Which software should I use for my Mac system

I Am ready to purchase new software for my video production company and need to speak to someone to make the correct decisions...
my questions entail, which products, which plugins which product is best suited for my Mac Maverick OS?

A good place to start would be to ask a question on the Premiere Pro forum here:
AdobePremiere Pro®

Similar Messages

  • HT1338 What anti-virus software shall I use for my Mac OS X 10.6.8?

    What anti-virus software shall I use for my Mac OS X 10.6.8?

    There are many forms of ‘Malware’ that can affect a computer system, of which ‘a virus’ is but one type, ‘trojans’ another. Using the strict definition of a computer virus, no viruses that can attack OS X have so far been detected 'in the wild', i.e. in anything other than laboratory conditions. The same is not true of other forms of malware, such as Trojans. Whilst it is a fairly safe bet that your Mac will NOT be infected by a virus, it may have other security-related problem, but more likely a technical problem unrelated to any malware threat.
    You may find this User Tip on Viruses, Trojan Detection and Removal, as well as general Internet Security and Privacy, useful: The User Tip seeks to offer guidance on the main security threats and how to avoid them.
    https://discussions.apple.com/docs/DOC-2435

  • HT3669 which driver should i use for the epson LX300 matrix-dot printer??

    which driver should i use for the epson LX300 matrix-dot printer??? I dowloaded all drivers for epson but i didn't find the driver for the LX300.
    I bought an i mac not so long ago, can anyone help me about this?

    i use parallels desktop 7 because i use a program for work with windows XP. Is there really no solution?

  • Which software can i use for recovery management that will allow me to use DVD's instead of Flashdsk

    which software can i use for recovery management that will allow me to use DVD's instead of Flashdisk? I find DVD's easier to use. i am using windows 10

    As the other posters wrote in order to take a movie file and turn it into a DVD that can be played in standard DVD players you need a DVD authoring application. That you need a separate program to create the DVD is standard procedure and has been that way since the beginning. All Apple produce that can produce video files require an external authoring program. iMovie, iPhoto and Final Cut all do this.
    One other thing I will comment on is your choice of output format. You will almost certainly be disappointed with the video quality of your finished DVD if you put a HD video on a SD DVD. Unless you plan to burn a bluray disk you will get a better quality video if you output as SD if you plan to burn to an SD disk.
    regards

  • What software should I use for editing videos from a Vixia HF R500?

    I have a VIxia HF R500. What editing software should I use. I am a beginner.

    Hi OM45GTR!
    Thanks for posting.
    Depending on what platform you are editing on, you may consider programs like Windows Movie Maker or Apple's iMovie.
    Did this answer your question? Please click the Accept as Solution button so that others may find the answer as well.

  • Which listener should be used for JTextArea

    Hi,
    I need to add a listener for JTextArea particualy when
    the text in the jtextarea is changed. I don't think
    mouse listener is enough, since the user can use tab to
    get to the jtextarea and edit the text. In this case,
    which listener should I use. Sample code would be
    helpful.
    In addition, I have a problem with the jtextarea that
    when user uses tab to go to different gui components,
    such as jtextfield, jcombobox, jtextarea, jlist, etc, the
    tab stays in the jtextarea and keeps appending to it. It does
    not go to next component, such as jlist. How can I make it
    work?
    Thanks in advance,
    Pin

    It doesn't work. Are you using 1.4 or 1.3? I am using
    1.4.
    In the 1.4 API, it says that isManagingFocus is
    "Deprecated".
    Here is what I have:
    JTextArea descrptArea = new JTextArea() {
    public boolean isManagingFocus() {
    return false;
    descrptArea.setRows(3);
    descrptArea.setLineWrap(true);
    descrptArea.addKeyListener(new KeyAdapter() {
    public void keyTyped(KeyEvent e) {
    // DO SOMETHING
    I found the following code which says it will do it.
    However, I got the exeception:
    java.lang.ClassCastException:
    n: javax.swing.KeyStroke
    at java.util.TreeMap.compare(TreeMap.java:1081)
    at java.util.TreeMap.put(TreeMap.java:459)
    at java.util.TreeSet.add(TreeSet.java:205)
    Set forwardTraversalKeys = new TreeSet();
    forwardTraversalKeys.add(KeyStroke.getKeyStroke('\t'));
    forwardTraversalKeys.add(KeyStroke.getKeyStroke(KeyEven
    .VK_TAB,
    InputEvent.CTRL_MASK));
    textArea.setFocusTraversalKeys
    (KeyboardFocusManager.FORWARD_TRAVERSAL_KEYS,
    forwardTraversalKeys);
    Set backwardTraversalKeys = new TreeSet();
    backwardTraversalKeys.add(KeyStroke.getKeyStroke(KeyEve
    t.VK_TAB,
    InputEvent.SHIFT_MASK));
    backwardTraversalKeys.add(KeyStroke.getKeyStroke(KeyEve
    t.VK_TAB,
    InputEvent.SHIFT_MASK |InputEvent.CTRL_MASK));
    textArea.setFocusTraversalKeys(
    KeyboardFocusManager.BACKWARD_TRAVERSAL_KEYS,
    backwardTraversalKeys);
    Any idea???
    PinI'm not using 1.4 but the class cast exceptions look like they come from : Set forwardTraversalKeys=new TreeSet() etc
    try : TreeSet forwardTraversalKeys=new TreeSet()
    you cant cast from a Set to a TreeSet because a TreeSet is a Set but a Set is NOT a TreeSet.
    hope this helps.

  • Which operator  should i used for loading not matched records

    HI ALL,
    I am just evluate OWB tools.
    and i met a question.
    I need to join two tables A and B with Condition A.id=B.id
    For example,
    A has 1000 records, and B has 100 records,
    what i need to do is
    (1) to get matched 100 record from B to a new table C,
    (2)to get the not matched 900 records from A to another table D.
    By the requirement like above, which operator could i use for?
    I tried to use joined but can not get the record of (2).
    Thanks for your attention.
    Regards

    Hi,Sutirtha
    Thanks for your attention.
    because joiner has only one output group.
    so what you mean is use joiner operator twice?
    One joiner userd to get the matched records,
    and the other used to get unmatched records?
    Thanks
    Rachel

  • Which antivirus software should i use for my iMac

    Hello,
    Wondering which antivirus software is recommended by Apple for an iMac?
    Thanks,
    Lisa C.

    VIRUSES
    No viruses that can attack OS X have so far been detected 'in the wild', i.e. in anything other than laboratory conditions.
    It is possible, however, to pass on a Windows virus to another Windows user, for example through an email attachment. To prevent this all you need is the free anti-virus utility ClamXav, which you can download for Tiger from:
    http://www.clamxav.com/download.php#tiger
    and for Leopard, Snow Leopard and Lion from here:
    http://www.clamxav.com/
    Note: If you wish to uninstall ClamXav: keep a copy of the disk image from when you downloaded it, or download it again - the uninstaller is included with the application. To uninstall, quit ClamXav Sentry (if you use it) and make sure it's not set to launch at log in. The uninstaller will remove the engine and any schedules you've got set up, then just drag ClamXav.app to the trash.
    If you are already using ClamXav: please ensure that you have installed all recent  Apple Security Updates  and that your version of ClamXav is the latest available.
    Do not install Norton Anti-Virus on a Mac as it can seriously damage your operating system. Norton Anti-Virus is not compatible with Apple OS X.
    FAKE ANTI-VIRUS SOFTWARE and associated MALWARE
    Do not be tricked by 'scareware' that tempts computer users to download fake anti-virus software that may itself be malware.
    Fake anti-virus software that infect PCs with malicious code are a growing threat, according to a study by Google. Its analysis of 240m web pages over 13 months showed that fake anti-virus programs accounted for 15% of all malicious software.
    Scammers trick people into downloading programs by convincing them that their PC is infected with a virus.
    Once installed, the software may steal data or force people to make a payment to register the fake product.
    Beware of PDF files from unknown sources. A security firm announced that by its counting, malicious Reader documents made up 80% of all exploits at the end of 2009.:
    http://www.computerworld.com/s/article/9157438/in which Rogue_PDFs_account_for_80_of_all_exploits_says_researcher
    TROJANS and RE-DIRECTION TO FAKE WEBSITES
    The appearance of Trojans and other malware that can possibly infect a Mac seems to be growing, but is a completely different issue to viruses.
    If you allow a Trojan to be installed, the user's DNS records can be modified, redirecting incoming internet traffic through the attacker's servers, where it can be hijacked and injected with malicious websites and pornographic advertisements. The trojan also installs a watchdog process that ensures the victim's  (that's you!)  DNS records stay modified on a minute-by-minute basis.
    You can read more about how, for example, the OSX/DNSChanger Trojan works (by falsely suggesting extra codecs are required for Quicktime) here:
    http://www.f-secure.com/v-descs/trojan_osx_dnschanger.shtml
    SecureMac has introduced a free Trojan Detection Tool for Mac OS X.  It's available here:
    http://macscan.securemac.com/
    First update the MacScan malware definitions before scanning. You can also contact their support team for any additional support - [email protected]
    The DNSChanger Removal Tool detects and removes spyware targeting Mac OS X and allows users to check to see if the trojan has been installed on their computer; if it has, the software helps to identify and remove the offending file. After a system reboot, the users' DNS records will be repaired.
    (Note that a 30 day trial version of MacScan can be downloaded free of charge from:
    http://macscan.securemac.com/buy/
    and this can perform a complete scan of your entire hard disk. After 30 days free trial the cost is $29.99. The full version permits you to scan selected files and folders only, as well as the entire hard disk. It will detect (and delete if you ask it to) all 'tracker cookies' that switch you to web sites you did not want to go to.)
    A white paper was published on the subject of Trojans by SubRosaSoft, available here:
    http://www.macforensicslab.com/ProductsAndServices/index.php?main_page=document_ general_info&cPath=11&products_id=174
    Also, beware of MacSweeper and MacDefender (also goes under the name of MacProtector, MacGaurd, MacSecurity or MacShield) :
    These are malware that misleads users by exaggerating reports about spyware, adware or viruses on their computer in an attempt to obtain payment.
    Mackeeper is equally worthless and should also be avoided. Again, the developer seeks to obtain payment for an application that does nothing that free utilities do not also offer, and in many cases it will also mess up your system.
    You can keep up to date, particularly about malware present in some downloadable pirated software, at the Securemac site:
    http://www.securemac.com/
    HOW TO AVOID RE-DIRECTION
    Adding Open DNS codes to your Network Preferences, should give good results in terms of added security as well as speed-up:
    Open System Preferences/Network. Double click on your connection type, or select it in the drop-down menu, and in the box marked 'DNS Servers' add the following two numbers:
    208.67.222.222
    208.67.220.220
    (You can also enter them if you click on Advanced and then DNS)
    Sometimes reversing the order of the DNS numbers can be beneficial in cases where there is a long delay before web pages start to load, and then suddenly load at normal speed:
    http://support.apple.com/kb/TS2296
    There may be other ways of guarding against Trojans, viruses and general malware affecting the Mac, and alternatives will probably appear in the future. In the meantime the advice is: be careful where you go on the web and what you download!
    WHAT TO DO IF YOU THINK YOUR MAC HAS BECOME 'INFECTED'
    If you think you may have acquired a Trojan, and you know its name, you can also locate it via the Terminal:
    http://theappleblog.com/2009/04/24/mac-botnet-how-to-ensure-you-are-not-part-of- the-problem/
    Although any content that you download has the possibility of containing malicious software, practising a bit of care will generally keep you free from the consequences of anything like the DNSChanger trojan.
    1. Avoid going to suspect and untrusted Web sites, especially p'orn'ography sites.
    2. Check out what you are downloading. Mac OS X asks you for you administrator password to install applications for a reason! Only download media and applications from well-known and trusted Web sites. If you think you may have downloaded suspicious files, read the installer packages and make sure they are legit. If you cannot determine if the program you downloaded is infected, do a quick Internet search and see if any other users reported issues after installing a particular program.
    3. Use an antivirus program like ClamXav. If you are in the habit of downloading a lot of media and other files, it may be well worth your while to run those files through this AV application.
    4. Use Mac OS X's built-in Firewalls and other security features.
    5.  Peer-to-peer sharing applications and download torrents (such as the now defunct LimeWire) supplying pirated software, movies etc are hotbeds of potential software issues waiting to happen to your Mac. Everything from changing permissions to downloading trojans and other malicious software can be acquired from using these applications. Similar risks apply to using Facebook, Twitter, MySpace, YouTube and similar sites which are prone to malicious hacking:  http://news.bbc.co.uk/1/hi/technology/8420233.stm
    6. Resist the temptation to download pirated software. They can contain Botnet Trojans.  SecureMac offer a simple and free tool for the removal of the iBotNet Trojan available here:
    http://macscan.securemac.com/files/iServicesTrojanRemovalTool.dmg
    YOUR PRIVACY ON THE INTERNET and the latest risks to look out for:
    There is the potential for having your entire email contact list stolen for use for spamming:
    http://www.nytimes.com/2009/06/20/technology/internet/20shortcuts.html?_r=1
    And if you are using iPhone Apps you are also at risk of losing all privacy:
    http://www.engadget.com/2010/10/03/hacker-claims-third-party-iphone-apps-can-tra nsmit-udid-pose-se/
    The advent of HTML5  may also be a future threat to internet privacy:
    http://www.nytimes.com/2010/10/11/business/media/11privacy.html?_r=1&hp
    Security of OS X generally:
    http://www.apple.com/macosx/what-is/security.html
    http://www.nsa.gov/ia/_files/os/applemac/I731-007R-2007.pdf
    Security Configuration for Version 10.5 Leopard:
    http://manuals.info.apple.com/en_US/Leopard_Security_Config_2nd_Ed.pdf
    NOTE: Apple's Snow Leopard and Lion operating systems silently update the malware protection built into Mac OS X to protect against a backdoor Trojan horse that can allow hackers to gain remote control over your treasured iMac or MacBook: Macs running Snow Leopard or Lion now check for new malware definitions daily, allowing Apple to quickly deploy protection from threats before they have a chance to spread.
    Few malicious titles actually exist for Mac OS X, and those that do rely almost entirely upon duping users to install software that pretends to be legitimate.
    http://www.sophos.com/blogs/gc/g/2010/06/18/apple-secretly-updates
    However, if you are running Lion Server:
    Apple's new server operating system -- OS X Lion -- is so inherently insecure that Stamos recommends keeping it off the network altogether and using Macs only as standalone machines connected to IP or Windows networks, not those designed for Macs.
    The Mac Server's networking protocols -- especially DHX User Authentication -- are designed for ease of use, not security. It is trivial, Stamos said, for hackers to set up a Mac user to download a file that will overflow the buffer protecting the heap segment of the server's memory, allowing the file's malicious payload to run uncontrolled in the server's memory and give itself whatever access rights it wants.
    http://www.macworld.co.uk/mac/news/index.cfm?newsid=3301796&olo=email

  • Which EBO should be used for employee absence data.

    Hi,
    We have the employee absences records in oracle ebiz which should be polled and send to a file.We have to implement this using AIA.Can anyone please tell me which EBO is used for this purpose.
    Thanks.

    Hi,
    I have the same requirement. Can you suggest which EBO did you use finally?
    Regards,
    Neeraj Sehgal

  • Which ID should I use for Family Sharing?

    My family has  the same iTunes ID (is this now called an iCloud ID??) so that we were able to share music. We logged into iTunes on our computers and our iphones with all the same iTunes ID.    We all have different Apple IDs and logged into our computers and iPhones with that ID.   How do I implement Family Sharing so that we still have the OLD music and shared app??  And which email address do I send the invitation?

    Hi gottalovemymac,
    When you join a family, you'll be asked to confirm the Apple ID that you regularly use for making iTunes, iBooks, and App Store purchases. Purchases from this account will be shared with your family members.
    That from 
    Sharing purchased content with Family Sharing
    It has more details too on setting up Family Sharing.
    You might also want to see
    Family Sharing
    Best Regards,
    Nubz

  • Difference between PDS and PPM and which one should be used for SNP /ppds?

    Hi Gurus,
                 Just wanted to know what are the difference between PDS and PPM ?
    1. For what industrial products we use PDS and PPM in SNP and PPDS?
    2. which one can be refered to clients?
    Please let me know it will be really great if anyone let me know the answers
    Thanks & Regards,
    Raj

    Hi Rajkumar,
    I have given below the detailed comparative account of PDS Vs PPM. Please copy and put it in an excel sheet in different columns and then read which is easy to understand.
    PDS
    1. Production Data Structure (PDS) in APO 3.1 & Run Time Object (RTO) in 4.0 and above versions
    2. Master Data Object
    3. Useful for scenarios where the compoenent has got different validity periods
    4. Used as Master data Basis for Planning in SAP-APO
    5. Contains active Master data from iPPE (Integrated Product and Process Engineering) generated from a production version
    6. PPDS PDS & SNP PDS can be used as master data for planning
    7. Change Management, variant configuration & Phantom assemplies are supported in PDS
    8. Sub-contracting in SNP is fully integrated with R/3 is supported in PDS
    9. Direct transfer of SNP PDS from R/3 is possible
    10.Rapid Planning Matrix can be generated
    11. Not possible to maintain PDS directly in APO and can be used only in combination with R/3
    12. The transfer of data changes is simpler
    13. Not possible to create alternate SNP-PDS in std system for different mode combinations
    14. PDS can be automatically generated from two sources ie R/3 and iPPE
    PPM:-
    1. Production Process Model
    2. Master Data Object
    3. Cannot be used for scenarios where the component has got different validity period
    4. Used as Master data Basis for Planning in SAP-APO
    5. Contains active Master data generated from the combination of routing (BoM & receipe) and production versions
    6. PPDS PPM & SNP PPM's can be used as master data for planning
    7. Not supported by PPM
    8. Not supported by PPM
    9. Not possible here. SNP PPMs will be generated via PPDS PPMs
    10. Not possible
    11. PPMs can be directly created in APO and can be modified without R/3 also.
    12. Little Complex when compared to PDS
    13. Alternate SNP-PPMs can be easily created
    14. PPM can be generated automatically generated only from R/3
    PDS is used in industries wherein there are multiple components or assemblies having diffeent production versions whose validity periods are different.  PPM is being used typically in process industries, chemical industries.  PPM is very simple in its usage and very flexible in operations in terms of modifications at APO level and can be referred to client depending on the business requirement
    Regards
    R. Senthil Mareeswaran.

  • Want to make a bootable clone...which software should I use?

    After an accident with my previous laptop I've realised the importance of backing up all my stuff.
    I decided on an OWC Mercury Elite-AL external hard drive and now it's arrived I want to make a bootable clone of my HD. Has anyone who has an OWC Drive tried the software that comes with it and is it any good? It's called intech Speedtools.
    I've heard a lot of people on here talk about Carbon Copy Cloner and SuperDuper. Which is the best (and easiest cos I'm pretty stupid) would you say or are there others I should consider? A while ago I remember reading CCC wasn't compatible with Tiger. Is this still a problem?
    Any advice, I'd be grateful...

    You can make a clone using Disk Utility's restore function. I haven't tried it in a while though because it kept making three invisible folder visible on the clone. That was supposedly fixed with a 10.4 update but it kept happening to me.
    Carbon Copy Cloner isn't yet truly Tiger compatible is my understanding. It hasn't been updated since the 10.3 days. Many have reported that it's started working again if you install the 10.4.2 update. I myself have been making clones of my machine with it since then and haven't had any issues. Except for some reason, I have to select the destination disk first instead of the source, otherwise the app has crashed on me on occasion.
    Super Duper has a lot of fans and got a great write-up in Macworld. It's shareware but looks very easy to use. If I wasn't in such a tight financial situation right now (my business has been a little light on customers lately), that's the one I'd buy. It's not expensive though so maybe I'm just really cheap.
    I've also used Lacie Silverkeeper which was a touch difficult to understand and it also made the same three invisible folders visible that Disk Utility did. I haven't tried it or checked for updates in a while though.
    I actually need to make a clone of my machine today so I'm going to try and see if Disk Utility works correctly.

  • Which driver should I use for Oracle RAC .....

    We are using Weblogic 8.1 sp2 and Oracle RAC (9.x). Which driver , I should
    use : i.e.
    type 2 Orcle thin driver
    or
    type 2 Oracle OCI driver
    or
    type 4 oracle thin driver
    or
    Jdrivers
    or other which is best for this configuration .
    Sanjeev

    Thanks. I was unaware of that forum.
    Joe
    Galen Boyer wrote:
    On Tue, 06 Jul 2004, [email protected] wrote:
    Galen Boyer wrote:
    Joe, I have always suggested that people use the OCI driver
    unless it won't suffice based on distribution requirements.
    How come you choose the thin driver? Oracle will generally
    fix the OCI driver before the thin and the OCI driver will
    give far superior performance when dealing with LOBs.We have actually had faster response getting thin driver fixes
    than OCI-based fixes. Thats interesting. I'll take note of it.
    The 10g driver works with RAC, is much faster than previous
    drivers, and is easier to install etc. OCI users are often
    hopeful about TAF, which is broken and less-than-useless for
    active complicated JDBC applications. OCI problems can bring
    down the whole JVM and are harder to debug.
    These are from reading the results and recommendations of
    Oracle Corporation, Tom Kyte and other Oracle professionals.
    Have you research to say different? I'd like to see it,
    because up until now, I've always suggested OCI first unless
    the client doesn't have an oracle client installation
    available.Tom does an excellent job from the DBMS perspective, but I
    don't see him often in the jdbc arena.His Q&A site is littered with jdbc examples. He also will call
    on people in specific expertise to help him answer questions.
    Here an example of that where he show the OCI driver to be much
    more performant.
    http://asktom.oracle.com/pls/ask/f?p=4950:8:9561536906412728184::NO::F4950_P8_DISPLAYID,F4950_P8_CRITERIA:1004630777647,

  • Which cable should I use for a MacBook to external VGA monitor

    Hello everyone
    Having just come back to Apple, last having used a Apple 2E way back in the 70's, I've got to get used to non-IBM compatible stuff!
    Please advise which cable is needed to hook up to a standard IBM compatible VGA screen/cable.
    Also, will the same cable do for an overhead projector with a VGA input port.
    Thank you

    Hi and welcome to Discussions and welcome back to the Apple world,
    this are the tech specs of your MacBook http://support.apple.com/kb/SP579 so you need a MiniDisplayPort to VGA adapter like this one http://store.apple.com/us/product/MB572Z/A?fnode=MTY1NDA5OQ&mco=MTA4MzU1NDg for connecting your IBm display and your projector.
    Regards
    Stefan

  • Which Function Should i use for static values for a an array[] in BPM 11g.

    Hi Experts,
    Please throw some light on this..
    I've a requirement which is bugging me..
    How do i assign a static value to a array in BPM11g in script activity. What exactly function do i need to use to assign a Static value for an Array []
    I been doing like taking the business object as a Array thats fine. But how can i set a static value in BPM 11g.
    Iam using BPM 11.1.1.6 version..
    Regards,
    Pavan

    Hi Pavan,
    Here's one approach, but it assumes you're comfortable with XSDs and XML.
    Know this is light on detail, but without knowing what your array looks like it's the best I can do. Here's what you'd do from a high level:
    1. Create an XSD that defines the structure of your array.
    2. Create the XML that represents the static item you want to add to the array.
    3. Create a process variable based on the XSD that defined the array.
    4. Add a Script activity.
    5. Open the "Implementation" tab -> click "Data Associations".
    6. On the right, expand the folder under your process -> drag the XML icon in the upper right corner on the array variable -> paste your XML into the XML literal panel.
    Hope this gets you going,
    Dan

Maybe you are looking for

  • Foreign Currency Transaction in ECC6

    I want to enter one transaction for selling 100 USD & purchasing INR. Can anybody proivde details as to how to enter transaction in ECC6. What are the requirements for doing the same. Information in details is required Vimal

  • HCM Transfer process - Authorization Check Failed

    Hi All     We are trying to run the Standard Transfer  process of HCM . We are trying to run the tcode u201C HRASR_TEST_PROCESSu201D  Can anybody Tell us what authorization objects does a user  require to run this process if the user does not have SA

  • TS2776 My I-pod will not sync with the i-tunes on my pc. What can I do?

    I have recently added some CDs to my i-tunes and tried to sync my i-pod but it gets to the second track and freezes. Therefore, it does not proceed any further and so I have a version of i-tunes on my pc which is different to my i-pod and I cannot sy

  • ICal Reporting and/or export to reporting tool

    I'd like to get a report of iCal entries either directly from iCal OR by exporting iCal entries to another tool (Word, Excel, etc.). Is there some way to do that? Thanks, mdh

  • Emacs GTK error. Can't open an X windows.

    Hi, Whenever I try to open emacs, I get the following errors: (emacs:8006): Gtk-CRITICAL **: gtk_distribute_natural_allocation: assertion `extra_space >= 0' failed (emacs:8006): Gtk-CRITICAL **: gtk_distribute_natural_allocation: assertion `extra_spa