dobbin
Sep 20, 03:45 AM
I don't want to have to put yet another box on the shelf under my TV and have yet another remote control kicking around my living room.
I already have a DVD, a VCR, and a Sky+ box (DVR). I know that in theory I should choose just one or two of these, but that doesn't work in practice. What happens when my mum records something on a video for me - I still need a VCR, and until Sky bring out a Sky+ box with a *much* larger hard disk then I'll need a DVD for keeping things long term.
If Apple could include at least a DVD burner and ideally a DVR hard disk as well, then I could actually start replacing the other machines I have rather than just adding to them and cluttering up my living room.
Its probably a moot point anyway as I doubt iTV will be launched in the UK for a long while anyway.
I already have a DVD, a VCR, and a Sky+ box (DVR). I know that in theory I should choose just one or two of these, but that doesn't work in practice. What happens when my mum records something on a video for me - I still need a VCR, and until Sky bring out a Sky+ box with a *much* larger hard disk then I'll need a DVD for keeping things long term.
If Apple could include at least a DVD burner and ideally a DVR hard disk as well, then I could actually start replacing the other machines I have rather than just adding to them and cluttering up my living room.
Its probably a moot point anyway as I doubt iTV will be launched in the UK for a long while anyway.
rasmasyean
Apr 23, 03:16 AM
sorry but you are wrong ... we do not tell soldiers they are fighting for God or that there is anything such as being a martyr
nice try though :rolleyes:
And that's why its so hard for "Atheists" to "come out" in the military, eh? Look past the surface and the exact words (heaven, prayers, freedom, hero...use whatever words you want) and the concept is still the same. Even the CIA told the Afghans during the cold war that they will "go to god" if they die fighting the Russians. It's funny when you see some white dude surrounded by turbaned ppl saying this in those old videos. Believe what you want but in a sense, we do "brainwash" our troops. And to good effect, because it makes them do their job willingly and better. And it gives them comfort when they know they will die taking a bullet for oil.
nice try though :rolleyes:
And that's why its so hard for "Atheists" to "come out" in the military, eh? Look past the surface and the exact words (heaven, prayers, freedom, hero...use whatever words you want) and the concept is still the same. Even the CIA told the Afghans during the cold war that they will "go to god" if they die fighting the Russians. It's funny when you see some white dude surrounded by turbaned ppl saying this in those old videos. Believe what you want but in a sense, we do "brainwash" our troops. And to good effect, because it makes them do their job willingly and better. And it gives them comfort when they know they will die taking a bullet for oil.
Gelfin
Mar 25, 03:41 PM
You have to prove the rights existed in the first place otherwise
On the contrary, it is the obligation of the United States government to prove it has a legitimate interest in preventing you from doing something, especially if it is preventing you from doing something it permits to another demographic segment.
I could argue the government is denying my right to drive a tank
I suspect the government could demonstrate this to a court's satisfaction, particularly if it denies that ability to everyone equally. Even "treads are hell on asphalt" is a rational reason.
This is about the Roman Catholic Church not Christendom.
Both you and NathanMuir really think you're onto something with this red herring, don't you? To ignore a point is not to discredit it.
Also the attitude is not shared, many Protestant groups see people as evil and wicked, the Roman Catholic Church sees homosexuals as people in need of love and support.
Tell that to the people who have benefitted from the "love and support" of Christians including Catholics. I know it's the party line, but you know quite well that "love and support" its a smokescreen for forced obedience wearing a phony smile. What religious leaders of all stripes "love" is to be obeyed.
The Catholic view does not demand the death of homosexuals, instead it seeks to change the behavior for they are lost sheep.
Including for "lost sheep" who are not Catholic by manipulating secular law and convincing their followers it is an abuse of their civil rights if secular law does not follow religious law.
On the contrary, it is the obligation of the United States government to prove it has a legitimate interest in preventing you from doing something, especially if it is preventing you from doing something it permits to another demographic segment.
I could argue the government is denying my right to drive a tank
I suspect the government could demonstrate this to a court's satisfaction, particularly if it denies that ability to everyone equally. Even "treads are hell on asphalt" is a rational reason.
This is about the Roman Catholic Church not Christendom.
Both you and NathanMuir really think you're onto something with this red herring, don't you? To ignore a point is not to discredit it.
Also the attitude is not shared, many Protestant groups see people as evil and wicked, the Roman Catholic Church sees homosexuals as people in need of love and support.
Tell that to the people who have benefitted from the "love and support" of Christians including Catholics. I know it's the party line, but you know quite well that "love and support" its a smokescreen for forced obedience wearing a phony smile. What religious leaders of all stripes "love" is to be obeyed.
The Catholic view does not demand the death of homosexuals, instead it seeks to change the behavior for they are lost sheep.
Including for "lost sheep" who are not Catholic by manipulating secular law and convincing their followers it is an abuse of their civil rights if secular law does not follow religious law.
Multimedia
Sep 26, 12:49 PM
Bottom line is that if you're not doing long-form processor-intensive stuff such as 2D/3D animation rendering, video encoding, mathematical/scientific analysis, running simulations, etc. then you probably won't get much benefit from more than two cores (you'll be better off with two cores running at faster clock speeds). But if you are, eight cores will be fantastic.Man are you out of touch with reality. I have a a 2GHz DC G5 PM and a 2.5GHz Quad PM and the DC PM is a DOG for even the simplest type of stuff. You obviously have ZERO experience with a Quad Mac or you would never have written such an absurd post.I would disagree with this: My Quad G5 destroys the Dual 2.7 in Photoshop, Illustrator, InDesign, iMovie HD, etc. No contest. Both in single app use and especially multitasking.No kidding. Once you've gone Quad you will NEVER want to go back to less than 4 on the floor. :D
RaceTripper
Mar 24, 06:54 PM
Aw, poor Vatican. Are your medieval feelings hurt?
PracticalMac
Mar 11, 08:56 AM
Dam... I hope that damage isn't that bad, but it being 8.9 I won't hold my breathe.
Its bad, really bad.
Have relatives there, in Tokyo.
Its bad, really bad.
Have relatives there, in Tokyo.
WiiDSmoker
Apr 20, 09:31 PM
No, of course not. I just find it interesting that someone who clearly dislikes a company and its products so much has so much free time to spend on a board for people who do enjoy said company and products.
So this site is for fanboys only?
So this site is for fanboys only?
flopticalcube
Apr 24, 12:40 PM
There are hells (known as "naraga") in Hinduism and Buddhism too, but none of them are eternal and all of them are only for people who have done really bad things in life - regardless of faith or lack thereof.
Christian believers who are enslaved by their fear of hell, as opposed to having their faith based on genuine love to God, will allegedly end up in hell anyway.
I was always under the impression that reincarnation was considered a kind of living hell, like reliving Junior High School over and over again.
The fire and brimstone of hell certainly figures in a lot of the fundamentalist sects of Christianity and many of the Protestant ones too. My father-in-law is a presbyterian lay preacher and constantly prattled on about it.
Christian believers who are enslaved by their fear of hell, as opposed to having their faith based on genuine love to God, will allegedly end up in hell anyway.
I was always under the impression that reincarnation was considered a kind of living hell, like reliving Junior High School over and over again.
The fire and brimstone of hell certainly figures in a lot of the fundamentalist sects of Christianity and many of the Protestant ones too. My father-in-law is a presbyterian lay preacher and constantly prattled on about it.
dukebound85
Apr 24, 01:02 PM
I was always under the impression that reincarnation was considered a kind of living hell, like reliving Junior High School over and over again.
The fire and brimstone of hell certainly figures in a lot of the fundamentalist sects of Christianity and many of the Protestant ones too. My father-in-law is a presbyterian lay preacher and constantly prattled on about it.
or better yet....wouldn't living forever a hell? who would want to go to Heaven and live forever...
What makes life so sweet is that it is NOT everlasting
The fire and brimstone of hell certainly figures in a lot of the fundamentalist sects of Christianity and many of the Protestant ones too. My father-in-law is a presbyterian lay preacher and constantly prattled on about it.
or better yet....wouldn't living forever a hell? who would want to go to Heaven and live forever...
What makes life so sweet is that it is NOT everlasting
KnightWRX
May 2, 05:51 PM
Until Vista and Win 7, it was effectively impossible to run a Windows NT system as anything but Administrator. To the point that other than locked-down corporate sites where an IT Professional was required to install the Corporate Approved version of any software you need to do your job, I never knew anyone running XP (or 2k, or for that matter NT 3.x) who in a day-to-day fashion used a Standard user account.
Of course, I don't know of any Linux distribution that doesn't require root to install system wide software either. Kind of negates your point there...
In contrast, an "Administrator" account on OS X was in reality a limited user account, just with some system-level privileges like being able to install apps that other people could run. A "Standard" user account was far more usable on OS X than the equivalent on Windows, because "Standard" users could install software into their user sandbox, etc. Still, most people I know run OS X as Administrator.
You could do the same as far back as Windows NT 3.1 in 1993. The fact that most software vendors wrote their applications for the non-secure DOS based versions of Windows is moot, that is not a problem of the OS's security model, it is a problem of the Application. This is not "Unix security" being better, it's "Software vendors for Windows" being dumber.
It's no different than if instead of writing my preferences to $HOME/.myapp/ I'd write a software that required writing everything to /usr/share/myapp/username/. That would require root in any decent Unix installation, or it would require me to set permissions on that folder to 775 and make all users of myapp part of the owning group. Or I could just go the lazy route, make the binary 4755 and set mount opts to suid on the filesystem where this binary resides... (ugh...).
This is no different on Windows NT based architectures. If you were so inclined, with tools like Filemon and Regmon, you could granularly set permissions in a way to install these misbehaving software so that they would work for regular users.
I know I did many times in a past life (back when I was sort of forced to do Windows systems administration... ugh... Windows NT 4.0 Terminal Server edition... what a wreck...).
Let's face it, Windows NT and Unix systems have very similar security models (in fact, Windows NT has superior ACL support out of the box, akin to Novell's close to perfect ACLs, Unix is far more limited with it's read/write/execute permission scheme, even with Posix ACLs in place). It's the hoops that software vendors outside the control of Microsoft made you go through that forced lazy users to run as Administrator all the time and gave Microsoft such headaches.
As far back as I remember (when I did some Windows systems programming), Microsoft was already advising to use the user's home folder/the user's registry hive for preferences and to never write to system locations.
The real differenc, though, is that an NT Administrator was really equivalent to the Unix root account. An OS X Administrator was a Unix non-root user with 'admin' group access. You could not start up the UI as the 'root' user (and the 'root' account was disabled by default).
Actually, the Administrator account (much less a standard user in the Administrators group) is not a root level account at all.
Notice how a root account on Unix can do everything, just by virtue of its 0 uid. It can write/delete/read files from filesystems it does not even have permissions on. It can kill any system process, no matter the owner.
Administrator on Windows NT is far more limited. Don't ever break your ACLs or don't try to kill processes owned by "System". SysInternals provided tools that let you do it, but Microsoft did not.
All that having been said, UAC has really evened the bar for Windows Vista and 7 (moreso in 7 after the usability tweaks Microsoft put in to stop people from disabling it). I see no functional security difference between the OS X authorization scheme and the Windows UAC scheme.
UAC is simply a gui front-end to the runas command. Heck, shift-right-click already had the "Run As" option. It's a glorified sudo. It uses RDP (since Vista, user sessions are really local RDP sessions) to prevent being able to "fake it", by showing up on the "console" session while the user's display resides on a RDP session.
There, you did it, you made me go on a defensive rant for Microsoft. I hate you now.
My response, why bother worrying about this when the attacker can do the same thing via shellcode generated in the background by exploiting a running process so the the user is unaware that code is being executed on the system
Because this required no particular exploit or vulnerability. A simple Javascript auto-download and Safari auto-opening an archive and running code.
Why bother, you're not "getting it". The only reason the user is aware of MACDefender is because it runs a GUI based installer. If the executable had had 0 GUI code and just run stuff in the background, you would have never known until you couldn't find your files or some chinese guy was buying goods with your CC info, fished right out of your "Bank stuff.xls" file.
That's the thing, infecting a computer at the system level is fine if you want to build a DoS botnet or something (and even then, you don't really need privilege escalation for that, just set login items for the current user, and run off a non-privilege port, root privileges are not required for ICMP access, only raw sockets).
These days, malware authors and users are much more interested in your data than your system. That's where the money is. Identity theft, phishing, they mean big bucks.
Of course, I don't know of any Linux distribution that doesn't require root to install system wide software either. Kind of negates your point there...
In contrast, an "Administrator" account on OS X was in reality a limited user account, just with some system-level privileges like being able to install apps that other people could run. A "Standard" user account was far more usable on OS X than the equivalent on Windows, because "Standard" users could install software into their user sandbox, etc. Still, most people I know run OS X as Administrator.
You could do the same as far back as Windows NT 3.1 in 1993. The fact that most software vendors wrote their applications for the non-secure DOS based versions of Windows is moot, that is not a problem of the OS's security model, it is a problem of the Application. This is not "Unix security" being better, it's "Software vendors for Windows" being dumber.
It's no different than if instead of writing my preferences to $HOME/.myapp/ I'd write a software that required writing everything to /usr/share/myapp/username/. That would require root in any decent Unix installation, or it would require me to set permissions on that folder to 775 and make all users of myapp part of the owning group. Or I could just go the lazy route, make the binary 4755 and set mount opts to suid on the filesystem where this binary resides... (ugh...).
This is no different on Windows NT based architectures. If you were so inclined, with tools like Filemon and Regmon, you could granularly set permissions in a way to install these misbehaving software so that they would work for regular users.
I know I did many times in a past life (back when I was sort of forced to do Windows systems administration... ugh... Windows NT 4.0 Terminal Server edition... what a wreck...).
Let's face it, Windows NT and Unix systems have very similar security models (in fact, Windows NT has superior ACL support out of the box, akin to Novell's close to perfect ACLs, Unix is far more limited with it's read/write/execute permission scheme, even with Posix ACLs in place). It's the hoops that software vendors outside the control of Microsoft made you go through that forced lazy users to run as Administrator all the time and gave Microsoft such headaches.
As far back as I remember (when I did some Windows systems programming), Microsoft was already advising to use the user's home folder/the user's registry hive for preferences and to never write to system locations.
The real differenc, though, is that an NT Administrator was really equivalent to the Unix root account. An OS X Administrator was a Unix non-root user with 'admin' group access. You could not start up the UI as the 'root' user (and the 'root' account was disabled by default).
Actually, the Administrator account (much less a standard user in the Administrators group) is not a root level account at all.
Notice how a root account on Unix can do everything, just by virtue of its 0 uid. It can write/delete/read files from filesystems it does not even have permissions on. It can kill any system process, no matter the owner.
Administrator on Windows NT is far more limited. Don't ever break your ACLs or don't try to kill processes owned by "System". SysInternals provided tools that let you do it, but Microsoft did not.
All that having been said, UAC has really evened the bar for Windows Vista and 7 (moreso in 7 after the usability tweaks Microsoft put in to stop people from disabling it). I see no functional security difference between the OS X authorization scheme and the Windows UAC scheme.
UAC is simply a gui front-end to the runas command. Heck, shift-right-click already had the "Run As" option. It's a glorified sudo. It uses RDP (since Vista, user sessions are really local RDP sessions) to prevent being able to "fake it", by showing up on the "console" session while the user's display resides on a RDP session.
There, you did it, you made me go on a defensive rant for Microsoft. I hate you now.
My response, why bother worrying about this when the attacker can do the same thing via shellcode generated in the background by exploiting a running process so the the user is unaware that code is being executed on the system
Because this required no particular exploit or vulnerability. A simple Javascript auto-download and Safari auto-opening an archive and running code.
Why bother, you're not "getting it". The only reason the user is aware of MACDefender is because it runs a GUI based installer. If the executable had had 0 GUI code and just run stuff in the background, you would have never known until you couldn't find your files or some chinese guy was buying goods with your CC info, fished right out of your "Bank stuff.xls" file.
That's the thing, infecting a computer at the system level is fine if you want to build a DoS botnet or something (and even then, you don't really need privilege escalation for that, just set login items for the current user, and run off a non-privilege port, root privileges are not required for ICMP access, only raw sockets).
These days, malware authors and users are much more interested in your data than your system. That's where the money is. Identity theft, phishing, they mean big bucks.
Lord Blackadder
Mar 13, 02:21 PM
Most of the major power sources in use today come with major safety/environmental risks. Nuclear is in some ways potentially the most risky. However, people will continue to use it because it works.
We are only as safe as the weakest nuclear power plant, and some of the old Soviet designs still operating are truly scary. But I see a discussion over whether or not to use nuclear power as being 60 years too late - nuclear power is here to stay, due to pressure to satisfy civil power demands that will require them to remain in operation and even expand in numbers. At this point in time renewable energy sources are producing only a fraction of the energy they must produce if we are to start decommissioning nuclear plants.
We are only as safe as the weakest nuclear power plant, and some of the old Soviet designs still operating are truly scary. But I see a discussion over whether or not to use nuclear power as being 60 years too late - nuclear power is here to stay, due to pressure to satisfy civil power demands that will require them to remain in operation and even expand in numbers. At this point in time renewable energy sources are producing only a fraction of the energy they must produce if we are to start decommissioning nuclear plants.
Eidorian
Oct 26, 11:32 PM
I would love a Kentsfield "desktop" based tower but I don't know if Apple wants to add another product line.Yeah I'd love one too. A little pricey for a process since it's in the Extreme series though.
MacRumors
May 2, 08:49 AM
http://www.macrumors.com/images/macrumorsthreadlogo.gif (http://www.macrumors.com/2011/05/02/new-macdefender-malware-threat-for-mac-os-x/)
http://images.macrumors.com/article/2011/05/02/094840-macdefender.jpg
Antivirus firm Intego today noted (http://blog.intego.com/2011/05/02/macdefender-rogue-anti-malware-program-attacks-macs-via-seo-poisoning/) the discovery of new malware known as "MACDefender" targeting Mac OS X users via Safari. According to the report, the malware appears to be being deployed via JavaScript as a compressed ZIP file reached through Google searches.When a user clicks on a link after performing a search on a search engine such as Google, this takes them to a web site whose page contains JavaScript that automatically downloads a file. In this case, the file downloaded is a compressed ZIP archive, which, if a specific option in a web browser is checked (Open "safe" files after downloading in Safari, for example), will open.More information is available in Apple's support communities (1 (https://discussions.apple.com/thread/3029144), 2 (https://discussions.apple.com/thread/3029310)), where users report that the malware is popping up directly in Google image searches.
Users running administrator accounts and with the Safari option to open "safe" files automatically checked appear to be most at risk, with some claiming that no notification of installation was seen or password required. Only when a screen popped up asking for a credit card number to sign up for virus protection did they realize that malware had been installed on their systems.
For those infected with the MACDefender malware, the following steps are recommended:
1. Open Applications > Utilities > Activity Monitor and quit any processes linked to MACDefender.
2. Delete MACDefender from the Applications folder.
3. Check System Preferences > Accounts > Login Items for suspicious entries
4. Run a Spotlight search for "MACDefender" to check for any associated files that might still be lingering.
Full details on the malware and the simplest steps needed for its complete removal are still being investigated.
Users are of course reminded that day-to-day system usage with standard accounts rather than administrator ones, as well as unchecking the Safari option for automatically opening "safe" files, are two of the simplest ways users can enhance their online security, adding extra layers of confirmation and passwords in the way of anything being installed on their systems.
Article Link: New 'MACDefender' Malware Threat for Mac OS X (http://www.macrumors.com/2011/05/02/new-macdefender-malware-threat-for-mac-os-x/)
http://images.macrumors.com/article/2011/05/02/094840-macdefender.jpg
Antivirus firm Intego today noted (http://blog.intego.com/2011/05/02/macdefender-rogue-anti-malware-program-attacks-macs-via-seo-poisoning/) the discovery of new malware known as "MACDefender" targeting Mac OS X users via Safari. According to the report, the malware appears to be being deployed via JavaScript as a compressed ZIP file reached through Google searches.When a user clicks on a link after performing a search on a search engine such as Google, this takes them to a web site whose page contains JavaScript that automatically downloads a file. In this case, the file downloaded is a compressed ZIP archive, which, if a specific option in a web browser is checked (Open "safe" files after downloading in Safari, for example), will open.More information is available in Apple's support communities (1 (https://discussions.apple.com/thread/3029144), 2 (https://discussions.apple.com/thread/3029310)), where users report that the malware is popping up directly in Google image searches.
Users running administrator accounts and with the Safari option to open "safe" files automatically checked appear to be most at risk, with some claiming that no notification of installation was seen or password required. Only when a screen popped up asking for a credit card number to sign up for virus protection did they realize that malware had been installed on their systems.
For those infected with the MACDefender malware, the following steps are recommended:
1. Open Applications > Utilities > Activity Monitor and quit any processes linked to MACDefender.
2. Delete MACDefender from the Applications folder.
3. Check System Preferences > Accounts > Login Items for suspicious entries
4. Run a Spotlight search for "MACDefender" to check for any associated files that might still be lingering.
Full details on the malware and the simplest steps needed for its complete removal are still being investigated.
Users are of course reminded that day-to-day system usage with standard accounts rather than administrator ones, as well as unchecking the Safari option for automatically opening "safe" files, are two of the simplest ways users can enhance their online security, adding extra layers of confirmation and passwords in the way of anything being installed on their systems.
Article Link: New 'MACDefender' Malware Threat for Mac OS X (http://www.macrumors.com/2011/05/02/new-macdefender-malware-threat-for-mac-os-x/)
Ivan0310
Apr 28, 07:39 AM
I dont think iPads should be included. A computer shouldn't need a computer to be usable.
Agreed. I disagree completely with Steve & Co. when they refer to this or any other of their mobile devices as a 'Post-PC' device. Something that is 'after' the PC shouldn't rely on one (in large or small part) in order to function.
Agreed. I disagree completely with Steve & Co. when they refer to this or any other of their mobile devices as a 'Post-PC' device. Something that is 'after' the PC shouldn't rely on one (in large or small part) in order to function.
Designer Dale
Apr 20, 06:47 PM
I don't have an iPhone, but I do have an iPod Touch. My wife has an Android phone. I can't use her phone well but I feel I could use an iPhone with zero learning curve just because everything is so consistent across Apple mobile devices. That's what I like about Apple devices. No big surprises.
The manual for her phone is 156 pages long. I couldn't find the buttons illustrated in it to set up another email address other than Gmail.
Dale
The manual for her phone is 156 pages long. I couldn't find the buttons illustrated in it to set up another email address other than Gmail.
Dale
Denarius
Mar 15, 10:55 AM
That's a failure of the German politicians to make a case for nuclear power there (although I imagine that Germany has good potential for hydropower and other renewables).
I think that the opposite could be said for the UK. Over the last few years opinion has turned more pro nuclear. In contrast to Merkel, Cameron turned the Japanese situation into a positive - saying that the UK could 'learn lessons' and make nuclear even safer.
There's too much hysteria over this. This plant has been hit by a force 9 earthquake and a tsunami and yet although some radiation has been released this is by no means anything like as serious as Chernobyl.
In a world where the security risks and economics of oil and natural gas are on their way to being untenable and the renewable energy options cannot realistically meet the world's ever growing energy demands, the benefits of nuclear fission far outweigh the risks, particularly when you consider that the public and worker fatalities relating to fission reactors are dwarfed in comparison to those from energy generation from fossil fuels, petrochemicals and natural gas.
I think that the opposite could be said for the UK. Over the last few years opinion has turned more pro nuclear. In contrast to Merkel, Cameron turned the Japanese situation into a positive - saying that the UK could 'learn lessons' and make nuclear even safer.
There's too much hysteria over this. This plant has been hit by a force 9 earthquake and a tsunami and yet although some radiation has been released this is by no means anything like as serious as Chernobyl.
In a world where the security risks and economics of oil and natural gas are on their way to being untenable and the renewable energy options cannot realistically meet the world's ever growing energy demands, the benefits of nuclear fission far outweigh the risks, particularly when you consider that the public and worker fatalities relating to fission reactors are dwarfed in comparison to those from energy generation from fossil fuels, petrochemicals and natural gas.
boncellis
Jul 12, 10:15 AM
This is news, albeit somewhat inconsequential in the end. I would have thought the iMac would see Merom as its upgrade because of heat issues--perhaps Conroe won't pose a problem or there is a slight redesign of the iMac case in the cards.
As far as the Mac Pro, there is a difference between Woodcrest and Conroe beyond the multiprocessor functionality, however small. But, in my opinion, to have the entire Mac Pro line be Woodcrest would mean Apple missing out on a market segment that want a pro level machine at an intermediate price. If Apple includes just one Conroe configuration along with the Woodcrest screamers, and prices it accordingly, I think they would find something of a "sweet spot" in covering the majority of its users and potential switchers.
The price is what's going to make or break it. And I don't see it breaking.
As far as the Mac Pro, there is a difference between Woodcrest and Conroe beyond the multiprocessor functionality, however small. But, in my opinion, to have the entire Mac Pro line be Woodcrest would mean Apple missing out on a market segment that want a pro level machine at an intermediate price. If Apple includes just one Conroe configuration along with the Woodcrest screamers, and prices it accordingly, I think they would find something of a "sweet spot" in covering the majority of its users and potential switchers.
The price is what's going to make or break it. And I don't see it breaking.
gorgeousninja
Apr 9, 06:36 AM
Oh, and try to be more mature in your reply next time please. That was uncalled for and childish.
actually the post was funny and to the point, your coming across as arrogant and ill informed.
actually the post was funny and to the point, your coming across as arrogant and ill informed.
Heavyhitter504
Mar 18, 11:31 AM
I actually paid for MyWi and I only use it to tether my iPad. I use it instead of (not in addition to) my iPhone and only when wifi is not available.
This is what I do, I'm on the "unlimited" plan and I haven't received any text or email regarding the warning about tethering, i hope it's because I dont surpass the 5 gb cap
This is what I do, I'm on the "unlimited" plan and I haven't received any text or email regarding the warning about tethering, i hope it's because I dont surpass the 5 gb cap
skunk
Apr 23, 05:29 PM
I've found the response of some of the devout atheist posters in this thread very interesting,What is a "devout atheist"? :confused:
Sydde
Apr 22, 08:50 PM
Atheists often, rightly or wrongly, seem to count agnostics in their number much as Blues is of classified as a part of Jazz (wrongly, IMO).
This document from census.gov (http://www.census.gov/compendia/statab/2011/tables/11s0075.pdf) looks to me like it is showing a fairly steady increase in unbelief, which can only be a good thing.
On this forum, there only appear to be a lot of atheists because they tend to be outspoken, put forth strong arguments (the strength of which may be a matter of opinion), and respond quickly to religious nonsense.
This document from census.gov (http://www.census.gov/compendia/statab/2011/tables/11s0075.pdf) looks to me like it is showing a fairly steady increase in unbelief, which can only be a good thing.
On this forum, there only appear to be a lot of atheists because they tend to be outspoken, put forth strong arguments (the strength of which may be a matter of opinion), and respond quickly to religious nonsense.
Multimedia
Oct 28, 04:58 PM
Maybe Apple will replace the 2.0 and 2.6 models with the 1 new quad-core Clovertown. They are probably less expensive for 1 than 2 Woodcrests. This would allow Apple to drop the entry level pricing and raise the bar so to speak.
Standard configuration:
One 2.66GHz Quad-core Intel Xeon "Clovertown" processor
2GB memory (4 x 512MB) 667MHz DDR2 fully-buffered DIMM ECC
NVIDIA GeForce 7300 GT graphics with 256MB memory
250GB Serial ATA 3Gb/s 7200-rpm hard drive
16x double-layer SuperDrive
$2,499
Configurations — Low to High
- One 2.3GHz Quad-core Intel Xeon "Clovertown" processor (subtract $299)
- Standard configuration
- Two 3.0GHz Dual-core Intel Xeon "Woodcrest" processors (add $799)
- Two 2.6GHz Quad-core Intel Xeon "Clovertown" processors (add $1,399)
What do you think?Not likely as all four in one would have to share one FSB instead of two in two each having their own FSB. While the 8-core owners will have to live with this limitation, I doubt the 4-core buyers would want theirs running that way. That would make the older 4-core Mac Pros run faster than the new ones. Not progress.
We are now less than four weeks away from Black Friday. So it's all very exciting. I imagine Apple will be able to add this choice the same day Intel makes release official. So watching for Intel's release day is key. I believe I read some post that said it would be mid November. Anyone know exactly?
Standard configuration:
One 2.66GHz Quad-core Intel Xeon "Clovertown" processor
2GB memory (4 x 512MB) 667MHz DDR2 fully-buffered DIMM ECC
NVIDIA GeForce 7300 GT graphics with 256MB memory
250GB Serial ATA 3Gb/s 7200-rpm hard drive
16x double-layer SuperDrive
$2,499
Configurations — Low to High
- One 2.3GHz Quad-core Intel Xeon "Clovertown" processor (subtract $299)
- Standard configuration
- Two 3.0GHz Dual-core Intel Xeon "Woodcrest" processors (add $799)
- Two 2.6GHz Quad-core Intel Xeon "Clovertown" processors (add $1,399)
What do you think?Not likely as all four in one would have to share one FSB instead of two in two each having their own FSB. While the 8-core owners will have to live with this limitation, I doubt the 4-core buyers would want theirs running that way. That would make the older 4-core Mac Pros run faster than the new ones. Not progress.
We are now less than four weeks away from Black Friday. So it's all very exciting. I imagine Apple will be able to add this choice the same day Intel makes release official. So watching for Intel's release day is key. I believe I read some post that said it would be mid November. Anyone know exactly?
dante@sisna.com
Sep 28, 04:59 AM
Surprised to see this thread come to a grinding hault after only 145 posts. I pledge right here and now to be one of the first to buy a NEW 8-core Dual Clovertown Mac Pro as soon as it becomes available. I will not wait for them to go refrub although I will probably wait for them to come with iLife '07 if they are added to the BTO page before the January 9th SteveNote.
I turn 60 on January 12th. :) Happy Birthday to me it will be. :eek: :D
Okay, I will jump onboard and be the second.
Clovertown Power -- bring it on.
Dante
I turn 60 on January 12th. :) Happy Birthday to me it will be. :eek: :D
Okay, I will jump onboard and be the second.
Clovertown Power -- bring it on.
Dante
peharri
Sep 24, 05:08 PM
The iTV most definitely requires a computer.
There's no evidence of this. Nothing has been said suggesting anything of the sort.
The iTV is a like a suped up Airport extreme for video.
No, it isn't. It's not remotely like an Airport Extreme.
It has already been demoed and it requires a computer. The computer streams the iTunes content to the iTV and the iTV receives the stream and translates it into video and audio out via an HDMI or SVGA connection to your TV.
This is not the case. There's only been one demonstration so far, and the controlling part was the iTV, not the server.
The iTV also supports front row and allows remote control of the iTunes source machine.
What was demonstrated was a box that can view iTunes libraries on the local network. There's no evidence it "controls" the source machine beyond telling it to send a stream (like any iTunes client.)
There maybe more features in the future but those are the reported and demoed features.
The reported and demo'd features are of a standalone box that can access iTunes libraries. The box is reported to have storage (which is what this entire thread is about!)
It most certainly is not of some souped up Airport Extreme. That was what was widely rumoured before the Showtime presentation, and it turned out to be completely false. Whatever the debate of the precise capabilities of the iTV may be, the device demo'd couldn't be further from being an Airport Extreme if it tried.
There's no evidence of this. Nothing has been said suggesting anything of the sort.
The iTV is a like a suped up Airport extreme for video.
No, it isn't. It's not remotely like an Airport Extreme.
It has already been demoed and it requires a computer. The computer streams the iTunes content to the iTV and the iTV receives the stream and translates it into video and audio out via an HDMI or SVGA connection to your TV.
This is not the case. There's only been one demonstration so far, and the controlling part was the iTV, not the server.
The iTV also supports front row and allows remote control of the iTunes source machine.
What was demonstrated was a box that can view iTunes libraries on the local network. There's no evidence it "controls" the source machine beyond telling it to send a stream (like any iTunes client.)
There maybe more features in the future but those are the reported and demoed features.
The reported and demo'd features are of a standalone box that can access iTunes libraries. The box is reported to have storage (which is what this entire thread is about!)
It most certainly is not of some souped up Airport Extreme. That was what was widely rumoured before the Showtime presentation, and it turned out to be completely false. Whatever the debate of the precise capabilities of the iTV may be, the device demo'd couldn't be further from being an Airport Extreme if it tried.