JGowan
Mar 29, 01:17 PM
:confused:For that to happen, people would have to want to buy a Windows phone... I'm pretty sure hardly anyone I know even realizes that the platform has undergone a major revamp recently.
My personal opinion is that WP7 is a decent OS, but I just don't see this being a possibility with the meager selection in WP7 software.I agree. I have met only ONE person ever to have a Windows phone. Everywhere I go, iPhones are by far the #1 phone I see.
My personal opinion is that WP7 is a decent OS, but I just don't see this being a possibility with the meager selection in WP7 software.I agree. I have met only ONE person ever to have a Windows phone. Everywhere I go, iPhones are by far the #1 phone I see.
ezekielrage_99
Sep 5, 12:31 AM
Then you haven't been paying attention. We've KNOWN new iMacs were coming in September ever since Intel announced Core 2 Duo was coming in September, THREE MONTHS AGO. I've been waiting three months for the Core 2 Duo iMac update.
Me too, I doubt if Apple wil wait another month because other PC manufacturers have release a few Core 2 Duos over the last few days and lets face it Apple is now competing on a hardware basis now as well.
Me too, I doubt if Apple wil wait another month because other PC manufacturers have release a few Core 2 Duos over the last few days and lets face it Apple is now competing on a hardware basis now as well.
aohus
Apr 19, 12:28 PM
Apple should just buy out Samsung!
Simplistic, I know.
/facepalm
Samsung is a 'chaebol' corporation, a conglomerate. The company is HUGE. It would be the equivalent of Apple/Microsoft/Blackberry combined + TSMC/Global Foundries + Shipbuilding + Property Real Estate + Electronics, etc. Not only that but Apple gets their A4/A5 chips + flash memory manufactured at Samsung fab plants.
This is the GUI wars all over again... Last time Apple sued Microsoft for copying their GUI desktop to make Windows....
(and no Xerox didn't invent that they invented windowing not really a desktop Apple did that bit.)
Anyway Apple lost and Microsoft took over the world while Apple dwindled to a market share of less than 5%.
I don't think they want that to happen this time....
they didn't invent the GUI? This doesn't look like a desktop to you?
http://netdna.webdesignerdepot.com/uploads/2009/03/xerox-8010-star.gif
http://www.catb.org/~esr/writings/taouu/html/graphics/xerox_star.jpg
Sure does to me.
Simplistic, I know.
/facepalm
Samsung is a 'chaebol' corporation, a conglomerate. The company is HUGE. It would be the equivalent of Apple/Microsoft/Blackberry combined + TSMC/Global Foundries + Shipbuilding + Property Real Estate + Electronics, etc. Not only that but Apple gets their A4/A5 chips + flash memory manufactured at Samsung fab plants.
This is the GUI wars all over again... Last time Apple sued Microsoft for copying their GUI desktop to make Windows....
(and no Xerox didn't invent that they invented windowing not really a desktop Apple did that bit.)
Anyway Apple lost and Microsoft took over the world while Apple dwindled to a market share of less than 5%.
I don't think they want that to happen this time....
they didn't invent the GUI? This doesn't look like a desktop to you?
http://netdna.webdesignerdepot.com/uploads/2009/03/xerox-8010-star.gif
http://www.catb.org/~esr/writings/taouu/html/graphics/xerox_star.jpg
Sure does to me.
LegendKillerUK
Apr 25, 01:16 PM
Hilarious to all those people who jumped on the THUNDERBOLT bandwagon. No thunderbolt devices yet and they have the hideous old case design.
:rolleyes:
opinions.jpg
:rolleyes:
opinions.jpg
ndpitch
Mar 30, 12:24 PM
Microsoft is suing homebuilders for offering "Windows" in their homes. Instead, they need to refer to them as "transparent viewing portals".
Haha! Made me laugh out loud at my desk.
Apple got there first and beat everyone to the punch. Microsoft should just accept it.
Haha! Made me laugh out loud at my desk.
Apple got there first and beat everyone to the punch. Microsoft should just accept it.
4God
Sep 5, 08:23 AM
Well, the Apple Store Online U.S. is down. Could be something, could be nothing.
hayesk
May 3, 12:41 PM
but i thought half the point of TB was that you would only need one output from the computer, and since we don't have any TB displays (or anything for that matter) how do we know that the ports are limited to one display?
TB has two 10 Gbps channels. A display takes up one of them. To power a second display, you could use the other channel, but you'd need some kind of breakout box that housed a video card.
TB has two 10 Gbps channels. A display takes up one of them. To power a second display, you could use the other channel, but you'd need some kind of breakout box that housed a video card.
owengot
Apr 14, 02:01 PM
I have a Rev D MacBook Air (11") and also think the Ivy Bridge will be a worthwhile upgrade. There is now no reason why that one shouldn't have USB 3.0, or Thunderbolt, plus Ivy Bridge, unlike Sandy Bridge, will have a GPU as fast as the NVIDIA 320m.
Amen to that :cool: As well as official support for OpenCL.
So when will Ivy Bridge be released?
Amen to that :cool: As well as official support for OpenCL.
So when will Ivy Bridge be released?
Manic Mouse
Sep 10, 05:03 AM
There's going to be a problem when PC manufacturers get a hold of this if Apple doesn't realease a mid-tower to compete. Conroes are faster than the Meroms in the iMac as it is, but with quad cores they'll wipe the floor with them at multi-tasking.
Surely Conroe needs to go somewhere in Apple's lineup? Great value, fast and soon to be quad-core.
Surely Conroe needs to go somewhere in Apple's lineup? Great value, fast and soon to be quad-core.
matrixmaniac
Apr 25, 01:43 PM
hideous? Really?
I am guessing this is the kind of laptop you admire for its beautiful case design, right?
http://www.gearfuse.com/a-rugged-dell-laptop-john-connor-would-use/
+1 +1 +1 +1 +1 +1 +1 +1 +1 +1 +1 +1 :d
I am guessing this is the kind of laptop you admire for its beautiful case design, right?
http://www.gearfuse.com/a-rugged-dell-laptop-john-connor-would-use/
+1 +1 +1 +1 +1 +1 +1 +1 +1 +1 +1 +1 :d
bruceyeah
Apr 27, 10:12 AM
I too am hanging out for a new MBA model before I jump in, and a backlit keyboard is the top of my list of must-have features. We have two unibody 2008 MacBooks in the house, only one of which has a backlit keyboard and not being a touch typist I really miss it when I use the other MacBook by mistake.
Anyway... has anyone else noticed that Apple will have a tricky design problem on their hands if they were to introduce a backlit keyboard into the new MBA design? Basically, they've got no room for the keyboard brightness keys!
When they brought out the 2010 MBA, they ditched the circular power button and added in a new 'power' key, to the right of the eject key. However this means that all the function keys have had their functions 'shifted' to the left, which was possible because there's no keyboard brightness up or down buttons needed in the function keys.
MacBook Pro
curly prom hairstyles, curly
Medium length hair
Prom Hairstyle Prom Hairstyle
Prom Hairstyles For Medium
Long Curly Prom Updo Hairstyle
updo hairstyles for curly hair
curly hair hairstyles for
Cute Prom Updo Hairstyle for
Anyway... has anyone else noticed that Apple will have a tricky design problem on their hands if they were to introduce a backlit keyboard into the new MBA design? Basically, they've got no room for the keyboard brightness keys!
When they brought out the 2010 MBA, they ditched the circular power button and added in a new 'power' key, to the right of the eject key. However this means that all the function keys have had their functions 'shifted' to the left, which was possible because there's no keyboard brightness up or down buttons needed in the function keys.
MacBook Pro
aloshka
Mar 29, 01:02 PM
Let's ask yourself this.. they are saying that approx 1 in every 17 people now have a Windows based phone?? Do you know ANYONE that does?? Cause I know hundreds of people who have smartphones and not one of them has a Windows based phone.. major statistical failure!
Completely agree! In fact, everyone I see throughout my daily life is 60% iphone, 40% android. I haven't even seen those foldable phones for a long time now.
Completely agree! In fact, everyone I see throughout my daily life is 60% iphone, 40% android. I haven't even seen those foldable phones for a long time now.
aaronb
Aug 31, 03:50 PM
What I'm confused about is how the movie downloads will be decent quality and not take FOREVER to download. If the quality is great, the download time is going to be ridiculous. If the quality is bad, no one would even consider buying it.
I would rather buy a 15 dollar DVD, rip it into my iPod and still have a DVD that looks good on my TV. That's just IMO.
I would rather buy a 15 dollar DVD, rip it into my iPod and still have a DVD that looks good on my TV. That's just IMO.
Otaviano
Apr 22, 05:48 AM
How does streaming music to my iPhone help me, when O2 cap my Internet usage, and then charge when you use more.
A great point, it's kind of funny how consumers have let the media lead us into believing we need clouded services out of everything. I can understand streaming television and films, but what is so hard about syncing your music at home once or twice a week?
A great point, it's kind of funny how consumers have let the media lead us into believing we need clouded services out of everything. I can understand streaming television and films, but what is so hard about syncing your music at home once or twice a week?
munkery
Mar 23, 04:20 PM
http://www.macforensicslab.com/ProductsAndServices/index.php?main_page=document_general_info&products_id=174
Much of the information in the PDF (http://www.macforensicslab.com/Malware_on_Mac_OS_X.pdf) associated with this article (http://www.macforensicslab.com/ProductsAndServices/index.php?main_page=document_general_info&products_id=174) is incorrect. For example:
Page 26
It refers to the bundle architecture as insecure. The argument presented would be true if security sensitive apps were not owned by system. Given that they are owned by system, malware cannot modify the bundle of an app owned by system without authentication when the app is run with user privileges in an admin or standard account.
For example, show package contents of iTunes, Safari, or Mail and try to create a folder in the bundle. In relation to the example in the article, try renaming iTunes. The argument in the article relies on actions that can not be completed in an OS X admin account; these type of changes are even more restricted in a standard account.
Apps not owned by system are vulnerable but without privilege escalation can not install rootkits or keyloggers. Even apps owned by system run with user privileges and require privilege escalation to install dangerous payloads.
Mac OS X does not prompt for authentication if you install apps in the proper location for that user account type. When installed in the proper location, apps are sandboxed from the system level of Mac OS X by the Unix DAC model used within Mac OS X.
Windows is less secure because most apps (Chrome only exception I can recall) install their associated files in levels of the system that require authentication regardless of user account type (unless Admin in Windows XP because running as superuser - no authentication required to install with elevated privileges - very dangerous). It is easier to trick Windows users to install a trojan with elevated privileges given that almost all apps ask for authentication to install and the user can not distinguish the intent of that authentication.
Page 30
The claim that the Application folder is unprotected is false. Security sensitive apps within the Application folder are owned by system.
Also, security sensitive system binaries are still stored in /bin and /sbin in Mac OS X.
Page 31
The ability to read the contacts stored in Address Book could be used by a worm to propagate. But, malware that uses this to spread is not likely to appear in the wild if the malware is not profitable. It is unlikely that malware will be profitable without being able to hook (this is a specific function) into apps owned by system.
Page 33
Starts off talking about trojans, trojans are easily avoided with user knowledge in Mac OS X because most apps do not require authentication to install if installed in the appropriate location where the Unix DAC model protects the system.
Viruses using the model shown in the article will not be successful without privilege escalation. This is the reason why Mac OS X malware is not successful in the wild.
By default, very few server side services are exposed in Mac OS X and those that are exposed are sandboxed. Vectors for worm propagation are limited to client side. Client side worms require authentication to install and spread if do not include privilege escalation via exploitation because of the Unix DAC model used in Mac OS X. Trojans used to trick users to authenticate are less likely to be successful in Mac OS X as stated above.
Much of the information in the PDF (http://www.macforensicslab.com/Malware_on_Mac_OS_X.pdf) associated with this article (http://www.macforensicslab.com/ProductsAndServices/index.php?main_page=document_general_info&products_id=174) is incorrect. For example:
Page 26
It refers to the bundle architecture as insecure. The argument presented would be true if security sensitive apps were not owned by system. Given that they are owned by system, malware cannot modify the bundle of an app owned by system without authentication when the app is run with user privileges in an admin or standard account.
For example, show package contents of iTunes, Safari, or Mail and try to create a folder in the bundle. In relation to the example in the article, try renaming iTunes. The argument in the article relies on actions that can not be completed in an OS X admin account; these type of changes are even more restricted in a standard account.
Apps not owned by system are vulnerable but without privilege escalation can not install rootkits or keyloggers. Even apps owned by system run with user privileges and require privilege escalation to install dangerous payloads.
Mac OS X does not prompt for authentication if you install apps in the proper location for that user account type. When installed in the proper location, apps are sandboxed from the system level of Mac OS X by the Unix DAC model used within Mac OS X.
Windows is less secure because most apps (Chrome only exception I can recall) install their associated files in levels of the system that require authentication regardless of user account type (unless Admin in Windows XP because running as superuser - no authentication required to install with elevated privileges - very dangerous). It is easier to trick Windows users to install a trojan with elevated privileges given that almost all apps ask for authentication to install and the user can not distinguish the intent of that authentication.
Page 30
The claim that the Application folder is unprotected is false. Security sensitive apps within the Application folder are owned by system.
Also, security sensitive system binaries are still stored in /bin and /sbin in Mac OS X.
Page 31
The ability to read the contacts stored in Address Book could be used by a worm to propagate. But, malware that uses this to spread is not likely to appear in the wild if the malware is not profitable. It is unlikely that malware will be profitable without being able to hook (this is a specific function) into apps owned by system.
Page 33
Starts off talking about trojans, trojans are easily avoided with user knowledge in Mac OS X because most apps do not require authentication to install if installed in the appropriate location where the Unix DAC model protects the system.
Viruses using the model shown in the article will not be successful without privilege escalation. This is the reason why Mac OS X malware is not successful in the wild.
By default, very few server side services are exposed in Mac OS X and those that are exposed are sandboxed. Vectors for worm propagation are limited to client side. Client side worms require authentication to install and spread if do not include privilege escalation via exploitation because of the Unix DAC model used in Mac OS X. Trojans used to trick users to authenticate are less likely to be successful in Mac OS X as stated above.
Music-Man
Sep 14, 09:01 AM
Any news if Steve will give a keynote in the special event preceeding photokina?
Have a look at the front page.
Have a look at the front page.
Jilted John
May 4, 08:01 AM
Just pulled the trigger on a new base 21 (500GB/TB/MTP)... then spotted the last-gen base 27 on sale on the refurb page for a similar price (1TB/Mini Display Port/MM). I was happy enough with the 21, but now I'm getting buyers remorse. Processor aside, the old base 27 looks the equal of, or superior to, the new base 21.
Is having the new processor and TB worth more than the bigger HD and screen? Any thoughts?
Is having the new processor and TB worth more than the bigger HD and screen? Any thoughts?
jwdsail
Apr 14, 06:19 PM
USB must DIE! Die die die!!! Kill it! Kill it dead! DEAD!!!!!
Not that I'm bitter about slow as molasses in MN in January transfer speeds or anything...
Not that I'm bitter about slow as molasses in MN in January transfer speeds or anything...
Hattig
Mar 29, 12:53 PM
Let's ask yourself this.. they are saying that approx 1 in every 17 people now have a Windows based phone?? Do you know ANYONE that does?? Cause I know hundreds of people who have smartphones and not one of them has a Windows based phone.. major statistical failure!
They must be counting the old Windows Mobile 6.x devices too - a very shaky thing to count as definite wins for WP7 in the future. A lot of those old WP6 devices are corporate, and we all know that corporate phones are moving towards the iPhone or BlackBerry.
They must be counting the old Windows Mobile 6.x devices too - a very shaky thing to count as definite wins for WP7 in the future. A lot of those old WP6 devices are corporate, and we all know that corporate phones are moving towards the iPhone or BlackBerry.
LagunaSol
Apr 19, 09:23 AM
Salesperson: Sir, they're only vaguely the same shape.
And I don't think "vaguely" means what you think it means.
And I don't think "vaguely" means what you think it means.
xxxamazexxx
Mar 29, 01:02 PM
Looking at the figures right now anyone can easily see that iOS is not the dominating platform. Not even the second most popular (which is Symbian), but does anyone really care ? Same case with the Macs and Mac OS X.
I would really like to see Microsoft step up the game because in the end, we customers are the ones receiving most benefit.
I had been a loyal Windows user (up to Windows 7) when I switched to Mac last year. My take is that Windows and its creators are not technically inferior to Mac OS and Apple, but their corporate philosophy has never sported the acumen and, guess what, common sense with which Steve Jobs creates such reliable, handsome products.
I would really like to see Microsoft step up the game because in the end, we customers are the ones receiving most benefit.
I had been a loyal Windows user (up to Windows 7) when I switched to Mac last year. My take is that Windows and its creators are not technically inferior to Mac OS and Apple, but their corporate philosophy has never sported the acumen and, guess what, common sense with which Steve Jobs creates such reliable, handsome products.
MacRumors
Apr 20, 09:43 AM
http://www.macrumors.com/images/macrumorsthreadlogo.gif (http://www.macrumors.com/2011/04/20/researchers-disclose-iphone-and-ipad-location-tracking-privacy-issues/)
A pair of security researchers today announced (http://radar.oreilly.com/2011/04/apple-location-tracking.html) that they are sounding the privacy warning bell about the capability of iOS 4 to track the location of an iPhone or iPad on an ongoing basis, storing the data to a hidden file known as "consolidated.db" in the form of latitude and longitude and a timestamp for each point.All iPhones appear to log your location to a file called "consolidated.db." This contains latitude-longitude coordinates along with a timestamp. The coordinates aren't always exact, but they are pretty detailed. There can be tens of thousands of data points in this file, and it appears the collection started with iOS 4, so there's typically around a year's worth of information at this point. Our best guess is that the location is determined by cell-tower triangulation, and the timing of the recording is erratic, with a widely varying frequency of updates that may be triggered by traveling between cells or activity on the phone itself.While the consolidated.db file has been known for some time and has played a key role in forensic investigations of iOS devices by law enforcement agencies, the researchers note the data is available on the devices themselves and in backups in unencrypted and unprotected form, leading to significant privacy concerns. Once gathered, the data is saved in backups, restored to devices if necessary, and even migrated across devices, offering a lengthy history of a user's movement.
Article Link: Researchers Disclose iPhone and iPad Location-Tracking Privacy Issues (http://www.macrumors.com/2011/04/20/researchers-disclose-iphone-and-ipad-location-tracking-privacy-issues/)
A pair of security researchers today announced (http://radar.oreilly.com/2011/04/apple-location-tracking.html) that they are sounding the privacy warning bell about the capability of iOS 4 to track the location of an iPhone or iPad on an ongoing basis, storing the data to a hidden file known as "consolidated.db" in the form of latitude and longitude and a timestamp for each point.All iPhones appear to log your location to a file called "consolidated.db." This contains latitude-longitude coordinates along with a timestamp. The coordinates aren't always exact, but they are pretty detailed. There can be tens of thousands of data points in this file, and it appears the collection started with iOS 4, so there's typically around a year's worth of information at this point. Our best guess is that the location is determined by cell-tower triangulation, and the timing of the recording is erratic, with a widely varying frequency of updates that may be triggered by traveling between cells or activity on the phone itself.While the consolidated.db file has been known for some time and has played a key role in forensic investigations of iOS devices by law enforcement agencies, the researchers note the data is available on the devices themselves and in backups in unencrypted and unprotected form, leading to significant privacy concerns. Once gathered, the data is saved in backups, restored to devices if necessary, and even migrated across devices, offering a lengthy history of a user's movement.
Article Link: Researchers Disclose iPhone and iPad Location-Tracking Privacy Issues (http://www.macrumors.com/2011/04/20/researchers-disclose-iphone-and-ipad-location-tracking-privacy-issues/)
mcrain
Apr 20, 02:56 PM
So, AFTER paying 30% in federal and state income taxes, whatever percentage in sales and property tax, you are still able give away an additional 50% or more to charity? So you are able to live on like 3% of your earnings? I would LOVE to be in that position! It's very admirable, but hardly reachable for the average person. I try to give whenever I can, but I can admit that's it's usually around $2k a year.
Actually, it is far more likely that they donate from pre-tax earnings, then use those donations to reduce their tax burden. The end result being a net tax rate of something like the 17-25% most high income taxpayers pay.
Actually, it is far more likely that they donate from pre-tax earnings, then use those donations to reduce their tax burden. The end result being a net tax rate of something like the 17-25% most high income taxpayers pay.
ThomBombadil
Jan 13, 02:15 PM
I have just installed Sophos Anti Virus - what a mistake!
I decided to install it because I have been a long term user of Sophos at work on the corporate PC and having installed the latest OSX I saw virus checkers in the App Store and a recommendation for Sophos there in a reference for another product.
I ran a scan and a couple of PC specific malware files were found and destroyed.
Then I noticed that my Time Machine back up was struggling.
It turns out that there are issues with Sophos and Time Machine.
I moved my Time Machine back ups to a DroboFS in December I have now lost all my back ups since then.
Once I have backed up again I will be deinstalling it - bet I find that I loose the new back up then!
:mad:
My wife is a University employee and Sophos is one of the IT folks recommended software programs. It seems to work fine on my 2gHz MBP Core (1) Duo and on the Mini without upsetting Time Machine. My 867mHz 12" PB is slow running Leopard, barely functional if Sophos is added as well, so I do not use it on the 12". AV software may not be a necessity but, if it does not cause a problem, or slow things noticably, I think it is a reasonable precaution. I'm not sure if "herd immunity" is an apt analogy, but I think if everyone tried to avoid passing on virus/trojan/malware/spam etc it would be a good thing.
I decided to install it because I have been a long term user of Sophos at work on the corporate PC and having installed the latest OSX I saw virus checkers in the App Store and a recommendation for Sophos there in a reference for another product.
I ran a scan and a couple of PC specific malware files were found and destroyed.
Then I noticed that my Time Machine back up was struggling.
It turns out that there are issues with Sophos and Time Machine.
I moved my Time Machine back ups to a DroboFS in December I have now lost all my back ups since then.
Once I have backed up again I will be deinstalling it - bet I find that I loose the new back up then!
:mad:
My wife is a University employee and Sophos is one of the IT folks recommended software programs. It seems to work fine on my 2gHz MBP Core (1) Duo and on the Mini without upsetting Time Machine. My 867mHz 12" PB is slow running Leopard, barely functional if Sophos is added as well, so I do not use it on the 12". AV software may not be a necessity but, if it does not cause a problem, or slow things noticably, I think it is a reasonable precaution. I'm not sure if "herd immunity" is an apt analogy, but I think if everyone tried to avoid passing on virus/trojan/malware/spam etc it would be a good thing.