myamid
Sep 12, 07:14 PM
From one enthusiast to another, we agree to disagree on your points b through e -- As far as point A, I think you should rewatch what Jobs said today. And view the apple press release on the device.
Fair enough :)
Fair enough :)
Peterkro
Mar 13, 04:14 PM
really ?
i live in a country which isn't at war .. and hasn't since quite a few years.. and by years i mean decades
and the nuclear power plant we built was stopped before getting turned on by a popular vote (since then we have a constitutional law forbidding to build nuclear power plants...)
wow look at how i am suffering from the terrible consequences
I grew up in a country where even a right wing government won't entertain the idea of nuclear power,where one of it's major allies (the U.S.) are not allowed to bring naval vessels into territorial waters because they will not reveal if nuclear weapons/propulsion are involved.Which has just suffered a major earthquake and as far as I know is the only country that is a nuclear free zone.To New Zealanders this policy is totally sacrosanct.Guess what they are doing fine.
(by the way 70% of electricity production is from renewables)
i live in a country which isn't at war .. and hasn't since quite a few years.. and by years i mean decades
and the nuclear power plant we built was stopped before getting turned on by a popular vote (since then we have a constitutional law forbidding to build nuclear power plants...)
wow look at how i am suffering from the terrible consequences
I grew up in a country where even a right wing government won't entertain the idea of nuclear power,where one of it's major allies (the U.S.) are not allowed to bring naval vessels into territorial waters because they will not reveal if nuclear weapons/propulsion are involved.Which has just suffered a major earthquake and as far as I know is the only country that is a nuclear free zone.To New Zealanders this policy is totally sacrosanct.Guess what they are doing fine.
(by the way 70% of electricity production is from renewables)
GGJstudios
May 2, 01:00 PM
It's not "helpful." I don't need to be "reminded" the file I downloaded a second ago was downloaded from the internet. I'm sure others find it useful, but for me, it's pointless and annoying..
While you may not need a reminder for an app that you downloaded a second ago, what about an app that might get downloaded without the user's knowledge, perhaps with the name of a well-known app they currently use? The presence of this reminder would alert them to the fact that they're about to launch something other than what they expected. Besides, how often are you downloading and first-launching apps? It's not enough of an annoyance to worry about and the benefit outweighs the inconvenience for most people.
While you may not need a reminder for an app that you downloaded a second ago, what about an app that might get downloaded without the user's knowledge, perhaps with the name of a well-known app they currently use? The presence of this reminder would alert them to the fact that they're about to launch something other than what they expected. Besides, how often are you downloading and first-launching apps? It's not enough of an annoyance to worry about and the benefit outweighs the inconvenience for most people.
kdarling
Oct 7, 05:24 PM
For those who like the iPhone, this works in our favor. With iPhone OS, there's only one hardware platform developers have to deal with. All they need to do for QC is make sure their apps work on the latest OS rev.
The iPhone platform has some significant variations. Location precision (lack of GPS), microphone or speaker existence on the touch, existence of MMS, CPU speed between models, amount of RAM (a potentially big problem for game makers).
So software that runs fine on one phone won't run on others and might even brick them because of different hw configurations. It happened with Windows Mobile.
Really. Do you have an example of an app bricking a WM phone?
It's rare that an app will make your OS unstable, brick your phone, and make you restore factory settings just to get it running again.
Sometimes it just takes getting an iPhone OS update to get into that situation.
Far as jailbreaking, to put it in perspective, look how bad Verizon cripples ALL their phones on release.
Verizon doesn't cripple their smartphones. Even their GPS is unlocked now.
Yea I have to hack the iphone to install maybe 5 choice apps I can't get otherwise,
So you admit that it's hobbled in its stock form? ATT / Verizon / Sprint don't block any apps you want to use on their smartphones. Or themes. Or anything else.
but at least my phone didn't have its GPS and bluetooth disabled, RAM cut in half, wi-fi disabled so I'd have to use 3g even though I'm at home, etc
The iPhone's Bluetooth was crippled to begin with... and still is. The original iPhone will always lack GPS and 3G.
I would just stick with the claim that Apple's total control over their platform can be helpful.
The iPhone platform has some significant variations. Location precision (lack of GPS), microphone or speaker existence on the touch, existence of MMS, CPU speed between models, amount of RAM (a potentially big problem for game makers).
So software that runs fine on one phone won't run on others and might even brick them because of different hw configurations. It happened with Windows Mobile.
Really. Do you have an example of an app bricking a WM phone?
It's rare that an app will make your OS unstable, brick your phone, and make you restore factory settings just to get it running again.
Sometimes it just takes getting an iPhone OS update to get into that situation.
Far as jailbreaking, to put it in perspective, look how bad Verizon cripples ALL their phones on release.
Verizon doesn't cripple their smartphones. Even their GPS is unlocked now.
Yea I have to hack the iphone to install maybe 5 choice apps I can't get otherwise,
So you admit that it's hobbled in its stock form? ATT / Verizon / Sprint don't block any apps you want to use on their smartphones. Or themes. Or anything else.
but at least my phone didn't have its GPS and bluetooth disabled, RAM cut in half, wi-fi disabled so I'd have to use 3g even though I'm at home, etc
The iPhone's Bluetooth was crippled to begin with... and still is. The original iPhone will always lack GPS and 3G.
I would just stick with the claim that Apple's total control over their platform can be helpful.
Ravich
May 3, 08:40 PM
All this over someone not even intelligent enough to title their "manual installation required" malware 'security update for Snow Leopard'
I like how the solution is basically "delete it"
I like how the solution is basically "delete it"
toddybody
Apr 15, 10:33 AM
You would be one of them. It stings when the mirror is held up in front of you, doesn't it? I was like you at one time too, and I know where you are right now. At some point, you will come to understand that there is a difference between people who are simply trying to be themselves (us) and people who are trying to keep us from being ourselves (social conservatives). One deserves respect, one does not.
Dude! Youre trying to advocate for understanding and openness...at the same time LABELING "Social Conservatives" as the enemy? Totally lame, sorry but that hurts your credibility. Im sure theres plently of these horrid "social conservatives" that would and do lay down their lives to serve you and the freedoms you enjoy. But yeah, I suppose they dont deserve any respect. :mad:
Dude! Youre trying to advocate for understanding and openness...at the same time LABELING "Social Conservatives" as the enemy? Totally lame, sorry but that hurts your credibility. Im sure theres plently of these horrid "social conservatives" that would and do lay down their lives to serve you and the freedoms you enjoy. But yeah, I suppose they dont deserve any respect. :mad:
ezekielrage_99
Jul 11, 11:27 PM
I wonder I they put a Xeon in a Mac will it come with Intergrated graphics :confused: ;)
I sure hope Apple don't put intergrated graphics in the Mac Pros as ANY sort of an option......
I sure hope Apple don't put intergrated graphics in the Mac Pros as ANY sort of an option......
emotion
Sep 21, 06:05 AM
I have no plans on purchasing this, unless its magically has DVR ability
Apple's point is that your computer more or less has that capability (ok with an Elgato dongle), and in any case they don't want to follow that business model. I guess you're not the target audience.
Only time will tell if anyone buys this.
Apple's point is that your computer more or less has that capability (ok with an Elgato dongle), and in any case they don't want to follow that business model. I guess you're not the target audience.
Only time will tell if anyone buys this.
sblasl
Nov 2, 08:25 PM
Sorry, still trying to get up to speed on all of this intel stuff...:o
hunkaburningluv
Apr 9, 11:21 AM
That's where things are going.
I read that a new XBOX might not be released for another 5 years and that the PlayStation is on a 10 year schedule. If that's actually the schedule, then the consoles could face serious competition from iOS and Android games.
The graphics difference from the first iPhone to the iPhone 4 or iPad 2 is a great comparison. That's just four years. What if that advancement continues for the next four years � which is very likely � the graphics could be amazing on iOS devices.
There's a fair bit of misconception in the 10 year lifecycle of the PS3 - the PS2 had a ten year lifecycle too, but the PS3 was released well into that 10 years. The 10 year thing is taken out of context. There will most likely be a ps4 in a couple of years (well, if Japan recovers from the current happenings). I think the same thing can apply to the 360 - there's been a lot of talk about some thing similar - I do think that we won't see anything this year due to the runaway success of Kinect. We'll most likely get an announcement next year and a release the year after. I've a feeling that we'll see something different in the way compatibility works as there was talk of forward "compatible games" many have taken their own thoughts on what that has meant though.
I read that a new XBOX might not be released for another 5 years and that the PlayStation is on a 10 year schedule. If that's actually the schedule, then the consoles could face serious competition from iOS and Android games.
The graphics difference from the first iPhone to the iPhone 4 or iPad 2 is a great comparison. That's just four years. What if that advancement continues for the next four years � which is very likely � the graphics could be amazing on iOS devices.
There's a fair bit of misconception in the 10 year lifecycle of the PS3 - the PS2 had a ten year lifecycle too, but the PS3 was released well into that 10 years. The 10 year thing is taken out of context. There will most likely be a ps4 in a couple of years (well, if Japan recovers from the current happenings). I think the same thing can apply to the 360 - there's been a lot of talk about some thing similar - I do think that we won't see anything this year due to the runaway success of Kinect. We'll most likely get an announcement next year and a release the year after. I've a feeling that we'll see something different in the way compatibility works as there was talk of forward "compatible games" many have taken their own thoughts on what that has meant though.
jettredmont
May 3, 03:44 PM
Of course, I don't know of any Linux distribution that doesn't require root to install system wide software either. Kind of negates your point there...
I wasn't specific enough there. I was talking about how "Unix security" has been applied to the overall OS X permissions system, not just "Unix security" in the abstract. I'll cede the point that this does mean that "Unix security" in the abstract is no better than NT security, as I can not refute the claim that Linux distributions share the same problem (the need to run as "root" to do day-to-day computer administration). I would point out, though, that unless things have changed significantly, most window managers for Linux et al refuse to run as root, so you can't end up with a full-fledged graphical environment running as root.
You could do the same as far back as Windows NT 3.1 in 1993. The fact that most software vendors wrote their applications for the non-secure DOS based versions of Windows is moot, that is not a problem of the OS's security model, it is a problem of the Application. This is not "Unix security" being better, it's "Software vendors for Windows" being dumber.
Yes and no. You are looking at "Unix security" as a set of controls. I'm looking at it as a pragmatic system. As a system, Apple's OS X model allowed users to run as standard users and non-root Administrators while XP's model made non-Administrator access incredibly cumbersome.
You can blame that on Windows developers just being dumber, or you can blame it on Microsoft not sufficiently cracking the whip, or you can blame it on Microsoft not making the "right way" easy enough. Wherever the blame goes, the practical effect is that Windows users tended to run as Administrator and locking them down to Standard user accounts was a slap in the face and serious drain on productivity.
Actually, the Administrator account (much less a standard user in the Administrators group) is not a root level account at all.
Notice how a root account on Unix can do everything, just by virtue of its 0 uid. It can write/delete/read files from filesystems it does not even have permissions on. It can kill any system process, no matter the owner.
Administrator on Windows NT is far more limited. Don't ever break your ACLs or don't try to kill processes owned by "System". SysInternals provided tools that let you do it, but Microsoft did not.
Interesting. I do remember being able to do some pretty damaging things with Administrator access in Windows XP such as replacing shared DLLs, formatting the hard drive, replacing any executable in c:\windows, etc, which OS X would not let me do without typing in a password (GUI) or sudo'ing to root (command line).
But, I stand corrected. NT "Administrator" is not equivalent to "root" on Unix. But it's a whole lot more "trusted" (and hence all apps it runs are a lot more trusted) than the equivalent OS X "Administrator" account.
UAC is simply a gui front-end to the runas command. Heck, shift-right-click already had the "Run As" option. It's a glorified sudo. It uses RDP (since Vista, user sessions are really local RDP sessions) to prevent being able to "fake it", by showing up on the "console" session while the user's display resides on a RDP session.
Again, the components are all there, but while the pragmatic effect was that a user needed to right-click, select "Run as Administrator", then type in their password to run something ... well, that wasn't going to happen. Hence, users tended to have Administrator access accounts.
There, you did it, you made me go on a defensive rant for Microsoft. I hate you now.
Sorry! I know; it burns!
...
Why bother, you're not "getting it". The only reason the user is aware of MACDefender is because it runs a GUI based installer. If the executable had had 0 GUI code and just run stuff in the background, you would have never known until you couldn't find your files or some chinese guy was buying goods with your CC info, fished right out of your "Bank stuff.xls" file.
Well, unless you have more information on this than I do, I'm assuming that the .zip file was unarchived (into a sub-folder of ~/Downloads), a .dmg file with an "Internet Enabled" flag was found inside, then the user was prompted by the OS if they wanted to run this installer they downloaded, then the installer came up (keeping in mind that "installer" is a package structure potentially with some scripts, not a free-form executable, and that the only reason it came up was that the 'installer' app the OS has opened it up and recognized it). I believe the Installer also asks the user permission before running any of the preflight scripts.
Unless there is a bug here exposing a security hole, this could not be done without multiple user interactions. The "installer" only ran because it was a set of instructions for the built-in installer. The disk image was only opened because it was in the form Safari recognizes as an auto-open disk image. The first time "arbitrary code" could be run would be in the preflight script of the installer.
I wasn't specific enough there. I was talking about how "Unix security" has been applied to the overall OS X permissions system, not just "Unix security" in the abstract. I'll cede the point that this does mean that "Unix security" in the abstract is no better than NT security, as I can not refute the claim that Linux distributions share the same problem (the need to run as "root" to do day-to-day computer administration). I would point out, though, that unless things have changed significantly, most window managers for Linux et al refuse to run as root, so you can't end up with a full-fledged graphical environment running as root.
You could do the same as far back as Windows NT 3.1 in 1993. The fact that most software vendors wrote their applications for the non-secure DOS based versions of Windows is moot, that is not a problem of the OS's security model, it is a problem of the Application. This is not "Unix security" being better, it's "Software vendors for Windows" being dumber.
Yes and no. You are looking at "Unix security" as a set of controls. I'm looking at it as a pragmatic system. As a system, Apple's OS X model allowed users to run as standard users and non-root Administrators while XP's model made non-Administrator access incredibly cumbersome.
You can blame that on Windows developers just being dumber, or you can blame it on Microsoft not sufficiently cracking the whip, or you can blame it on Microsoft not making the "right way" easy enough. Wherever the blame goes, the practical effect is that Windows users tended to run as Administrator and locking them down to Standard user accounts was a slap in the face and serious drain on productivity.
Actually, the Administrator account (much less a standard user in the Administrators group) is not a root level account at all.
Notice how a root account on Unix can do everything, just by virtue of its 0 uid. It can write/delete/read files from filesystems it does not even have permissions on. It can kill any system process, no matter the owner.
Administrator on Windows NT is far more limited. Don't ever break your ACLs or don't try to kill processes owned by "System". SysInternals provided tools that let you do it, but Microsoft did not.
Interesting. I do remember being able to do some pretty damaging things with Administrator access in Windows XP such as replacing shared DLLs, formatting the hard drive, replacing any executable in c:\windows, etc, which OS X would not let me do without typing in a password (GUI) or sudo'ing to root (command line).
But, I stand corrected. NT "Administrator" is not equivalent to "root" on Unix. But it's a whole lot more "trusted" (and hence all apps it runs are a lot more trusted) than the equivalent OS X "Administrator" account.
UAC is simply a gui front-end to the runas command. Heck, shift-right-click already had the "Run As" option. It's a glorified sudo. It uses RDP (since Vista, user sessions are really local RDP sessions) to prevent being able to "fake it", by showing up on the "console" session while the user's display resides on a RDP session.
Again, the components are all there, but while the pragmatic effect was that a user needed to right-click, select "Run as Administrator", then type in their password to run something ... well, that wasn't going to happen. Hence, users tended to have Administrator access accounts.
There, you did it, you made me go on a defensive rant for Microsoft. I hate you now.
Sorry! I know; it burns!
...
Why bother, you're not "getting it". The only reason the user is aware of MACDefender is because it runs a GUI based installer. If the executable had had 0 GUI code and just run stuff in the background, you would have never known until you couldn't find your files or some chinese guy was buying goods with your CC info, fished right out of your "Bank stuff.xls" file.
Well, unless you have more information on this than I do, I'm assuming that the .zip file was unarchived (into a sub-folder of ~/Downloads), a .dmg file with an "Internet Enabled" flag was found inside, then the user was prompted by the OS if they wanted to run this installer they downloaded, then the installer came up (keeping in mind that "installer" is a package structure potentially with some scripts, not a free-form executable, and that the only reason it came up was that the 'installer' app the OS has opened it up and recognized it). I believe the Installer also asks the user permission before running any of the preflight scripts.
Unless there is a bug here exposing a security hole, this could not be done without multiple user interactions. The "installer" only ran because it was a set of instructions for the built-in installer. The disk image was only opened because it was in the form Safari recognizes as an auto-open disk image. The first time "arbitrary code" could be run would be in the preflight script of the installer.
Beric
Mar 12, 03:36 AM
What the hell? Why doesn't the wind blow it into China instead??? :D
Anyways, that seems kinda extreme. That looks worse than a nuclear missle strike.
Again, it's a worse-case scenario. Still, get something in the gulf stream, and it's going everywhere.
Anyways, that seems kinda extreme. That looks worse than a nuclear missle strike.
Again, it's a worse-case scenario. Still, get something in the gulf stream, and it's going everywhere.
Huntn
Mar 13, 07:30 PM
We don't all have scrubland... or reliable sunshine! Can't see solar power taking off in the UK, I'm afraid. The same goes for most of Northern Europe.
I agree with you, it's not an option for some countries, but there are lots of deserts on this planet, apparently some by our own making. :(
I agree with you, it's not an option for some countries, but there are lots of deserts on this planet, apparently some by our own making. :(
Eidorian
Jul 13, 07:17 AM
Like I said, my laptop has a hotter CPU in it. I've yet to hear a good argument as to why a Conroe is too hot to put in an iMac when they had G5's in them not so long ago. If a Macbook can handle 35W then the much much bigger and thicker iMac can handle 65W.
The below lists power consumed by the part, they are not TDP numbers (only part of the power consumed by a chip leaves the chip as heat, heat is what you have to dissipate and is what TDP attempts define).
PPC 970fx power optimized part (@ 2GHz)
40W average, 45-50 W max, 23 W throttle back (half frequency)
PPC 970fx standard part (@ 2GHz)
48W average, 55-60 W max, 29 W throttle back (half frequency)
To me this puts the PPC 970fx below the TDP of a Conroe... I would say the TDP for the PPC 970fx (@2Ghz) is around 40 W (if not lower).Conroe might be possible for the iMac. But why redesign the motherboard when you can just DROP IN Merom where Yonah once was?
The below lists power consumed by the part, they are not TDP numbers (only part of the power consumed by a chip leaves the chip as heat, heat is what you have to dissipate and is what TDP attempts define).
PPC 970fx power optimized part (@ 2GHz)
40W average, 45-50 W max, 23 W throttle back (half frequency)
PPC 970fx standard part (@ 2GHz)
48W average, 55-60 W max, 29 W throttle back (half frequency)
To me this puts the PPC 970fx below the TDP of a Conroe... I would say the TDP for the PPC 970fx (@2Ghz) is around 40 W (if not lower).Conroe might be possible for the iMac. But why redesign the motherboard when you can just DROP IN Merom where Yonah once was?
MacinDoc
Aug 29, 11:15 AM
The reason Apple "performs poorly" on recycling compared to Dell is that Apple computers, on average, remain in use approximately twice as long as Dell computers. Instead of being recycled, they are still being used. Apple does, after all, have a free recycling program. And there is no way that making computers that are replaced more frequently is more environmentally friendly.
It also seems that most of Greenpeace's complaints focus around Apple's refusal to provide Greenpeace with information on what materials are used in manufacturing its products.
Greenpeace does not have an exactly spotless record when it comes to ethics. Makes you wonder if it gets its computers from Dell at a discount.
It also seems that most of Greenpeace's complaints focus around Apple's refusal to provide Greenpeace with information on what materials are used in manufacturing its products.
Greenpeace does not have an exactly spotless record when it comes to ethics. Makes you wonder if it gets its computers from Dell at a discount.
Huntn
Apr 25, 12:45 PM
Comma added, because my brain was starting to hurt. ;)
And I agree, but then 'power' is lost, and that just won't do, now will it? :rolleyes:
No not really especially when power is often held by those placing themselves in the position of interpreting what God thinks and wants...
I do think it was a bad call when God decided that strapping on explosives and blowing up the local market and it's customers was appropriate. ;)
And I agree, but then 'power' is lost, and that just won't do, now will it? :rolleyes:
No not really especially when power is often held by those placing themselves in the position of interpreting what God thinks and wants...
I do think it was a bad call when God decided that strapping on explosives and blowing up the local market and it's customers was appropriate. ;)
EricNau
May 8, 05:08 PM
I can honestly and without exaggeration say that over half of the calls placed with my iPhone drop, and it's been getting progressively worse in both cities where I use my phone. It's practically unusable.
My phone so consistently cycles between full bars and no service that Apple replaced my phone under warranty, to no avail.
I love my iPhone, but AT&T needs to go.
My phone so consistently cycles between full bars and no service that Apple replaced my phone under warranty, to no avail.
I love my iPhone, but AT&T needs to go.
sammachin
Mar 18, 05:00 AM
Actually the way they are most likely doing this and the way most carriers do it is using some deep packet inspection kit or maybe even a transparent proxy.
They can look for browsing traffic on port 80 then simply pick out any users where the user agent string is that of a computer OS so Windows|Mac|Linux.
2 options to get around it are: either change your browsers UA to that of the iPhone although this will often give you mobile sites or better still send everything down a VPN, that way its encrypted and they can;t see what your doing just how many bytes :-) High VPN usage shouldn't be odd either as the iPhone has a VPN client so you could feasibly be using that.
(Used to work in a carrier designing these systems so I should know!)
They can look for browsing traffic on port 80 then simply pick out any users where the user agent string is that of a computer OS so Windows|Mac|Linux.
2 options to get around it are: either change your browsers UA to that of the iPhone although this will often give you mobile sites or better still send everything down a VPN, that way its encrypted and they can;t see what your doing just how many bytes :-) High VPN usage shouldn't be odd either as the iPhone has a VPN client so you could feasibly be using that.
(Used to work in a carrier designing these systems so I should know!)
Liquorpuki
Mar 15, 11:38 PM
I did a little reading and now am a one minute expert... :p
I've read these reactors did auto shut down when the earthquake hit. The problem is that the rods create tremendous persistent heat even after a shutdown, and it is the lack of cooling water that is causing the problem.
Could it be considered a myth that any nuclear reactor can be expected to automatically safely shutdown when power to all safety systems are lost no matter how it is designed?
And who was saying this could not be like Chernobyl??
If you want to get technical, the lack of cooling water was caused by the inability to activate the backup generators. The switchgear for the backup generators was flooded by the tsunami. I could come up with a ton of engineering design decisions that could've prevented this and none of them have to do with the reactor or nuclear technology
- Not putting critical switchgear in a basement that could get flooded
- Pre-installing pumps in the basement to remove the water in the case of a flood
- Having a redundant set of switchgear/BU generators with an additional switchover scheme in the event the primary switchgear malfunctions
- Having an additional distribution panel or tap point so I could use portable generators to power the cooling system
- Building a taller tsunami barrier
- Putting all critical components in a secure building, not just the reactor.
Even though the radiation leak is devastating because, well it's radiation, it's the electrical and structural engineers who failed here, not the nuclear engineers. Personally I think there needs be a design standards revision when it comes to nuclear stations, which is what I'm hoping other countries are referring to when they say they're watching and taking notes.
I've read these reactors did auto shut down when the earthquake hit. The problem is that the rods create tremendous persistent heat even after a shutdown, and it is the lack of cooling water that is causing the problem.
Could it be considered a myth that any nuclear reactor can be expected to automatically safely shutdown when power to all safety systems are lost no matter how it is designed?
And who was saying this could not be like Chernobyl??
If you want to get technical, the lack of cooling water was caused by the inability to activate the backup generators. The switchgear for the backup generators was flooded by the tsunami. I could come up with a ton of engineering design decisions that could've prevented this and none of them have to do with the reactor or nuclear technology
- Not putting critical switchgear in a basement that could get flooded
- Pre-installing pumps in the basement to remove the water in the case of a flood
- Having a redundant set of switchgear/BU generators with an additional switchover scheme in the event the primary switchgear malfunctions
- Having an additional distribution panel or tap point so I could use portable generators to power the cooling system
- Building a taller tsunami barrier
- Putting all critical components in a secure building, not just the reactor.
Even though the radiation leak is devastating because, well it's radiation, it's the electrical and structural engineers who failed here, not the nuclear engineers. Personally I think there needs be a design standards revision when it comes to nuclear stations, which is what I'm hoping other countries are referring to when they say they're watching and taking notes.
alust2013
Apr 5, 11:23 PM
What if I just want my top 10 favorites? In Windows I just drag the icon (of whatever I want) to the Start button, then drop it into the list of my favorites (I'm not sure of the actual term for this). Can this be done on a Mac?
Since I open the same 10 or 12 programs or folders or files many times throughout the day, every day, this is pretty important to me. It would absolutely mess up my work flow to lose this feature.
The dock is wonderful for that, and it can be auto hidden, somewhat like the taskbar in windows, but it works more naturally. You just mouse down, click your app and go. Expose and spaces are also brilliant features of the OS, that don't have exact equivalents in windows. I do have to say though, that win7 is actually pretty darn nice. I have it as a dual boot on my computer for games and miscellaneous stuff, and I could use it as my primary OS if I needed/wanted to. I'd sure miss my trackpad though...I haven't found a windows laptop that can touch it.
As for above post, the forward delete can be done via fn-delete, which comes in handy. I have the wired version so I do happen to have the dedicated key.
Since I open the same 10 or 12 programs or folders or files many times throughout the day, every day, this is pretty important to me. It would absolutely mess up my work flow to lose this feature.
The dock is wonderful for that, and it can be auto hidden, somewhat like the taskbar in windows, but it works more naturally. You just mouse down, click your app and go. Expose and spaces are also brilliant features of the OS, that don't have exact equivalents in windows. I do have to say though, that win7 is actually pretty darn nice. I have it as a dual boot on my computer for games and miscellaneous stuff, and I could use it as my primary OS if I needed/wanted to. I'd sure miss my trackpad though...I haven't found a windows laptop that can touch it.
As for above post, the forward delete can be done via fn-delete, which comes in handy. I have the wired version so I do happen to have the dedicated key.
cmcconkey
Jul 12, 12:15 PM
Smallish mid-tower case
Intel Core 2 Duo @ 2.8Ghz or better
1GB RAM
1-PCIe x16 Slot
1-Standard PCI Slot
6-USB 2.0 ports (One in front)
1- Firewire 800 port (in front)
Dual Layer DVD
Onboard 10/100/1000 (I don't care if its wireless, but a wireless opition would be nice but not necessary)
Graphics Card should be x1600XT or better with 256mb RAM
I want it at or less than $1199.00
Now gimmie
Also would have to have a standard Firewire port. Wireless and Bluetooth standard would be just awesome, considering it is quite cheap now. At that price point would be VERY nice. But don't see it happening. :(
Christopher
Intel Core 2 Duo @ 2.8Ghz or better
1GB RAM
1-PCIe x16 Slot
1-Standard PCI Slot
6-USB 2.0 ports (One in front)
1- Firewire 800 port (in front)
Dual Layer DVD
Onboard 10/100/1000 (I don't care if its wireless, but a wireless opition would be nice but not necessary)
Graphics Card should be x1600XT or better with 256mb RAM
I want it at or less than $1199.00
Now gimmie
Also would have to have a standard Firewire port. Wireless and Bluetooth standard would be just awesome, considering it is quite cheap now. At that price point would be VERY nice. But don't see it happening. :(
Christopher
munkery
May 2, 06:23 PM
Vulnerabilities are found in everything. It's not like sudo, RBAC or any other Unix scheme that's similar to Windows' UAC/RunAs has been vulnerability free all these years. This is besides the point that UAC is not somehow inferior. It's just an implementation of limited privilege escalation, same as you find on Unix systems. "Unix security" is not being any better here.
Really,
Here is a list of privilege escalation (UAC bypass) vulnerabilities just related to Stuxnet (win32k.sys) in Windows in 2011:
http://cve.mitre.org/cgi-bin/cvekey....in32k.sys+2011
Here is a list of all of the privilege escalation vulnerabilities in Mac OS X in 2011:
http://cve.mitre.org/cgi-bin/cvekey....rivileges+2011
BTW, the system call for that local in OS X was no longer needed so it was removed from OS X. It was only used in relation to 32 bit processes.
Have I claimed such a beasts exists ? No. Why should I then be made to provide an example of it ?
Why are you going on and on about something that is not a common threat in the wild?
Really,
Here is a list of privilege escalation (UAC bypass) vulnerabilities just related to Stuxnet (win32k.sys) in Windows in 2011:
http://cve.mitre.org/cgi-bin/cvekey....in32k.sys+2011
Here is a list of all of the privilege escalation vulnerabilities in Mac OS X in 2011:
http://cve.mitre.org/cgi-bin/cvekey....rivileges+2011
BTW, the system call for that local in OS X was no longer needed so it was removed from OS X. It was only used in relation to 32 bit processes.
Have I claimed such a beasts exists ? No. Why should I then be made to provide an example of it ?
Why are you going on and on about something that is not a common threat in the wild?
superleccy
Sep 20, 05:55 AM
I know of at least one company (http://www.itv.com/) in the UK who won't be too happy if they keep that name.
<UK>Indeed. EyeTV and ITV was confusing enough, but now we have iTV too. And I don't think I'll be watching Coronation street on iTV if Apple are going to charge �1.99 an episode. Think again Steve.</UK>
<Everyone Else>ITV is the name of the UK's biggest terrestrial commercial TV network</Everyone Else>
<UK>Indeed. EyeTV and ITV was confusing enough, but now we have iTV too. And I don't think I'll be watching Coronation street on iTV if Apple are going to charge �1.99 an episode. Think again Steve.</UK>
<Everyone Else>ITV is the name of the UK's biggest terrestrial commercial TV network</Everyone Else>
AppliedVisual
Oct 30, 11:49 PM
I already have a bunch of Adaptec eSATA/USB2 SATA enclosures that say they only work as USB2 on Macs. But I wonder if they won't work on any eSATA PCIe card we can put into the Mac Pro. How expensive are those eSATA PCIe cards anyway?
I don't know why it wouldn't work... In fact, I'm pretty sure I've seen eSATA enclosures advertised as working with a Mac. I'll see if I can find one.
BTW I find USB2 HD hook ups to be far less problematic and just as fast or faster than FW hooks ups. Is that true?
I've had pretty much the same luck... Some USB2 devices struggle a bit due to the onboard USB2 chipset, but for the most part, they're equivalent to FW400 (with a max rate of 480Mbps) and USB2 handles traffic from multiple devices better than firewire. OTOH, lots of older Mac systems, especially those Powerbook G4s, struggled with USB2 and often exhibited poor performance. But overall, I think USB2 has a bad reputation that it didn't deserve to get stuck with. In my experience having owned quite a few USB2 storage devices, I find that poor performance is more the fault of the device maker than the interface itself as I've got some hard drives - like a couple of my external Maxtor units, that perform blazingly fast and in no way slower on USB2 than when connected via FW.
I don't know why it wouldn't work... In fact, I'm pretty sure I've seen eSATA enclosures advertised as working with a Mac. I'll see if I can find one.
BTW I find USB2 HD hook ups to be far less problematic and just as fast or faster than FW hooks ups. Is that true?
I've had pretty much the same luck... Some USB2 devices struggle a bit due to the onboard USB2 chipset, but for the most part, they're equivalent to FW400 (with a max rate of 480Mbps) and USB2 handles traffic from multiple devices better than firewire. OTOH, lots of older Mac systems, especially those Powerbook G4s, struggled with USB2 and often exhibited poor performance. But overall, I think USB2 has a bad reputation that it didn't deserve to get stuck with. In my experience having owned quite a few USB2 storage devices, I find that poor performance is more the fault of the device maker than the interface itself as I've got some hard drives - like a couple of my external Maxtor units, that perform blazingly fast and in no way slower on USB2 than when connected via FW.
No comments:
Post a Comment