Benjamins
Apr 9, 04:54 AM
Ahhh. A Gamer. Thanks.;) What you are seeing is called RDF. That field will not be around forever.
Barcelona+fc+logo+2011
jogos Barcelona+fc+2011
Fc+arcelona+logo+2011
Barcelona+fc+2011+jersey
Barcelona+fc+players+2011
BARCELONA, SPAIN - OCTOBER 03:
real madrid fc players 2011.
Players, fans apr arcelona,
arcelona fc jersey 2011.
fc barcelona 2011 (7),lionel
arcelona fc 2011 logo.
Article; Comments (6). Lionel
arcelona fc wallpaper 2011.
arcelona fc wallpaper 2011.
arcelona fc messi 2011.
FC Barcelona players celebrate
Players, fans apr arcelona,
arcelona fc 2011.
alexf
Aug 29, 12:00 PM
These groups don't care at all about the environment. They only want to hinder businesses. These are the same groups that protest plans and lobby politicians to stop building power plants and refineries so the existing ones can be over worked (lower efficiency) and not allow for downtime for maintenance, further lowering efficiency. These groups have an agenda that has nothing to do with the environment. I believe that Apple does just fine, as do many other companies. I'll gladly buy my Merom MBP and sell my Rev E 17" pbg4 as soon as Apple makes it available to me. :)
Oh yeah? Please kindly explain to all of us just what the "real agenda" of these "evil groups" such as Greenpeace is...
With all due respect, are you asleep?
Oh yeah? Please kindly explain to all of us just what the "real agenda" of these "evil groups" such as Greenpeace is...
With all due respect, are you asleep?
GGJstudios
May 2, 05:21 PM
A few people need to stop being so short sighted in trying to meticulously defend the idea of "no viruses on Macs". Ultimately it's a rather hollow ideal to uphold because uninitiated users accept it as gospel and it doesn't encourage them to adopt safe computer practices.
It's not an "idea" that there are no viruses in the wild that run on Mac OS X; it's a fact. Whether malware is a virus or trojan is important, because it determines what defense is required. Rather than lump everything together and erroneously call it a virus, it's more helpful to properly identify what kind of threat it is, so users know how best to handle it. Even in the absence of viruses, safe computer practices are always encouraged, such as not pirating software or downloading codecs or plug-ins from disreputable sites. In fact, it's more helpful to encourage safe computing practices than to recommend antivirus apps, which can give a user a false sense of security.
It's not an "idea" that there are no viruses in the wild that run on Mac OS X; it's a fact. Whether malware is a virus or trojan is important, because it determines what defense is required. Rather than lump everything together and erroneously call it a virus, it's more helpful to properly identify what kind of threat it is, so users know how best to handle it. Even in the absence of viruses, safe computer practices are always encouraged, such as not pirating software or downloading codecs or plug-ins from disreputable sites. In fact, it's more helpful to encourage safe computing practices than to recommend antivirus apps, which can give a user a false sense of security.
MacCoaster
Oct 10, 04:03 PM
ddtlm:
Ah, thanks for clarifying.
Ah, thanks for clarifying.
deannnnn
May 6, 10:07 PM
For christ's sake -- Arn, why not make a sticky for people who's phones work?
It's difficult for people who do not live in New York City to understand this issue. You should be happy that your iPhone works for you where you live, not upset at people who have difficulties with it.
It's difficult for people who do not live in New York City to understand this issue. You should be happy that your iPhone works for you where you live, not upset at people who have difficulties with it.
Trishul
Oct 27, 03:56 AM
ah i'm so glad i check this website, sold my Quad G5 day before yesterday, and put in an order for a Mac Pro, that would have arrived Tuesday, fortunately (at least i hope it turns out that way) i saw this news last night, being unable to cancel online, i had to call and have just now cancelled the order. Don't know how to read into this, and i doubt customer services are in possession of such information but when the lady asked me why i was cancelling i mentioned hearing about new version coming out, it was news to her she thought i was making it up, so she put me on hold, and came back after a minute or two, i was worried she was coming back with news saying i couldn't cancel my order or something, but she had a different tone as if someone told her the news was true and she was happy to cancel.
But seriously i wish there was some more concrete news of the Octo core, i'm going to have to finish off a lot of work this weekend before i ship my G5 on Monday, as i'm going to be without a Mac for at least 2-3 weeks, and even if the new Revision comes out as planned lord knows what the waiting time will be, what if they have option of x1950 or something and we are looking at the delays like before?
Looks like i have an excuse to get one of those new fangled MB Pros. no Mac for a month, can not imagine it. :(
But seriously i wish there was some more concrete news of the Octo core, i'm going to have to finish off a lot of work this weekend before i ship my G5 on Monday, as i'm going to be without a Mac for at least 2-3 weeks, and even if the new Revision comes out as planned lord knows what the waiting time will be, what if they have option of x1950 or something and we are looking at the delays like before?
Looks like i have an excuse to get one of those new fangled MB Pros. no Mac for a month, can not imagine it. :(
desdomg
Mar 20, 05:51 PM
If you view debate as a means to some sort of winner and looser type outcome the I can understand that you would reach that conclusion. However, the merits of a good debate, particularly one where their are strong opposing views, lie in the illumination of many points of view.
bringing IMO, this whole discussion has deteriorated beyond any form of usefulness. However, it does reaffirm two points -- never discuss either politics ("laws") or religion ("right" and "wrong") in mixed company. :)
The recent direction of this debate should have been seen as a non-starter -- that is, neither side of the argument is going to win and thus it's pointless to continue.
It does seem somewhat newsworthy, however, that there have been a few reports that the PyMusique utility has stopped working. Apparently you can no longer complete the purchase authorization. Can anyone else confirm this (may or may not be true)?
bringing IMO, this whole discussion has deteriorated beyond any form of usefulness. However, it does reaffirm two points -- never discuss either politics ("laws") or religion ("right" and "wrong") in mixed company. :)
The recent direction of this debate should have been seen as a non-starter -- that is, neither side of the argument is going to win and thus it's pointless to continue.
It does seem somewhat newsworthy, however, that there have been a few reports that the PyMusique utility has stopped working. Apparently you can no longer complete the purchase authorization. Can anyone else confirm this (may or may not be true)?
arn
Oct 25, 10:32 PM
It would be the first for Apple. :cool:
If the pricing is any indication, the (low end) Quad Core 2.33GHz Clovertown is the same price as the (high end) 3.0GHz Dual-core Xeon...
so unless the bottom of the line Mac Pro is expected to start at $3298, the current Dual-Core Xeon Mac Pros will stick around.
arn
If the pricing is any indication, the (low end) Quad Core 2.33GHz Clovertown is the same price as the (high end) 3.0GHz Dual-core Xeon...
so unless the bottom of the line Mac Pro is expected to start at $3298, the current Dual-Core Xeon Mac Pros will stick around.
arn
JoEw
Jan 20, 11:22 PM
i really divided on the matter i think android has a possibility of surpassing iphone market share only because android platform is on more then just 1 smart phone. However iphone is simplistic and has the app store which has way more developer backing then android does at the moment. Mainly because there is money to made from the app store where android simply does not have enough popularity for developers to make money from its store. I think the biggest thing hurting the iphone is the fact that it is locked on ATT. I think it needs to be on all major US cell networks or at least on verizon.
arkitect
Apr 15, 10:55 AM
BEST. POST. EVER.
So you are OK with the whole Ex-Gay thing?
And before you become over-wrought again, I am just reading what you wrote in reply to WestonHarvey1's post (http://forums.macrumors.com/showpost.php?p=12397392&postcount=126)… where he says he suspects you might be sympathetic to the ex-gay "cause". A post which you then labelled Best. Post. Ever.
So you are OK with the whole Ex-Gay thing?
And before you become over-wrought again, I am just reading what you wrote in reply to WestonHarvey1's post (http://forums.macrumors.com/showpost.php?p=12397392&postcount=126)… where he says he suspects you might be sympathetic to the ex-gay "cause". A post which you then labelled Best. Post. Ever.
faroZ06
May 2, 06:26 PM
Switching off or turning down UAC in Windows also equally impacts the strength of MIC (Windows sandboxing mechanism) because it functions based on inherited permissions. Unix DAC in Mac OS X functions via inherited permissions but MAC (mandatory access controls -> OS X sandbox) does not. Windows does not have a sandbox like OS X.
UAC, by default, does not use a unique identifier (password) so it is more susceptible to attacks the rely on spoofing prompts that appear to be unrelated to UAC to steal authentication. If a password is attached to authentication, these spoofed prompts fail to work.
Having a password associated with permissions has other benefits as well.
If "Open safe files after downloading" is turned on, it will both unarchive the zip file and launch the installer. Installers are marked as safe to launch because require authentication to complete installation.
No harm can be done from just launching the installer. But, you are correct in that code is being executed in user space.
Code run in user space is used to achieve privilege escalation via exploitation or social engineering (trick user to authenticate -> as in this malware). There is very little that can be done beyond prank style attacks with only user level access. System level access is required for usefully dangerous malware install, such as keyloggers that can log protected passwords. This is why there is little malware for Mac OS X. Achieving system level access to Windows via exploitation is much easier.
Webkit2 will further reduce the possibility of even achieving user level access.
The article suggested that the installer completed itself without authentication. I don't see how that is possible unless you are using the root account or something. It would give sudo access, but even still you'd get SOME dialog box :confused:
UAC, by default, does not use a unique identifier (password) so it is more susceptible to attacks the rely on spoofing prompts that appear to be unrelated to UAC to steal authentication. If a password is attached to authentication, these spoofed prompts fail to work.
Having a password associated with permissions has other benefits as well.
If "Open safe files after downloading" is turned on, it will both unarchive the zip file and launch the installer. Installers are marked as safe to launch because require authentication to complete installation.
No harm can be done from just launching the installer. But, you are correct in that code is being executed in user space.
Code run in user space is used to achieve privilege escalation via exploitation or social engineering (trick user to authenticate -> as in this malware). There is very little that can be done beyond prank style attacks with only user level access. System level access is required for usefully dangerous malware install, such as keyloggers that can log protected passwords. This is why there is little malware for Mac OS X. Achieving system level access to Windows via exploitation is much easier.
Webkit2 will further reduce the possibility of even achieving user level access.
The article suggested that the installer completed itself without authentication. I don't see how that is possible unless you are using the root account or something. It would give sudo access, but even still you'd get SOME dialog box :confused:
Don't panic
Mar 15, 03:14 PM
Well, not that I hope he's right, but words like these from people of high up places don't give any comfort.
Europe's energy commissioner Guenther Oettinger dubs Japan's nuclear disaster an "apocalypse,"
http://news.yahoo.com/s/afp/20110315/wl_afp/japanquakelivereport
yes, but it's a figure of speech.
however bad a realistic worst case scenario would be, it will not require permanent evacuation of anything but a few tens of square miles, if that.
for example, this is not going to be as bad as chernobyl by any stretch of imagination, since the design and built of the plant is much safer, and this uses water for cooling instead of graphite which is itself flammable. And in chernobyl, only the immediate surroundings and another area where the fallout was massive are still off-limits.
In addition, this plant is on the seashore, so about half of the contamination will be dispersed into the ocean.
on a separate note, i can confirm takao's post that many japanese cities have built "tsunami walls" including one of the cities shown in one of the videos (where you can clearly see the water coing over a wall and waterfalling into the city. It might have been inefective in a tsunami this massive, but I am sure they can work on smaller ones. One of the California nuclear power plant on the coast also has a similar 25 feet wall.
I also agree with takao on the bizarre design of putting the spent rods in a pool on top of the reactor and without any containment other than the cooling water and the roof.
it seems clearly a design flaw which hopefully will be/has been taken care of in other designs and fixes
Europe's energy commissioner Guenther Oettinger dubs Japan's nuclear disaster an "apocalypse,"
http://news.yahoo.com/s/afp/20110315/wl_afp/japanquakelivereport
yes, but it's a figure of speech.
however bad a realistic worst case scenario would be, it will not require permanent evacuation of anything but a few tens of square miles, if that.
for example, this is not going to be as bad as chernobyl by any stretch of imagination, since the design and built of the plant is much safer, and this uses water for cooling instead of graphite which is itself flammable. And in chernobyl, only the immediate surroundings and another area where the fallout was massive are still off-limits.
In addition, this plant is on the seashore, so about half of the contamination will be dispersed into the ocean.
on a separate note, i can confirm takao's post that many japanese cities have built "tsunami walls" including one of the cities shown in one of the videos (where you can clearly see the water coing over a wall and waterfalling into the city. It might have been inefective in a tsunami this massive, but I am sure they can work on smaller ones. One of the California nuclear power plant on the coast also has a similar 25 feet wall.
I also agree with takao on the bizarre design of putting the spent rods in a pool on top of the reactor and without any containment other than the cooling water and the roof.
it seems clearly a design flaw which hopefully will be/has been taken care of in other designs and fixes
Howdr
Mar 18, 08:20 AM
Glad I got the AT&T 3G iPad 2. :D:D:D
I was really considering jailbreaking for theathering but unlike some have a problem with stealing.
And YES I do believe that if I buy 2 GIG of data I should be able to use it as I wish. But just becuase I want it that way does not give me the right to do it.Its stealing because At&t says so? Really? How about At&t stealing from us? They are charging twice for the same Data, that is stealing from the users.
No offense but I think people are brainwashed.
In Europe and even here in the US there are many carriers who do not charge for tethering because honestly I think charging is not ethical.
Just because a thief (At&t) gets away with it does not make it right.
The law does not monitor contracts, it waits for us to complain and bring it to the judge. Maybe its time for a class action.
I was really considering jailbreaking for theathering but unlike some have a problem with stealing.
And YES I do believe that if I buy 2 GIG of data I should be able to use it as I wish. But just becuase I want it that way does not give me the right to do it.Its stealing because At&t says so? Really? How about At&t stealing from us? They are charging twice for the same Data, that is stealing from the users.
No offense but I think people are brainwashed.
In Europe and even here in the US there are many carriers who do not charge for tethering because honestly I think charging is not ethical.
Just because a thief (At&t) gets away with it does not make it right.
The law does not monitor contracts, it waits for us to complain and bring it to the judge. Maybe its time for a class action.
Iscariot
Mar 24, 11:34 PM
exactly, subtract the gangs, the mentally unstable, the non-Catholics and the inconclusively because the victim was homosexual and see where we are
Subtract the individuals affiliated with gangs and the mentally unstable and we're staring at a long list of homosexuals murdered by "mainstream" individuals, many of whom attended church on a regular basis and were in fact catholic. That their religious affiliations are not immediately telegraphed is not evidence of absence, but rather of the fact that 76% of the population self-identifies as Christian.
Subtract the individuals affiliated with gangs and the mentally unstable and we're staring at a long list of homosexuals murdered by "mainstream" individuals, many of whom attended church on a regular basis and were in fact catholic. That their religious affiliations are not immediately telegraphed is not evidence of absence, but rather of the fact that 76% of the population self-identifies as Christian.
AppleScruff1
Apr 20, 07:50 PM
You obviously don't work in IT or no anything about how viruses are spread. Windows can get a virus just by being on a network with an infected machine or opening an email in Outlook from someone on an infected machine. I fix these kind of issues for a living and see it all the time. The truth is its insanely easy for viruses to get onto, and hide in Windows. Windows allows the files to completely hide themselves even if hidden and system files are set to show. The only way to see them on an infected machine is to yank the hard drive and plug it into a mac or linux based machine then you can spot hidden infected files if you know where they are located.
So please, don't start with the "as long as users are smart" myth. It can easily happen to anyone, its a flaw in the OS.
I believe you can also pull the hard drive and scan it with another Windows based machine to find the files also.
So please, don't start with the "as long as users are smart" myth. It can easily happen to anyone, its a flaw in the OS.
I believe you can also pull the hard drive and scan it with another Windows based machine to find the files also.
econgeek
Apr 12, 11:21 PM
Reading the comments about $299 being a pretty good deal truly makes me laugh. Ten years ago a system of such capacity would be > $50K and you're downplaying $299.
Grow some perspective.
This is the problem with low-low pricing. If Apple charged $40k, maybe all the "professionals" would be onboard!
I think it is great to see the simplification of the product line. FCE always seemed an odd product out.
This is the internet. People are more invested in their egos than in understanding each other, and since several people have chosen to put words in my mouth to attack me, there's no point in really trying to advocate for the product here. Let the haters have the thread, I'm out.
Grow some perspective.
This is the problem with low-low pricing. If Apple charged $40k, maybe all the "professionals" would be onboard!
I think it is great to see the simplification of the product line. FCE always seemed an odd product out.
This is the internet. People are more invested in their egos than in understanding each other, and since several people have chosen to put words in my mouth to attack me, there's no point in really trying to advocate for the product here. Let the haters have the thread, I'm out.
dnedved
Sep 12, 05:04 PM
As an IT consultant, I recommend for anyone who's thinking of using an Airport Express for audio or a Mac Mini for a living room computer (or now this new iTV that will come out next year) to just spend the money on getting a wired connection. Ultimately, wireless will not be at the quality it needs to be to handle this throughput CONSISTENTLY. I still get skips on my Airpot Express when streaming from iTunes.
As an IT consultant you should know about caching. The bandwidth is there, a little bit of caching and the inconsistency caused by an occasional glitch in the throughput won't even be noticed. OS X doesn't do extensive read-ahead caching over network file systems. It's arguable whether a general-purpose OS even should (You and I probably both want it to but how often do you hear other users asking for it?) But with the workload that this device will be doing it's a no-brainer that doing 64-128MB of read-ahead would be a good idea. You can bet that Apple is smart enough to think of that. Hell, if they get the downloads working over the internet connection, the delivery around the LAN is much easier -- wired or wireless. 802.11g is a MUCH fatter pipe than anybody here's internet connection I'm willing to bet.
I agree with you about the current situation. It's just a simple tweak on the client though. Right now I even have occasional glitches streaming video off my NAS over GigE but it's just the lack of caching, it's certainly not a bandwidth issue with GigE!!!
As an IT consultant you should know about caching. The bandwidth is there, a little bit of caching and the inconsistency caused by an occasional glitch in the throughput won't even be noticed. OS X doesn't do extensive read-ahead caching over network file systems. It's arguable whether a general-purpose OS even should (You and I probably both want it to but how often do you hear other users asking for it?) But with the workload that this device will be doing it's a no-brainer that doing 64-128MB of read-ahead would be a good idea. You can bet that Apple is smart enough to think of that. Hell, if they get the downloads working over the internet connection, the delivery around the LAN is much easier -- wired or wireless. 802.11g is a MUCH fatter pipe than anybody here's internet connection I'm willing to bet.
I agree with you about the current situation. It's just a simple tweak on the client though. Right now I even have occasional glitches streaming video off my NAS over GigE but it's just the lack of caching, it's certainly not a bandwidth issue with GigE!!!
bigwig
Oct 27, 05:43 PM
That is simply false. The schedular in Mac OS X handles 8 cores just fine... what Applications do with them in a different story.
Scaling isn't really a product of your scheduler, it's a product of eliminating bottlenecks to multiple threads of execution. I'm glad that Apple is working on this. I didn't come up with this from whole cloth or animosity towards Apple, I saw several benchmarks showing how poorly OSX scaled, which I hope are now out of date.
I mentioned SGI several times here because I used to do kernel work for them, so I have a real good idea what it takes to scale performance on large (256-1024 CPU) systems. Btw, that's not a cluster, that's a single kernel being shared by all processors.
Scaling isn't really a product of your scheduler, it's a product of eliminating bottlenecks to multiple threads of execution. I'm glad that Apple is working on this. I didn't come up with this from whole cloth or animosity towards Apple, I saw several benchmarks showing how poorly OSX scaled, which I hope are now out of date.
I mentioned SGI several times here because I used to do kernel work for them, so I have a real good idea what it takes to scale performance on large (256-1024 CPU) systems. Btw, that's not a cluster, that's a single kernel being shared by all processors.
CorvusCamenarum
Mar 25, 02:36 PM
On the contrary, our own Supreme Court has held it to be a fundamental right, and the United States through its treaty making power has also held it as a right through the Universal Declaration of Human Rights (Article 16).
Got a source for that?
Is voting also a privilege?
Of course not, but then again, I've never needed a license to vote. Have you?
The fact that something is licensed does not change it from a right to a privilege.
If it were a right, one would not need a license in the first place. A license implies the privilege it confers can be revoked at any time, such as driving, operating a boat, driving a forklift, operating a vehicle with air brakes, hunting, fishing, carrying a concealed weapon, owning a weapon (in your country), or having a television (again in your country). Obviously, not an exhaustive list. Conversely, I do not require a license to speak my mind in public, worship as I choose, have counsel present in the face of criminal proceedings, etc. Similarly, the state can decide not to issue me a license if I do not meet the criteria for obtaining one, and marriage falls under this purview.
Got a source for that?
Is voting also a privilege?
Of course not, but then again, I've never needed a license to vote. Have you?
The fact that something is licensed does not change it from a right to a privilege.
If it were a right, one would not need a license in the first place. A license implies the privilege it confers can be revoked at any time, such as driving, operating a boat, driving a forklift, operating a vehicle with air brakes, hunting, fishing, carrying a concealed weapon, owning a weapon (in your country), or having a television (again in your country). Obviously, not an exhaustive list. Conversely, I do not require a license to speak my mind in public, worship as I choose, have counsel present in the face of criminal proceedings, etc. Similarly, the state can decide not to issue me a license if I do not meet the criteria for obtaining one, and marriage falls under this purview.
arkitect
Apr 15, 10:27 AM
Everybody deserves love and respect--it seems to me that this project is supportive of this notion. Very cool indeed.
At least someone gets the message. :)
At least someone gets the message. :)
ddtlm
Oct 12, 06:27 PM
nixd2001:
Those score I posted earlier were from the integer version of the loop that I was ripping on as meaningless. The float version is not quite so meaningless because you can't just unroll the thing, because floats get different results if the ops are even done in different orders. For the benefit of people who may not know it, with floating point numbers often 4x != x + x + x.
Anyway, my P3 Xeon 700 sports this compiler:
gcc version 2.96 20000731 (Red Hat Linux 7.3 2.96-112)
Results for the exact loop posted by PCUser are:
gcc -O driver.c -o exe && time ./exe
38.858
gcc -O2 -funroll-loops driver.c -o exe && time ./exe
38.818
On a side note, I also found gcc on my Mac after relogging into the terminal so that things were added to the path. Funny that the finder's find cannot see tools like gcc. I'll get results for that posted soon.
Those score I posted earlier were from the integer version of the loop that I was ripping on as meaningless. The float version is not quite so meaningless because you can't just unroll the thing, because floats get different results if the ops are even done in different orders. For the benefit of people who may not know it, with floating point numbers often 4x != x + x + x.
Anyway, my P3 Xeon 700 sports this compiler:
gcc version 2.96 20000731 (Red Hat Linux 7.3 2.96-112)
Results for the exact loop posted by PCUser are:
gcc -O driver.c -o exe && time ./exe
38.858
gcc -O2 -funroll-loops driver.c -o exe && time ./exe
38.818
On a side note, I also found gcc on my Mac after relogging into the terminal so that things were added to the path. Funny that the finder's find cannot see tools like gcc. I'll get results for that posted soon.
sinsin07
Apr 9, 09:42 AM
Or would be part of a larger game as sub-games. Nintendo do understand this kind of gaming but package it differently. I am not at all convinced that that packaging & pricing strategy would not work on iOS.
munkery
May 2, 04:14 PM
I'm curious how it auto-executes the installer because that can have potential damaging results for a user account, without privilege escalation. My data is all in my user account, I don't care about a few system files so much as I care about my data.
It auto-executes the installer because installers are marked as safe if "open safe files after downloading" is turned on.
This is not an example of shellcode being injected into a running application to execute code in user space.
It auto-executes the installer because installers are marked as safe if "open safe files after downloading" is turned on.
This is not an example of shellcode being injected into a running application to execute code in user space.
DeathChill
Apr 20, 10:09 PM
Outside of Apple's app and music apps, all other applications go into a saved state; i.e. not running in the background.
Uh, that's not true. Applications that don't use any of the seven (I think) multitasking API's go into a saved state; an application that uses one of those API's continues running (the particular task that the API allows).
The funny thing is that it is almost identical to Android's implementation. Unless an application is explicitly programmed to run in the background it goes into a saved state.
Uh, that's not true. Applications that don't use any of the seven (I think) multitasking API's go into a saved state; an application that uses one of those API's continues running (the particular task that the API allows).
The funny thing is that it is almost identical to Android's implementation. Unless an application is explicitly programmed to run in the background it goes into a saved state.
0 komentar:
Posting Komentar