How integrated the BSO DTS will assess CDA and QTD? Pls explain.

Hi guru and expert.

I want to know how the dynamic time series in OSB will assess the CDA and QTD.?

If I set my time dimension something like below.

EF07-08 (time Dimension, DTS active CDA, QTD)
Qtr1
Avr07
Mai07
Jun07
......
......
.....

Qtr4
Jan08
Fev08
Mar08

That's my question will be the CDA to return the sum of the value of all four qtrs above? .... Thanks for replying...

When you use DTS it is calculated according to the level zero members if you specify somethng as YTD (Jan08) to join the year number through Jan. If you want the CDA all year, you could do two things
1 Select the EF07-08 witout CDA member because it is the sum of the whole year already
2. select YTD (Mar08)

Frankly I prefer the former because it is less for Essbase to do

Tags: Business Intelligence

Similar Questions

  • I have 12 PS elements and Premier elements installed on Windows 10. How do we install PSE 14 and 14 PE of DVDs so that the Organizer 14 will display photos and videos imported using 12 Organizer? I would also, continue to use PSE12 and EP 12

    I have 12 PS elements and Premier elements installed on Windows 10. How do we install PSE 14 and 14 PE of DVDs so that the Organizer 14 will display photos and videos imported using 12 Organizer? I would also, continue to use PSE12 and EP 12

    When you install a new version of the items, you are prompted to update the current catalog. Creating a new catalog with the data in the old. The new catalog has the same name as before and can be opened in the new version, the old catalog is unchanged, but renamed with a suffix-1 can be opened in the old version without any intervention on your part.

    If you do agree to the conversion prompt, you can do it later from the Catalog Manager; same for the other catalogues.

    Just be careful what you do in a catalog are ignored by the other, they cannot be updated by the other. This means that you will need to choose which version of catalog to choose to manage your files.

    In addition, I don't see a way to use PSE12 catalogs to edit in the PSE14 Editor.

  • How can I make an osteonecrosis affects the form that will be present and send the pdf as an email?

    How to make a button on the form that will be present and send the pdf as an email?

    You can set up a button with an action to "Submit a form" and use a URL of the type mailto to specify the email address, you have the forms sent. If you want to send the whole PDF, select this option and not FDF or anything else. The mailto URL must not include spaces and the part "mailto" must be lowercase, as:

    mailto:[email protected]
    

    It will try to open an e-mail by using the users default email client. If the user has not implemented a or there is another problem, the email could not get started. If she has to work with versions of reader before 11, the form must be activated for the reader, what you do in Acrobat 11 selecting: file > save as other > Reader Extended PDF > activate tools more

  • How long the camera raw will be available for the new Canon 70 d?

    How long the camera raw will be available for the new Canon 70 d?

    The next Raw (currently in RC) 8.2 includes preliminary support for the 70 d

    http://labs.Adobe.com/technologies/cameraraw8-2-CC/?tabid=details#tabTop

  • I use a third party inf file when creating a network connection via my USB port. The USB connection will become inadmissible and also cause the laptop hang up.

    I use a third party inf file when creating a network connection via my USB port. The USB connection will become inadmissible and also cause the laptop hang up. Currently I try to modify the INF file but is seeking a help or suggestions in T/S to this problem. Thank you.

    original title: third party INF problems

    Hi Paul,.

    ·         Why are you using a USB port to create a network connection instead of using an Ethernet connection?

    You can see the following article on how to set up a network.

    How to set up a small network with Windows XP Home Edition (PART 1)

  • After the blackout, VMs will not start and Vsphere Client cannot be re management/access / start VMs on a physical server.

    After the blackout, VMs will not start and Vsphere Client cannot be re management/access / start VMs on a physical server.

    Get the error message...

    [[: start: W: 1] 2016-06-09 14:41:36.562 Log for vSphere Client Launcher, pid = 4532, version = version 5.0.0 = build-455964, option = released
    [[:QuickInf:W: 6] 2016-06-09 14:42:20.421 the value of the search dll C:\Program Files\VMware\Infrastructure\Virtual Infrastructure Client\5.0 path
    [[:QuickInf:W: 6] 2016-06-09 14:42:24.281 load shared dll: C:\Program Files\VMware\Infrastructure\Virtual Infrastructure Client\5.0
    [[ : start: w: 6] 2016-06-09 14:42:41.406 Log for vSphere Client, pid = 4532, version = version 5.0.0 = build-455964, option = release, user = root, url = https://192.168.10.200/sdk
    [[:ShowExcp:W: 6] 2016-06-09 14:42:42.406 error: an internal error has occurred in the vSphere Client.

    Details: The initializer for type for 'VirtualInfrastructure.Utils.ClientsXml' threw an exception.

    Contact VMware support if necessary.

    System.TypeInitializationException: The initializer for type for 'VirtualInfrastructure.Utils.ClientsXml' threw an exception.

    at VirtualInfrastructure.Utils.ClientsXml.FetchIfClientsXmlExists (String serviceUrl)

    at VirtualInfrastructure.LoginUtils.LoadMatchingVI (String serviceUrl)

    at VirtualInfrastructure.LoginUtils.CreateNewService (String serviceUrl, ClientSpec clientSpec, Boolean waitForTopology, Assembly / viAssembly)

    to VMware.Vim.Client.VimClient.StartUp (2 specMap, String [] arguments dictionary, Manager of LoginEventHandler)

    to VpxClient.UI.InitializeVimClient (dictionary 2 specMap, String [] arguments)

    to VpxClient.UI.StartUpIfNotMultiVcSecure (dictionary 2 specMap, SecureString password, String [] arguments, LoginEventHandler Manager, String, dllPath, list 1 listOfVcUrls)

    System.TypeInitializationException: The type to 'VirtualInfrastructure.Utils.TypedXmlSerializer ' 1' initializer threw an exception.

    to VirtualInfrastructure.Utils.TypedXmlSerializer'1.ctor)

    to VirtualInfrastructure.Utils.ClientsXml... cctor()

    System.IO.IOException: The process cannot access the file "C:\Documents and Settings\XXXXUSERNAMEXXXX\Local Settings\Temp\nyhn4bev.dll" because it is used by another process.

    ...

    to System.Xml.Serialization.XmlSerializer... ctor (Type type)

    to VirtualInfrastructure.Utils.TypedXmlSerializer'1.cctor)

    -End of the exception stack trace internal-

    -End of the exception stack trace internal-

    After many unsuccessful attempts tried to connect Vsphere client, the client has finally connected and was able to on all virtual machines. Thanks to Luciano Patrão for study. For all in the community, peace out...

  • When I drop a second video clip with audio in a sequence, how is the 2nd clip will not display or launches its audio track?

    I hope someone can help me with this.  I've just updated to the new CC first pro and when I drag a clip that has audio it displays correctly only audio in the audio track, BUT... when I drag a clip (or even the exact same clip) in the sequence of the audio track is not displayed and cannot be heard or published.  Just to double check, I did a new project, tried to load these two clips in reverse order and it worked the same way.  Only the first loaded track will show that it is the audio track.  When I create a new sequence by using the menus at the top specifically to test this, none of the audio tracks are displayed when the drug on the time line.

    I also tried to load the video in the window source first before I drag it down. Sometimes the source plays audio, sometimes it does not. Anyway the audio still does not appear.

    timelinewoes.png

    I hope that there is just a shoddy setting, I've turned on.  I know how to do Prime Minister rip the audio output and is it she's own track after the fact, but the whole issue is speed and convenience, and I never had this problem in the old version.  Thanks much for any help.

    Check A1 left the lock.

  • How work the files config.lok, AdminServer.lok and edit.lok?

    I could see in their respective locations that these files are 0 KB. So it was just curious to know how it works; It's just their exitence which tell that the lock is taken or should she have some content?
    Furthermore, what is the difference between the 3 .lok files?

    Hi Jeggar,

    There are config.lok, EmbeddedLDAP.lok, and XXXserver.lok files that are used by the server administrator and the server managed. Another file locking, named edit.lok is used for the server administrator only. Here are more details about each:

    config. Lok
    The config.lok file is just used to get a lock file on the file config.xml, to ensure that updates to config files run in the series. It won't be a problem if it exists in the directory.

    Edit.Lok

    The modification lock is used to ensure that only one user at a time is changing configuration. The editing lock is used on the administration server.

    EmbeddedLDAP.lok

    This file locks access to the embedded LDAP server, in order to ensure that only one process can access this directory server. If two processes write to the same directory server, the directory server will have a problem.

    XXXServer.lok
    The .lok [servername] indicates that the server with the name of [server name] is running. It is used to prevent a started server twice. If you are sure that this server process is stopped, you can remove it.

    Kind regards
    Kal

  • The download links will not open (and not download)

    Hello

    Thanks in advance for your help. I tried to open the download links for the last days and then Firefox "tent" and I get the wheel rolling, the popup will never open and never downloaded files. I checked on the options of Firefox and popups are enabled. I uninstalled Firefox and reinstalled back and it did not work.

    Can you help me please?

    Thank you.

    What happens if you press CTRL + S on a site? A dialogue window appear?

  • How did the same predicate is completed access and filter?

    SELECT select, j.job_title, d.department_name

    OF e hr.employees, hr.departments d, hr.jobs j

    WHERE e.department_id = d.department_id

    AND e.job_id = j.job_id

    AND select LIKE 'a % ';

    Execution plan

    ----------------------------------------------------------

    Hash value of plan: 975837011

    ---------------------------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    ---------------------------------------------------------------------------------------------

    | 0 | SELECT STATEMENT | 3. 189. 7 (15) | 00:00:01 |

    |* 1 | HASH JOIN | 3. 189. 7 (15) | 00:00:01 |

    |* 2 | HASH JOIN | 3. 141. 5 (20) | 00:00:01 |

    | 3. TABLE ACCESS BY INDEX ROWID | EMPLOYEES | 3. 60. 2 (0) | 00:00:01 |

    |* 4 | INDEX RANGE SCAN | EMP_NAME_IX | 3 | | 1 (0) | 00:00:01 |

    | 5. TABLE ACCESS FULL | JOBS | 19. 513. 2 (0) | 00:00:01 |

    | 6. TABLE ACCESS FULL | DEPARTMENTS | 27. 432. 2 (0) | 00:00:01 |

    ---------------------------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - access("E".") DEPARTMENT_ID "=" D ". ("" DEPARTMENT_ID ")

    2 - access("E".") JOB_ID '=' J '. ("' JOB_ID ')

    4 - access ("E". "Last_name" LIKE 'A %') "

    filter ("E". "LAST_NAME" LIKE 'A %') "

    I understand not only how to select column is evaluated by the access and filter? Can someone there explain please? Or recommend me an article or document that explain this predicate excatly explains to explain the plan?

    Thanks in advance.

    Near NightWing.

    I believe that the predicate can be used to access THE index entries and if entries of access could include potentially "false positives" then filtering is required to remove the FPs.

    This filtering can be done in the same step of the operation (such as access) or as an extra step.

    My apologies, this has become much longer and more detailed that I intended it to be. :-(

    If I understand correctly,

    In terms of the explanation of the path, each step can include access and filtering process for "entries" (index or line). In the plan to explain the predicate section shows Information the use of predicate for step 'matching. "

    Some predicates can be "used" to ACCESS (ing) the entries, while the same or additional predicates (or even other) can be "used" to FILTER (ing) access entries (which have been consulted, but the optimizer is not sure that EACH AACCESSed entry is indeed a part of final result set). In such cases optimizer applies filtering predicate also during the operation stage. The optimizer can sometime even add additional operation steps or predicate [almost like a short circuit]

    So, using our previous configuration, allow us to run test cases.

    In this query we use AS predicate but the operand does NOT contain any 'wild' character In this case INDEX RANGE SCAN is performed, but since there is no wild characters are involved we can be sure that each entry using this predicate is indeed part of the final result set. This predicate Section shows that the predicate is used ONLY to access (index) entries.

    We know that the result set of this query is NULL lines.

    > explain plan for select v1 of tst where v1 as "A".

    ------------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    ------------------------------------------------------------------------------

    |   0 | SELECT STATEMENT |           |     1.     7.     1 (0) | 00:00:01 |

    |*  1 |  INDEX RANGE SCAN | TSTV1_IDX |     1.     7.     1 (0) | 00:00:01 |

    ------------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - access ("V1" = 'A')

    However, in this application, there is a wildcard character in the predicate, so while the INDEX RANGE SCAN step access entries using this predicate, it could potentially access entries that can be part of the final result set. So in the SAME step of the INDEX RANGE SCAN operation the predicate is also used for filtering. Since this is the only predicate, it may seem redundant.

    > explain plan for select v1 of tst where v1 like 'a % '.

    ------------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    ------------------------------------------------------------------------------

    |   0 | SELECT STATEMENT |           |    24.   168.     1 (0) | 00:00:01 |

    |*  1 |  INDEX RANGE SCAN | TSTV1_IDX |    24.   168.     1 (0) | 00:00:01 |

    ------------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - access ("V1" LIKE 'A %')

    filter ("V1" LIKE 'A %')

    If we add an another predicate as below (also includes wild character), it gets interesting. INDEX RANGE SCAN step performs two access AND filtering.

    Please note that the predicate 'V1' AS '%' is used to ACCESS and FILTER, fine FILTER uses additional predicates.

    > explain plan for select v1 of tst where v1 like 'A %' and v1 as "%c".

    ------------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    ------------------------------------------------------------------------------

    |   0 | SELECT STATEMENT |           |     1.     7.     1 (0) | 00:00:01 |

    |*  1 |  INDEX RANGE SCAN | TSTV1_IDX |     1.     7.     1 (0) | 00:00:01 |

    ------------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - access ("V1" LIKE 'A %')

    filter ("V1" IS NOT NULL AND "V1" LIKE 'A %') AND "V1" LIKE "%c"

    When we change the predicate 'V1' LIKE 'A %' to 'V1' > 'A', then we can use the predicate to access entries AND do not forget that each entry using this predicate are

    Indeed part of results if other predicates are met. In this case optimizer of must not filter on 'V1' > 'A', wherever it must continue to filter on 'V1' LIKE '%c '.

    > explain plan for select v1 of tst where v1 > 'A' and v1 as "%c".

    ------------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    ------------------------------------------------------------------------------

    |   0 | SELECT STATEMENT |           |     1.     7.     1 (0) | 00:00:01 |

    |*  1 |  INDEX RANGE SCAN | TSTV1_IDX |     1.     7.     1 (0) | 00:00:01 |

    ------------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - access("V1">'A')

    filter ("V1" IS NOT NULL AND "V1" LIKE "%c")

    Of course, if we do the predicate so that the entries are NOT accessible using the predicate, then for INDEX FULL SCAN (no Beach cannot be determined) operation comes into play and the predicate of ACCESS goes. All entries in the index are ALWAYS accessible (predicate applied no ACCESS) and FILTER predicate is applied.

    > explain plan for select v1 of tst where v1 like '%c %'

    ------------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    ------------------------------------------------------------------------------

    |   0 | SELECT STATEMENT |           |     1.     8 S     1 (0) | 00:00:01 |

    |*  1 |  INDEX SCAN FULL | TSTV1_IDX |     1.     8 S     1 (0) | 00:00:01 |

    ------------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - filter ("V1" IS NOT NULL AND "V1" LIKE '%A%c')

    For the example proposed by JL, two predicates are used in the INDEX RANGE SCAN step to access THE entries. In addition, we can be sure that all entries that are accessible with success using this predicate can be included in the final result set. So not necessary filtering.

    > explain plan for select v1 of tst where v1 > 'A' and v1<>

    ------------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    ------------------------------------------------------------------------------

    |   0 | SELECT STATEMENT |           |    24.   168.     1 (0) | 00:00:01 |

    |*  1 |  INDEX RANGE SCAN | TSTV1_IDX |    24.   168.     1 (0) | 00:00:01 |

    ------------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - access("V1">'A' AND "V1")<>

    Interestingly, when we change the 'B' in the previous query to 'A', change predicates of inequality, so we cannot use index. Optimizer knows this and switches for FTS and introduced an additional step of operation FILTER. In my view, the filter predicate can be applied in operation of FTS. Additional FILTER stage is the predicate as FALSE hard-coded value. It does not yet use our predicate of the query.

    Well, don't know if he actually bypasses the operation of FTS. SQL trace can indicate that.

    > explain plan for select v1 of tst where v1 > 'A' and v1<>

    ---------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    ---------------------------------------------------------------------------

    |   0 | SELECT STATEMENT |      |     1.     8 S     0 (0) |          |

    |*  1 |  FILTER |      |       |       |            |          |

    |   2.   TABLE ACCESS FULL | TST |    49.   343.     3 (0) | 00:00:01 |

    ---------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - filter (NULL IS NOT NULL AND NULL IS NOT NULL)

    Subsequently, optimizer decides to use the INDEX RANGE SCAN, even if the predicate is always an inequality. Go figure...

    > explain plan for select v1 of tst where v1 > 'A' and v1<=>

    -------------------------------------------------------------------------------

    | ID | Operation | Name | Lines | Bytes | Cost (% CPU). Time |

    -------------------------------------------------------------------------------

    |   0 | SELECT STATEMENT |           |     1.     8 S     0 (0) |          |

    |*  1 |  FILTER |           |       |       |            |          |

    |*  2 |   INDEX RANGE SCAN | TSTV1_IDX |     1.     8 S     0 (0) | 00:00:01 |

    -------------------------------------------------------------------------------

    Information of predicates (identified by the operation identity card):

    ---------------------------------------------------

    1 - filter (NULL IS NOT NULL)

    2 - access("V1">'A' AND "V1")<>

    As others have said, it is difficult to understand and predict the path, but fortunately Oracle doing the right thing, 99% of the time.

    VR

    Sudhakar

  • Subscription Stop DPS Profession but keep the DPS team will be content and stop .folio if email

    Hello

    I use the CC team for a few months, but to be able to create a package for Google game store with my .folio I upgrated to CC Professional Edition. Now that I realized what I had I've suspended my CC Professional Edition, but I received the following message is displayed:

    When your subscription is moving towards a fulfilment of the suspension of your content to .folio stops as well.

    As I still subscribe to the CC teams, my folios will remain in the DPS? The email address used for CC Professional Edition is part of the CC teams. [email protected] and [email protected]

    Thank you very much for your help!

    Kind regards

    You must maintain an active account of DPS professional for slips to your Android app. If you cancel your account Pro DPS so your readers will be able to download the app on Google, but will not be able to download the slips inside.

    Neil

  • How to the mozilla help page search engine AND my terms rather than OR them?

    Example: Search for 'failure of the log message timestamp' results with just the personal conditions. I tried ANDing them and surrounding quotation marks without success. I tried 'advanced search' without success.

    It is on the 'doing' list for the site, but currently, your best bet is to do a targeted search of Google. In other words:

    https://www.Google.com/search?q=message+log+timestamp+failure+site:support.Mozilla.com

    P.S. There is an advanced search, but it has the same problem.

  • How does the new HTML5 video Support? and what are the limits?

    If the new benefit has been relased as well as many new features, including the video support HTML5 then with the new feature, here are a few new questions!

    How Edge to load the video? It is fully preloaded before Edge shows the content? Or is it more of a pregressive 'youtube' loading while playing?

    Or can choose us?

    What is the example of recommended video file size 4 MB?

    How does edge deal with browsers that only support .ogg or .webm instead of mp4?

    What about ISO & tablets support? loading time, 'delay', etc.?

    When you import an audio or video file, a group is created for you. You can import media with the same name (videosample.ogv; videosample.mp4) this group for compatibility with browsers. The corresponding format is chosen according to the browser which is in charge of the composition.

    About the WebM format - you can also add a webm file in your publication. However since it is a format of royalty, Animate will not display a live preview in the authoring tool. If your browser supports this then it will definitely play fine on the browser preview.

    You can take a look at the video lesson In - app, which is available in the Panel of lesson for more details on how it works.

    And Yes, you have options to preload for HTML5 video too, however progressive download is not available. You will need to use scripts using JS to achieve this functionality.

    Hope this helps and try this out.

    -Reynaud

  • Flash - how is the HUGE issue of image resolution and HD - support

    Hello Flash Forums,

    It's been a while since I've posted, but I would love to inform me of some of the old pros here concerning best practices using flash for large-scale environmental labelling:

    1 flash supports high definition correct? I did a google search and see that it does - but not sure that I need a plug-in or it is just a parameter? My question is more inspiring-animation flash maybe highDef, or only the videos that it displays?

    2. I'm working on a graphic very large environment (like 40 ft high) and curious to know if anyone can tell me how you deal with images at this size? I remember vaugely that they do need to be 300 dpi, but I still need to maintain a certain resolution?

    Thanks for any help you can provide!

    B

    The limiting factors, that you're going to have case are more likely to see with what will actually being run / play your Flash content and feed it to this view. Who is responsible for the implementation of the computer system that displays this could answer. Discover the resolution of their screen set up. It will probably take a projection installation, which shows regardless of the media to a size of enlargements of. Ask if the HD 1080 video will work and if they used before, and how did he watch, etc.

    If the screen ends up having a resolution of something of significantly higher resolution monitor 'high' of what a designer is, have not necessarily to have your Flash showing 100% and fill all these pixels. You can have good results by creating your Flash to width reasonale & height and then scaling that 150%, 200%, etc.

    Flash displays no problems dispalying 1080 HD video, and nothing is required other than the Flash plugin. It continues to be updated to Flash Player for improving video support, so make sure you get the latest version installed on any computer that plays. YouTube has begun to show the full HD (1080) all the time, and the thread and so you can always check this site to see videos how smooth are.

  • Part of the browser screen will flash intermittently and when trying to select a link out of my drop-down lists, click with the mouse selects the link above it.

    These problems occur only when you use Mozilla Firefox. I am using a Lenovo Thinkpad:
    1 site Web seem to flicker on the images, videos, maps, when the mouse moves around the screen.
    2 pointing the mouse over a link in the browser and a left click activating the link above (if it exists)

    Do not experience problems with google or ie. It started a few days ago.

    Thoughts?

    Hello paulo.eichelberger, try Disabling graphics hardware acceleration.

    You will have to perhaps restart Firefox for it to take effect, so save any work first (e.g. you compose mail, documents online that you are editing, etc.).

    Then perform the following steps:

    1. Open the Firefox Options window as follows:

      • Click the menu button

        then select Options.

    2. In the Options of Firefox window, click the Advanced tab, and then select general.
    3. You will find in the list of parameters, the checkbox use hardware acceleration when available . Clear this check box.
    4. Now restart Firefox and see if the problems persist.

    In addition, please check the updates for your graphics driver by following the steps in the following knowledge base articles:

    This solve your problems? Please report to us!

    Thank you.

Maybe you are looking for

  • Link to image problem

    Click on the button share and share buttons will show up but I can't click the button images of action as from facebook.the html tag is,< a href = 'facebook' >< /a > I have no problem in other browsers, firefox just. Help, please.

  • Satellite A660 - update Windows 7 Tuner Driver killed

    I have the Satellite A660 type psaw3a-07T00RThe latest Microsoft stopped updating my internal TV tuner working with MS media thing watch tv program. I tired removing and then reinstalling Yuan DVB - T, ATSC Tuner drivers, but nothing works. the inter

  • iTunes is showing wrong album art

    Hi all I use Mac OS 10.11.3 with iTunes 12.3.2.35 and I have a problem with album art. When I change the album art for some tracks, I have everything first to remove the old and then paste it into the new. I noticed that, in some cases the old album

  • Microsoft Office Mac 2016 - worth it?

    Hello world! I recently bought a Mac and the need for the Office Suite. I downloaded the trial of 2016, the today, 01/27/16, and so far, I do not feel the questions that everyone seemed to have. However, any questions I read everything, was posted Oc

  • P7-1235: helps p7-1235 video card!

    Please someone help! I have a p7-1235 and I'm trying to upgrade to a video card to improve game performance. The problem I have is that I can't get a card to work. First of all, I tried XFX r9 270 x without a bit of luck, will not appear. Traded the