Which spry do you recommend for dynamic images?

I want to include three pictures in one page, and want each picture to show for 3 seconds, then the other for 3, etc...
like a slide show, but I can;t seem to find the right tool to do it.
thanks
Paty

Hi Paty,
Try this: http://www.projectseven.com/extensions/info/show_pic/index.htm
Hope this helps,
Ben

Similar Messages

  • Which data center you recommended for hosting a websites that targeting the region of Iraq?

    I am wondering, Which data center you recommended for hosting a websites that targeting the region of Iraq?
    Here is a list of current Azure's data centers:
    -US East
    -US West
    -US North Central
    -US South Central
    -Europe North
    -Europe West
    -Asia Pacific East
    -Japan East
    -Japan West
    -Brazil South
    Thanks

    Hi,
    As far as I know, this is determine by your use group, choose the data center that was closest to your use group, you could also use
    http://azurespeedtest.azurewebsites.net/ to test the speed.
    Best Regards,
    Jambor 
    We are trying to better understand customer views on social support experience, so your participation in this interview project would be greatly appreciated if you have time. Thanks for helping make community forums a great place.
    Click
    HERE to participate the survey.

  • Which book do you recommend for 'MySQL 5 Certified Associate Exam' exam?

    Hello, this is my first post. I am familiar with SQL and I use it occasionally, but I decided to get certified. Which book and material would you recommend me studying to sit the 1Z0-870 exam? Online and college courses are too expensive for me and I happen to do better studying at my own pace. Thanks.

    sami1983 wrote:
    Hello, this is my first post. I am familiar with SQL and I use it occasionally, but I decided to get certified. Which book and material would you recommend me studying to sit the 1Z0-870 exam? Online and college courses are too expensive for me and I happen to do better studying at my own pace. Thanks.For certification purposes: MySQL 5.0 Certification Study Guide [Paperback] ISBN-13: 978-0672328121 is still probably still good (unless the topics have been updated and I haven't noticed), though perhaps dated compared to the more recent MySQL versions.
    ... That said the 1z0-870 for MySQL is relatively expensive and over simple for what it is (IMHO); and it may be worth considering going direct for the OCP.
    For using the more recent version of MySQL in practice additional books/material may be important for on the job in practice.

  • Which iPad would you recommend for a college student, an iPad mini or full size iPad?

    I already have the top of the line Macbook Pro 15 in ret display for school, but I'm also interested in using an iPad for school as well. Would the iPad mini be more convenient because of the small size or more of a problem? And would getting an iPad for school be really worth it? What could I do on there that I couldn't do on my Mac? If I were to get an iPad I would be looking into a 32GB, is that too big or too small? Thanks for the help ahead of time!

    OK... here's the latest on my lab environment/server set up. We have a 17" iMac G5. It is connected to a 24 port 10/100 switch with two gigabit ports. The iMac gets a gigabit port; the eleven eMacs get 10/100 ports. There is an internal 160 GB SATA hard drive installed in the iMac, and a 160 GB external firewire drive connected to the iMac for back-up purposes. I haven't got the back-up software running yet, but plans are to back up user information on the external hard drive and create an archive of server OS set up and software on DVD in case of catastrophic failure.
    Since our 30+ Windows boxes are served with your basic Dell Optiplex running Windows Server 2003 and an old, cranky Gateway running Linux, I didn't think our little Mac lab would suffer that much under an iMac server. So far it's been smooth sailing, and the whole set-up, iMac, server software, and external hard drive, were under $2000.

  • Which scanner do You recommend for Lion?

    my HP scanjet 3970 is signed by lion as a pc power programm that is no longer supported.

    "my HP scanjet 3970 is signed by lion as a pc power programm that is no longer supported."
    Perhaps the HP software is, however due check some of the thrid party software like VueScan and see if your scanner is supported. In any case I found success with Epson scanners.

  • Which jre & tomcat version do you recommend for this hardware setup?

    I have to install a SINGLE JSP application onto an Intel pentium3 windows XP box with 128Mb of RAM clocked at 733Mhz
    1. Is this setup sufficient for running tomcat?
    2. Which version of tomcat and which JRE do you recommend for this setup?
    3. Would I get better performance running Jetty, and if so which version?

    The issue of changing native folder hierarchy and/or naming conventions has little to do with solid state media and everything to do with the container and header data that links the audio/video streams with the metadata and thus allows the content or "media essence" to be properly decoded and played.  This is the very reason to use a tool like Prelude or Premiere's Media Browser or even Bridge or Lightroom or a third party logging tool like metafuze or shotputpro, or dedicated camera format software such as sony xdcam clipbrowser or panasonic p2 browser, redcine x, ect, as these tools all are designed to parse the captured A/V data and make properly syntaxed edits to the metadata either embedded directly into the media container or in Prelude and Premiere's case can also be written back to a sidecar or associated XMP file, which is a flavor of XML that contains all the original captured metadata plus any changes and/or additions made via these tools.
    The dangers come into play when changes to the native file naming convention or folder hierarchy are done directly to the media content via finder on mac or explorer on windows, as changing at that level can break the relationship between the metadata stream and the media essence since the changes are not being written to the metadata or content headers or being handled in a manner referred to as transmuxing..
    Prelude & Premiere's Media Browser both allow for looking into the native files non-destructively and safely modifying either the metadata linked to the native media or also allows for a transcode to be done which will then copy or recreate a new media file in whatever format selected along with a new metadata stream.
    Prelude is a nice utility and Premiere's Media Browser an amazing tool for organizing, modifying and selectively ingesting media and or making quick selects and assemblies.

  • Hello, I am interested in buying a new Macbook Pro but want to run Adobe CS package.  Which computer do you recommend?

    Hello, I am interested in buying a new Macbook Pro but want to run the latest Adobe CS package.  Which computer do you recommend for best speed and perfromance?

    Depending on the software you'll use - I doubt you'll be an expert on After Effects and use Photoshop, Illustrator and Dreamweaver like a pro (you may be an exception) - I have a 13" Macbook Pro simply because the 15" lacks the portability of the smaller size - the Retina 15" is alot lighter and if you can afford it - go for it!
    I bought the Macbook Pro and replaced the 4GB of RAM with 8GB of RAM and replaced the HDD with an m4 SSD from Crucial. The SSD really makes a difference in app start up speeds, loading times and bootup speeds. The RAM ensures apps operate smoothly and everything is snappy. Since getting an SSD, I would say the performance of Photoshop and Illustrator is vastly improved. I can have both open whilst surfing the web, checking my email and even using Dreamweaver every once in a while. Multitasking is great.
    To conclude, depedning on your price range, buying a £999 Macbook Pro and swapping the HDD for an SSD and the 4GB of RAm to 8GB, will ensure better performance than both 15" Models. However, buying a 15" Model and maxing out the specs, would beat the performance of a maxed out 13".
    I have a 13" and it runs faster than it was when I first purchased it last year. Photoshop opens in 2/3 seconds and performance is great.
    Hope this helps.
    P.S. If you have the money, get the 15" Retina. If not, max out the 13" if you still want portability. Otherwise, get the 15" and max that out if you feel performance is poor.
    The reason I say Retina, is because the maxed ram and SSD is already installed and saves alot of hassle aswell as the slimmer design and lighter weight.

  • Which email service do you recommend for macbook pro?

    which email service do you recommend for macbook pro?  we have an HP desktop with Windows Mail that is sync'd  to laptop Mail currently.

    Vista is an operating system, Windows Mail is a mail client and Windows Live is an e-mail provider, 3 entirely different things, try this, what does your e-mail address consist of after the @sign?

  • Which of the two monitors do you recommend for Adobe Photoshop Lightroom 5:  EIZO CG 277 Coloredge o

    HI,
    Which of the two monitors do you recommend for Adobe Photoshop Lightroom 5:
    EIZO CG 277 Coloredge or NEC PA-272W.
    Thanks in advance for your reply.

    It depends on where you are. Things are very different in Europe (Italy?) compared to the US situation.
    The price difference between comparable NEC/Eizo models in Europe actually goes in Eizo's favor. The regular NEC PA272 in Europe cannot be hardware calibrated (it has a firmware lock) and the comparable offering would be either the NEC Spectraview 272 or the Spectraview Reference 272. These are more expensive than the Eizo CG277.
    Note that the European PA272 can be hardware calibrated with the US Spectraview II software - but that software cannot be bought in Europe and has to be imported from the US.
    All these displays are top reference quality. As for calibration software, which is a very important part in the equation, my vote goes to Eizo's ColorNavigator (I have a CG246). It is a superb piece of well thought-out software. The US Spectraview II - which I also happen to have - is a very, very close second, but the European Spectraview Profiler software that you get with the EU NEC units isn't all that impressive.
    Photoshop supports a 10 bit display pipeline, with either display, as long as you have a video card that also supports it. Lightroom doesn't support it.

  • For editing video which MacBook do you recommend me?

    Hello. For editing video which MacBook do you recommend me? Thanks.

    Unless you're too delicate and can't handle the weight, a regular MacBookPro with the Widescreen/Anti-glare and 2.6GHz processor options (gets you 1GB VRAM as well):
    Then upgrade by yourself to 16GB RAM and either a 7200RPM HDD or an SSD for substantially less than what Apple charges and you will have a screamer.

  • Which NAS you recommend for SMB backup storage

    Synology and ReadyNAS would be my first choices in this category.  I have and use both and love them.  I've had quite good success with Buffalo as well with clients.  Nearly all storage engineers that I know when choosing this type of storage, like Kooler, choice Synology and ReadyNAS.
    For backups and archives specifically I have had good luck with Drobo too.

    For me it's always between Netgear and Synology. Now I'm back to Netgears (being a green guy here I cannot tell reason in public).For anything bigger then 2 SATAs in RAID1 economically reasonable to "roll your own" backup appliance. Recycled Dell R7xx and again recycled Windows Server 2012 R2 (because of SMB3 and decent backup-ready dedupe) appliance is very hard to beat! In case you don't have old server xByte has a stack of reburbished ones they sell cheap.--Planning to buy a NAS storage for our backups.Very small environment with VMware host, 7 VMs, Veeam backup.Total backup size 200GB, daily increment is around 7-10GB (Compressed).Will use the NAS for backup storage only and nothing else.Which brand do you recommend or use at your SMB locations:SynologyQNAPSeagateNetgear ReadyNASBuffalo

  • Which Case Do you Recommend?

    I purchased a Black Nano for my husband for Christmas. I would like to order him a case soon to have for Christmas. I have looked at the Agent 18 Case. Which one would you recommend? I know that there is a certain way that you put on this case. Also, does it take away from the black? Please give me your recommendations for a case. Thanks

    Hi,
    I'd have to say that I'd recommend the iSkin Duo Nano case without a second thought. I have one for my iRiver H140 as well and its never been out of it since installed. Same with the nano.
    They are beautifully made, have 2 layers of protection, come in some cool colours and have screen/click wheel protectors.
    Its changed the way I use my nano. Before I was always a little nervous about putting it in a bag or pocket. Now I don't worry.
    There a belt clip for jogging and all 'holes' are covered when not in use. The only access is to the hold switch.
    The only issue, as with all cases, is that if you have an iPod dock then it will no longer fit.
    If silicone is your weapon of choice then look no further.
    Hope this is of use.
    NIALL 8-)

  • Which tool do you use for load testing?

    Which tool do you use for load testing for J2EE application?

    hi,
    i use jmeter for without issues..
    first make sure that the system from where you are doing load testing is in the same lan(without firewall) to that of server. Here you are testing the capacity of server and not the network bandwith.
    So assuming very good network connection what is the servers performance level...
    If u have to decide which tool is decent enough to load testing,
    i would suggest go for jmeter. its reliable and i have used it without problems.
    Here is my quick tutorial for jemeter which i made for my teams reference.
    REFERENCE
         For Getting Started refer to any tutorial for Jmeter
         You can refer to introduction on
              http://jakarta.apache.org/jmeter/usermanual/
    RUNNING LOAD TEST
         Extract jakarta-jmeter-2.3RC4.zip in c:
         install jdk-1_5_0_12-windows-i586-p.exe
         Run C:\jakarta-jmeter-2.3RC4\bin\jmeter.bat
         In Test Plan add Thread Group
         Right Click Thread Group -> Add->Sampler->HTTP Request
         Select HTTP Request added fill details
              Serverip:www.xyz.com
              Port:80
              Path:/xyz-webapp/index.jsp
              Use KeepAlive: Checked
              Retrive All Embeded images from HTML: Checked(For geting images inside html)
         Right Click Thread Group -> Add->Listner->Graph Results
         Click on Thread Group Fill details
              No of Threads:3(This means no of simultaneous users)
              Ramp Up Period:1(3 Request will be made in 1 second period)
              Loop Count:5(Above process should be repeated how many times)
         Save TestPlan
         Run -> Clear All
         Run -> Start
              Click on Graph Results for Output
         Try adding different listener in Thread Group
              Thread Group -> Add->Listner->Summary Report
         Listeners coud be added at thread group level or HTTP Request Level
    RECORDING A TEST.
         Add a HTTP proxy server in workbench by right clicking on it and selecting Add->Non test Element->HTTP Proxy Server.
         In Test Plan Add Thread Group
         In HTTP proxy server select Target Controller as Test Plan > Thread Group.
         Go to Internet Explorer and go to internet settings and set proxy server as localhost and the port
              which is configured in Jmeter proxy server.Save Settings.
         In Jeter proxy server start by Clicking on Start button in the HTTP Proxy Server Flap.
         In browser navigate the application which you want to test.
         The nodes will be added in the Thread Group.
         Once Navigation is done stop the proxy server and save the test plan from file menu.
    LOGGING INTO APPLICATION.
         When we have to login into system and then navigate the system
              we need a cookie to be tracked after login. This could be achieved
              simply by Add -> Config Element -> HTTP Cooie Manager.
         After adding the HTTP Cooie Manager simply run the test.
    LOOPING COUNTER.
         When a request is made multiple parameter is sent to server.
         Parameters are sent from the HTTP Request node added in the Thread Group
              in "Send Parameter with the request" table.
         If we run the loop count 10 times the parameters will be sent same in every request.
         If you have to send parameters like user1,user2,user3,user4....
              then add -> Pre processor -> Counter.
         Put start as 1 and and Maximum as 10 or whatever required.
         Put Referene name as iCtr or whatever.
         In the "Send Parameter with the request" in value column put user${iCtr}

  • I just purchased MBP and it is my first Apple computer. How concerned should I be about virus software and what do you recommend for security software?

    I just purchased MBP and it is my first Apple computer. How concerned should I be about virus software and what do you recommend for security software?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets (see below.)
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been another layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
    Gatekeeper has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to evade Apple's controls.
    For more information about Gatekeeper, see this Apple Support article.
    4. Beyond XProtect and Gatekeeper, there’s no benefit, in most cases, from any other automated protection against malware. The first and best line of defense is always your own intelligence. All known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source. How do you know whether a source is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    5. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was never a good idea, and Java's developers have had a lot of trouble implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style "virus" affecting OS X. Merely loading a page with malicious Java content could be harmful. Fortunately, Java on the Web is mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers. In Safari, this is done by unchecking the box marked Enable Java in the Security tab of the preferences dialog.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a specific task, enable Java only when needed for the task and disable it immediately when done. Close all other browser windows and tabs, and don't visit any other sites while Java is active. Never enable Java on a public web page that carries third-party advertising. Use it only on well-known, password-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow these guidelines, and you’ll be practically as safe from malware as you can be.
    6. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    7. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    8. The greatest harm done by anti-virus software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but they get a false sense of security from it, and then they may behave in ways that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • Which antivirus product is recommended for the iMac?

    Which antivirus product is recommended for the iMac?

    OS X already includes everything it needs to protect itself from viruses and malware. Keep it updated with software updates from Apple.
    A much better question is "how should I protect my Mac":
    Never install any product that claims to "speed up", "clean up", "optimize", or "accelerate" your Mac. Without exception, they will do the opposite.
    Never install pirated or "cracked" software, software obtained from dubious websites, or other questionable sources. Illegally obtained software is almost certain to contain malware.
    Don’t supply your password in response to a popup window requesting it, unless you know what it is and the reason your credentials are required.
    Don’t open email attachments from email addresses that you do not recognize, or click links contained in an email:
    Most of these are scams that direct you to fraudulent sites that attempt to convince you to disclose personal information.
    Such "phishing" attempts are the 21st century equivalent of a social exploit that has existed since the dawn of civilization. Don’t fall for it.
    Apple will never ask you to reveal personal information in an email. If you receive an unexpected email from Apple saying your account will be closed unless you take immediate action, just ignore it. If your iTunes or App Store account becomes disabled for valid reasons, you will know when you try to buy something or log in to this support site, and are unable to.
    Don’t install browser extensions unless you understand their purpose. Go to the Safari menu > Preferences > Extensions. If you see any extensions that you do not recognize or understand, simply click the Uninstall button and they will be gone.
    Don’t install Java unless you are certain that you need it:
    Java, a non-Apple product, is a potential vector for malware. If you are required to use Java, be mindful of that possibility.
    Disable Java in Safari > Preferences > Security.
    Despite its name JavaScript is unrelated to Java. No malware can infect your Mac through JavaScript. It’s OK to leave it enabled.
    Block browser popups: Safari menu > Preferences > Security > and check "Block popup windows":
    Popup windows are useful and required for some websites, but popups have devolved to become a common means to deliver targeted advertising that you probably do not want.
    Popups themselves cannot infect your Mac, but many contain resource-hungry code that will slow down Internet browsing.
    If you ever see a popup indicating it detected registry errors, that your Mac is infected with some ick, or that you won some prize, it is 100% fraudulent. Ignore it.
    Ignore hyperventilating popular media outlets that thrive by promoting fear and discord with entertainment products arrogantly presented as "news". Learn what real threats actually exist and how to arm yourself against them:
    The most serious threat to your data security is phishing. To date, most of these attempts have been pathetic and are easily recognized, but that is likely to change in the future as criminals become more clever.
    OS X viruses do not exist, but intentionally malicious or poorly written code, created by either nefarious or inept individuals, is nothing new.
    Never install something without first knowing what it is, what it does, how it works, and how to get rid of it when you don’t want it any more.
    If you elect to use "anti-virus" software, familiarize yourself with its limitations and potential to cause adverse effects, and apply the principle immediately preceding this one.
    Most such utilities will only slow down and destabilize your Mac while they look for viruses that do not exist, conveying no benefit whatsoever - other than to make you "feel good" about security, when you should actually be exercising sound judgment, derived from accurate knowledge, based on verifiable facts.
    Do install updates from Apple as they become available. No one knows more about Macs and how to protect them than the company that builds them.
    Summary: Use common sense and caution when you use your Mac, just like you would in any social context. There is no product, utility, or magic talisman that can protect you from all the evils of mankind.

Maybe you are looking for

  • Unable to open PSE10 Organiser

    Hi People Today is 27/11/2011,and 2 days ago I was able to open both Organiser and edit in Elements 10,now I can only open Edit.I have uninstalled and installed the disc 3 times and still no elements organiser.I also re installed Elements 9 but canno

  • EPMA for Windows 2008 R2 Intel 64 bit

    My organization is implementing Public Sector Planning and Budgeting so I'm trying to create an environment for learning purposes. I did a rapid deploy of EPM 11.1.2 but the workforce planning component was absent. I think I read that the EPM Archite

  • Mpd update error

    just updated mpd and i keep getting a connection refused message when trying to start ncmpcpp. anyone else see this?

  • XPERIA with integrated DAB+ radio

    When will there be XPERIAs with integrated DAB+ radio available in Europe? For iOS there are at least accessories available. I would prefer to have built in DAB+. SONY has released DAB+ tuners in compact Hifi sets and in portable radios. Given that D

  • Camera quit working, can't open

    Camera quit working, cant open