HD 4000/OSX
Intuit Bamboo tablet
Recommendations?

http://lifehacker.com/5426041/understanding-the-windows-pagefile-and-why-you-shouldnt-disa ble-it
Keep in mind Video/Animation applications use more ram now than almost any other type and there are far more memory hungry services running in the background as well. Consider the normal recommendations are for standard applications. HD material changed far more than just the need for 64Bit memory addressing.
Eric
ADK

Similar Messages

  • In EJB3 entities, what is the equiv. of key-cache-size for PK generation?

    We have an oracle sequence which we use to generate primary keys. This sequence is set to increment by 5.
    e.g.:
    create sequence pk_sequence increment by 5;
    This is so weblogic doesn't need to query the sequence on every entity bean creation, it only needs to query the sequence every 5 times.
    With CMP2 entity beans and automatic key generation, this was configured simply by having the following in weblogic-cmp-rdbms-jar.xml:
    <automatic-key-generation>
    <generator-type>Sequence</generator-type>
    <generator-name>pk_sequence</generator-name>
    <key-cache-size>5</key-cache-size>
    </automatic-key-generation>
    This works great, the IDs created are 10, 11, 12, 13, 14, 15, 16, etc and weblogic only needs to hit the sequence 1/5 times.
    However, we have been trying to find the equivalent with the EJB3-style JPA entities:
    We've tried
    @SequenceGenerator(name = "SW_ENTITY_SEQUENCE", sequenceName = "native(Sequence=pk_sequence, Increment=5, Allocate=5)")
    @SequenceGenerator(name = "SW_ENTITY_SEQUENCE", sequenceName = "pk_sequence", allocationSize = 5)
    But with both configurations, the autogenerated IDs are 10, 15, 20, 25, 30, etc - weblogic seems to be getting a new value from the sequence every time.
    Am i missing anything?
    We are using weblogic 10.3

    If you are having a problem it is not clear what it is from what you have said.  If you have sugestions for improving some shortcomings you see in Flash CC then you should submit them to:
    Adobe - Wishlist & Bug Report
    http://www.adobe.com/cfusion/mmform/index.cfm?name=wishform

  • With Premiere elements 11, when Publish/Share (saving) a finished video, selecting H.264  .mov file type, what are the recommended Codec and Aspect settings for a crisp video and a small file size?

    With Premiere Elements 11, when Publish/Share (saving) a finished video, selecting H.264  .mov file type, what are the recommended Aspect and Codec settings , for a crisp video with a small file size?

    Gary Krouse
    We will customize a very detailed reply, but
    (a) What are the properties of your source media?
    (b) What did you or the program set as the project preset to match the properties of the source media?
    (c) What specific requirements do you have for this H.264.mov export file?
    File size can be a compromise between bitrate, file size, and quality.
    Thanks.
    ATR

  • What is the best malwear detection and protection for use on a Mac?

    What is the best malwear detection and protection for use on a Mac?

    Mac users often ask whether they should install "anti-virus" software. The answer usually given on ASC is "no." The answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There  is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is foremost a problem of human behavior, and no technological fix alone is going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're better informed than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software.
    ☞ Rogue websites such as Softonic, Soft32, and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission. All "YouTube downloaders" are in this category, though not all are necessarily malicious.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the left side of the address bar when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It's as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • What Is The Best All-round Canvas Size For A Web Browser

    What is the best all-round canvas size when authoring a swi
    for a web browser? by this I mean best for authoring without
    scrollbars. I know a chap whose screen res is 800x600 and who has
    every single toolbar displayed in IE, leaving around 400pixels in
    height free. For crying out loud.
    I once sat with a bloke who uses Courier New set at 36pt as
    his default browser font. Ouch. I sat there transfixed, not
    believing what I was looking at; to this day I have no recollection
    of our conversation, so stunned was I.
    I've used 780x410, 800x600, 770x540 and I'm going nutsoid
    trying to find the best compromise; whatever size I use, distortion
    creeps in if accompanied with an "exactfit" value, especially if
    the height and Width values are set at 100%.
    Beats me.
    What are you guys using?

    Hrududu wrote:
    > What is the best all-round canvas size when authoring a
    swi for a web browser?
    > by this I mean best for authoring without scrollbars. I
    know a chap whose
    > screen res is 800x600 and who has every single toolbar
    displayed in IE, leaving
    > around 400pixels in height free. For crying out loud.
    >
    > I once sat with a bloke who uses Courier New set at 36pt
    as his default
    > browser font. Ouch. I sat there transfixed, not
    believing what I was looking
    > at; to this day I have no recollection of our
    conversation, so stunned was I.
    >
    > I've used 780x410, 800x600, 770x540 and I'm going
    nutsoid trying to find the
    > best compromise; whatever size I use, distortion creeps
    in if accompanied with
    > an "exactfit" value, especially if the height and Width
    values are set at 100%.
    personally avoid scaling, especially filling up user window.
    more and more really high resolution monitors out there,
    the larger the screen the more CPU it sucks...
    Don't follow the exact screen size like 800x600 as it is
    never the
    browser ratio, must consider the browser chromes.
    I will design something within that size or slightly larger
    and use the
    around margin to incorporate graphics as part of the design.
    Sometimes even smaller than that and centralized. Depends on
    amount
    of content.

  • Customizing Paging File: what is the recommended initial and maximum size?

    Hi everyone, and Harm,
    Following Harm's response to my question about how to setup disks, Harm said this:
    "disk allocation: It is a three stage process, first you define the boot order in the BIOS, then you format the disks inWindows and allocate drive letters, then still in Windows you setup the pagefile. Then the allocation of media cache, preview, project etc. is done in the preferences and project setup of PR."
    and I have a question about paging file.
    First let me say describe my new machine, it has a 4 disc setup, no RAID, 16GB RAM, with OCZ-Vertex3 for OS & Programs, i.e. i have installed Windows 7 Ultimate 64bit on this disc, and Web Premium CS5 and Acrobat Pro 9. In BIOS, i have made the OCZ (OS) disk, be the priority in the Boot order.
    Later, after verifying the system is in working order, i will upgrade to Classic Collection CS5.5, so at this point, i have named my 3 additional disks as such,
    WDC WD 2002FAEX-007BA0 - "Media Projects(D)"
    WDC WD 1002FAEX-00Y9A0 - "Pagefile, Media Cache (E)"
    WDC WD 1002FAEX-00Y9A0 - "Previews, Exports(F)"
    So, for now these are simply names, which i have given to the various disks, and now i am changing the paging file, switching it from happening in the OS disk, in order to happen inthe disk which (via Premier, later) will be designated for Media Cache.
    So, in Windows Performance Options pane, I went to Advanced tab, & under Virtual memory I hit "change", uncheck Automatically manage paging file size for all drives, select drive E, which is the disk that's to have the paging file happen in it.
    And the question, assuming that i am supposed to select Custom size, can you Harm, or/and others, please recommend the Initial and Maximum sizes?
    Or, should i select "System managed size"?
    Thanks:)

    http://lifehacker.com/5426041/understanding-the-windows-pagefile-and-why-you-shouldnt-disa ble-it
    Keep in mind Video/Animation applications use more ram now than almost any other type and there are far more memory hungry services running in the background as well. Consider the normal recommendations are for standard applications. HD material changed far more than just the need for 64Bit memory addressing.
    Eric
    ADK

  • What is the best column width & font size for an ipad magazine

    I'm creating a magazine that will be shown on the ipad I was wondering what is the best column width and font size to use. If someone has any suggestions I'd love the help.
    thanks,

    You should know how you publish it and what the technical limitations of each type are.
    No one can or will give you any advise to use this or that font. Make several drafts, try it, pass on several drafts to testers and get response.
    If you work with styles, it is then easy for you to change it to the best result with a few clicks.
    Normally a column width with 37 to 45 letters I would personally suggest to be the best width, but opinions are very different on it. The more letters in a line the less readability is given, the less letters the more difficulty you will have to get an even grey factor. (I mean that through space between words some lines become bright others dark, which does not look so fine, I don't know the English technical term for that.)

  • What is the required book cover image size for ePub?

    Hi all
    I am trying to follow the insturcitons in the Publisher Setup guide for uploading my ePub file to the iBook store. Having gone through this process with Amazon I am gobsmacked by how unhelpful the guidance is from Apple.
    It is asking me for a cover image but I cannot see anything telling the required spec for this - on Amazon they tell you min and max dimensions and what the required dpi is but (unless I've missed a whole bunch of instrucitons somewhere!) I see no such info in the guide or in the iTunes connect screens.
    Can someone please help me here?  After googling I found these forum pages and saw that someone had said the cover image must be at least 600dpi and max height of 740 pixels - is that right? (odd as on Amazon you only need 72dpi!)
    Just in case anyone can help here too - my ePub file already has the cover image included in it - do I therefore need to separetely add this standalone cover image?
    Really grateful if anyone can help on this.
    Many thanks
    Karen Inglis

    From Apple about book covers:
    JPEG with “.jpg” extension (quality unconstrained) or PNG with “.png” extension
    RGB (screen standard)
    600 pixels minimum along the larger axis. For an average trade paperback, this could be 400x600minimum size, as the books are generally taller than they are wide.
    Covers may not reference pricing, the physical edition, or include any other wording that may notnecessarily be true for the digital edition.
    Yes, a separate cover file is needed for display. My experience is if you have a cover for Amazon that is 600 px or greater on the longest side, you are fine with Apple.
    Step back and take a breath. We all go through this the first time.
    - Fabe

  • After enabling Oracle Deport Repair, What are the recommended patches to be applied for R12 instance.

    Hi,
    I'm working on Oracle Deport Repair, so are they any Recommended patches to be applied on the Instance to complete the Implementation successful.
    Please let me know if they are any patches available.
    Thank you.

    Please see ..
    Identifying Recommended Patches for E-Business Suite Environments
    https://blogs.oracle.com/stevenChan/entry/recommended_patches_for_oracle_e
    Identifying the Latest Family Packs for Oracle E-Business Suite
    https://blogs.oracle.com/stevenChan/entry/latest_available_packs_for_oracle
    Oracle Applications Current Patchset Comparison Utility - patchsets.sh [ID 139684.1]
    Thanks,
    Hussein

  • What is the recommended Adobe web design app for a beginner?

    I am primarily a print designer who would like to learn web design, which Adobe app would best suit a beginner like me?

    Hello,
    mytaxsite.co.uk's hint gave me the idea of poking around a little bit in my library. There I found some links where you can read more about layout (and basic HTML and CSS):
    HTML & CSS Tutorials >>> http://w3schools.com/
    How to Develop with CSS? >>> http://phrogz.net/css/HowToDevelopWithCSS.html
    Learn CSS positioning in 10 Steps >>> http://www.barelyfitz.com/screencast/html-training/css/positioning/
    Have fun!
    Hans-Günter

  • What is the best DVD burner to buy for use with my Mac?

    I have a MacMini with a DVD player/CD burner. I would like to buy an external DVD burner for use with the MacMini and my Tiger OS. Could I get some thoughts on purchasing a good external burner and using the best burning program with it. Thanks

    Paul,
    LaCie d2 DVD±RW with LightScribe http://www.lacie.com/products/product.htm?pid=10113
    $179.99 includes full version Toast 7
    $129.99 includes Toast 6 Lite
    The $129.99 unit that comes with Toast 6 Lite can be found on the web for a lot less. Later, if you outgrow Toast 6 you can upgrade to Toast 8 (which is the latest version).
    External Multi-Format DVD RecorderDRX-830UL/T $129.00
    http://www.sonystyle.com/is-bin/%3Cwbr%20target=blank%3EINTERSHOP.enfinity/eCS/Store/en/-/USD/SY_DisplayProductInformation-Start ?ProductSKU=DRX830UL%2fT&Dept=computers&CategoryName=cpu_Sony_PCAccessories_CD%2 fDVDBurnDVDBurners
    My experience with Lacie and Sony burners has always been positve and Toast is good to have around, it's always complimented iDVD well (in addition to having a host of other useful features).
    Note:
    I'm not familiar with any of Toast 6 lite's features, but I do know you can burn DVD's with it. It adds another means of authoring a DVD outside of iDVD.

  • What is the minimum file system access needed to run ODI 10.1.3.4.0 client?

    Hi ODI discussion folks,
    I have a couple of questions from an Oracle partner that I'm trying to find a definitive answer for if possible. The partner is setting up ODI 10.1.3.4.0 for a customer who insists that the absolute minimum amount of access to the file system is granted due to corporate security policies.
    I have checked the bundled ODI documentation but couldn't really find anything about file system permissions needed to run the ODI client. I was pointed towards the "Setting Up Security for an Integration Project — What to Consider" document but this does not mention a great deal about how much access to the file system is needed for the ODI client to function.
    What the partner is asking is the following:
    "1. What are the minimum file/folder permissions needed for the ODI client installation? I'm installing at xxxxx
    and their machines have to be locked down as much as possible.
    2. Say you have 3 users all wanting to run integrations etc and the Master and Work
    repositories have been set up. An admin installs the ODI client but doesn't
    create the connection to the Master repository. What are the minimum
    file/folder permissions required on the client machine to:
    a) create the connection to the repository
    b) run any subsequent integrations?"
    If anyone can advise on this then that would be much appreciated.
    Regards
    Craig Huggans
    Oracle Hyperion Support
    Message was edited by:
    user648991

    Hi Craig,
    How are you?
    Let me try to contribute a little....
    1) The minimum requirement is for its own installation directory, there is no reason to have access to other directories unless if it is necessary to read files from some other directory at the client
    2) Again only to its own install directory. The connection setting is recorded at \bin install directory. After that, all information are recorded at repository, there is no client work.
    Be free to contact me by email or phone if you have any new doubt. You can get my email from my profile.
    Does it respond your doubts?
    Cezar Santos

  • What is the best file format for photos?

    Greetings.
    I am going to be importing some photos into FCE 3.5.1 to do some effects and motion. What is the prefered file format form Photoshop for FCE? TIFF, JPEG, and PS format all import, but I'm just wondering if one is prefered over the other.
    My images will be pretty big, 3000 pxels x xxx at 72dpi, so I can move in and out, and maybe pan.
    Thanks.
    Jonathan

    PNG, PSD. Don't make the image larger than you need to.

  • What is the max file size that a Adapter Engine [J2SE] can handle ?

    We are having a scenario where a 4 GB compressed file needs to be sent across without mapping, I'm trying to explore the possible options to tackle this scenario.
    Some of the options, we are considering :
    - Sending a file from one Adapter Engine [J2SE] to another Adapter Engine [J2SE] bypassing PI. Adapter Logs will be monitored. What is the maximum file size that can be then handled assuming a standard installation ?
    - What is the max file size that Adapter Engine [J2SE] can send through PI without mapping?
    Any help with the above options or with any other possible solutions to handle extremely large file transfers will be much appreciated.

    Hi,
    j2se is not a good option here
    if you have 4gb then you need a copy solution
    a) build an proxy that will just copy the file from sender dest to receiver
    b) build an adapter that will do the same as proxy)
    this way processing of this message will be controlled with SAP PI/XI
    it will be as quick as copy & paste of the 4gb file
    I did the a) for one of the flow for 300 mb and it works perfectly
    Regards,
    Michal Krawczyk

  • What is the Maximum File SIZE Can we transfer through XI.

    Hi All,
    What is the Maximum File SIZE Can we transfer Through XI?
    With Regards,
    Mahesh

    HI,
    Please refer the below thread which talks about the same.
    Wat is the maximu size of data XI can handle
    There can be many threads related to this topic I suggest u try to serach on SDN first.
    Thnx
    Chirag

Maybe you are looking for

  • Multi language support for reports and prompts labels

    Is there a way to configure reports prompts labels with session\presentation variables, in order to support multi language interface?

  • Firewall recommendations

    Does anyone know of a good freeware firewall for Solaris? IPF and SXCE 111 and 113 don't play nice together and gnome-terminal doesn't update the login records as it should. Thanks in advance, alan

  • Deletion of tcode in module pool

    hi, i have created two transaction codes for one program in module pool....now i deleted one tcode...even i deleted that it is showing in the tree how to make it not to display it on left side ?

  • Graphique double échelle et calcul dynamique de l'échelle

    Merci de votre aide Bonjour, J'ai un graphique double échelle                 Echelle A             Minimum 0                        Maximum (Variable Longueur)                 Echelle B             Minimum 0 x Coeff           Maximum (Variable Long

  • It Takes 1 Minute To Boot Up The System..

    the day i upgraded to lion, it take 40 to 50 seconds to start up..i have 2.3Ghz i5 intel processer n 4gb ram...Any Ideas how to solve that??