Implementation of new z820 and Quadro K4000

We are established a new HP z820 with a Quadro K4000 card.  When we look at After Effects CS6 preferences, Ray-tracing settings do not select a GPU and CUDA box is gray.  The OpenGL box shows the card Quadro... Seems that something is not here.

Advice please?

The K4000 is not a map that uses After Effects to the GPU of the 3D rendering engine acceleration traced to the RADIUS.

See this page for more details:

http://blogs.Adobe.com/AfterEffects/2012/05/GPU-CUDA-OpenGL-features-in-after-effects-CS6. HTML

Tags: After Effects

Similar Questions

  • How can I get my new/old office to connect to the internet? I ran to the implementation of new Internet and network connection wizards, nothing happens.

    LAN and WLAN connections

    My old wired desktop xp died, it was the first computer on my home network. My friend just got a new office and gave me an old. I have a laptop which has windows 7 and is connected wireless. It is still plugged in and works fine.  How can I get my new/old office to connect to the internet? I ran to the implementation of new Internet and network connection wizards, nothing happens. When I go to internet connections, it shows that it is connected, but I can't seem to connect. Help, please!

    Hi ShannonStrong,

    ·         What exactly happens when you try to connect to the network?

    ·         You receive an error message or error code?

    You can follow the steps in the Microsoft Knowledge Base article mentioned below and check.

    How to troubleshoot possible causes of Internet connection problems in Windows XP

    http://support.Microsoft.com/kb/314095

    You can also see this article:

    Networking of computers running different versions of Windows

    http://Windows.Microsoft.com/en-us/Windows7/networking-home-computers-running-different-versions-of-Windows

     

    Note: The article also applies to Windows XP

    Let us know if this information useful.

  • I've just implemented a new iPad and now everything I do online is displayed on my husbands iPhone, how can I stop this?

    I I just set up my new iPad Air and now everything I do online is displayed on my iPhon husbands, my apps appear on his phone as well.  What can I do to stop this?

    It seems that if you use both the same Apple ID If so, create a new and use it.

  • implementation of new macbook and difficulty to import photos to the macbook. Also have an iPhone and mac.

    doubling of the photos when importing

    How do you import:

    -directly from the iPhone to the MacBook by USB or WiFi?

    -directly from the iPhone to another Mac by USB or WiFi?

    -by means of iCloud photo library?

    -through the my photo stream?

    You have iCloud library enabled on each of your three devices?

  • Over-pants W7000 or Quadro K4000

    I'm about to buy a graphics card

    I'm between Over-pants W7000 and Quadro K4000

    I know that Adobe supports the OpenCL in news is so the AMD solution is an option.

    But I have the problem.

    I'm not entirely sure if the rendering 3DRay tracing in after effects has the openCL or CUDA accelerated is only
    because I read that OpenCL entirely does not support some features and plugins.

    So, what do you propose?

    I'm not interested to buy a consumer card game so pls don't tell me on GeforceGTX or HD products

    Thanks in advance for your answer

    Best regards

    Dimitris

    > I would like to know if Adobe is planing to OpenCL for this kind of tasks in the near future

    The raytraced 3D in After Effects render engine is built on top of the Nvidia OptiX library, based on CUDA. It will never work with OpenCL. Remember that this is only a feature, however, and there are other ways to work with 3D in After Effects, including the latest features to integrate After Effects with CInema 4 d.

    > Then... you recommend the K4000 Quadro...

    I don't see where someone said. This card is not on the list of the tested and supported in the current version.

    > That's why I need a business card.

    I think that it is incorrect to refer to the Quadro cards as a "more professional". They offer different features. So raw CUDA calculation is what you're after, the GTX cards do very well. The establishment of a system of 'professional' is only spend what you need on the functions you will use actually (and then using the savings on other components, such as RAM and SSD, that make a huge difference in performance).

    We spend a lot of time talking with our partners at Nvidia on this subject, and they are happy to recommend as the 690 GTX cards for use with applications like After Effects.

    Of the four cards that they asked us to test then, three of them are GTX cards, because it is those who know (and we know) suited to the use of After Effects and other creative software. (The other being the K6000, which is a nice powerful card).

    I'm not trying to tell you that you must get a card or another. Just trying to make sure that you don't dismiss an entire category of hand without more research of your choice.

  • When implementing my new iPhone, I logged into my old iCloud instead of choosing "set up as new iPhone" is there a way I can do this again? All my news from icloud is on my phone. All applications that I never downloaded and every pic ive taken. I don't w

    When implementing my new iPhone, I logged into my old iCloud instead of choosing "set up as new iPhone" is there a way I can do this again? All my news from iCloud is on my phone. All applications that I never downloaded all the photos I've ever taken since 2005 and I want to restart without remove ALL account iCloud himself. I always want to do a backup, I don't want it on my phone. I want to start fresh on my phone, but I tried to reset my phone under settings. I have just reset settings that did not 'you can't cancel it "because I don't want to lose all the photos I've ever taken." I always want to iCloud saving it just in case I need it someday, but I don't want any of this on my phone. I tried all means of security who do not say "you can't cancel" I still images and apps on my phone.

    Hello

    Turn off find my iPhone in settings then restore the iphone to factory settings.

    Now configure iphone as a new iPhone.

    See you soon

    Brian

  • Implementation of new iMac in late 2006 iMac and external hard drive

    I have a late 2006 iMac 2.16 GHz intel core 2 duo with 2.5 GB which I Lion 10.7.5.  I don't think I can improve operating systems, or more if they are not compatible.  I have an external hard drive that stores my photos, music etc I just ran out of space on iMac.  I decided to upgrade to the new iMac.  I thought that I would be able to plug in my external hard drive which has also my Time Machine backup and all the news would move to the new iMac.  However, the external hard drive is Firewire 800.  I connect it to the old iMac with adapter on the Firewire 400 port.  The new iMac has USB3.

    1. How can I connect external drive to the new iMac?  You can get a Firewire 800 cable USB3 (online research I don't think)

    2 read online it seems to say that you need to update your software on your old iMac to match the new iMac otherwise the time Machine can not read information correctly.  It is not possible on the old iMac, what should I do?

    I'm looking at my beautiful new iMac and the have not yet enabled.

    The cable would probably be Thunderbolt to FireWire, check the available adapters

    to see what should be the part. You would not upgraded an outdated old

    Mac for a last OS X when he cannot go. Use the Migration Wizard or

    migrate after installation. Some of these older applications or documents created

    can be updated easily; Some may require conversion. Depending on your files.

    The manual method is sometimes preferred. A new computer may balk

    a lot of stuff which is reduced to an antique.

    • OS X: manually migrating the data from another Mac - Apple Support

    You may reflected on this article:

    • Move your content to a new Mac - Apple Support

    https://support.Apple.com/en-us/HT204350

    If you have a time Machine, there are several articles on how to use it,

    How to upgrade and so on. -A classic example of the info source is here:

    • Apple OS X and Time Machine tips:

    http://www.pondini.org/OSX/home.html

    • If you cannot back up or restore your Mac with Time Machine - Apple Support

    Good luck!

  • Two U2713HM, T5610 Precision, Quadro K4000

    Hello

    I bought a new DELL T5610 with quadro k4000 for use with two 2713HM monitor with

    resolution of 2560 x 1600. What ports I need to use?, graphics card has 2 dp 1, 2 ports, 1 port dvi-d-l.

    I want to use two screens with a resolution of 2560 x 1600

    You can't make 2560 x 1600 with the U2713HM. On the U2713HM, DVI - D and DisplayPort will be max to 2560 x 1440. Open the User Guide. Right there at the top it states that the maximum resolution is 2560 x 1440.

    Maximum resolutions of Quadro K4000 are =
    DP (DisplayPort) 1.2 3840 x 2160
    DVI - I, 1920 x 1200

    Because of the Quadro K4000 DVI - I DL 1920 x 1200 limitation, don't use it.

    Computer/Quadro K4000 DP on-->--> (#1) DP U2713HM DP cable in DP = 2560 x 1440 (maximum U2713HM)

    Computer/Quadro K4000 #2 DP on--> DP to DP cable--> (#2) U2713HM in DP = 2560 x 1440 (maximum U2713HM)

  • Problems with NVIDIA Quadro K4000

    I have a new HP with a NVIDIA Quadro K4000 workstation. Premiere Pro does not recognize, so "The Mercury Playback Engine's GPU acceleration" is not available. Does anyone know how to force Premiere Pro to recognize material?

    I'm new to this forum... Thanks for any help you can provide!

    I just did a clean uninstall / reinstalling the Nvidia driver, and that seems to fix the problem. Just somehow install / reinstall was not enough. I had to go directly to the site for a new driver package.

    Thank you very much for your help! I am very grateful.

  • Cannot automatically download new messages and auto answer with out-of-Office message must manually check for new messages, so he can do

    I use Mozilla Thunderbird 31.3.0. I know how to create a message filter, to implement a response message automatic, but impossible to get Mozilla to automatically download new message and auto reply with the message in the filter, unless I have manually check for new messages, this is the only way to make it work. I looked online and can't seem to find an answer to that particular question. According to everything I found, I have the right boxes checked in the server settings: automatically check for new messages at startup, check new messages, check for new messages every x amount of minutes. It's one thing to have leave my computer and open Thunderbird for this works, but having to manually check for new messages get the AutoReply to work defeats the whole purpose of having an automatic response, because I use them for vacations, holidays, etc. I wondered if there are security settings that cause this problem, but if so, I don't know what changes to do to them. Thanks in advance for any help. It drives me crazy.

    I find it a little odd that Thunderbird does not mail on the calendar, you may have an add-on or antivirus program that prevents this.

    Now shift while you start Thunderbird will begin with disabled modules to check if the messages are automatically.

    By air is to the right, use the autoresponder Verizons. This link might help with this http://www.verizon.com/support/residential/internet/highspeed/account+tools/email+tools/questionsone/85621.htm#
    You say that not having is not such a context in Thunderbird is something that needs fixing. This idea comes across because Outlook has such an option. what most people don't know of it only works with Exchange server. There is no "vacation response" in the specifications of the mail server so every server implements differently.

    As all cars have a radiator, you can't take any radiator, and simply put, they are subtly different even if they perform the same purpose. Goes same for stakeholders of vacation, they perform the same function, but they differ between brands of e-mail server software.

    Thunderbird leaves the server end to expose the feature, because they are really the only ones who understand what they were doing. Outlook exposes the option and especially greys out.

  • I have synced back, try to transfer bookmarks to new laptop and lost them all. Any hope of healing?

    I wanted to add my Firefox bookmarks to my new Macbook and it was late and I was tired, and don't think not, I implemented the synchronization on the Macbook first. So basically I was transferred to an empty queue of bookmarks and now all my favorites are gone from my old PC. I tried to save the Favorites on a USB key, while I was doing this, but I can't find them now. Is it possible to recover?

    Thank you.

    IRIS

    By default Firefox automatically stores copies of backup of bookmarks for the last 10 days that Firefox has been used. For details of how to do to recover bookmarks in one of the backups, see as "Backup restore" section in this article to support - restore bookmarks from a backup or move them to another computer

  • Is a necessary additional security, such as McAfee software on the new iMac and iPad?

    Is a necessary additional security, such as McAfee software on the new iMac and iPad?

    Mac users often ask if they should install "anti-virus" (AV) or software "anti-malware". The answer is 'no', but it can give the false impression that there is no threat of what is loosely called 'virus '. There is a threat.

    1. it is a comment on what you should - and should not-do to protect you from malicious software ("malware") that runs on the Internet and gets onto a computer as an unintended consequence of the user's actions.

    It does not apply to the software, such as keyloggers, which can be installed deliberately by an intruder who has convenient access to the computer, or who has been able to take control of it remotely. This threat is in a different category, and there is no easy way to defend against it. AV software is not intended to and does not, to defend against these attacks.

    The comment is long because the issue is complex. The essential points are in articles 5 and 11.

    OS X implements now three levels of integrated protection specifically against malware, not to mention the protections of runtime such as quarantine the file, execute disable, sandbox, protecting the integrity of system, System Library randomization and randomized address space layout , which can also prevent other kinds of exploits.

    2. all versions of Mac OS X 10.6.7 were able to detect the malware Mac known in downloaded files and block non-secure web plugins. This feature is transparent to the user. Apple calls internally it "XProtect."

    The malware used by XProtect recognition database is automatically updated. However, you should not count on it, because the attackers are still at least a day before the defenders.

    The following restrictions apply to XProtect:

    ☞ circumvented by some third-party network software, such as the BitTorrent clients and Java applets.

    ☞ It applies only to software downloaded on the network. Software installed from a CD or other media is not verified.

    As new versions of Mac OS X are available, it is not clear whether Apple will continue indefinitely maintain the older versions such as 10.6 XProtect database. Versions of obsolete systems security may eventually be affected. Updates to security for the code of obsolete systems will be stop being released at any given time, and which can leave them open to other types of attack in addition to malware.

    3. starting with the OS X 10.7.5, there was a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and installation packages downloaded from the network will be run only if they are digitally signed by a developer to a certificate issued by Apple. Certified software in this way has not been checked for safety by Apple, unless it comes to the App Store, but you can be reasonably sure that it has not been changed by someone other than the developer. His identity is known to Apple, so it could be held legally responsible if it distributes malicious software. Which may not mean much if the developer lives in a country with a weak legal system (see below).

    Access controller does not depend on a database of known malware. He has, however, the same limitations as XProtect and in addition the following:

    ☞ It can easily be turned off or overridden by the user.

    ☞ A malware attacker could find a way around it, or could take control of a certificate of signing of code under false pretenses or could simply ignore the consequences of the distribution of malware Tryggvason.

    ☞ Developer App store could find a way around the Apple control, or the control may fail due to human error.

    Apple took too long to revoke some known attackers codesigning certificates, thus diluting the value of the keeper and the program developer ID. These variances do not involve the App Store products, however.

    For the reasons given, App Store, and, to a lesser extent - other applications recognized by signed Gatekeeper, are safer than others, but they cannot be considered to be absolutely sure. "Sand" applications could make to access to private data, such as your contacts, or for access to the network. Think that before granting access. Security sandbox is based on user input. Never click through any application for leave without thinking.

    4. by starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background. He checks and removes, malware that corresponds to a database of recognition held by Apple. To ensure that MRT will be executed when the database is updated, the App Store tab in system preferences and check the box marked

    Install the system data files and security updates

    If it is not already done.

    As XProtect, MRT is effective against known threats, but not against strangers. It alerts you if it detects malware, but otherwise, it has no user interface.

    5. the built-in Mac OS x security features reduce the risk of malware attack, but they are not and will never be complete protection. Malware is a problem of human behavior, not a behavior machine, and none only of technological solution will solve. Software protect you from trust only will make you more vulnerable.

    The best defense is always going to be your own intelligence. Except perhaps feats of Java, all the known malware, circulating on the Internet wearing reached a completely setting installation to update to OS X 10.6 or later takes the form of so-called "Trojans", which may have no effect if the victim is deceived in their execution. The threat thus amounts to a battle of wits between you and cybercriminals. If you are better informed, they think you are, you win. In effect, it means that you always stay in the shelter of practical computing. How do you know when you leave the safe harbor? Here are a few signs warning of danger.

    Software from a reliable source

    ☞ Software with a brand, such as Adobe Flash Player, does not come directly from the Web site. Don't be fooled an alert of any website for updating Flash, or your browser, or other software. A real alert that Flash is outdated and blocked is shown on this support page. In this case, follow the instructions on the support page. Furthermore, assume that the alert is false and that someone is trying to rip you off to install malicious software. If you see these alerts on more than one Web site, ask for instructions.

    ☞ Software any is distributed via BitTorrent or Usenet, or on a Web site that distributes pirated music and movies.

    ☞ Rogue sites Web such as CNET Download MacUpdate, Soft32, Softonic and SourceForge distribute free applications that have been packaged in a superfluous "install".

    ☞ The software is advertised through spam or intrusive web ads. Any announcement, on any site, which includes a direct link to a download should be ignored.

    Software that is clearly illegal or doing something illegal

    Commercial software ☞ high-end such as Photoshop is "cracked" or "free."

    ☞ An application helps you violates copyright law, for example to circumvent the copy protection on a commercial software, or streamed media recording to be reused without permission. All the 'YouTube downloaders' are in this category, but not all are necessarily malicious.

    Conditional or unsolicited offer from strangers

    ☞ A phone calling or a web page you indicates that you have a "virus" and offers to remove. (Some reputable sites warned visitors who have been infected with the malware "DNSChanger" legitimately. The exception to this rule applies.)

    ☞ A web site offers a free content like music or video, but for use, you must install a "codec", 'plug-in', 'player' 'Downloader', 'extractor', or 'certificate' which comes from the same site, or a stranger.

    ☞ You win a prize in a competition that you are never entered.

    ☞ someone on a forum like this is eager to help you, but only if you download an application of your choice.

    ☞ a 'FREE WI - FI!' network presents itself in a public place like an airport, but is not provided by management.

    ☞ Online everything that you expect to pay is 'free '.

    Unexpected events

    ☞ a file is downloaded automatically when you visit a web page, without any further action on your part. delete any file without opening it.

    ☞ You open what you think, it is a document and you receive an alert that it is "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you must always remove any download that is not what you expected it to be.

    ☞ An application does something you don't expect, such as permission to access your contacts, your location or the Internet without obvious reason.

    ☞ Software is attached to the email you na not ask, even if it is (or seems to come) by a person of trust.

    I do not leave the safe harbour that once will necessarily lead to disasters, but make a habit of it will weaken your defenses against malicious software attacks. None of the above scenarios must, at the very least, make you uncomfortable.

    6. Java on the Web (not to be confused with JavaScript, to which it is not related, despite the similarity of names) is a weak point in the security of any system. Java is, among other things, a platform to run complex applications in a web page. That was always a bad idea, and Java developers have proved unable to apply it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been a type virus Windows affecting OS X. simply load a page with Java malicious content could be harmful.

    Fortunately, client-side Java on the Web is outdated and largely disappeared. Only a few outdated sites still use it. Try to accelerate the process of extinction by avoiding these sites, if you have a choice. Forget to play games or other uses not Java essentials.

    Java is not included in OS X 10.7 and later versions. Discrete Java installers are distributed by Apple and Oracle (the developer of Java). Do not use one unless you need it. Most of the people don't. If Java is installed, turn it off- not the JavaScript in your browser.

    Whatever the version, experience has shown that Java on the Web is not reliable. If you must use a Java applet for a job on a specific site, Enable Java only for the site in Safari. Never activate Java for a public Web site that carries the third-party advertising. Use only on websites that are well known, protected by login and secure without ads. In Safari 6 or later, you will see a padlock icon in the address bar when you visit a secure site.

    7. another perennial weak point is Adobe Flash Player. Like Java, Flash is declining well deserved, but content Flash is still much more widespread than the contents of Java on the Web. If you choose to install the Flash plugin, you can reduce your exposure to Flash by checking the box marked

    Stop the plug-ins to save energy

    in the Advanced tab of the preferences of Safari window, if not already done. Consider also installing an extension Safari as "ClickToFlash" or "ClickToPlugin." They will prevent the Flash content automatically load and are initially not Flash video is substituted for Flash on YouTube and perhaps a few other sites. I tested the extensions and found them safe, but you should always do your own research before you decide whether to trust any third party software.

    8. remain within the sphere of security, and you will be as safe from malware you can be practically. The rest of this comment is what you must do to protect you.

    Never install any AV or products 'Internet security' for Mac if you have a choice, because they are all worse than useless. If you are required by a (wrong) institutional policy to install some kind of AV, choose one of the free apps in the Mac App Store, nothing else.

    Why you should not use products AV?

    ☞ To recognize malware, software depends on a database of known threats, which is always at least one day to day. This technique is a proven failure, as a major supplier of AV software has admitted. Most of the attacks are "zero-day" - that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry comes to realize that the traditional AV software is worthless.

    ☞ design is based generally on the nonexistent threat that malware can be injected at any time, anywhere in the file system. Malware is downloaded from the network; He is not of the blue leaves. To meet this threat does not exist, a commercial AV software changes or low level functions of the operating system, which is a waste of resources and a frequent cause of instability, bugs, poor performance, and duplicates.

    ☞ changing the operating system, the software can also create weaknessesthat could be exploited by malicious attackers.

    ☞ especially, a false sense of security is dangerous. This fact relates to all AV software it will never be any changes elsewhere.

    9. a free AV product from the Mac App Store is safe as long as you don't let it delete or move files. Ignore all the warnings that it can give you on "heuristic" or "phishing." These warnings, if they are not simply false positives, see the text of e-mail messages or updates cached web pages, not malware.

    An AV application is not necessary and may not be invoked for protection against malware for OS X. It is useful, or even not at all, only to detect malware Windows and even for this use it is not really effective, because the new Windows malware makes its appearance much faster than OS X malware.

    Windows malware cannot hurt you directly (unless, of course, you use Windows). Just do not pass to someone else. A malicious link in the e-mail is usually easy to recognize by the name alone. A concrete example:

         London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe

    You don't need software to tell you it's a horse Trojan for Windows. Software may be able to tell what trojan is, but who cares? In practice, there is no reason to use a recognition software, unless an organizational strategy requires. Malware Windows is so widespread that you must assume that it is in each attachment until proof to the contrary. Nevertheless, a free AV product on the App Store can serve a purpose if it fulfills a misinformed network administrator that says you must have some sort of application AV. An App Store product will not change the operating system; in fact, it does nothing, unless you run it.

    If you are just curious to know if a file is considered malware by the AV engines, you can download it from the "VirusTotal" site, where it will be tested against most of them without charge. A negative result is evidence of what whether, for the reasons given above. I do not recommend doing this with a file that may contain private information.

    10. There seems to be a common belief that the firewall Application acts as a barrier to infection, or prevents operation of malware. He does not. It blocks incoming connections to some network services you are using, such as file sharing. It is disabled by default, and you should leave it like that if you're behind a router on a private home or office network. Activate only when you are on an untrusted network, for example a public Wi - Fi hotspot, where you do not want to provide services. Disable services that you don't use in the sharing preferences window. All are disabled by default.

    11. as a Mac user, you don't have to live in fear that your computer may be infected whenever you install the software, read emails, or visit a web page. But nor can you assume that you will always be free from exploitation, no matter what you do. Internet browsing, it's like walking the streets of a big city. It can be as safe or as dangerous that you choose to do so. The greatest harm done by software AV is precisely its selling point: it makes people feel safe. They can then feel sufficiently safe to take risks, which the software does not protect them. Nothing can reduce the need for safe computing practices.

  • my Apple Watch does not record the data of my activity on my iPhone. The application of the activity is implemented on my watch and twinned with phone and not yet to record data.

    my Apple Watch does not record the data of my activity on my iPhone. The application of the activity is implemented on my watch and twinned with phone and not yet to record data.

    HI - try the following steps:

    On your iPhone close application of activity and also, if it runs in the background, the health app (you can close open apps, including the app shows):

    -Double-click the Home button, and then drag upward on each of the app previews to close.

    It can help to restart your iPhone and your watch. Turn on both devices off the power together first, and then restart your iPhone before restarting your watch:

    -To switch off your watch: press and hold the button side until you see the cursor off the power; slide it to turn off;

    -To switch on: press and hold the side button until you see the Apple logo.

    If this does not resolve the problem, try next disconnect and rematching of your watch:

    -L'app shows on your iPhone shows backups automatically, including a new when the unpairing via the application.

    -Choose to restore the watch (backup restore) when provided the opportunity during the whole.

    -Most of the data and settings will be restored, with a few exceptions (for example cards Pay Apple, access code).

    - Pairing your Apple Watch and Support Apple - iPhone

    - Set up your Apple Watch - Apple Support

  • Implement the 'New tab' feature in the tabbed pane

    Hello

    I wanted to design feature 'New tab' in my application of cascades in same way that we found in the browser native avaialbe on system Z10.

    On the left sidebar, it states:

    Bookmarks

    History

    New tab

    Tab 1                    |--------------------------

    Tab 2                    |

    Tab 2                    |

    ........

    Tab n                    |-----------------------------

    I know that TabbedPane provides functions like add, insert, delete can be used to manage the tabs in the tabbed pane. But they show cahnges in the level list root of the tabs.

    1 how we can implement similar user interface design?

    1.1 how to add newly created list tab under the menu tab "new tab"?

    1.2 How to provide on each newly created tab close button?

    Could someone please guide me to make this UI?

    Thanks in advance.

    He's right, because while the browser uses WebWorks, you use stunts where the TabbedPane is not customizable in this way (at least not close buttons).

    You can certainly make a tab that says 'New tab', however, and have in fact insert a new tab and then switch to him. How to do this should be pretty obvious once you have read the documentation of the API TabbedPane.

  • Quadro k4000 vs GTX 760. only one for AE

    I have 2 computers and planning to mix them together as possible. I built a PC with quadro k4000 last year because I graduated as a 3D animator, I intend to work as a facilitator and I also have another PC with GTX 760. and now, I am currently working as a video editor. So here are my questions:

    -k4000 and gtx 760 which we could do better in AE and Pr?

    -J' read some articles said: "quadro and gtx can consolidate upward in a PC. is it really possible? because some people said yes and some people said no and some people said yes but do not work together blah blah. I really want to know about it, because now I have these 2 GPU. and if YES. can you show me how do?

    There are two my PC specs:

    Processor: core i7 3820 3.66 hz

    RAM: 16 GB

    SSD 128 gb

    HARD DRIVE 3 TB

    Motherboard: Asus P9X79 PRO

    VGA: asus GTX 760

    Another is:

    Core i7 - 3930 K 3.20 GHz processor

    RAM: 32GB

    SSD: the 256 gb

    HARD drive: 3 TB x 2

    Motherboard: ASRock X 79 Extreme6

    VGA: quadro k4000

    Can someone help me build these 2 PC in only 1 PC possible?

    Yes, they will work together if you install the right driver. Use the Quadro for output and map of 760GTX like the GPU acceleration.

    Eric

    ADK

Maybe you are looking for